This post explores the pitfalls and steps to securely read an YAML file using SnakeYAML library
A post detailing about the Glove algorithm, its variations and utilities and further improvements on word representation
A post detailing more about the Word2Vec algorithm, its variations and utilities
A post about Introduction to NLP and basics of Word Vectors
This post discusses Fermat’s little theorum and its usage in modular arithmetic
In a recent working session, some of the best practices for a secure Android application development were discussed. Following were some of the important aspects of the discussion. Other the usual standards of securing the APK and securing the server-side components, some of the development and secure coding practices are listed in this post.
Some git and github usage secrets for quick reference.
This post chronicles the list of steps that were followed for selecting a database based on its attributes and capabilities
For a emailing solution we used velocity templates for simpler generation of Java mail templates and data. This post explains the code and the setup to get this in simple steps.
Our Project required PDF generation at various stages of the application and the uploading the same into the FileNet FTP. PD4ML was used for generation and saving the file locally into the server from which the PDF got generated to the FileNet.