DEV Community

Aditya Pratap Bhuyan profile picture

Aditya Pratap Bhuyan

404 bio not found

Joined Joined on  github website
Exploring Programming Languages with Support for SIMD Instructions

Exploring Programming Languages with Support for SIMD Instructions

Comments
3 min read
Understanding Docker and Kubernetes: Key Differences and Complementary Uses in Cloud Environments

Understanding Docker and Kubernetes: Key Differences and Complementary Uses in Cloud Environments

Comments
3 min read
Understanding Multithreading: Inner Workings and Key Concepts

Understanding Multithreading: Inner Workings and Key Concepts

Comments
4 min read
Can MySQL Support 10000 of Concurrent Connections Without a Performance Collapse in Low-Conflict Scenarios Like TPC-C Testing?

Can MySQL Support 10000 of Concurrent Connections Without a Performance Collapse in Low-Conflict Scenarios Like TPC-C Testing?

1
Comments
7 min read
How the Operating System Manages Hardware Resources in a Complete System

How the Operating System Manages Hardware Resources in a Complete System

1
Comments
7 min read
The Purpose of Computer Processors (CPUs) and How Multiple Cores Improve Speed and Performance

The Purpose of Computer Processors (CPUs) and How Multiple Cores Improve Speed and Performance

1
Comments
7 min read
Using a Public Repository on GitHub for Personal Projects: A Complete Guide

Using a Public Repository on GitHub for Personal Projects: A Complete Guide

1
Comments 1
7 min read
Maintaining Code Quality: Essential Concepts and Best Practices

Maintaining Code Quality: Essential Concepts and Best Practices

Comments
5 min read
Advantages and Disadvantages of Using Multiple CPUs vs. a Single Large CPU in Parallel Computing

Advantages and Disadvantages of Using Multiple CPUs vs. a Single Large CPU in Parallel Computing

Comments
9 min read
Understanding AIOps: The Future of IT Operations

Understanding AIOps: The Future of IT Operations

Comments
8 min read
The Relationship Between Access Control, Authorization, and Authentication

The Relationship Between Access Control, Authorization, and Authentication

Comments
8 min read
The Evolution of Hardware vs. Software Speed: Analyzing the Growing Gap Over Time

The Evolution of Hardware vs. Software Speed: Analyzing the Growing Gap Over Time

Comments
7 min read
Implementing Continuous Testing in a CI/CD Pipeline: A Comprehensive Guide

Implementing Continuous Testing in a CI/CD Pipeline: A Comprehensive Guide

Comments
6 min read
Configuring a Load Balancer for Your Web Application: A Comprehensive Guide

Configuring a Load Balancer for Your Web Application: A Comprehensive Guide

Comments
5 min read
The Comprehensive Guide to Code Review vs. Pair Programming: Understanding Key Differences and Best Practices

The Comprehensive Guide to Code Review vs. Pair Programming: Understanding Key Differences and Best Practices

Comments
9 min read
The Most Effective Two-Factor Authentication Methods in 2024: Enhancing Security with Multi-Factor Authentication

The Most Effective Two-Factor Authentication Methods in 2024: Enhancing Security with Multi-Factor Authentication

Comments
7 min read
Microservices vs. Service-Oriented Architecture: A Comprehensive Guide to Choosing the Right Architecture for Your Business

Microservices vs. Service-Oriented Architecture: A Comprehensive Guide to Choosing the Right Architecture for Your Business

27
Comments 1
10 min read
Implementing a Comprehensive Data Loss Prevention (DLP) Strategy

Implementing a Comprehensive Data Loss Prevention (DLP) Strategy

2
Comments
7 min read
Designing a Data Pipeline in Azure Data Factory (ADF) for Real-Time Data Ingestion and Transformation

Designing a Data Pipeline in Azure Data Factory (ADF) for Real-Time Data Ingestion and Transformation

Comments
4 min read
Managing Infrastructure as Code at Amazon: Tools, Strategies, and Practices

Managing Infrastructure as Code at Amazon: Tools, Strategies, and Practices

Comments
5 min read
Real-World Applications of Web3 Technology

Real-World Applications of Web3 Technology

4
Comments
5 min read
The Key Benefits and Applications of Optical Transceivers in Modern Networking Infrastructure

The Key Benefits and Applications of Optical Transceivers in Modern Networking Infrastructure

Comments
4 min read
The Role of MongoDB in the MEAN Stack Architecture

The Role of MongoDB in the MEAN Stack Architecture

Comments
5 min read
Optimizing Application Performance: Tools, Techniques, and Best Practices

Optimizing Application Performance: Tools, Techniques, and Best Practices

Comments
5 min read
Leveraging Quantum Principles for More Secure Communication Networks

Leveraging Quantum Principles for More Secure Communication Networks

Comments
5 min read
Comparative Analysis of macOS, GNU/Linux, FreeBSD, and Oracle Solaris: Features, Design, and Use Cases

Comparative Analysis of macOS, GNU/Linux, FreeBSD, and Oracle Solaris: Features, Design, and Use Cases

1
Comments
7 min read
The Impact of Clock Speed Versus Architecture on Computing Performance

The Impact of Clock Speed Versus Architecture on Computing Performance

Comments
6 min read
Synergies Between Quantum Computing and Edge Computing for Advancing AI and Machine Learning

Synergies Between Quantum Computing and Edge Computing for Advancing AI and Machine Learning

Comments
5 min read
Different Types of Reviews in the Software Development Life Cycle (SDLC)

Different Types of Reviews in the Software Development Life Cycle (SDLC)

1
Comments
4 min read
Transforming Enterprise IT Infrastructure with Software-Defined Networking (SDN)

Transforming Enterprise IT Infrastructure with Software-Defined Networking (SDN)

Comments
6 min read
Understanding Transcoding on NAS: A Comprehensive Guide

Understanding Transcoding on NAS: A Comprehensive Guide

Comments
6 min read
Maven Commands Cheat Sheet

Maven Commands Cheat Sheet

1
Comments
5 min read
Gradle Commands Cheat Sheet

Gradle Commands Cheat Sheet

Comments
5 min read
Strategies for Database Sharding and When to Use Them

Strategies for Database Sharding and When to Use Them

Comments
6 min read
Best Practices for Securing Cloud computing Environments and Data

Best Practices for Securing Cloud computing Environments and Data

Comments
6 min read
Understanding Executables (EXEs) and Dynamic Link Libraries (DLLs): A Comprehensive Guide

Understanding Executables (EXEs) and Dynamic Link Libraries (DLLs): A Comprehensive Guide

Comments
5 min read
Common Causes of Data Loss in Virtual Machines and How to Prevent It

Common Causes of Data Loss in Virtual Machines and How to Prevent It

Comments
5 min read
Best Practices and Techniques for Optimizing Java Code Performance

Best Practices and Techniques for Optimizing Java Code Performance

Comments
5 min read
Understanding FTP Servers: An In-Depth Guide

Understanding FTP Servers: An In-Depth Guide

Comments 1
8 min read
Storing and Securing User Data: Methods Used by Facebook and Google

Storing and Securing User Data: Methods Used by Facebook and Google

Comments
5 min read
Protecting Against SQL Injection: An Overview of Platform Measures

Protecting Against SQL Injection: An Overview of Platform Measures

Comments
7 min read
Data Center Network Architecture: A Comprehensive Guide

Data Center Network Architecture: A Comprehensive Guide

3
Comments
6 min read
Developing Applications Using Microservices: An Engineering Approach

Developing Applications Using Microservices: An Engineering Approach

Comments
5 min read
Understanding the TLS/SSL Protocol: How Ciphers and Keys are Generated

Understanding the TLS/SSL Protocol: How Ciphers and Keys are Generated

Comments
6 min read
Understanding Server-Side Scripting in Web Application Development

Understanding Server-Side Scripting in Web Application Development

3
Comments
7 min read
Popular Tech Stacks for Full-Stack Development in 2024

Popular Tech Stacks for Full-Stack Development in 2024

6
Comments
6 min read
Differences Between SQL and NoSQL Databases and Their Combined Use in Projects

Differences Between SQL and NoSQL Databases and Their Combined Use in Projects

4
Comments
6 min read
Understanding Serverless Architecture and Its Impact on Full Stack Development

Understanding Serverless Architecture and Its Impact on Full Stack Development

1
Comments
6 min read
Migrating Legacy Systems to Modern Full Stack Architectures: Challenges and Strategies

Migrating Legacy Systems to Modern Full Stack Architectures: Challenges and Strategies

Comments
5 min read
Free Cloud Relational Databases for Initial Web Application Development

Free Cloud Relational Databases for Initial Web Application Development

Comments
5 min read
Certifications to Kickstart Your Career in Reverse Engineering and Malware Analysis with C++ and Python

Certifications to Kickstart Your Career in Reverse Engineering and Malware Analysis with C++ and Python

Comments
5 min read
loading...