Let's dive into the world of cybersecurity and explore how we can keep our digital assets safe from prying eyes and malicious attacks. Understanding Vulnerability Testing Vulnerability testing isn't just about finding weaknesses in systems; it's about safeguarding digital homes from unseen threats. Just like checking the locks and windows before bed, manual vulnerability testing … Continue reading A Guide for Manual Vulnerability Testing
blog
Beyond the Map: Ola’s Journey to Innovate with Homegrown Tech
In an era increasingly characterized by technological independence and innovation, Ola's initiative to create and implement its own mapping solution, Ola Maps, marks a pivotal development. This strategic move, projected to save the company approximately ₹100 crores annually by moving away from Azure and Google Maps, underscores a significant trend in India's technology sector: the … Continue reading Beyond the Map: Ola’s Journey to Innovate with Homegrown Tech
Guide to JSON Marshal/Unmarshal and Encode/Decode
Introduction JSON is a lightweight data-interchange format that is easy for humans to read and write, and easy for machines to parse and generate. In Go, working with JSON is made simple with the encoding/json package. This blog will explore the fundamentals of JSON marshal/unmarshal and encode/decode in Go, when to use them, a comparison of their … Continue reading Guide to JSON Marshal/Unmarshal and Encode/Decode
