<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Eduguru</title>
	<atom:link href="https://blog.eduguru.in/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.eduguru.in</link>
	<description>Tech Blog and Discussion</description>
	<lastBuildDate>Mon, 06 Apr 2026 02:51:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.eduguru.in/wp-content/uploads/2016/02/cropped-eduguru-logo-32x32.jpg</url>
	<title>Eduguru</title>
	<link>https://blog.eduguru.in</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top Courses After 10th Class: A Comprehensive Guide</title>
		<link>https://blog.eduguru.in/course-after-10th/courses-after-10th-class</link>
					<comments>https://blog.eduguru.in/course-after-10th/courses-after-10th-class#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 02:51:01 +0000</pubDate>
				<category><![CDATA[course after 10th]]></category>
		<category><![CDATA[academic streams]]></category>
		<category><![CDATA[career options]]></category>
		<category><![CDATA[courses after 10th]]></category>
		<category><![CDATA[education in india]]></category>
		<category><![CDATA[vocational training]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15850</guid>

					<description><![CDATA[Discover diverse courses available after 10th class that can shape your career. This guide covers academic and vocational paths for students in India.]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/course-after-10th/courses-after-10th-class/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Turning the Tables: An App That Challenges Students&#8217; Easy Answers : ChatGPT</title>
		<link>https://blog.eduguru.in/artificial-intelligent/app-to-argue-with-students</link>
					<comments>https://blog.eduguru.in/artificial-intelligent/app-to-argue-with-students#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 02:07:58 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI in education]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[critical thinking]]></category>
		<category><![CDATA[debate skills]]></category>
		<category><![CDATA[educational technology]]></category>
		<category><![CDATA[India education]]></category>
		<category><![CDATA[learning apps]]></category>
		<category><![CDATA[student engagement]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15847</guid>

					<description><![CDATA[Explore how a teacher created an app to foster critical thinking among students, challenging their reliance on easy answers from AI like ChatGPT.]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/artificial-intelligent/app-to-argue-with-students/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding AI Safety and Ethics for a Better Future</title>
		<link>https://blog.eduguru.in/artificial-intelligent/ai-safety-and-ethics</link>
					<comments>https://blog.eduguru.in/artificial-intelligent/ai-safety-and-ethics#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 01 Apr 2026 02:13:30 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[ai ethics]]></category>
		<category><![CDATA[ai safety]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[EDUCATION]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[responsible ai]]></category>
		<category><![CDATA[societal impact]]></category>
		<category><![CDATA[technology development]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15845</guid>

					<description><![CDATA[This article delves into AI safety and ethics, highlighting their significance in technology development and societal impact.]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/artificial-intelligent/ai-safety-and-ethics/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Exploring Career Options After the 10th Exam in India</title>
		<link>https://blog.eduguru.in/result/career-options-after-10th-exam</link>
					<comments>https://blog.eduguru.in/result/career-options-after-10th-exam#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 10:11:30 +0000</pubDate>
				<category><![CDATA[result]]></category>
		<category><![CDATA[Career Options After the 10th Exam]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15843</guid>

					<description><![CDATA[This article explores various career options available for students after completing their 10th exam in India, highlighting pathways in academics and vocational training.]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/result/career-options-after-10th-exam/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Rise of Agentic AI: From Tools to Autonomous Decision-Makers</title>
		<link>https://blog.eduguru.in/artificial-intelligent/the-rise-of-agentic-ai-from-tools-to-autonomous-decision-makers</link>
					<comments>https://blog.eduguru.in/artificial-intelligent/the-rise-of-agentic-ai-from-tools-to-autonomous-decision-makers#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 01:51:50 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI Agent]]></category>
		<category><![CDATA[Benefits of Agentic AI]]></category>
		<category><![CDATA[CRM & Sales Automation]]></category>
		<category><![CDATA[Customer Support Automation]]></category>
		<category><![CDATA[Key Technologies Behind Agentic AI]]></category>
		<category><![CDATA[LLMs]]></category>
		<category><![CDATA[Multi-Agent Collaboration]]></category>
		<category><![CDATA[Real-World Use Cases of AI]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[The Rise of Agentic AI: From Tools to Autonomous Decision-Makers]]></category>
		<category><![CDATA[Voice Bots & Call Centers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15841</guid>

					<description><![CDATA[Introduction Artificial Intelligence has long been seen as a tool—something that responds when prompted, executes commands, and assists humans in defined tasks. But a new paradigm is rapidly emerging: Agentic AI. Agentic AI refers to systems that can act autonomously, make decisions, pursue goals, and adapt over time with minimal human intervention. Instead of waiting ... <a title="The Rise of Agentic AI: From Tools to Autonomous Decision-Makers" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/the-rise-of-agentic-ai-from-tools-to-autonomous-decision-makers" aria-label="Read more about The Rise of Agentic AI: From Tools to Autonomous Decision-Makers">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/artificial-intelligent/the-rise-of-agentic-ai-from-tools-to-autonomous-decision-makers/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BSEB 10th Result 2026 (OUT) Highlights: Bihar Board Matric result declared @ matricbiharboard.com; 81.79% pass, direct link here</title>
		<link>https://blog.eduguru.in/uncategorized/bseb-10th-result-2026-out-highlights-bihar-board-matric-result-declared-matricbiharboard-com-81-79-pass-direct-link-here</link>
					<comments>https://blog.eduguru.in/uncategorized/bseb-10th-result-2026-out-highlights-bihar-board-matric-result-declared-matricbiharboard-com-81-79-pass-direct-link-here#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 02:11:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[486]]></category>
		<category><![CDATA[487]]></category>
		<category><![CDATA[488]]></category>
		<category><![CDATA[489]]></category>
		<category><![CDATA[492]]></category>
		<category><![CDATA[97.2 5]]></category>
		<category><![CDATA[97.4 4]]></category>
		<category><![CDATA[97.4 5]]></category>
		<category><![CDATA[97.6 3]]></category>
		<category><![CDATA[97.6 4]]></category>
		<category><![CDATA[97.8 3]]></category>
		<category><![CDATA[98.4 1]]></category>
		<category><![CDATA[98.4 2]]></category>
		<category><![CDATA[Abhnish Kumar]]></category>
		<category><![CDATA[Ansh Raj]]></category>
		<category><![CDATA[Anubhav Kumar]]></category>
		<category><![CDATA[Anupa Kumari]]></category>
		<category><![CDATA[B P High School Begusarai]]></category>
		<category><![CDATA[B S S High School Rajwara]]></category>
		<category><![CDATA[Banka]]></category>
		<category><![CDATA[Begusarai]]></category>
		<category><![CDATA[Bhojpur]]></category>
		<category><![CDATA[Bikash Kumar Gupta]]></category>
		<category><![CDATA[BSEB 10th Result 2026 (OUT) Highlights: Bihar Board Matric result declared @ matricbiharboard.com; 81.79% pass]]></category>
		<category><![CDATA[Buxar]]></category>
		<category><![CDATA[direct link here]]></category>
		<category><![CDATA[Female]]></category>
		<category><![CDATA[Gender]]></category>
		<category><![CDATA[J P N High School Narhan]]></category>
		<category><![CDATA[Jyoti Kumari]]></category>
		<category><![CDATA[Kaimur]]></category>
		<category><![CDATA[Madita Vidyarthi H/S Bharatshila]]></category>
		<category><![CDATA[Male]]></category>
		<category><![CDATA[Marks Obtained]]></category>
		<category><![CDATA[Nahid Sultana]]></category>
		<category><![CDATA[Nasrin Parvin]]></category>
		<category><![CDATA[Om Kumar]]></category>
		<category><![CDATA[Percentage 1]]></category>
		<category><![CDATA[Prerna Kumari]]></category>
		<category><![CDATA[Purnea]]></category>
		<category><![CDATA[Pushpanjali Kumari]]></category>
		<category><![CDATA[R D M High School Gadhani]]></category>
		<category><![CDATA[R K RIT High School Banwaripur]]></category>
		<category><![CDATA[Rupesh Kumar]]></category>
		<category><![CDATA[S S 108 High School Hatta]]></category>
		<category><![CDATA[Sabreen Praween]]></category>
		<category><![CDATA[Saharsa]]></category>
		<category><![CDATA[Samastipur]]></category>
		<category><![CDATA[School Name]]></category>
		<category><![CDATA[Simultala Awasiya Vidyalaya Jamui]]></category>
		<category><![CDATA[Student Name]]></category>
		<category><![CDATA[Uchch Madhyamik Vidyalaya Chhaurahi]]></category>
		<category><![CDATA[Uchch Madhyamik Vidyalaya Kharahana]]></category>
		<category><![CDATA[Uchh Madhyamik School Suhath]]></category>
		<category><![CDATA[Utkramit M S Bairiya Gauripur Rupauli]]></category>
		<category><![CDATA[Vaishali]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15837</guid>

					<description><![CDATA[he Bihar School Examination Board (BSEB) is set to release the Matric Annual Examination 2026 results today, March 29. The official announcement confirms that the Class 10 scores will be released during a press conference at the BSEB headquarters in Patna. BSEB 10th Result 2026: Pass percentage over the years 2026: 81.79% 2025: 82.11% 2024: ... <a title="BSEB 10th Result 2026 (OUT) Highlights: Bihar Board Matric result declared @ matricbiharboard.com; 81.79% pass, direct link here" class="read-more" href="https://blog.eduguru.in/uncategorized/bseb-10th-result-2026-out-highlights-bihar-board-matric-result-declared-matricbiharboard-com-81-79-pass-direct-link-here" aria-label="Read more about BSEB 10th Result 2026 (OUT) Highlights: Bihar Board Matric result declared @ matricbiharboard.com; 81.79% pass, direct link here">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/bseb-10th-result-2026-out-highlights-bihar-board-matric-result-declared-matricbiharboard-com-81-79-pass-direct-link-here/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to resolve -bash: netstat: command not found centos stream 9</title>
		<link>https://blog.eduguru.in/linux-2/how-to-resolve-bash-netstat-command-not-found-centos-stream-9</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-resolve-bash-netstat-command-not-found-centos-stream-9#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 18 Oct 2024 00:33:03 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[How to resolve -bash: netstat: command not found centos stream 9]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[net tool]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15804</guid>

					<description><![CDATA[Today, after installing a centos stream 9 minimal, Getting the error like -bash: netstat: command not found centos stream 9. Let see how to resolve this.New Install Asterisk 18 from source on CentOS Stream 8 In Linux distributions such as CentOS, the package that comprises the net-stat is known as &#8220;net-tools&#8220;. The &#8220;net-tools&#8221; package has ... <a title="How to resolve -bash: netstat: command not found centos stream 9" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-resolve-bash-netstat-command-not-found-centos-stream-9" aria-label="Read more about How to resolve -bash: netstat: command not found centos stream 9">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-resolve-bash-netstat-command-not-found-centos-stream-9/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>python script to STT output in a text file</title>
		<link>https://blog.eduguru.in/asterisk/python-script-to-stt-output-in-a-text-file</link>
					<comments>https://blog.eduguru.in/asterisk/python-script-to-stt-output-in-a-text-file#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 13 Oct 2024 00:58:19 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[free stt in asterisk]]></category>
		<category><![CDATA[offline stt asterisk]]></category>
		<category><![CDATA[python script to STT output in a text file]]></category>
		<category><![CDATA[Speech to text in python with vosk]]></category>
		<category><![CDATA[stt in asterisk]]></category>
		<category><![CDATA[vosk speech to text]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15794</guid>

					<description><![CDATA[To output the Speech-to-Text (STT) transcription into a text file using Vosk and Python, you can modify the AGI script or any standalone Python script to write the transcription to a file after processing the audio.SPEECH RECOGNITION WITH GOOGLE CLOUD API ON ASTERISK 15 python script to STT output in a text file Here is ... <a title="python script to STT output in a text file" class="read-more" href="https://blog.eduguru.in/asterisk/python-script-to-stt-output-in-a-text-file" aria-label="Read more about python script to STT output in a text file">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/asterisk/python-script-to-stt-output-in-a-text-file/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Install Asterisk 18 from source on CentOS Stream 8</title>
		<link>https://blog.eduguru.in/asterisk/new-install-asterisk-18-from-source-on-centos-stream-8</link>
					<comments>https://blog.eduguru.in/asterisk/new-install-asterisk-18-from-source-on-centos-stream-8#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 13 Oct 2024 00:45:27 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[asterisk install]]></category>
		<category><![CDATA[Asterisk installation on centos stream 8]]></category>
		<category><![CDATA[centos stream 8]]></category>
		<category><![CDATA[New Install Asterisk 18 from source on CentOS Stream 8]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15792</guid>

					<description><![CDATA[Since Centos 7/8 approaches it’s EOL, below you will find all necessary commands and files to new install Asterisk 18 from source on Centos 8 Stream.Installing Asterisk 20 From source On Rocky 9 Prerequisites First of all make sure that you run all command as root user. Just run su command and enter root password. Update the system and install required dependencies. ... <a title="New Install Asterisk 18 from source on CentOS Stream 8" class="read-more" href="https://blog.eduguru.in/asterisk/new-install-asterisk-18-from-source-on-centos-stream-8" aria-label="Read more about New Install Asterisk 18 from source on CentOS Stream 8">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/asterisk/new-install-asterisk-18-from-source-on-centos-stream-8/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to save audio stream from Asterisk to a file via WebSocket</title>
		<link>https://blog.eduguru.in/asterisk/how-to-save-audio-stream-from-asterisk-to-a-file-via-websocket</link>
					<comments>https://blog.eduguru.in/asterisk/how-to-save-audio-stream-from-asterisk-to-a-file-via-websocket#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 08 Oct 2024 06:00:59 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[webrtc]]></category>
		<category><![CDATA[websocet]]></category>
		<category><![CDATA[asterisk]]></category>
		<category><![CDATA[How to save audio stream from Asterisk to a file via WebSocket]]></category>
		<category><![CDATA[websocket]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15789</guid>

					<description><![CDATA[To save an audio stream from Asterisk to a file via WebSocket, you need to capture the audio being streamed from Asterisk and write it to an audio file format (such as WAV or PCM). Here&#8217;s a step-by-step guide to accomplish this: create web socket and save data in a text file Requirements: Asterisk: To ... <a title="How to save audio stream from Asterisk to a file via WebSocket" class="read-more" href="https://blog.eduguru.in/asterisk/how-to-save-audio-stream-from-asterisk-to-a-file-via-websocket" aria-label="Read more about How to save audio stream from Asterisk to a file via WebSocket">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/asterisk/how-to-save-audio-stream-from-asterisk-to-a-file-via-websocket/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>create web socket and save data in a text file</title>
		<link>https://blog.eduguru.in/python/create-web-socket-and-save-data-in-a-text-file</link>
					<comments>https://blog.eduguru.in/python/create-web-socket-and-save-data-in-a-text-file#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 07 Oct 2024 01:17:47 +0000</pubDate>
				<category><![CDATA[python]]></category>
		<category><![CDATA[websocet]]></category>
		<category><![CDATA[create web socket and save data in a text file]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[python websocket]]></category>
		<category><![CDATA[websocket]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15787</guid>

					<description><![CDATA[Today, we will create a websocket in linux and save the data received in a text file.webrtc implementation asterisk : Webphone To create a WebSocket server in Linux that listens for incoming WebSocket connections and saves the received data to a text file, you can use Python with the websockets library. Below is a step-by-step ... <a title="create web socket and save data in a text file" class="read-more" href="https://blog.eduguru.in/python/create-web-socket-and-save-data-in-a-text-file" aria-label="Read more about create web socket and save data in a text file">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/python/create-web-socket-and-save-data-in-a-text-file/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to capture and analyze traffic with tcpdump</title>
		<link>https://blog.eduguru.in/linux-2/how-to-capture-and-analyze-traffic-with-tcpdump</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-capture-and-analyze-traffic-with-tcpdump#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 04 Oct 2024 00:10:07 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[How to capture and analyze traffic with tcpdump]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[network analiyse traffic with tcpdump]]></category>
		<category><![CDATA[tcpdump]]></category>
		<category><![CDATA[tcpdump installation and how to use]]></category>
		<category><![CDATA[use of tcpdump]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15785</guid>

					<description><![CDATA[Network administrators use tcpdump to analyze traffic in Linux systems. Learn how to install and use tcpdump, as well as examine the results of captured traffic. tcpdump : Linux Network Sniffer Tool Protocol analyzers, also known as packet sniffers, capture network data for display or use by administrators. The captures include transport layer content, application layer ... <a title="How to capture and analyze traffic with tcpdump" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-capture-and-analyze-traffic-with-tcpdump" aria-label="Read more about How to capture and analyze traffic with tcpdump">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-capture-and-analyze-traffic-with-tcpdump/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Installing Asterisk 20 From source On Rocky 9</title>
		<link>https://blog.eduguru.in/asterisk/installing-asterisk-20-from-source-on-rocky-9</link>
					<comments>https://blog.eduguru.in/asterisk/installing-asterisk-20-from-source-on-rocky-9#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 03 Oct 2024 23:30:45 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[Asterisk 20 on rocky linux]]></category>
		<category><![CDATA[asterisk installation]]></category>
		<category><![CDATA[Install Asterisk 20.4.0 on Rocky Linux 9.2]]></category>
		<category><![CDATA[Installing Asterisk 20 From source On Rocky 9]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15782</guid>

					<description><![CDATA[Update your system and install the required dependencies. At the same time, install a convenient text editor, for example Nano, and the wget and tar applications to download and unpack the installer. If we are used to the yum installer, here we will use the DNF package manager, which is its newer equivalent. Webrtc with ... <a title="Installing Asterisk 20 From source On Rocky 9" class="read-more" href="https://blog.eduguru.in/asterisk/installing-asterisk-20-from-source-on-rocky-9" aria-label="Read more about Installing Asterisk 20 From source On Rocky 9">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/asterisk/installing-asterisk-20-from-source-on-rocky-9/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>html drop down with search from table php mysql</title>
		<link>https://blog.eduguru.in/php-mysql/html-drop-down-with-search-from-table-php-mysql</link>
					<comments>https://blog.eduguru.in/php-mysql/html-drop-down-with-search-from-table-php-mysql#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 23 Jun 2024 05:24:59 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[php-mysql]]></category>
		<category><![CDATA[html drop down with search from table php mysql]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[php mysql drop down]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15777</guid>

					<description><![CDATA[To create an HTML dropdown with a search functionality that fetches data from a MySQL table using PHP and displays it with Bootstrap styling, you can follow these steps: Learn more How to SUM Columns value in MYSQL Set up the MySQL database and table (assuming you already have a database and table ready). Create ... <a title="html drop down with search from table php mysql" class="read-more" href="https://blog.eduguru.in/php-mysql/html-drop-down-with-search-from-table-php-mysql" aria-label="Read more about html drop down with search from table php mysql">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mysql/html-drop-down-with-search-from-table-php-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Install and Use FFmpeg on CentOS 8</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-and-use-ffmpeg-on-centos-8</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-install-and-use-ffmpeg-on-centos-8#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 07 Jun 2024 14:30:14 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ffmpeg]]></category>
		<category><![CDATA[ffmpeg on linux]]></category>
		<category><![CDATA[How to Install and Use FFmpeg on CentOS 8]]></category>
		<category><![CDATA[install ffmpeg on centos]]></category>
		<category><![CDATA[use of ffmpeg]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15774</guid>

					<description><![CDATA[Here, we will see how to Install and Use FFmpeg on CentOS 8. Convert audio files for Asterisk FFmpeg is a free and open-source collection of tools for handling multimedia files. With FFmpeg, you can convert between various video and audio formats, set sample rates, capture streaming audio/video, and resize videos. Now we will see ... <a title="How to Install and Use FFmpeg on CentOS 8" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-and-use-ffmpeg-on-centos-8" aria-label="Read more about How to Install and Use FFmpeg on CentOS 8">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-install-and-use-ffmpeg-on-centos-8/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to get duration of MP3 or wav any audio File in PHP</title>
		<link>https://blog.eduguru.in/php/how-to-get-duration-of-mp3-or-wav-any-audio-file-in-php</link>
					<comments>https://blog.eduguru.in/php/how-to-get-duration-of-mp3-or-wav-any-audio-file-in-php#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 05 Jun 2024 01:49:56 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[PHP Function to get]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15772</guid>

					<description><![CDATA[Today, we will see the way to get duration of mp3 , wav or any audio file in php. Learn more PHP Video File Upload in Server For this you need to install getID3. Here is the link to download getID3. Once this downloaded, we can write the below code part to get the duration ... <a title="How to get duration of MP3 or wav any audio File in PHP" class="read-more" href="https://blog.eduguru.in/php/how-to-get-duration-of-mp3-or-wav-any-audio-file-in-php" aria-label="Read more about How to get duration of MP3 or wav any audio File in PHP">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php/how-to-get-duration-of-mp3-or-wav-any-audio-file-in-php/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Change location Of MariaDB Data Directory</title>
		<link>https://blog.eduguru.in/mysql-2/how-to-change-location-of-mariadb-data-directory</link>
					<comments>https://blog.eduguru.in/mysql-2/how-to-change-location-of-mariadb-data-directory#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 26 Mar 2024 00:36:44 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[first make sure to stop mysql service # service mysqld stop 2. Change Data Directory Now copy default mysql data directory (/var/lib/mysql) to other location as per your requirement. Also set the requ]]></category>
		<category><![CDATA[How to Change location Of MariaDB Data Directory]]></category>
		<category><![CDATA[MariaDB]]></category>
		<category><![CDATA[MySQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15765</guid>

					<description><![CDATA[How to change location Of MariaDB Data Directory Safely. Here is the steps to follow migrate data directory to another server. read more: How to check partition details of MySQL table Know more about Change default MySQL Data Directory in Linux You may require to change the MySQL data directory due to insufficient partition space ... <a title="How to Change location Of MariaDB Data Directory" class="read-more" href="https://blog.eduguru.in/mysql-2/how-to-change-location-of-mariadb-data-directory" aria-label="Read more about How to Change location Of MariaDB Data Directory">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/how-to-change-location-of-mariadb-data-directory/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to check partition details of MySQL table</title>
		<link>https://blog.eduguru.in/mysql-2/how-to-check-partition-details-of-mysql-table</link>
					<comments>https://blog.eduguru.in/mysql-2/how-to-check-partition-details-of-mysql-table#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 28 Feb 2024 11:41:28 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[How to check partition details of MySQL table]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Query to find partition table details in mysql]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15759</guid>

					<description><![CDATA[Here, We can check the partition details of the MySQL table, like how many partitions are there in a table and storage size of each partition? Know more about MYSQL Partitioning : What is and HOW To ? RANGE Partitioning in MySQL We can check this from the below query needs to run on any ... <a title="How to check partition details of MySQL table" class="read-more" href="https://blog.eduguru.in/mysql-2/how-to-check-partition-details-of-mysql-table" aria-label="Read more about How to check partition details of MySQL table">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/how-to-check-partition-details-of-mysql-table/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>internal server error when download large file php</title>
		<link>https://blog.eduguru.in/uncategorized/internal-server-error-when-download-large-file-php</link>
					<comments>https://blog.eduguru.in/uncategorized/internal-server-error-when-download-large-file-php#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 09 Jan 2024 01:48:58 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15756</guid>

					<description><![CDATA[The HTTP 500 Error &#8211; Internal Server Error may also be caused by PHP scripts that exceed the memory limit of your website. How to Live Search using PHP MySQL and Ajax Solution: This will set it for just the script. You will still need to tell apache to allow that much for a php script. ... <a title="internal server error when download large file php" class="read-more" href="https://blog.eduguru.in/uncategorized/internal-server-error-when-download-large-file-php" aria-label="Read more about internal server error when download large file php">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/internal-server-error-when-download-large-file-php/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>iostat : How to monitor disk activity and CPU load average</title>
		<link>https://blog.eduguru.in/linux-2/iostat-how-to-monitor-disk-activity-and-cpu-load-average</link>
					<comments>https://blog.eduguru.in/linux-2/iostat-how-to-monitor-disk-activity-and-cpu-load-average#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 03:10:03 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[iostat : How to monitor disk activity and CPU load average]]></category>
		<category><![CDATA[iostat command in linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[monitor disk activity in linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15749</guid>

					<description><![CDATA[Today, we will see How to monitor disk activity and CPU load average using iostat command in linux. TOP command in Linux iostat command used to report Central Processing Unit (CPU) statistics and input/output statistics for devices, partitions and network filesystems (NFS) under Linux operating sytems [root@localhost ~]# iostatLinux 3.10.0-1160.90.1.el7.x86_64 (localhost.localdomain) 07/23/2023 x86_64 (4 CPU) ... <a title="iostat : How to monitor disk activity and CPU load average" class="read-more" href="https://blog.eduguru.in/linux-2/iostat-how-to-monitor-disk-activity-and-cpu-load-average" aria-label="Read more about iostat : How to monitor disk activity and CPU load average">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/iostat-how-to-monitor-disk-activity-and-cpu-load-average/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webrtc with Asterisk 16 : complete configuration with SIP</title>
		<link>https://blog.eduguru.in/webrtc/webrtc-with-asterisk-16-complete-configuration-with-sip</link>
					<comments>https://blog.eduguru.in/webrtc/webrtc-with-asterisk-16-complete-configuration-with-sip#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 17 Jul 2023 02:38:22 +0000</pubDate>
				<category><![CDATA[webrtc]]></category>
		<category><![CDATA[asterisk]]></category>
		<category><![CDATA[asterisk with webrtc]]></category>
		<category><![CDATA[sip web phone configuration]]></category>
		<category><![CDATA[webphone configuration with asterisk]]></category>
		<category><![CDATA[webrtc asterisk 16]]></category>
		<category><![CDATA[Webrtc with Asterisk 16 : complete configuration with SIP]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15746</guid>

					<description><![CDATA[Today, We will wrap up webrtc set up with Asterisk 16. We will see how to configure asterisk 16 to suport webrtc and what more packages will require. Asterisk and SIP.js were tested using the following setup: CentOS 7.2 minimal (x86_64). Asterisk 16.9.0. OpenSSL 1.0.1e-fips 11 Feb 2013 or later. A public IP address to avoid ... <a title="Webrtc with Asterisk 16 : complete configuration with SIP" class="read-more" href="https://blog.eduguru.in/webrtc/webrtc-with-asterisk-16-complete-configuration-with-sip" aria-label="Read more about Webrtc with Asterisk 16 : complete configuration with SIP">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/webrtc/webrtc-with-asterisk-16-complete-configuration-with-sip/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is inode and where this is stored</title>
		<link>https://blog.eduguru.in/linux-2/what-is-inode-and-where-this-is-stored</link>
					<comments>https://blog.eduguru.in/linux-2/what-is-inode-and-where-this-is-stored#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 08 Jul 2023 04:05:35 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[check inode]]></category>
		<category><![CDATA[how to check inode usages]]></category>
		<category><![CDATA[inode]]></category>
		<category><![CDATA[inode used by a foloder or directory]]></category>
		<category><![CDATA[inode used by file]]></category>
		<category><![CDATA[inode used by system]]></category>
		<category><![CDATA[what is inode]]></category>
		<category><![CDATA[What is inode and where this is stored]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15739</guid>

					<description><![CDATA[Today we will understand about the basic of inode. What inode and where this is stored. How to Get Total Inodes of Root Partition As per the redhat blog, an inode is an index node. It serves as a unique identifier for a specific piece of metadata on a given filesystem. Each piece of metadata describes ... <a title="What is inode and where this is stored" class="read-more" href="https://blog.eduguru.in/linux-2/what-is-inode-and-where-this-is-stored" aria-label="Read more about What is inode and where this is stored">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/what-is-inode-and-where-this-is-stored/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to create Bootstrap Dropdown button/link</title>
		<link>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-dropdown-button-link</link>
					<comments>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-dropdown-button-link#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 02 Jul 2023 01:43:58 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[bootstrap dropdown]]></category>
		<category><![CDATA[dropdown]]></category>
		<category><![CDATA[How to create Bootstrap Dropdown]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15736</guid>

					<description><![CDATA[Here is the sample code to create bootstrap dropdown with button link. How to create bootstrap buttons Learn More: How to Download and Install Jenkins on WindowsDownloading Kali Linux]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-dropdown-button-link/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to check supported RAM type in Linux System</title>
		<link>https://blog.eduguru.in/linux-2/how-to-check-supported-ram-type-in-linux-system</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-check-supported-ram-type-in-linux-system#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 30 Jun 2023 15:29:50 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[check ram information in linux]]></category>
		<category><![CDATA[dmidecode -t 17]]></category>
		<category><![CDATA[dmidecode command in linux]]></category>
		<category><![CDATA[How to check supported RAM type in Linux System]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[RAM details in linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15729</guid>

					<description><![CDATA[Here we see How to check supported RAM type in Linux System? Programming languages that are useful to hackers &#160;RAM is a common computing acronym that stands for&#160;random-access memory. Sometimes it&#8217;s called PC memory or just memory. In essence, RAM is your computer or laptop&#8217;s short-term memory. It&#8217;s where the data stored that your computer ... <a title="How to check supported RAM type in Linux System" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-check-supported-ram-type-in-linux-system" aria-label="Read more about How to check supported RAM type in Linux System">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-check-supported-ram-type-in-linux-system/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL update table based on value of another table Join</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-update-table-based-on-value-of-another-table-join</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-update-table-based-on-value-of-another-table-join#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 20 Jun 2023 00:38:07 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[MySQL update table based on value of another table Joinmupdate join table]]></category>
		<category><![CDATA[mysql update values from join table]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15726</guid>

					<description><![CDATA[While working on MySQL, sometimes we need to update the table values based on the values of another table. In this case, we can update the table value by joining from another table. MySQL table join Here, I have done this as follows: For example, we need to update the value to table2 from the ... <a title="MySQL update table based on value of another table Join" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-update-table-based-on-value-of-another-table-join" aria-label="Read more about MySQL update table based on value of another table Join">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-update-table-based-on-value-of-another-table-join/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to check the Public IP: Mera Wala IP</title>
		<link>https://blog.eduguru.in/info/how-to-check-the-public-ip-mera-wala-ip</link>
					<comments>https://blog.eduguru.in/info/how-to-check-the-public-ip-mera-wala-ip#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 18 Jun 2023 03:48:30 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[How to check Ip from merawalaip.com]]></category>
		<category><![CDATA[How to check the Public IP]]></category>
		<category><![CDATA[How to check the Public IP : Mera Wala IP]]></category>
		<category><![CDATA[merawala IP]]></category>
		<category><![CDATA[myip.com.what is my ip]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15720</guid>

					<description><![CDATA[Working on the internet or in general troubleshooting, we wanted to know the IP address, But you know how to check the IP public address. What is IP Address and MAC Address Here, we will show how to check the IP address from MeraWalaIP.com: How to check the Public IP merawalaip.com : You can check ... <a title="How to check the Public IP: Mera Wala IP" class="read-more" href="https://blog.eduguru.in/info/how-to-check-the-public-ip-mera-wala-ip" aria-label="Read more about How to check the Public IP: Mera Wala IP">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/info/how-to-check-the-public-ip-mera-wala-ip/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to fix WordPress 404 Errors, requested URL was not found on this server: Home Page works</title>
		<link>https://blog.eduguru.in/error/how-to-fix-wordpress-404-errors-requested-url-was-not-found-on-this-server-home-page-works</link>
					<comments>https://blog.eduguru.in/error/how-to-fix-wordpress-404-errors-requested-url-was-not-found-on-this-server-home-page-works#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 17 Jun 2023 02:47:36 +0000</pubDate>
				<category><![CDATA[Error]]></category>
		<category><![CDATA[Error: The requested URL was not found on this server]]></category>
		<category><![CDATA[How to fix WordPress 404 Errors]]></category>
		<category><![CDATA[WordPress]]></category>
		<category><![CDATA[wordpress error]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15718</guid>

					<description><![CDATA[We often find the issue of the WordPress page not found 404 error when we move the WordPress to another new server. Here will see how to fix the issue.How to install WordPress.com desktop app on Ubuntu Error: The requested URL was not found on this server. There could be multiple solutions you can find ... <a title="How to fix WordPress 404 Errors, requested URL was not found on this server: Home Page works" class="read-more" href="https://blog.eduguru.in/error/how-to-fix-wordpress-404-errors-requested-url-was-not-found-on-this-server-home-page-works" aria-label="Read more about How to fix WordPress 404 Errors, requested URL was not found on this server: Home Page works">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/error/how-to-fix-wordpress-404-errors-requested-url-was-not-found-on-this-server-home-page-works/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to create Round Buttons and Square Buttons</title>
		<link>https://blog.eduguru.in/tutorial/css-tutorial/how-to-create-round-buttons-and-square-buttons</link>
					<comments>https://blog.eduguru.in/tutorial/css-tutorial/how-to-create-round-buttons-and-square-buttons#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 15 Apr 2023 01:51:51 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[css]]></category>
		<category><![CDATA[How to create Round Buttons and Square Buttons]]></category>
		<category><![CDATA[round button in HTML CSS bootstrap]]></category>
		<category><![CDATA[square button in HTML CSS bootstrap]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15710</guid>

					<description><![CDATA[Today in the example, We will see how to create round buttons and square buttons. Read More: How to create bootstrap buttons How To Create Multi-Step Form Progress Bar JQuery, Bootstrap, And PHP]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/tutorial/css-tutorial/how-to-create-round-buttons-and-square-buttons/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Basic and Simple Examples of Skills with CSS</title>
		<link>https://blog.eduguru.in/tutorial/css-tutorial/basic-and-simple-examples-of-skills-with-css</link>
					<comments>https://blog.eduguru.in/tutorial/css-tutorial/basic-and-simple-examples-of-skills-with-css#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 15 Apr 2023 01:29:44 +0000</pubDate>
				<category><![CDATA[css]]></category>
		<category><![CDATA[Basic and Simple Examples of Skills with CSS]]></category>
		<category><![CDATA[code example of CSS]]></category>
		<category><![CDATA[CSS]]></category>
		<category><![CDATA[CSS example]]></category>
		<category><![CDATA[CSS skills]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15707</guid>

					<description><![CDATA[Today we will see a very basic example of understanding Skills with CSS. Read More: What is Bootstrap Container and How to use in HTML How to create bootstrap buttons Sample Code to show basic Skill bar]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/tutorial/css-tutorial/basic-and-simple-examples-of-skills-with-css/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to SUM Columns value in MYSQL</title>
		<link>https://blog.eduguru.in/php-mysql/how-to-sum-columns-value-in-mysql</link>
					<comments>https://blog.eduguru.in/php-mysql/how-to-sum-columns-value-in-mysql#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 09 Apr 2023 01:48:54 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[php-mysql]]></category>
		<category><![CDATA[How to SUM Columns value in MYSQL]]></category>
		<category><![CDATA[MySQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15705</guid>

					<description><![CDATA[We require the sum of column values to display or use in the programming skill. So today you see How to SUM Columns value in MYSQL. Learn More: How to Select Data Into MySQL Database Using PHP ? How to Create Event Calendar with jQuery, PHP, and MySQL Problem Statement: subject &#124; mark1 &#124; mark2 ... <a title="How to SUM Columns value in MYSQL" class="read-more" href="https://blog.eduguru.in/php-mysql/how-to-sum-columns-value-in-mysql" aria-label="Read more about How to SUM Columns value in MYSQL">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mysql/how-to-sum-columns-value-in-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to create a data table in bootstrap PHP and  MySQL ?</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-create-a-data-table-in-bootstrap-php-and-mysql</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-create-a-data-table-in-bootstrap-php-and-mysql#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Fri, 07 Oct 2022 08:43:57 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15698</guid>

					<description><![CDATA[What is Bootstrap Bootstrap is the most popular HTML, CSS and JavaScript framework for developing a responsive and mobile friendly website .  Bootstrap helps web developers build website faster as they don’t need to worry about basic commands and functions. Bootstrap became popular very quickly, and not without reason. Web designers and web developer like bootstrap because it ... <a title="How to create a data table in bootstrap PHP and  MySQL ?" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-create-a-data-table-in-bootstrap-php-and-mysql" aria-label="Read more about How to create a data table in bootstrap PHP and  MySQL ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-create-a-data-table-in-bootstrap-php-and-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to DELETE Data Into MySQL Database Using PHP ?</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-delete-data-into-mysql-database-using-php</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-delete-data-into-mysql-database-using-php#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Thu, 06 Oct 2022 11:13:08 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15696</guid>

					<description><![CDATA[The DELETE statement is used to delete records from a table. you can delete records from a table using the SQL DELETE statement. It is typically used in conjugation with the WHERE clause to delete only those records that matches specific criteria or condition. Syntax : DELETE FROM table_nameWHERE some_column = some_value ; Implementation of the Delete Query ... <a title="How to DELETE Data Into MySQL Database Using PHP ?" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-delete-data-into-mysql-database-using-php" aria-label="Read more about How to DELETE Data Into MySQL Database Using PHP ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-delete-data-into-mysql-database-using-php/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create MySQL user and Grant permission ?</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-create-mysql-user-and-grant-permission</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-create-mysql-user-and-grant-permission#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Thu, 06 Oct 2022 08:26:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15692</guid>

					<description><![CDATA[Introduction : MySQL is the most popular Open Source Relational SQL database management system. MySQL is one of the best RDBMS being used for developing web-based software applications.&#160;&#160;It is commonly deployed as part of the&#160;LAMP stack&#160;(which stands for&#160;Linux,&#160;Apache,&#160;MySQL, and&#160;PHP) and, as of this writing, is the&#160;most popular open-source database&#160;in the world. Prerequisites : A Linux ... <a title="How to Create MySQL user and Grant permission ?" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-create-mysql-user-and-grant-permission" aria-label="Read more about How to Create MySQL user and Grant permission ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-create-mysql-user-and-grant-permission/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is XML &#038; HTML ? What is Difference Between XML &#038; HTML?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-xml-html-what-is-difference-between-xml-html</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-xml-html-what-is-difference-between-xml-html#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Wed, 05 Oct 2022 10:49:01 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15682</guid>

					<description><![CDATA[What is XML : XML is stand for (Extensible Markup Language) &#160;is a mark up language. It is designed to store transmitting, and reconstructing arbitrary data. The XML standard is a flexible way to create information formats and electronically share structured data via the public internet, as well as via corporate networks.XML does not define ... <a title="What is XML &#038; HTML ? What is Difference Between XML &#038; HTML?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-xml-html-what-is-difference-between-xml-html" aria-label="Read more about What is XML &#038; HTML ? What is Difference Between XML &#038; HTML?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-xml-html-what-is-difference-between-xml-html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is MySQL Binary logs ,their usages and how to purge binary logs ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-mysql-binary-logs-their-usages-and-how-to-purge-binary-logs</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-mysql-binary-logs-their-usages-and-how-to-purge-binary-logs#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Wed, 05 Oct 2022 08:04:46 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15689</guid>

					<description><![CDATA[Define Binary logs : In MySQL, the changes that occur within the database are logged simultaneously. The binary log is a set of log files that contain information about data modifications made to a MySQL server instance. The log is enabled by starting the server with the &#8211;log- bin option. The MySQL Bin Log (Binary Logs) ... <a title="What is MySQL Binary logs ,their usages and how to purge binary logs ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-mysql-binary-logs-their-usages-and-how-to-purge-binary-logs" aria-label="Read more about What is MySQL Binary logs ,their usages and how to purge binary logs ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-mysql-binary-logs-their-usages-and-how-to-purge-binary-logs/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Select Data Into MySQL Database Using PHP ?</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-select-data-into-mysql-database-using-php</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-select-data-into-mysql-database-using-php#comments</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Tue, 04 Oct 2022 08:26:14 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15679</guid>

					<description><![CDATA[Select : Select Data From a MySQL Database The SELECT statement is used to select data from one or more tables The SQL&#160;SELECT&#160;command is used to fetch data from the MySQL database. You can use this command at mysql&#62; prompt as well as in any script like PHP. Syntax : Columns are the column names ... <a title="How to Select Data Into MySQL Database Using PHP ?" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-select-data-into-mysql-database-using-php" aria-label="Read more about How to Select Data Into MySQL Database Using PHP ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-select-data-into-mysql-database-using-php/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to Remove spaces from string in MySQL ?</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-remove-spaces-from-string-in-mysql</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-remove-spaces-from-string-in-mysql#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Fri, 16 Sep 2022 07:06:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15674</guid>

					<description><![CDATA[MySQL String Functions : MySQL string functions manipulate the character string data effectively. The following table indicates each of the functions with a brief description: Name Description CONTACT Concatenate two or more strings into a single string INSTR Return the position of the first occurrence of a substring in a string ASCII Returns the ASCII ... <a title="How to Remove spaces from string in MySQL ?" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-remove-spaces-from-string-in-mysql" aria-label="Read more about How to Remove spaces from string in MySQL ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-remove-spaces-from-string-in-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Different Between CHAR &#038; VARCHAR ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-different-between-char-varchar</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-different-between-char-varchar#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Thu, 15 Sep 2022 08:41:14 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15669</guid>

					<description><![CDATA[VARCHAR Datatype:  Varchar is a datatype in SQL that holds characters of variable length. This data type stores character strings of up to 255 bytes in a variable-length field. If the length of the string is less than set or fixed-length then it will store as it is without padded with extra blank spaces. The ... <a title="What is Different Between CHAR &#038; VARCHAR ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-different-between-char-varchar" aria-label="Read more about What is Different Between CHAR &#038; VARCHAR ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-different-between-char-varchar/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Insert Data Into MySQL Database Using PHP</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-insert-data-into-mysql-database-using-php</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-insert-data-into-mysql-database-using-php#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Wed, 14 Sep 2022 08:04:33 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15663</guid>

					<description><![CDATA[INSERT : The INSERT INTO statement is used to add new records to a MySQL table . Syntax : NSERT INTO table_name (column1, column2, column3,&#8230;)VALUES (value1, value2, value3,&#8230;) PHP&#160;MySQL INSERT&#160;Query : SQL query using the&#160;INSERT INTO&#160;statement with appropriate values, after that we will execute this insert query through passing it to the PHP&#160;Mysqli_query&#160;function to insert ... <a title="How to Insert Data Into MySQL Database Using PHP" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-insert-data-into-mysql-database-using-php" aria-label="Read more about How to Insert Data Into MySQL Database Using PHP">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-insert-data-into-mysql-database-using-php/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is MySQL  SELECT Statement And Example of MySQL SELECT Query</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-mysql-select-statement-and-example-of-mysql-select-query</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-mysql-select-statement-and-example-of-mysql-select-query#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Tue, 13 Sep 2022 08:27:38 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15654</guid>

					<description><![CDATA[MySQL&#160;SELECT&#160;Statement : The&#160;select&#160;statement is used to select data from a database. The SELECT statement in MySQL is used to&#160;fetch data from one or more tables. We can retrieve records of all fields or specified fields that match specified criteria using this statement. Syntax : SELECT&#160;column1,&#160;column2, &#8230;FROM&#160;table_nameWHERE&#160;condition; You can use one or more tables separated by ... <a title="What is MySQL  SELECT Statement And Example of MySQL SELECT Query" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-mysql-select-statement-and-example-of-mysql-select-query" aria-label="Read more about What is MySQL  SELECT Statement And Example of MySQL SELECT Query">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-mysql-select-statement-and-example-of-mysql-select-query/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is INSERT Statement And Example of INSERT Query ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-insert-statement-and-example-of-insert-query</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-insert-statement-and-example-of-insert-query#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Tue, 13 Sep 2022 07:54:56 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15657</guid>

					<description><![CDATA[SQL INSERT INTO Statement : The SQL&#160;INSERT INTO&#160;Statement is used to add new rows of data to a table in the database. SQL INSERT statement inserts one or more rows of data into a table. You can also see INSERT written as INSERT INTO, but both behave the same. The inclusion of INTO is optional in most variants of SQL &#160;Syntax ... <a title="What is INSERT Statement And Example of INSERT Query ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-insert-statement-and-example-of-insert-query" aria-label="Read more about What is INSERT Statement And Example of INSERT Query ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-insert-statement-and-example-of-insert-query/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is MySQL Cluster vs Replication ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-mysql-cluster-vs-replication</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-mysql-cluster-vs-replication#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Fri, 09 Sep 2022 15:29:14 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15652</guid>

					<description><![CDATA[What is MySQL Cluster Manager Architecture:MySQL Cluster Manager is a distributed client/server application consisting of two main components. The MySQL Cluster Manager agent is a set of one or more agent processes that manage NDB Cluster nodes, and the MySQL Cluster Manager client provides a command-line interface to the agent&#8217;s management functions.A Cluster is a ... <a title="What is MySQL Cluster vs Replication ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-mysql-cluster-vs-replication" aria-label="Read more about What is MySQL Cluster vs Replication ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-mysql-cluster-vs-replication/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Protect your computer from viruses and malware ?</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-protect-your-computer-from-viruses-and-malware</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-protect-your-computer-from-viruses-and-malware#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Tue, 06 Sep 2022 10:17:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15650</guid>

					<description><![CDATA[what is computer virus : computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about computer viruses is that they are designed to spread across programs and systems. In more technical terms, a computer virus is a type of malicious code or ... <a title="How to Protect your computer from viruses and malware ?" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-protect-your-computer-from-viruses-and-malware" aria-label="Read more about How to Protect your computer from viruses and malware ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-protect-your-computer-from-viruses-and-malware/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is the Use of Motherboard in a Computer ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-the-use-of-motherboard-in-a-computer</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-the-use-of-motherboard-in-a-computer#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Mon, 05 Sep 2022 11:42:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15646</guid>

					<description><![CDATA[What is Motherboard A motherboard is one of the most important parts of a computer system. The motherboard is the backbone that ties the computer’s components together at one spot and allows them to talk to each other. A motherboard provides connectivity between the hardware components of a computer, like the CPU, RAM, Hard Drive, ROM, ... <a title="What is the Use of Motherboard in a Computer ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-the-use-of-motherboard-in-a-computer" aria-label="Read more about What is the Use of Motherboard in a Computer ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-the-use-of-motherboard-in-a-computer/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Happy Teacher&#8217;s Day 2022 &#8211; Quotes and Greetings on Teachers&#8217; Day</title>
		<link>https://blog.eduguru.in/uncategorized/happy-teachers-day-2022-quotes-and-greetings-on-teachers-day</link>
					<comments>https://blog.eduguru.in/uncategorized/happy-teachers-day-2022-quotes-and-greetings-on-teachers-day#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 05 Sep 2022 02:27:19 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15637</guid>

					<description><![CDATA[A Guru or a teacher is regarded highly for their selfless contribution to our educational journey. In India, September 5 is marked as Teacher’s Day. It is an annual celebration to value and honor the remarkable role that teachers play in our lives. The day also marks the birth anniversary of former President of India, ... <a title="Happy Teacher&#8217;s Day 2022 &#8211; Quotes and Greetings on Teachers&#8217; Day" class="read-more" href="https://blog.eduguru.in/uncategorized/happy-teachers-day-2022-quotes-and-greetings-on-teachers-day" aria-label="Read more about Happy Teacher&#8217;s Day 2022 &#8211; Quotes and Greetings on Teachers&#8217; Day">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/happy-teachers-day-2022-quotes-and-greetings-on-teachers-day/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NDA exam date question paper 2022 download and solution</title>
		<link>https://blog.eduguru.in/uncategorized/nda-exam-date-question-paper-2022-download-and-solution</link>
					<comments>https://blog.eduguru.in/uncategorized/nda-exam-date-question-paper-2022-download-and-solution#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 04 Sep 2022 14:30:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15628</guid>

					<description><![CDATA[Union Public Service Commission (UPSC) conducted&#160;NDA 2 2022 exam on September 4&#160;across various cities spread throughout the country to fill up a total of 400 vacancies. The Maths paper was born in the forenoon shift from 10.00 am to 12.30 pm, whereas, the GAT paper was conducted in the afternoon shift from 2 pm to ... <a title="NDA exam date question paper 2022 download and solution" class="read-more" href="https://blog.eduguru.in/uncategorized/nda-exam-date-question-paper-2022-download-and-solution" aria-label="Read more about NDA exam date question paper 2022 download and solution">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/nda-exam-date-question-paper-2022-download-and-solution/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Need of Information Security?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-need-of-information-security</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-need-of-information-security#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Fri, 02 Sep 2022 12:09:41 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15625</guid>

					<description><![CDATA[Information Security : Information security covers the tools and processes that organizations use to protect information. Information Security is not only about securing information from unauthorized access. It is basically the practice of preventing unauthorized access, use ,disclosure, disruption , modification , inspection , recording or destruction of information.  The Need of Information Security : ... <a title="What is Need of Information Security?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-need-of-information-security" aria-label="Read more about What is Need of Information Security?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-need-of-information-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Information Security ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-information-security</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-information-security#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 16:45:43 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15620</guid>

					<description><![CDATA[What is Security ? Security is a system to Protected computerized system and its data from Intentional or un-intentional threats or from un-authorized access. Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization&#8217;s digital assets. An effective security strategy uses a range of approaches to minimize vulnerabilities ... <a title="What is Information Security ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-information-security" aria-label="Read more about What is Information Security ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-information-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Secure Web server ?</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-secure-web-server</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-secure-web-server#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 10:47:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15617</guid>

					<description><![CDATA[What is Web server A web server can be either a software unit or a hardware unit, which provides the web pages via HTTP (Hypertext Transfer Protocol) and other protocols to respond to&#160;client&#160;requests made over the World Wide Web. Web server&#160;is a computer where the web content is stored. Basically web server is used to ... <a title="How to Secure Web server ?" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-secure-web-server" aria-label="Read more about How to Secure Web server ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-secure-web-server/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is JSP ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-jsp-2</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-jsp-2#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Tue, 30 Aug 2022 15:19:02 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15606</guid>

					<description><![CDATA[Define JSP : It is the full form of Java Server Page (JSP). It is a server side programming technology and used for creating web application ,that enables the creation of dynamic, platform-independent method for building Web-based applications. It is based on&#160;HTML,&#160;XML,&#160;SOAP, or other document types. There are JSP tags to insert Java code. The ... <a title="What is JSP ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-jsp-2" aria-label="Read more about What is JSP ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-jsp-2/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DDoS Attack ? &#038; How Google Stopped the  Largest -ever DDoS Attack ?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-ddos-attack-how-google-stopped-the-largest-ever-ddos-attack</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-ddos-attack-how-google-stopped-the-largest-ever-ddos-attack#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 12:39:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15608</guid>

					<description><![CDATA[What is DDoS ? Read more How to secure from DDoS Attack DDoS stands for Distributed -Denial of -service. It is a malicious user trying to make a machine or network resources unavailable to use. In which multiple compromised computer systems attack a target, such as a server, website, or another network resource, and cause ... <a title="What is DDoS Attack ? &#038; How Google Stopped the  Largest -ever DDoS Attack ?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-ddos-attack-how-google-stopped-the-largest-ever-ddos-attack" aria-label="Read more about What is DDoS Attack ? &#038; How Google Stopped the  Largest -ever DDoS Attack ?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-ddos-attack-how-google-stopped-the-largest-ever-ddos-attack/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>what is Malware ? And How to Stay Protected from Malware Attacks?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-malware-and-how-to-stay-protected-from-malware-attacks</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-malware-and-how-to-stay-protected-from-malware-attacks#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Thu, 25 Aug 2022 11:52:34 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15600</guid>

					<description><![CDATA[Definition of Malware Malware or malicious software, that is programmed to cause damage to a computer system, network, and hardware device. It is computer code designed to disrupt, disable or take control of your computer system. It comes in many forms, usually hidden in another file or disguised as a harmless app. Hostile, intrusive, and ... <a title="what is Malware ? And How to Stay Protected from Malware Attacks?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-malware-and-how-to-stay-protected-from-malware-attacks" aria-label="Read more about what is Malware ? And How to Stay Protected from Malware Attacks?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-malware-and-how-to-stay-protected-from-malware-attacks/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Best Practices to secure from DDoS Attack</title>
		<link>https://blog.eduguru.in/uncategorized/best-practices-to-secure-from-ddos-attack</link>
					<comments>https://blog.eduguru.in/uncategorized/best-practices-to-secure-from-ddos-attack#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Wed, 24 Aug 2022 07:25:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15592</guid>

					<description><![CDATA[what is DDoS Attack DDoS stand for Distributed Denial -of-service Attack. It &#160;is defined as a malicious user trying to make a machine or network resources unavailable to use. A distributed denial-of-service (DDoS) attack is an attempt to disrupt the traffic of a targeted server, service, or network by overwhelming it with a flood of ... <a title="Best Practices to secure from DDoS Attack" class="read-more" href="https://blog.eduguru.in/uncategorized/best-practices-to-secure-from-ddos-attack" aria-label="Read more about Best Practices to secure from DDoS Attack">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/best-practices-to-secure-from-ddos-attack/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to protect Your Site Against DDoS  Attack</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-protect-your-site-against-ddos-attack</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-protect-your-site-against-ddos-attack#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Mon, 22 Aug 2022 12:34:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15587</guid>

					<description><![CDATA[The distributed denial -of- service (DDoS) Attack  is one of the most popular and terrify attacks cybercriminals like to use to attack websites. since the arrival of the new millennium, hackers have DDoS (Distributed Denial -of -service attack) to Shut Down some of the world&#8217;s biggest websites.  There are various type of variations of the ... <a title="How to protect Your Site Against DDoS  Attack" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-protect-your-site-against-ddos-attack" aria-label="Read more about How to protect Your Site Against DDoS  Attack">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-protect-your-site-against-ddos-attack/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to secure from DDoS  Attack</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-secure-from-ddos-attack</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-secure-from-ddos-attack#comments</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Sat, 20 Aug 2022 18:35:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15580</guid>

					<description><![CDATA[Introduction of DDoS Attack : A&#160;distributed denial-of-service (DDoS) attack&#160;operates as its name implies; it’s a form of cyber attack that disrupts connectivity or network services to deny service to users. Attacks generally feature tools, such as a bot, that overwhelm the network with repeated signals until it can no longer process genuine requests from users. ... <a title="How to secure from DDoS  Attack" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-secure-from-ddos-attack" aria-label="Read more about How to secure from DDoS  Attack">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-secure-from-ddos-attack/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is DDoS Attack. Basic introduction of DDoS</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-ddos-attack-basic-introduction-of-ddos</link>
					<comments>https://blog.eduguru.in/uncategorized/what-is-ddos-attack-basic-introduction-of-ddos#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Sat, 20 Aug 2022 05:48:44 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15575</guid>

					<description><![CDATA[It stands for Distributed Denial-of-service (DDoS) Attack. Distributed Denial-of-service (DDoS) Attack, is defined as a malicious user trying to make a machine or network resources unavailable to use. In which multiple compromised computer systems attack a target, such as a server, website, or another network resource, and cause a denial of service for users of ... <a title="What is DDoS Attack. Basic introduction of DDoS" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-ddos-attack-basic-introduction-of-ddos" aria-label="Read more about What is DDoS Attack. Basic introduction of DDoS">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/what-is-ddos-attack-basic-introduction-of-ddos/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to install Asterisk on LINUX</title>
		<link>https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-on-linux</link>
					<comments>https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-on-linux#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Fri, 19 Aug 2022 07:59:41 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15565</guid>

					<description><![CDATA[Asterisk is a free, open-source framework for building communications applications and is sponsored by Sangoma. Asterisk turns an ordinary computer into a communications server. Asterisk powers IP PBX systems, VoIP gateways, conference servers, and other custom solutions. It is used by small businesses, large businesses, call centers, carriers, and government agencies, worldwide. What Can You ... <a title="How to install Asterisk on LINUX" class="read-more" href="https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-on-linux" aria-label="Read more about How to install Asterisk on LINUX">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-on-linux/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to change MySQL data  directory</title>
		<link>https://blog.eduguru.in/uncategorized/how-to-change-mysql-data-directory</link>
					<comments>https://blog.eduguru.in/uncategorized/how-to-change-mysql-data-directory#respond</comments>
		
		<dc:creator><![CDATA[Mohini Kumari]]></dc:creator>
		<pubDate>Thu, 18 Aug 2022 07:24:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15552</guid>

					<description><![CDATA[Information managed by the MySQL server is stored under a directory known as the data directory. The following list briefly describes the items typically found in the data directory, with cross references for additional information: Data directory subdirectories. Each subdirectory of the data directory is a database directory and corresponds to a database managed by ... <a title="How to change MySQL data  directory" class="read-more" href="https://blog.eduguru.in/uncategorized/how-to-change-mysql-data-directory" aria-label="Read more about How to change MySQL data  directory">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/how-to-change-mysql-data-directory/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to set up multi-master slave in MySQL</title>
		<link>https://blog.eduguru.in/mysql-2/how-to-set-up-multi-master-slave-in-mysql</link>
					<comments>https://blog.eduguru.in/mysql-2/how-to-set-up-multi-master-slave-in-mysql#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 14 Jun 2022 13:12:40 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[How to set up multi-master slave in MySQL]]></category>
		<category><![CDATA[multi master slave]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[mysql multi master replication]]></category>
		<category><![CDATA[mysql replication]]></category>
		<category><![CDATA[mysql slave]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15547</guid>

					<description><![CDATA[Today, We will see how to set up a multi-master slave in the MySQL replication process. Read more: Replication with Different Master and Slave Storage Engines Also Read: Reset ( Re-Sync ) MySQL Master-Slave Replication MariaDB 10 supports multi-source replication, and each MariaDB Galera node can have up to 64 masters connected to it. So ... <a title="How to set up multi-master slave in MySQL" class="read-more" href="https://blog.eduguru.in/mysql-2/how-to-set-up-multi-master-slave-in-mysql" aria-label="Read more about How to set up multi-master slave in MySQL">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/how-to-set-up-multi-master-slave-in-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL: How to ignore errors when importing data?</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-how-to-ignore-errors-when-importing-data</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-how-to-ignore-errors-when-importing-data#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 14 Jun 2022 12:49:31 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[ignore importing data issue in MySQL]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[mysql ignore import error]]></category>
		<category><![CDATA[mysql import data]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15544</guid>

					<description><![CDATA[Recently, I faced an issue while importing data to MySQL. Here are the steps that help me to solve and ignore the error. Read more: show progress on MySQL DB Import Use the &#8211;force (-f) flag on your MySQL import. Rather than stopping on the offending statement, MySQL will continue and just log the errors ... <a title="MySQL: How to ignore errors when importing data?" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-how-to-ignore-errors-when-importing-data" aria-label="Read more about MySQL: How to ignore errors when importing data?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-how-to-ignore-errors-when-importing-data/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Uninstall NGINX in Centos</title>
		<link>https://blog.eduguru.in/linux-2/how-to-uninstall-nginx-in-centos</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-uninstall-nginx-in-centos#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 10 Jun 2022 14:06:53 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[uninstall NGINX]]></category>
		<category><![CDATA[uninstall NGINX in CentOS]]></category>
		<category><![CDATA[uninstall NGINX in linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15542</guid>

					<description><![CDATA[Here are the steps to uninstall NGINX in CentOS. Please note, you will need a user with root privileges to execute the following commands. Read More : Installing LAMP on RHEL or Centos 7 NGINX is a popular web server that is also used as load balancer and reverse proxy. But sometimes you may need ... <a title="How to Uninstall NGINX in Centos" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-uninstall-nginx-in-centos" aria-label="Read more about How to Uninstall NGINX in Centos">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-uninstall-nginx-in-centos/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to kill processes in Linux</title>
		<link>https://blog.eduguru.in/linux-2/how-to-kill-processes-in-linux</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-kill-processes-in-linux#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 10 Jun 2022 13:56:43 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[kil]]></category>
		<category><![CDATA[Kill process linux]]></category>
		<category><![CDATA[kill processes in Linux]]></category>
		<category><![CDATA[killall]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[pkill]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15540</guid>

					<description><![CDATA[Here we will see how to kill processes in Linux. We will use kill, killall and pkill. Let see how to use this. Read more : Kill all instances of httpd The main difference between these tools is that kill terminates processes based on Process ID number (PID), while the killall and pkill commands terminate ... <a title="How to kill processes in Linux" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-kill-processes-in-linux" aria-label="Read more about How to kill processes in Linux">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-kill-processes-in-linux/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL Export query to SQL file : mysqldump</title>
		<link>https://blog.eduguru.in/uncategorized/mysql-export-query-to-sql-file-mysqldump</link>
					<comments>https://blog.eduguru.in/uncategorized/mysql-export-query-to-sql-file-mysqldump#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 30 May 2022 18:11:33 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15538</guid>

					<description><![CDATA[Here is how to export query result to SQL file with the help of mysqldump command: Read more mysqldump – MySQL Database Backup and restore program mysqldump allows you to use a WHERE clause when creating a backup and only the rows fulfilling the given condition will be included in the dump. Example: We can apply multiple condition ... <a title="MySQL Export query to SQL file : mysqldump" class="read-more" href="https://blog.eduguru.in/uncategorized/mysql-export-query-to-sql-file-mysqldump" aria-label="Read more about MySQL Export query to SQL file : mysqldump">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/mysql-export-query-to-sql-file-mysqldump/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Error – /bin/rm: Argument list too long : Linux Error</title>
		<link>https://blog.eduguru.in/linux-command/error-bin-rm-argument-list-too-long-linux-error</link>
					<comments>https://blog.eduguru.in/linux-command/error-bin-rm-argument-list-too-long-linux-error#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 15 Jan 2022 18:24:36 +0000</pubDate>
				<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[Error – /bin/rm: Argument list too long]]></category>
		<category><![CDATA[error rm]]></category>
		<category><![CDATA[linux command]]></category>
		<category><![CDATA[rm command]]></category>
		<category><![CDATA[rm command in linux]]></category>
		<category><![CDATA[rm error]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15534</guid>

					<description><![CDATA[We in real life, generally use the rm command to remove the files and folders. Have you ever got this Error – /bin/rm: Argument list too long ! rm command to delete files in linux Today, We will see the alternate method to delete such a large number of files. Learn More What are the ... <a title="Error – /bin/rm: Argument list too long : Linux Error" class="read-more" href="https://blog.eduguru.in/linux-command/error-bin-rm-argument-list-too-long-linux-error" aria-label="Read more about Error – /bin/rm: Argument list too long : Linux Error">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-command/error-bin-rm-argument-list-too-long-linux-error/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to install Asterisk: Asterisk installation on centos</title>
		<link>https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-asterisk-installation-on-centos</link>
					<comments>https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-asterisk-installation-on-centos#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 13 Jan 2022 01:15:08 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[asterisk]]></category>
		<category><![CDATA[asterisk install on redhat system]]></category>
		<category><![CDATA[asterisk installation]]></category>
		<category><![CDATA[asterisk installation on centos 7]]></category>
		<category><![CDATA[Asterisk installation on centos 8]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15532</guid>

					<description><![CDATA[Today, In this article we will know how to Asterisk Installation on centos 8 or a RedHat-based system. Know more about asterisk installation Installation and configuration of WebRTC with asterisk on Amazon What New in Asterisk 16 Step 1: Updating system Update your system before installing Asterisk. After updating set SELinux in permissive mode by ... <a title="How to install Asterisk: Asterisk installation on centos" class="read-more" href="https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-asterisk-installation-on-centos" aria-label="Read more about How to install Asterisk: Asterisk installation on centos">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/asterisk/asterisk-asterisk/how-to-install-asterisk-asterisk-installation-on-centos/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Setup SSH Passwordless Login in Linux</title>
		<link>https://blog.eduguru.in/linux-2/how-to-setup-ssh-passwordless-login-in-linux</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-setup-ssh-passwordless-login-in-linux#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 28 Nov 2021 17:31:36 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[SSH]]></category>
		<category><![CDATA[ssh login]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15527</guid>

					<description><![CDATA[Today, We will learn how to set up ssh passwordless login in Linux. SSH&#160;(Secure SHELL) is an open-source and most trusted network protocol that is used to log in to remote servers for the execution of commands and programs. Here is the step to Passwordless SSH login: Step 1: Generate ssh-keygen on source machine Step ... <a title="How to Setup SSH Passwordless Login in Linux" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-setup-ssh-passwordless-login-in-linux" aria-label="Read more about How to Setup SSH Passwordless Login in Linux">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-setup-ssh-passwordless-login-in-linux/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create Shell Script in Linux/Unix</title>
		<link>https://blog.eduguru.in/linux-2/how-to-create-shell-script-in-linux-unix</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-create-shell-script-in-linux-unix#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 05 Oct 2021 01:33:43 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Example of Shell script : Read also Shell Script Example – Linux]]></category>
		<category><![CDATA[How to Create Shell Script in Linux/Unix]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[shell script]]></category>
		<category><![CDATA[SHELL SCRIPTING]]></category>
		<category><![CDATA[What is Shell? Read: The Linux Shell]]></category>
		<category><![CDATA[Why do we need to write a shell script]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15518</guid>

					<description><![CDATA[Today, We will learn how to create shell scripts in Linux or UNIX systems. We will start with the basic concept of how shell scripts work and will also see the example. Read: Linux Shell script example 1 Shell Scripting is an open-source computer program designed to be run by the Unix/Linux shell. Shell Scripting is ... <a title="How to Create Shell Script in Linux/Unix" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-create-shell-script-in-linux-unix" aria-label="Read more about How to Create Shell Script in Linux/Unix">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-create-shell-script-in-linux-unix/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are the Basic Linux Commands and How to use</title>
		<link>https://blog.eduguru.in/linux-2/what-are-the-basic-linux-commands-and-how-to-use</link>
					<comments>https://blog.eduguru.in/linux-2/what-are-the-basic-linux-commands-and-how-to-use#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 04 Oct 2021 16:06:32 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[cd command in linux]]></category>
		<category><![CDATA[linux command]]></category>
		<category><![CDATA[ls command in linux]]></category>
		<category><![CDATA[mkdir command in linux]]></category>
		<category><![CDATA[pwd linux command]]></category>
		<category><![CDATA[rm command in linux]]></category>
		<category><![CDATA[What are the Basic Linux Commands and How to use]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15516</guid>

					<description><![CDATA[Today, We will learn what are the basic Linux command and how to use this. Read: nmcli – Linux command 1. pwd — pwd command is used to show the current working directory of the user. To know which directory you are in, you can use the “pwd” command. It gives us the absolute path, which means the ... <a title="What are the Basic Linux Commands and How to use" class="read-more" href="https://blog.eduguru.in/linux-2/what-are-the-basic-linux-commands-and-how-to-use" aria-label="Read more about What are the Basic Linux Commands and How to use">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/what-are-the-basic-linux-commands-and-how-to-use/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is more command in Linux and how to use</title>
		<link>https://blog.eduguru.in/linux-2/what-is-more-command-in-linux-and-how-to-use</link>
					<comments>https://blog.eduguru.in/linux-2/what-is-more-command-in-linux-and-how-to-use#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 02 Oct 2021 00:43:09 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[Do more with more command]]></category>
		<category><![CDATA[Example of more command to display the file]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux command]]></category>
		<category><![CDATA[more command use with other commands]]></category>
		<category><![CDATA[The basic Use of more command]]></category>
		<category><![CDATA[Use of more command]]></category>
		<category><![CDATA[What is more command in Linux]]></category>
		<category><![CDATA[What is more command in Linux and how to use]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15513</guid>

					<description><![CDATA[Today, We will learn the basic understanding of the &#8220;more&#8221; command in Linux. We will also see the usages of the &#8220;more&#8221; command and their example. Read: pipe (&#124;) operator in Linux command What is the &#8220;more&#8221; command in Linux? Sometimes, while working on the command line, We will see outputs produced by commands in ... <a title="What is more command in Linux and how to use" class="read-more" href="https://blog.eduguru.in/linux-2/what-is-more-command-in-linux-and-how-to-use" aria-label="Read more about What is more command in Linux and how to use">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/what-is-more-command-in-linux-and-how-to-use/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to create bootstrap buttons</title>
		<link>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-buttons</link>
					<comments>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-buttons#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 23:44:51 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[Bootstrap Active/Disabled Buttons]]></category>
		<category><![CDATA[Bootstrap Button Outline]]></category>
		<category><![CDATA[Bootstrap Button Sizes]]></category>
		<category><![CDATA[Bootstrap Spinner Buttons]]></category>
		<category><![CDATA[How to create bootstrap buttons]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15505</guid>

					<description><![CDATA[Today, We will learn how to create bootstrap buttons. We will use Bootstrap custom button styles for actions in forms, dialogs, and more. Includes support for a handful of contextual variations, sizes, states, and more. Read more: How to create Bootstrap Jumbotron and where to use When using button classes on &#60;a> elements that are used ... <a title="How to create bootstrap buttons" class="read-more" href="https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-buttons" aria-label="Read more about How to create bootstrap buttons">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-buttons/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to Add or remove the Default Gateway in Linux</title>
		<link>https://blog.eduguru.in/linux-2/how-to-add-or-remove-the-default-gateway-in-linux</link>
					<comments>https://blog.eduguru.in/linux-2/how-to-add-or-remove-the-default-gateway-in-linux#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 03:10:37 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[How to add a default route or gateway in Linux]]></category>
		<category><![CDATA[How to Add or remove the Default Gateway in Linux]]></category>
		<category><![CDATA[How to check the default route or gateway in Linux]]></category>
		<category><![CDATA[How to delete the default route or gateway in Linux]]></category>
		<category><![CDATA[linux command]]></category>
		<category><![CDATA[linux command to change gatewaty]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15502</guid>

					<description><![CDATA[Today, We will learn how to add or remove the default gateway in Linux. Read: ifconfig Sometimes you may need to change the default route of your system. This is especially true if you have multiple network adapters or routers on the network. How to check the default route or gateway in Linux? We can ... <a title="How to Add or remove the Default Gateway in Linux" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-add-or-remove-the-default-gateway-in-linux" aria-label="Read more about How to Add or remove the Default Gateway in Linux">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/how-to-add-or-remove-the-default-gateway-in-linux/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Bootstrap Container and How to use in HTML</title>
		<link>https://blog.eduguru.in/bootstrap/what-is-bootstrap-container-and-how-to-use-in-html</link>
					<comments>https://blog.eduguru.in/bootstrap/what-is-bootstrap-container-and-how-to-use-in-html#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 29 Sep 2021 00:34:57 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[bootstrap container class]]></category>
		<category><![CDATA[Creating Containers with Bootstrap]]></category>
		<category><![CDATA[What is Bootstrap Container and How to use in HTML]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15497</guid>

					<description><![CDATA[Today, We will learn what is a bootstrap container and will also see the example to understand the use of HTML. Read: How to create Bootstrap Jumbotron and where to use Creating Containers with Bootstrap Containers are the most basic layout element in Bootstrap and are required when using the grid system. Containers are basically ... <a title="What is Bootstrap Container and How to use in HTML" class="read-more" href="https://blog.eduguru.in/bootstrap/what-is-bootstrap-container-and-how-to-use-in-html" aria-label="Read more about What is Bootstrap Container and How to use in HTML">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/what-is-bootstrap-container-and-how-to-use-in-html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to create Bootstrap Jumbotron and where to use</title>
		<link>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-jumbotron-and-where-to-use</link>
					<comments>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-jumbotron-and-where-to-use#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 28 Sep 2021 17:35:13 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[Bootstrap Full-width Jumbotron]]></category>
		<category><![CDATA[Bootstrap Full-width Jumbotron exampe]]></category>
		<category><![CDATA[Bootstrap Jumbotron example]]></category>
		<category><![CDATA[How to create Bootstrap Jumbotron]]></category>
		<category><![CDATA[How to create Bootstrap Jumbotron and where to use]]></category>
		<category><![CDATA[Why this named Jumbotron]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15492</guid>

					<description><![CDATA[Today, We will learn how to create bootstrap Jumbotron and use of Bootstrap Jumbotron. Read: How to write code Bootstrap Image A jumbotron indicates a big grey box for calling extra attention to some special content or information. Any text that seems to be important can be written inside a jumbotron to make it appear ... <a title="How to create Bootstrap Jumbotron and where to use" class="read-more" href="https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-jumbotron-and-where-to-use" aria-label="Read more about How to create Bootstrap Jumbotron and where to use">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/how-to-create-bootstrap-jumbotron-and-where-to-use/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>How to write code Bootstrap Image</title>
		<link>https://blog.eduguru.in/bootstrap/how-to-write-code-bootstrap-image</link>
					<comments>https://blog.eduguru.in/bootstrap/how-to-write-code-bootstrap-image#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 25 Sep 2021 17:59:47 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[alignment of the image]]></category>
		<category><![CDATA[and responsive image]]></category>
		<category><![CDATA[Bootstrap Image]]></category>
		<category><![CDATA[circle-shaped image]]></category>
		<category><![CDATA[How to write code Bootstrap Image]]></category>
		<category><![CDATA[rounded corner image]]></category>
		<category><![CDATA[thumbnail image]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15483</guid>

					<description><![CDATA[Today, We will learn how to write code for Bootstrap Images. Read also: What are Bootstrap Colors and How to Code While creating a bootstrap page, We usually include images to the page. Here we will see how the images can be formatted in bootstrap. This could be a rounded corner image, circle-shaped image, thumbnail ... <a title="How to write code Bootstrap Image" class="read-more" href="https://blog.eduguru.in/bootstrap/how-to-write-code-bootstrap-image" aria-label="Read more about How to write code Bootstrap Image">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/how-to-write-code-bootstrap-image/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What are Bootstrap Tables and How to create</title>
		<link>https://blog.eduguru.in/bootstrap/what-are-bootstrap-tables-and-how-to-create</link>
					<comments>https://blog.eduguru.in/bootstrap/what-are-bootstrap-tables-and-how-to-create#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 24 Sep 2021 03:44:31 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[Bootstrap 4 Basic Table]]></category>
		<category><![CDATA[Bootstrap Tables Bordered Table]]></category>
		<category><![CDATA[Bootstrap Tables Borderless Table]]></category>
		<category><![CDATA[Bootstrap Tables Dark Striped Table]]></category>
		<category><![CDATA[Bootstrap Tables Hover Rows]]></category>
		<category><![CDATA[Bootstrap Tables Hoverable Dark Table]]></category>
		<category><![CDATA[Bootstrap Tables Responsive Tables]]></category>
		<category><![CDATA[Bootstrap Tables Small table]]></category>
		<category><![CDATA[Bootstrap Tables Striped Rows]]></category>
		<category><![CDATA[Bootstrap Tables Table Head Colors]]></category>
		<category><![CDATA[What are Bootstrap Tables and How to create]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15468</guid>

					<description><![CDATA[Today, We will learn about Bootstrap Table and how to create Bootstrap Tables. Read: What are Bootstrap Colors and How to Code Bootstrap 4 Basic Table A basic Bootstrap 4 table has light padding and horizontal dividers. The class .table adds basic styling to a table: Bootstrap Tables Striped Rows The class .table-striped adds zebra-stripes to a table: Bootstrap ... <a title="What are Bootstrap Tables and How to create" class="read-more" href="https://blog.eduguru.in/bootstrap/what-are-bootstrap-tables-and-how-to-create" aria-label="Read more about What are Bootstrap Tables and How to create">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/what-are-bootstrap-tables-and-how-to-create/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>How to create Expense Management System PHP and MySQL</title>
		<link>https://blog.eduguru.in/php-mysql/how-to-create-expense-management-system-php-and-mysql</link>
					<comments>https://blog.eduguru.in/php-mysql/how-to-create-expense-management-system-php-and-mysql#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 23 Sep 2021 15:02:28 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[php-mysql]]></category>
		<category><![CDATA[project]]></category>
		<category><![CDATA[Create MySQL Database Table for Expense Management System]]></category>
		<category><![CDATA[EMS]]></category>
		<category><![CDATA[expense management system]]></category>
		<category><![CDATA[How to create Expense Management System PHP and MySQL]]></category>
		<category><![CDATA[Implement Report for Expense Management System]]></category>
		<category><![CDATA[Manage Expenses for Expense Management System]]></category>
		<category><![CDATA[Manage Income for Expense Management System]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[php mysql project]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15465</guid>

					<description><![CDATA[Today, We will learn how to create an expense management system in PHP and MySQL. Read: How to Live Search using PHP MySQL and Ajax Expense management systems are web-based applications to manage their income and expenses. The users are allowed to log in system and manage their income and expenses and view the report ... <a title="How to create Expense Management System PHP and MySQL" class="read-more" href="https://blog.eduguru.in/php-mysql/how-to-create-expense-management-system-php-and-mysql" aria-label="Read more about How to create Expense Management System PHP and MySQL">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mysql/how-to-create-expense-management-system-php-and-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create Simple REST API PHP and MySQL</title>
		<link>https://blog.eduguru.in/php-mysql/how-to-create-simple-rest-api-php-and-mysql</link>
					<comments>https://blog.eduguru.in/php-mysql/how-to-create-simple-rest-api-php-and-mysql#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 23 Sep 2021 01:53:19 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[php-mysql]]></category>
		<category><![CDATA[project]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15461</guid>

					<description><![CDATA[Today, We will learn how to create a simple rest API in PHP and MySQL. Read: How to Live Search using PHP MySQL and Ajax REST (Representational State Transfer) is a way to define the architectural style for creating web services. The REST API is created at the server side with getting, POST, PUT or ... <a title="How to Create Simple REST API PHP and MySQL" class="read-more" href="https://blog.eduguru.in/php-mysql/how-to-create-simple-rest-api-php-and-mysql" aria-label="Read more about How to Create Simple REST API PHP and MySQL">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mysql/how-to-create-simple-rest-api-php-and-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create Event Calendar with jQuery, PHP, and MySQL</title>
		<link>https://blog.eduguru.in/php-mysql/how-to-create-event-calendar-with-jquery-php-and-mysql</link>
					<comments>https://blog.eduguru.in/php-mysql/how-to-create-event-calendar-with-jquery-php-and-mysql#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 22 Sep 2021 17:47:06 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[php-mysql]]></category>
		<category><![CDATA[project]]></category>
		<category><![CDATA[and MySQL]]></category>
		<category><![CDATA[Create Event Calendar with Bootstrap Calendar Plugin for dynamic event calendar]]></category>
		<category><![CDATA[Create MySQL Database Table for dynamic event calendar]]></category>
		<category><![CDATA[Design Event Calendar HTML for dynamic event calendar]]></category>
		<category><![CDATA[How to Create Event Calendar with jQuery]]></category>
		<category><![CDATA[Include Bootstrap and jQuery Files for dynamic event calendar]]></category>
		<category><![CDATA[Load Events Data from MySQL Database for dynamic event calendar]]></category>
		<category><![CDATA[PHP]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15458</guid>

					<description><![CDATA[Today, We will learn How to Create an Event Calendar with jQuery, PHP, and MySQL. Read: How To Create Multi-Step Form Progress Bar JQuery, Bootstrap, And PHP Event Calendar is an important feature of web applications to allow users to add and view events in a Calendar. Here, you will learn how to create an ... <a title="How to Create Event Calendar with jQuery, PHP, and MySQL" class="read-more" href="https://blog.eduguru.in/php-mysql/how-to-create-event-calendar-with-jquery-php-and-mysql" aria-label="Read more about How to Create Event Calendar with jQuery, PHP, and MySQL">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mysql/how-to-create-event-calendar-with-jquery-php-and-mysql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Create Multi-Step Form Progress Bar JQuery, Bootstrap, And PHP</title>
		<link>https://blog.eduguru.in/php-mysql/how-to-create-multi-step-form-progress-bar-jquery-bootstrap-and-php</link>
					<comments>https://blog.eduguru.in/php-mysql/how-to-create-multi-step-form-progress-bar-jquery-bootstrap-and-php#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 22 Sep 2021 16:31:26 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[php-mysql]]></category>
		<category><![CDATA[project]]></category>
		<category><![CDATA[And PHP]]></category>
		<category><![CDATA[Create Database Connection for Multi-Step Form]]></category>
		<category><![CDATA[Create Database Table for multi-step form]]></category>
		<category><![CDATA[Create Multiple FORM HTML for Multi-Step Form]]></category>
		<category><![CDATA[How To Create Multi-Step Form Progress Bar JQuery]]></category>
		<category><![CDATA[Multiple Form Display with jQuery for Mutli-Step Form]]></category>
		<category><![CDATA[Save Form Data to Database for Multi-Step Form]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15451</guid>

					<description><![CDATA[Today, We will learn how to create a multi-step form with progress bar using Jquery, Bootstrap, and PHP. So let&#8217;s start writing code. Read: What are Bootstrap Containers and how to code Forms with too many input fields are so boring and annoying to users, So we will not use more input fields. We will ... <a title="How To Create Multi-Step Form Progress Bar JQuery, Bootstrap, And PHP" class="read-more" href="https://blog.eduguru.in/php-mysql/how-to-create-multi-step-form-progress-bar-jquery-bootstrap-and-php" aria-label="Read more about How To Create Multi-Step Form Progress Bar JQuery, Bootstrap, And PHP">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mysql/how-to-create-multi-step-form-progress-bar-jquery-bootstrap-and-php/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What are Bootstrap Colors and How to Code</title>
		<link>https://blog.eduguru.in/bootstrap/what-are-bootstrap-colors-and-how-to-code</link>
					<comments>https://blog.eduguru.in/bootstrap/what-are-bootstrap-colors-and-how-to-code#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 22 Sep 2021 11:40:05 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[Bootstrap Background Colors]]></category>
		<category><![CDATA[Bootstrap colors]]></category>
		<category><![CDATA[Bootstrap Text Colors]]></category>
		<category><![CDATA[What are Bootstrap Colors and How to Code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15443</guid>

					<description><![CDATA[Today, We will know about Bootstrap colors and How to code Bootstrap colors in Code. Read: What is Bootstrap Text or Typography and How to Bootstrap Text Colors Bootstrap 4 has some contextual classes that can be used to provide &#8220;meaning through colors&#8221;. The classes for text colors are: .text-muted, .text-primary, .text-success, .text-info, .text-warning, .text-danger, .text-secondary, .text-white, .text-dark, .text-body (default body-color/often black) and .text-light: Contextual text classes ... <a title="What are Bootstrap Colors and How to Code" class="read-more" href="https://blog.eduguru.in/bootstrap/what-are-bootstrap-colors-and-how-to-code" aria-label="Read more about What are Bootstrap Colors and How to Code">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/what-are-bootstrap-colors-and-how-to-code/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>How to Live Search using PHP MySQL and Ajax</title>
		<link>https://blog.eduguru.in/php-mysql/how-to-live-search-using-php-mysql-and-ajax</link>
					<comments>https://blog.eduguru.in/php-mysql/how-to-live-search-using-php-mysql-and-ajax#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 21 Sep 2021 04:24:34 +0000</pubDate>
				<category><![CDATA[php-mysql]]></category>
		<category><![CDATA[project]]></category>
		<category><![CDATA[Ajax Live Database Search]]></category>
		<category><![CDATA[Creating the Database Table]]></category>
		<category><![CDATA[Creating the Search Form]]></category>
		<category><![CDATA[How to Live Search using PHP MySQL and Ajax]]></category>
		<category><![CDATA[Processing Search Query in Backend]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15441</guid>

					<description><![CDATA[Today, We will learn the program to live search using PHP MySQL and Ajax. You can also download the source code of Live Search written in PHP MySQL and Ajax. Ajax Live Database Search You can create a simple live database search functionality utilizing Ajax and PHP, where the search results will be displayed as ... <a title="How to Live Search using PHP MySQL and Ajax" class="read-more" href="https://blog.eduguru.in/php-mysql/how-to-live-search-using-php-mysql-and-ajax" aria-label="Read more about How to Live Search using PHP MySQL and Ajax">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mysql/how-to-live-search-using-php-mysql-and-ajax/feed</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>What is Bootstrap Text or Typography and How to</title>
		<link>https://blog.eduguru.in/bootstrap/what-is-bootstrap-text-or-typography-and-how-to</link>
					<comments>https://blog.eduguru.in/bootstrap/what-is-bootstrap-text-or-typography-and-how-to#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 20 Sep 2021 23:42:28 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15429</guid>

					<description><![CDATA[Today, We will learn about Bootstrap Text or Typography and How to write Bootstrap Code. Read: What are Bootstrap Containers and how to code Bootstrap 4 Default Settings Bootstrap 4 uses a default&#160;font-size&#160;of 16px, and its&#160;line-height&#160;is 1.5. The default&#160;font-family&#160;is &#8220;Helvetica Neue&#8221;, Helvetica, Arial, sans-serif. In addition, all&#160;&#60;p&#62;&#160;elements have&#160;margin-top: 0&#160;and&#160;margin-bottom: 1rem&#160;(16px by default). &#60;h1&#62; &#8211; &#60;h6&#62; ... <a title="What is Bootstrap Text or Typography and How to" class="read-more" href="https://blog.eduguru.in/bootstrap/what-is-bootstrap-text-or-typography-and-how-to" aria-label="Read more about What is Bootstrap Text or Typography and How to">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/what-is-bootstrap-text-or-typography-and-how-to/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What are Bootstrap Containers and how to code</title>
		<link>https://blog.eduguru.in/bootstrap/what-are-bootstrap-containers-and-how-to-code</link>
					<comments>https://blog.eduguru.in/bootstrap/what-are-bootstrap-containers-and-how-to-code#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 20 Sep 2021 15:56:53 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[Bootstrap 4]]></category>
		<category><![CDATA[Bootstrap Container Border and Color]]></category>
		<category><![CDATA[Bootstrap Container Padding]]></category>
		<category><![CDATA[Bootstrap Containers]]></category>
		<category><![CDATA[Bootstrap Fixed Container]]></category>
		<category><![CDATA[Bootstrap Fluid Container]]></category>
		<category><![CDATA[Bootstrap Responsive Containers]]></category>
		<category><![CDATA[What are Bootstrap Containers and how to code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15421</guid>

					<description><![CDATA[Today, We will learn Bootstrap Containers and how to code Bootstrap containers with example. Read: What is Bootstrap Grids and How to Code Bootstrap Containers Containers are used to pad the content inside of them, and there are two container classes available: The&#160;.container&#160;class provides a responsive&#160;fixed width container The&#160;.container-fluid&#160;class provides a&#160;full width container, spanning the ... <a title="What are Bootstrap Containers and how to code" class="read-more" href="https://blog.eduguru.in/bootstrap/what-are-bootstrap-containers-and-how-to-code" aria-label="Read more about What are Bootstrap Containers and how to code">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/what-are-bootstrap-containers-and-how-to-code/feed</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>What is Bootstrap Grids and How to Code</title>
		<link>https://blog.eduguru.in/bootstrap/what-is-bootstrap-grids-and-how-to-code</link>
					<comments>https://blog.eduguru.in/bootstrap/what-is-bootstrap-grids-and-how-to-code#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 20 Sep 2021 10:48:58 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[Basic Structure of a Bootstrap 4 Grid]]></category>
		<category><![CDATA[Bootstrap 4 Grid System]]></category>
		<category><![CDATA[Grid Classes]]></category>
		<category><![CDATA[Responsive Columns in bootstrap]]></category>
		<category><![CDATA[Three Equal Columns in bootstrap]]></category>
		<category><![CDATA[Two Unequal Responsive Columns in bootstrap]]></category>
		<category><![CDATA[What is Bootstrap Grids and How to Code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15414</guid>

					<description><![CDATA[Today, We will learn about what is Bootstrap Grids and how to code. We Will also see the example of Bootstrap Grids. Read: How to Develop CRUD Application from PHP MySQL Bootstrap 4 Grid System Bootstrap&#8217;s grid system is built with flexbox and allows up to 12 columns across the page. If you do not ... <a title="What is Bootstrap Grids and How to Code" class="read-more" href="https://blog.eduguru.in/bootstrap/what-is-bootstrap-grids-and-how-to-code" aria-label="Read more about What is Bootstrap Grids and How to Code">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/what-is-bootstrap-grids-and-how-to-code/feed</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>How to Develop CRUD Application from PHP MySQL</title>
		<link>https://blog.eduguru.in/php-mssql/how-to-develop-crud-application-from-php-mysql</link>
					<comments>https://blog.eduguru.in/php-mssql/how-to-develop-crud-application-from-php-mysql#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 20 Sep 2021 03:40:35 +0000</pubDate>
				<category><![CDATA[php-mssql]]></category>
		<category><![CDATA[project]]></category>
		<category><![CDATA[Creating the Config File]]></category>
		<category><![CDATA[Creating the Create Page]]></category>
		<category><![CDATA[Creating the Database Table for CRUD Application]]></category>
		<category><![CDATA[Creating the Delete Page]]></category>
		<category><![CDATA[Creating the Error Page]]></category>
		<category><![CDATA[Creating the Read Page]]></category>
		<category><![CDATA[Creating the Update Page]]></category>
		<category><![CDATA[CRUD]]></category>
		<category><![CDATA[CRUD Example]]></category>
		<category><![CDATA[How to Develop CRUD Application from PHP MySQL]]></category>
		<category><![CDATA[What is CRUD]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15411</guid>

					<description><![CDATA[Today, We will see the example of Developing a CRUD Application from PHP MySQL. Download Source Code What is CRUD CRUD is an acronym for&#160;Create,&#160;Read,&#160;Update, and&#160;Delete. CRUD operations are basic data manipulation for databases. We will learn how to perform create (i.e. insert), read (i.e. select), update and delete operations. Here, we&#8217;ll also create a ... <a title="How to Develop CRUD Application from PHP MySQL" class="read-more" href="https://blog.eduguru.in/php-mssql/how-to-develop-crud-application-from-php-mysql" aria-label="Read more about How to Develop CRUD Application from PHP MySQL">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/php-mssql/how-to-develop-crud-application-from-php-mysql/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is the Difference Between Linux and Windows</title>
		<link>https://blog.eduguru.in/info/what-is-the-difference-between-linux-and-windows</link>
					<comments>https://blog.eduguru.in/info/what-is-the-difference-between-linux-and-windows#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 19 Sep 2021 17:18:46 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[The Main Difference between linux and windows]]></category>
		<category><![CDATA[Types of Files]]></category>
		<category><![CDATA[What is the Difference Between Linux and Windows]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Vs. Linux: HOME Directory]]></category>
		<category><![CDATA[Windows Vs. Linux: Other Directories]]></category>
		<category><![CDATA[Windows Vs. Linux: Users]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15408</guid>

					<description><![CDATA[Today, We will know the difference between Linux and Windows OS. Before going into more depth about their structure and core functionality, Most of the end-users are working on Windows OS. Now Linux OS is also a user-friendly GUI. Generally, Linux OS is open source and free i.e no license is required to use Linux ... <a title="What is the Difference Between Linux and Windows" class="read-more" href="https://blog.eduguru.in/info/what-is-the-difference-between-linux-and-windows" aria-label="Read more about What is the Difference Between Linux and Windows">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/info/what-is-the-difference-between-linux-and-windows/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DevOps Training Certification and How to</title>
		<link>https://blog.eduguru.in/devops/what-is-devops-training-certification-and-how-to</link>
					<comments>https://blog.eduguru.in/devops/what-is-devops-training-certification-and-how-to#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 19 Sep 2021 15:04:35 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[AWS Certified DevOps Engineer]]></category>
		<category><![CDATA[Certified Hyperledger Fabric Developer]]></category>
		<category><![CDATA[DevOps Institute]]></category>
		<category><![CDATA[DevOps Training Certification]]></category>
		<category><![CDATA[Red Hat Certification:]]></category>
		<category><![CDATA[What is DevOps Training Certification and How to]]></category>
		<category><![CDATA[What is the future of DevOps]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15406</guid>

					<description><![CDATA[DevOps Training Certification DevOps training certification helps anyone who aspires to make a career as a DevOps Engineer. Certifications are available from Amazon web services, Red Hat, Microsoft Academy, DevOps Institute. Read: What is DevOps? Basics of DevOps Let’s consider them one by one Certified Hyperledger Fabric Developer Certified Hyperledger Fabric Developer program allows you to ... <a title="What is DevOps Training Certification and How to" class="read-more" href="https://blog.eduguru.in/devops/what-is-devops-training-certification-and-how-to" aria-label="Read more about What is DevOps Training Certification and How to">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/what-is-devops-training-certification-and-how-to/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is MariaDB and How to Install MariaDB On Windows</title>
		<link>https://blog.eduguru.in/mysql-2/what-is-mariadb-and-how-to-install-mariadb-on-windows</link>
					<comments>https://blog.eduguru.in/mysql-2/what-is-mariadb-and-how-to-install-mariadb-on-windows#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 19 Sep 2021 13:23:55 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[Difference between mysql and mariadb]]></category>
		<category><![CDATA[Download MariaDB]]></category>
		<category><![CDATA[feature of Mariadb]]></category>
		<category><![CDATA[install Mariadb]]></category>
		<category><![CDATA[MariaDB]]></category>
		<category><![CDATA[What is MariaDB]]></category>
		<category><![CDATA[What is MariaDB and How to Install MariaDB On Windows]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15397</guid>

					<description><![CDATA[Today, We will learn the basics of MariaDB and Will also Download and install MariaDB on Windows. What is MariaDB? MariaDB is a fork of the MySQL database management system. It is created by its original developers. This DBMS tool offers data processing capabilities for both small and enterprise tasks. MariaDB is an improved version ... <a title="What is MariaDB and How to Install MariaDB On Windows" class="read-more" href="https://blog.eduguru.in/mysql-2/what-is-mariadb-and-how-to-install-mariadb-on-windows" aria-label="Read more about What is MariaDB and How to Install MariaDB On Windows">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/what-is-mariadb-and-how-to-install-mariadb-on-windows/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Jenkins Interview Questions and Answers</title>
		<link>https://blog.eduguru.in/devops/jenkins-interview-questions-and-answers</link>
					<comments>https://blog.eduguru.in/devops/jenkins-interview-questions-and-answers#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 19 Sep 2021 12:21:13 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Explain how can create a backup and copy files in Jenkins]]></category>
		<category><![CDATA[Explain how you can clone a Git repository via Jenkins]]></category>
		<category><![CDATA[Explain how you can move or copy Jenkins from one server to another]]></category>
		<category><![CDATA[Explain what is continuous integration]]></category>
		<category><![CDATA[Jenkins]]></category>
		<category><![CDATA[Jenkins Interview Questions and Answers]]></category>
		<category><![CDATA[Mention some of the useful plugins in Jenkin]]></category>
		<category><![CDATA[Mention what is Jenkins]]></category>
		<category><![CDATA[What is the requirement for using Jenkins]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15394</guid>

					<description><![CDATA[Here is the top question and answer asked in Jenkins Interview. Read: What is the Free Jenkins Alternative for Continuous Integration 1) Mention what is Jenkins? Jenkins is an open-source tool with plugins built for continuous integration purposes.  The principle functionality of Jenkins is to keep a track of the version control system and to ... <a title="Jenkins Interview Questions and Answers" class="read-more" href="https://blog.eduguru.in/devops/jenkins-interview-questions-and-answers" aria-label="Read more about Jenkins Interview Questions and Answers">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/jenkins-interview-questions-and-answers/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is the Free Jenkins Alternative for Continuous Integration</title>
		<link>https://blog.eduguru.in/devops/what-is-the-free-jenkins-alternative-for-continuous-integration</link>
					<comments>https://blog.eduguru.in/devops/what-is-the-free-jenkins-alternative-for-continuous-integration#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 19 Sep 2021 03:54:21 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Is Jenkins free]]></category>
		<category><![CDATA[Jenkins]]></category>
		<category><![CDATA[What are the drawbacks of Jenkins]]></category>
		<category><![CDATA[What is Jenkins]]></category>
		<category><![CDATA[What is the Free Jenkins Alternative for Continuous Integration]]></category>
		<category><![CDATA[Which are the Best Jenkins alternatives]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15391</guid>

					<description><![CDATA[Today, We will know the free Jenkins alternative for continuous integration. Read: What is Jenkins, feature, and function of Jenkins Jenkins is an open-source Continuous Integration platform and is a crucial tool in DevOps Lifecycle. However, its interface is outdated and not user-friendly compared to current UI trends. Moreover, the Jenkin configuration could be tricky, ... <a title="What is the Free Jenkins Alternative for Continuous Integration" class="read-more" href="https://blog.eduguru.in/devops/what-is-the-free-jenkins-alternative-for-continuous-integration" aria-label="Read more about What is the Free Jenkins Alternative for Continuous Integration">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/what-is-the-free-jenkins-alternative-for-continuous-integration/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is Continuous Integration, Deployment, and Delivery</title>
		<link>https://blog.eduguru.in/devops/what-is-continuous-integration-deployment-and-delivery</link>
					<comments>https://blog.eduguru.in/devops/what-is-continuous-integration-deployment-and-delivery#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 18 Sep 2021 15:21:27 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Advantages of Continuous Delivery]]></category>
		<category><![CDATA[Advantages of Continuous Deployment]]></category>
		<category><![CDATA[Advantages of Continuous Integration]]></category>
		<category><![CDATA[and Delivery]]></category>
		<category><![CDATA[Challenges of Continuous Delivery]]></category>
		<category><![CDATA[Challenges of Continuous Deployment]]></category>
		<category><![CDATA[Challenges of Continuous Integration]]></category>
		<category><![CDATA[Continuous Delivery Best Practices]]></category>
		<category><![CDATA[Continuous Deployment Best Practices]]></category>
		<category><![CDATA[Continuous Integration Best Practices]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Difference between CI vs CD vs CD]]></category>
		<category><![CDATA[Disadvantages of Continuous Delivery]]></category>
		<category><![CDATA[Disadvantages of Continuous Deployment]]></category>
		<category><![CDATA[Disadvantages of Continuous Integration]]></category>
		<category><![CDATA[What is Continuous Delivery]]></category>
		<category><![CDATA[What is Continuous Deployment]]></category>
		<category><![CDATA[What is Continuous Integration]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15388</guid>

					<description><![CDATA[Continuous integration is a software development method where members of the team can integrate their work at least once a day. In this method, every integration is checked by an automated build to search for the error. Read: What is CI and CD: Continuous Integration and Delivery How to In continuous integration after a code ... <a title="What is Continuous Integration, Deployment, and Delivery" class="read-more" href="https://blog.eduguru.in/devops/what-is-continuous-integration-deployment-and-delivery" aria-label="Read more about What is Continuous Integration, Deployment, and Delivery">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/what-is-continuous-integration-deployment-and-delivery/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Jenkins, feature, and function of Jenkins</title>
		<link>https://blog.eduguru.in/devops/what-is-jenkins-feature-and-function-of-jenkins</link>
					<comments>https://blog.eduguru.in/devops/what-is-jenkins-feature-and-function-of-jenkins#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 18 Sep 2021 14:42:54 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[and function of Jenkins]]></category>
		<category><![CDATA[feature]]></category>
		<category><![CDATA[jenikns]]></category>
		<category><![CDATA[Jenkin Features]]></category>
		<category><![CDATA[What does Jenkin do]]></category>
		<category><![CDATA[What is Jenkins]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15386</guid>

					<description><![CDATA[Today, We will learn What is Jenkins, the features of Jenkins, and their feature? Jenkins is an award-winning continuous integration tool that monitors executions of deployment cycles. It started as a side project by Sun’s software engineers group. Later it was expanded as one of the popular open-source CI tools which help software development teams to automate ... <a title="What is Jenkins, feature, and function of Jenkins" class="read-more" href="https://blog.eduguru.in/devops/what-is-jenkins-feature-and-function-of-jenkins" aria-label="Read more about What is Jenkins, feature, and function of Jenkins">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/what-is-jenkins-feature-and-function-of-jenkins/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>CI and CD pipeline in process of software delivery</title>
		<link>https://blog.eduguru.in/devops/ci-and-cd-pipeline-in-process-of-software-delivery</link>
					<comments>https://blog.eduguru.in/devops/ci-and-cd-pipeline-in-process-of-software-delivery#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 18 Sep 2021 07:36:55 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Advantages of CI/CD pipelines]]></category>
		<category><![CDATA[and Continuous Deployment?]]></category>
		<category><![CDATA[Build Stage of CI/CD]]></category>
		<category><![CDATA[CI and CD pipeline in process of software delivery]]></category>
		<category><![CDATA[CI/CD pipeline Best Practices]]></category>
		<category><![CDATA[Continuous Delivery]]></category>
		<category><![CDATA[Deploy Stage of CI/CD]]></category>
		<category><![CDATA[Example of CI/CD Pipeline]]></category>
		<category><![CDATA[Jenkins]]></category>
		<category><![CDATA[Source Stage of CI/CD]]></category>
		<category><![CDATA[Stages of a CI/CD pipeline]]></category>
		<category><![CDATA[Test Stage of CI/CD]]></category>
		<category><![CDATA[What is Continuous Integration]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15382</guid>

					<description><![CDATA[Today, We will know What is a CI/CD pipeline and what is relo to the software delivery process? Read: Jenkins Pipeline: How to Create JenkinsFile A CI/CD pipeline automates the process of software delivery. It builds code, runs tests, and helps you safely deploy a new version of the software. CI/CD pipeline reduces manual errors, ... <a title="CI and CD pipeline in process of software delivery" class="read-more" href="https://blog.eduguru.in/devops/ci-and-cd-pipeline-in-process-of-software-delivery" aria-label="Read more about CI and CD pipeline in process of software delivery">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/ci-and-cd-pipeline-in-process-of-software-delivery/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Jenkins Pipeline: How to Create JenkinsFile</title>
		<link>https://blog.eduguru.in/devops/jenkins-pipeline-how-to-create-jenkinsfile</link>
					<comments>https://blog.eduguru.in/devops/jenkins-pipeline-how-to-create-jenkinsfile#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 18 Sep 2021 04:17:05 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Declarative versus Scripted pipeline]]></category>
		<category><![CDATA[how Continuous Delivery Pipelines works]]></category>
		<category><![CDATA[How to Create Jenkins Pipeline]]></category>
		<category><![CDATA[How to Create JenkinsFile]]></category>
		<category><![CDATA[Install Build Pipeline Plugin in Jenkins]]></category>
		<category><![CDATA[Jenkins]]></category>
		<category><![CDATA[Jenkins Pipeline]]></category>
		<category><![CDATA[Jenkins Pipeline Concepts]]></category>
		<category><![CDATA[What is a JenkinsFile]]></category>
		<category><![CDATA[What is Continuous Delivery Pipelines]]></category>
		<category><![CDATA[What is Jenkins Pipeline]]></category>
		<category><![CDATA[Why Use Jenkins Pipeline]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15376</guid>

					<description><![CDATA[Today, We will know about the Jenkins pipeline and how to create a jenkinsfile. Read: How to Download and Install Jenkins on Windows What is Jenkins Pipeline? Jenkins Pipeline is a combination of plugins that supports the integration and implementation of continuous delivery pipelines. It has an extensible automation server to create simple and complex delivery ... <a title="Jenkins Pipeline: How to Create JenkinsFile" class="read-more" href="https://blog.eduguru.in/devops/jenkins-pipeline-how-to-create-jenkinsfile" aria-label="Read more about Jenkins Pipeline: How to Create JenkinsFile">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/jenkins-pipeline-how-to-create-jenkinsfile/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to display Message Box in Excel VBA</title>
		<link>https://blog.eduguru.in/excel/how-to-display-message-box-in-excel-vba</link>
					<comments>https://blog.eduguru.in/excel/how-to-display-message-box-in-excel-vba#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 17:04:43 +0000</pubDate>
				<category><![CDATA[Excel]]></category>
		<category><![CDATA[Excel VBA]]></category>
		<category><![CDATA[How to display Message Box in Excel VBA]]></category>
		<category><![CDATA[Message box Return Values in VBA]]></category>
		<category><![CDATA[Parameter Description of Message box in vba]]></category>
		<category><![CDATA[Syntax of Message box in VBA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15373</guid>

					<description><![CDATA[Today, We will learn how to display the message box in Excel VBA with an Example. The MsgBox function displays a message box and waits for the user to click a button and then an action is performed based on the button clicked by the user. Read: Definition of Excel VBA Variable and Datatype Syntax of Message ... <a title="How to display Message Box in Excel VBA" class="read-more" href="https://blog.eduguru.in/excel/how-to-display-message-box-in-excel-vba" aria-label="Read more about How to display Message Box in Excel VBA">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/excel/how-to-display-message-box-in-excel-vba/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Definition of Excel VBA Variable and Datatype</title>
		<link>https://blog.eduguru.in/devops/definition-of-excel-vba-variable-and-datatype</link>
					<comments>https://blog.eduguru.in/devops/definition-of-excel-vba-variable-and-datatype#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 07:00:27 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Constant in VBA]]></category>
		<category><![CDATA[Definition of Excel VBA Variable and Datatype]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[Excel VBA Data Types]]></category>
		<category><![CDATA[The syntax for VBA Variable]]></category>
		<category><![CDATA[VBA Variables]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15371</guid>

					<description><![CDATA[Today, We will know the Definition of Excel VBA Variables and Datatype. We will also explain the variable and their data type. Read: How to Write Macros in Excel and Use Variables are used in almost all computer programs and VBA is no different. It’s a good practice to declare a variable at the beginning ... <a title="Definition of Excel VBA Variable and Datatype" class="read-more" href="https://blog.eduguru.in/devops/definition-of-excel-vba-variable-and-datatype" aria-label="Read more about Definition of Excel VBA Variable and Datatype">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/definition-of-excel-vba-variable-and-datatype/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create a New Build Job in Jenkins Freestyle Project</title>
		<link>https://blog.eduguru.in/devops/how-to-create-a-new-build-job-in-jenkins-freestyle-project</link>
					<comments>https://blog.eduguru.in/devops/how-to-create-a-new-build-job-in-jenkins-freestyle-project#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 03:46:36 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[How to Create a New Build Job in Jenkins]]></category>
		<category><![CDATA[How to Create a New Build Job in Jenkins Freestyle Project]]></category>
		<category><![CDATA[Jenkins]]></category>
		<category><![CDATA[jenkins new project]]></category>
		<category><![CDATA[What is a Jenkins Freestyle Project?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15363</guid>

					<description><![CDATA[Today, We will know how to create a new build job in Jenkins. Read: How to Create/Add Users in Jenkins and Manage Permissions What is a Jenkins Freestyle Project? Jenkins Freestyle Project&#160;is a repeatable build job, script, or pipeline that contains steps and post-build actions. It is an improved job or task that can span ... <a title="How to Create a New Build Job in Jenkins Freestyle Project" class="read-more" href="https://blog.eduguru.in/devops/how-to-create-a-new-build-job-in-jenkins-freestyle-project" aria-label="Read more about How to Create a New Build Job in Jenkins Freestyle Project">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/how-to-create-a-new-build-job-in-jenkins-freestyle-project/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create/Add Users in Jenkins and Manage Permissions</title>
		<link>https://blog.eduguru.in/devops/how-to-create-add-users-in-jenkins-and-manage-permissions</link>
					<comments>https://blog.eduguru.in/devops/how-to-create-add-users-in-jenkins-and-manage-permissions#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 02:45:44 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[How to Assign Roles in Jenkins]]></category>
		<category><![CDATA[How to Create/Add a User in Jenkins]]></category>
		<category><![CDATA[How to Create/Add Users in Jenkins and Manage Permissions]]></category>
		<category><![CDATA[How to Install Role Strategy Plugin in Jenkins]]></category>
		<category><![CDATA[How to Manage Users and Roles in Jenkins]]></category>
		<category><![CDATA[Jenkins]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15353</guid>

					<description><![CDATA[Today, We will know how to create or add new users in Jenkins and How to manage Permissions in Jenkins. Generally, in a large organization, there are multiple, separate teams to manage and run jobs in Jenkins. But managing this crowd of users and assigning roles to them can prove troublesome. Read: How to Integrate ... <a title="How to Create/Add Users in Jenkins and Manage Permissions" class="read-more" href="https://blog.eduguru.in/devops/how-to-create-add-users-in-jenkins-and-manage-permissions" aria-label="Read more about How to Create/Add Users in Jenkins and Manage Permissions">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/how-to-create-add-users-in-jenkins-and-manage-permissions/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Write Macros in Excel and Use</title>
		<link>https://blog.eduguru.in/excel/how-to-write-macros-in-excel-and-use</link>
					<comments>https://blog.eduguru.in/excel/how-to-write-macros-in-excel-and-use#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 16 Sep 2021 16:33:32 +0000</pubDate>
				<category><![CDATA[Excel]]></category>
		<category><![CDATA[Enable Developer Option on Excel]]></category>
		<category><![CDATA[Excel Macro Basics]]></category>
		<category><![CDATA[How to Use Excel Macro]]></category>
		<category><![CDATA[How to Write Macros in Excel and Use]]></category>
		<category><![CDATA[Introduction to Visual Basic for Applications]]></category>
		<category><![CDATA[VBA in Excel: What is Visual Basic for Applications]]></category>
		<category><![CDATA[What is VBA in a Layman’s Language]]></category>
		<category><![CDATA[What is Visual Basic for Applications (VBA)]]></category>
		<category><![CDATA[Why are Excel Macros Used in Excel]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15343</guid>

					<description><![CDATA[Today, We will know How to Write Macros in Excel, What is Macro and How to Use Macro. Excel Macro is a piece of programming code that runs in an Excel environment but you don’t need to be a coder to program macros. VBA Macros save time as they automate repetitive tasks. Though, you need basic ... <a title="How to Write Macros in Excel and Use" class="read-more" href="https://blog.eduguru.in/excel/how-to-write-macros-in-excel-and-use" aria-label="Read more about How to Write Macros in Excel and Use">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/excel/how-to-write-macros-in-excel-and-use/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to Integrate Jenkins With GitHub</title>
		<link>https://blog.eduguru.in/devops/how-to-integrate-jenkins-with-github</link>
					<comments>https://blog.eduguru.in/devops/how-to-integrate-jenkins-with-github#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 16 Sep 2021 09:18:14 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15331</guid>

					<description><![CDATA[Today, We will know how to Integrate Jenkins with GitHub. Read: How to Download and Install Jenkins on Windows Jenkins has outstanding plugin support. There are thousands of third-party application plugins available on their website. To know if Jenkins supports the third-party applications you have in mind, check their plugins directory at https://plugins.jenkins.io/. Installation of Plugins ... <a title="How to Integrate Jenkins With GitHub" class="read-more" href="https://blog.eduguru.in/devops/how-to-integrate-jenkins-with-github" aria-label="Read more about How to Integrate Jenkins With GitHub">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/how-to-integrate-jenkins-with-github/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to Download and Install Jenkins on Windows</title>
		<link>https://blog.eduguru.in/devops/how-to-download-and-install-jenkins-on-windows</link>
					<comments>https://blog.eduguru.in/devops/how-to-download-and-install-jenkins-on-windows#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 16 Sep 2021 03:18:12 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Customize Jenkins]]></category>
		<category><![CDATA[How to Download and Install Jenkins on Windows]]></category>
		<category><![CDATA[How to Download Jenkins]]></category>
		<category><![CDATA[How to Unblock Jenkins]]></category>
		<category><![CDATA[Jenkins]]></category>
		<category><![CDATA[jenkins installation]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15313</guid>

					<description><![CDATA[Jenkins may be installed on either Windows or Unix platforms, but we will focus on Windows installation only. Here will see how to download and install Jenkins on the windows system. Read Jenkins For Beginners: Step By Step Tutorial Prerequisites: Before you proceed to install Jenkins in your windows system, there are some prerequisites for ... <a title="How to Download and Install Jenkins on Windows" class="read-more" href="https://blog.eduguru.in/devops/how-to-download-and-install-jenkins-on-windows" aria-label="Read more about How to Download and Install Jenkins on Windows">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/how-to-download-and-install-jenkins-on-windows/feed</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>Which is best: Partial Index and Expression Index: PostgreSQL</title>
		<link>https://blog.eduguru.in/postgresql/which-is-best-partial-index-and-expression-index-postgresql</link>
					<comments>https://blog.eduguru.in/postgresql/which-is-best-partial-index-and-expression-index-postgresql#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 16 Sep 2021 02:25:36 +0000</pubDate>
				<category><![CDATA[postgreSQl]]></category>
		<category><![CDATA[Expression Indexes]]></category>
		<category><![CDATA[index in real-world use case]]></category>
		<category><![CDATA[Partial Index and Expression Index]]></category>
		<category><![CDATA[Partial Indexes]]></category>
		<category><![CDATA[postgresql]]></category>
		<category><![CDATA[Which is best: Partial Index and Expression Index: PostgreSQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15310</guid>

					<description><![CDATA[Here, we came across in the context of a real-world use case. Let see, Which is best: Partial Index and Expression Index in PostgreSQL. Both are good and the usages depend on the context of user queries. Read: MySQL Index: Understanding MySQL indexing Here, We show the power of advanced RDBMS features such as partial ... <a title="Which is best: Partial Index and Expression Index: PostgreSQL" class="read-more" href="https://blog.eduguru.in/postgresql/which-is-best-partial-index-and-expression-index-postgresql" aria-label="Read more about Which is best: Partial Index and Expression Index: PostgreSQL">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/postgresql/which-is-best-partial-index-and-expression-index-postgresql/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Jenkins and Continuous Integration Tool</title>
		<link>https://blog.eduguru.in/devops/jenkins-and-continuous-integration-tool</link>
					<comments>https://blog.eduguru.in/devops/jenkins-and-continuous-integration-tool#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 15 Sep 2021 08:38:14 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Advantages of using Jenkins]]></category>
		<category><![CDATA[Disadvantages of using Jenkins]]></category>
		<category><![CDATA[Highlights of Jenkins and Continious Integration]]></category>
		<category><![CDATA[How does Jenkins work]]></category>
		<category><![CDATA[Jenkin History]]></category>
		<category><![CDATA[Jenkins and Continuous Integration Tool]]></category>
		<category><![CDATA[What is Continuous Integration]]></category>
		<category><![CDATA[What is Jenkins]]></category>
		<category><![CDATA[Why use Continuous Integration with Jenkins]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15300</guid>

					<description><![CDATA[What is Jenkins and Why use Continuous Integration Tool? Jenkins&#160;is an open-source Continuous Integration server written in Java for orchestrating a chain of actions to achieve the Continuous Integration process in an automated fashion. Jenkins supports the complete development life cycle of software from building, testing, documenting the software, deploying, and other stages of the ... <a title="Jenkins and Continuous Integration Tool" class="read-more" href="https://blog.eduguru.in/devops/jenkins-and-continuous-integration-tool" aria-label="Read more about Jenkins and Continuous Integration Tool">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/jenkins-and-continuous-integration-tool/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>What is CI and CD:  Continuous Integration and Delivery How to</title>
		<link>https://blog.eduguru.in/devops/what-is-ci-and-cd-continuous-integration-and-delivery-how-to</link>
					<comments>https://blog.eduguru.in/devops/what-is-ci-and-cd-continuous-integration-and-delivery-how-to#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 15 Sep 2021 03:30:06 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Activities in Continuous Integration]]></category>
		<category><![CDATA[Best practices of using CI Systems]]></category>
		<category><![CDATA[Continuous Integration]]></category>
		<category><![CDATA[DevOps Work Flow]]></category>
		<category><![CDATA[Disadvantages of CI]]></category>
		<category><![CDATA[Features of CI]]></category>
		<category><![CDATA[Version Control System]]></category>
		<category><![CDATA[What do you need to conduct CI process]]></category>
		<category><![CDATA[What is CI and CD]]></category>
		<category><![CDATA[What is DevOps]]></category>
		<category><![CDATA[Why is DevOps used]]></category>
		<category><![CDATA[Why Use CI]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15297</guid>

					<description><![CDATA[Continuous Integration known as CI is a software development method where team members integrate their work at least once a day. In this method, every integration is checked by an automated build to detect errors. Read Jenkins For Beginners: Step By Step Tutorial Also Read: What is DevOps? Basics of DevOps Activities in Continuous Integration &#8211; ... <a title="What is CI and CD:  Continuous Integration and Delivery How to" class="read-more" href="https://blog.eduguru.in/devops/what-is-ci-and-cd-continuous-integration-and-delivery-how-to" aria-label="Read more about What is CI and CD:  Continuous Integration and Delivery How to">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/what-is-ci-and-cd-continuous-integration-and-delivery-how-to/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Jenkins For Beginners: Step By Step Tutorial</title>
		<link>https://blog.eduguru.in/devops/jenkins-for-beginners-step-by-step-tutorial</link>
					<comments>https://blog.eduguru.in/devops/jenkins-for-beginners-step-by-step-tutorial#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 14 Sep 2021 05:06:05 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Jenkins]]></category>
		<category><![CDATA[Jenkins For Beginners]]></category>
		<category><![CDATA[Jenkins step by step]]></category>
		<category><![CDATA[learn jenkins]]></category>
		<category><![CDATA[What is Jenkins]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15294</guid>

					<description><![CDATA[Today, we will know How to start Jenkins For Beginners Step By Step. Jenkins is a powerful application that allows continuous integration and continuous delivery of projects, regardless of the platform you are working on. It is a free source that can handle any kind of build or continuous integration. You can integrate Jenkins with ... <a title="Jenkins For Beginners: Step By Step Tutorial" class="read-more" href="https://blog.eduguru.in/devops/jenkins-for-beginners-step-by-step-tutorial" aria-label="Read more about Jenkins For Beginners: Step By Step Tutorial">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/jenkins-for-beginners-step-by-step-tutorial/feed</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>What is DevOps? Basics of DevOps</title>
		<link>https://blog.eduguru.in/devops/what-is-devops-basics-of-devops</link>
					<comments>https://blog.eduguru.in/devops/what-is-devops-basics-of-devops#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 13 Sep 2021 15:30:07 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[and Skills of a DevOps Engineer]]></category>
		<category><![CDATA[DevOps Lifecycle]]></category>
		<category><![CDATA[DevOps Work Flow]]></category>
		<category><![CDATA[How is DevOps different from traditional IT]]></category>
		<category><![CDATA[Responsibilities]]></category>
		<category><![CDATA[Roles]]></category>
		<category><![CDATA[What is DevOps]]></category>
		<category><![CDATA[Who is a DevOps Engineer]]></category>
		<category><![CDATA[Why is DevOps is Needed]]></category>
		<category><![CDATA[Why is DevOps used]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15290</guid>

					<description><![CDATA[Today, We will learn What is DevOps, the Basics of DevOps, How DevOps is different from traditional IT, Why DevOps is required, and much more. What is DevOps? DevOps is a collaboration between Development and IT Operations to make software production and deployment in an automated &#38; repeatable way. DevOps helps to increase the organization’s speed ... <a title="What is DevOps? Basics of DevOps" class="read-more" href="https://blog.eduguru.in/devops/what-is-devops-basics-of-devops" aria-label="Read more about What is DevOps? Basics of DevOps">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/devops/what-is-devops-basics-of-devops/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>BSc Computer Science Courses after 12th how to admission</title>
		<link>https://blog.eduguru.in/course-after-12/bsc-computer-science-courses-after-12th-how-to-admission</link>
					<comments>https://blog.eduguru.in/course-after-12/bsc-computer-science-courses-after-12th-how-to-admission#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 12 Sep 2021 14:59:31 +0000</pubDate>
				<category><![CDATA[Course After 12]]></category>
		<category><![CDATA[BSc Computer Science - Courses after 12th: how to admission]]></category>
		<category><![CDATA[BSc Computer Science Admission]]></category>
		<category><![CDATA[BSc Computer Science Colleges]]></category>
		<category><![CDATA[BSc Computer Science Jobs]]></category>
		<category><![CDATA[BSc Computer Science Salary 2021]]></category>
		<category><![CDATA[BSc Computer Science Syllabus]]></category>
		<category><![CDATA[Subjects]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15283</guid>

					<description><![CDATA[Today, We will know about BSc Computer Science &#8211; Courses after 12th: how to admission, their Syllabus, Subjects, Colleges, Jobs, Salary. BSc Computer Science, abbreviated as BSc CS,&#160;is a 3-year undergraduate program with the subjects and topics related to computer science, computer application, and its services. The main aim of this program is to create ... <a title="BSc Computer Science Courses after 12th how to admission" class="read-more" href="https://blog.eduguru.in/course-after-12/bsc-computer-science-courses-after-12th-how-to-admission" aria-label="Read more about BSc Computer Science Courses after 12th how to admission">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/course-after-12/bsc-computer-science-courses-after-12th-how-to-admission/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Courses After 12th: Career, Scope, Salary, and Duration</title>
		<link>https://blog.eduguru.in/course-after-12/courses-after-12th-career-scope-salary-and-duration</link>
					<comments>https://blog.eduguru.in/course-after-12/courses-after-12th-career-scope-salary-and-duration#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 12 Sep 2021 09:29:38 +0000</pubDate>
				<category><![CDATA[Course After 12]]></category>
		<category><![CDATA[career after 12th]]></category>
		<category><![CDATA[commerce after 12th]]></category>
		<category><![CDATA[courses available after the 12th]]></category>
		<category><![CDATA[engineering after 12th]]></category>
		<category><![CDATA[medical course after 12th]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15279</guid>

					<description><![CDATA[Today we will know what are the courses available after the 12th as career, scope, salary, and duration of course. When the student comes in 9th&#160;grade, he starts thinking about which&#160;stream to be selected after Class 10th,&#160;whether they should take the&#160;Science Stream,&#160;Arts Stream,&#160;or&#160;Commerce Stream. Courses after 12th are very crucial to choose because these courses ... <a title="Courses After 12th: Career, Scope, Salary, and Duration" class="read-more" href="https://blog.eduguru.in/course-after-12/courses-after-12th-career-scope-salary-and-duration" aria-label="Read more about Courses After 12th: Career, Scope, Salary, and Duration">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/course-after-12/courses-after-12th-career-scope-salary-and-duration/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Diploma in Fashion Designing: Course after 12th Commerce</title>
		<link>https://blog.eduguru.in/course-after-12/diploma-in-fashion-designing-course-after-12th-commerce</link>
					<comments>https://blog.eduguru.in/course-after-12/diploma-in-fashion-designing-course-after-12th-commerce#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 11 Sep 2021 05:51:18 +0000</pubDate>
				<category><![CDATA[Course After 12]]></category>
		<category><![CDATA[Diploma in Fashion Designing]]></category>
		<category><![CDATA[Diploma in Fashion Designing: Recommended Books]]></category>
		<category><![CDATA[What will you study in the fashion designing course]]></category>
		<category><![CDATA[What work can you do after Diploma in Fashion Designing]]></category>
		<category><![CDATA[Why choose fashion designing as a career]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15277</guid>

					<description><![CDATA[Here, We will know about Diploma in Fashion Designing: Admission, Top Colleges, Syllabus, Jobs and Salary 2021. This diploma course can be done after 12th commerce. You are a great fit for the Fashion Industry if you:- Seek an interest in the latest fashion trends and fashion shows. Possess an ability to work with fabrics ... <a title="Diploma in Fashion Designing: Course after 12th Commerce" class="read-more" href="https://blog.eduguru.in/course-after-12/diploma-in-fashion-designing-course-after-12th-commerce" aria-label="Read more about Diploma in Fashion Designing: Course after 12th Commerce">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/course-after-12/diploma-in-fashion-designing-course-after-12th-commerce/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Indian State/Union Territory with longest Coastline</title>
		<link>https://blog.eduguru.in/uncategorized/indian-state-union-territory-with-longest-coastline</link>
					<comments>https://blog.eduguru.in/uncategorized/indian-state-union-territory-with-longest-coastline#respond</comments>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 16:01:01 +0000</pubDate>
				<category><![CDATA[Geography]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Coastline]]></category>
		<category><![CDATA[Gujarat]]></category>
		<category><![CDATA[Longest Coastline]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[Tamil]]></category>
		<category><![CDATA[Union Territory]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15274</guid>

					<description><![CDATA[Andaman and Nicobar 1962km Gujarat 1215km Andhra Pradesh 907km Tamil Nadu 974km Maharashtra 653km]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/uncategorized/indian-state-union-territory-with-longest-coastline/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is a Bachelor of Arts (BA) &#8211; Course Details</title>
		<link>https://blog.eduguru.in/course-after-12/what-is-a-bachelor-of-arts-ba-course-details</link>
					<comments>https://blog.eduguru.in/course-after-12/what-is-a-bachelor-of-arts-ba-course-details#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 15:24:50 +0000</pubDate>
				<category><![CDATA[Course After 12]]></category>
		<category><![CDATA[Admission in BA college]]></category>
		<category><![CDATA[BA and BA Hons: Course Difference]]></category>
		<category><![CDATA[BA college]]></category>
		<category><![CDATA[BA course]]></category>
		<category><![CDATA[Bachelor of Arts]]></category>
		<category><![CDATA[Bachelor of Arts (BA)]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15272</guid>

					<description><![CDATA[Bachelor of Arts or BA is one of the most popular undergraduate programs that students pursue right after passing class 12th in India. Usually, a three-year course Arts program is offered by colleges under various streams such as Design, Mass Communication, Hospitality, and Humanities.The duration of BA or Bachelor of Arts courses is normally three years. However, it is dependent on the ... <a title="What is a Bachelor of Arts (BA) &#8211; Course Details" class="read-more" href="https://blog.eduguru.in/course-after-12/what-is-a-bachelor-of-arts-ba-course-details" aria-label="Read more about What is a Bachelor of Arts (BA) &#8211; Course Details">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/course-after-12/what-is-a-bachelor-of-arts-ba-course-details/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Physiographic Division of India</title>
		<link>https://blog.eduguru.in/geography/physiographic-division-of-india</link>
					<comments>https://blog.eduguru.in/geography/physiographic-division-of-india#respond</comments>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 15:16:51 +0000</pubDate>
				<category><![CDATA[Geography]]></category>
		<category><![CDATA[Coastal]]></category>
		<category><![CDATA[Himalayan]]></category>
		<category><![CDATA[Mountains]]></category>
		<category><![CDATA[Peninsular plateau]]></category>
		<category><![CDATA[Physiographic division of India]]></category>
		<category><![CDATA[Physiography]]></category>
		<category><![CDATA[Plains of India]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15271</guid>

					<description><![CDATA[On the basis of physiography, India is divided into the following divisions: &#8211; The Himalayan Mountains The Great Plains of India The Peninsular Plateau The Coastal Plains The Islands]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/geography/physiographic-division-of-india/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is BCA: Bachelor of Computer Applications</title>
		<link>https://blog.eduguru.in/course-after-12/what-is-bca-bachelor-of-computer-applications</link>
					<comments>https://blog.eduguru.in/course-after-12/what-is-bca-bachelor-of-computer-applications#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 07:26:34 +0000</pubDate>
				<category><![CDATA[Course After 12]]></category>
		<category><![CDATA[BCA Admission]]></category>
		<category><![CDATA[BCA Eligibility]]></category>
		<category><![CDATA[BCA Fees]]></category>
		<category><![CDATA[BCA Full Form]]></category>
		<category><![CDATA[BCA Jobs]]></category>
		<category><![CDATA[BCA Scope]]></category>
		<category><![CDATA[BCA Subjects]]></category>
		<category><![CDATA[BCA Top Colleges 2021]]></category>
		<category><![CDATA[BCA: Course]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15267</guid>

					<description><![CDATA[The full form of BCA is Bachelor in Computer Application. BCA is a three-year undergraduate degree program for candidates wishing to delve into the world of Computer languages. One of the most popular options to get started with a career in Information Technology, the course gives you an insight into the world of computers and ... <a title="What is BCA: Bachelor of Computer Applications" class="read-more" href="https://blog.eduguru.in/course-after-12/what-is-bca-bachelor-of-computer-applications" aria-label="Read more about What is BCA: Bachelor of Computer Applications">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/course-after-12/what-is-bca-bachelor-of-computer-applications/feed</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Basic Question and Answer of Ethical Hacking &#8211; IT Security</title>
		<link>https://blog.eduguru.in/it-security/basic-question-and-answer-of-ethical-hacking-it-security</link>
					<comments>https://blog.eduguru.in/it-security/basic-question-and-answer-of-ethical-hacking-it-security#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 03:41:06 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[basic]]></category>
		<category><![CDATA[basic question of ethical interview]]></category>
		<category><![CDATA[ETHICAL HACKING]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[job interview of ethical hacking]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[question answer of ethical hacking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[top question for ethical hacking interview]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15265</guid>

					<description><![CDATA[Here are the Top 25 Basic Questions and their Answer of Ethical Hacking &#8211; IT Security. Ethical Hacking interview questions to help you prepare for the job interview. In this list of Ethical Hacker interview questions, we have covered all commonly asked basic and advanced hacking interview questions. Read this also Understanding the Steps of ... <a title="Basic Question and Answer of Ethical Hacking &#8211; IT Security" class="read-more" href="https://blog.eduguru.in/it-security/basic-question-and-answer-of-ethical-hacking-it-security" aria-label="Read more about Basic Question and Answer of Ethical Hacking &#8211; IT Security">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/basic-question-and-answer-of-ethical-hacking-it-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Course and Free Online Certificate Training</title>
		<link>https://blog.eduguru.in/it-security/cybersecurity-course-and-free-online-certificate-training</link>
					<comments>https://blog.eduguru.in/it-security/cybersecurity-course-and-free-online-certificate-training#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 08 Sep 2021 13:12:24 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[certificate program cyber certificate]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security course]]></category>
		<category><![CDATA[CYBERSECURITY]]></category>
		<category><![CDATA[free cyber security course]]></category>
		<category><![CDATA[free cyber security training]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15262</guid>

					<description><![CDATA[Below is a handpicked list of the Best Online Cyber Security Certificate Courses to gather knowledge about cybersecurity. The list contains both open source (free) and commercial (paid) cybersecurity courses. What is Cybercrime? Cybercrime Types, Tools, and Examples Best Online Cybersecurity Training Courses Name Provider Price Key Topics Ratings Duration Link Introduction to Cybersecurity Udacity ... <a title="Cybersecurity Course and Free Online Certificate Training" class="read-more" href="https://blog.eduguru.in/it-security/cybersecurity-course-and-free-online-certificate-training" aria-label="Read more about Cybersecurity Course and Free Online Certificate Training">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/cybersecurity-course-and-free-online-certificate-training/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Most Common Web Security Vulnerabilities</title>
		<link>https://blog.eduguru.in/it-security/most-common-web-security-vulnerabilities</link>
					<comments>https://blog.eduguru.in/it-security/most-common-web-security-vulnerabilities#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 08 Sep 2021 02:30:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Broken Authentication and Session Management]]></category>
		<category><![CDATA[Cross Site Request Forgery]]></category>
		<category><![CDATA[Cross Site Scripting]]></category>
		<category><![CDATA[Failure to restrict URL Access]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Insecure Cryptographic Storage]]></category>
		<category><![CDATA[Insecure Direct Object References]]></category>
		<category><![CDATA[Insufficient Transport Layer Protection]]></category>
		<category><![CDATA[Most Common Web Security Vulnerabilities]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Misconfiguration]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[SQL injection]]></category>
		<category><![CDATA[Unvalidated Redirects and Forwards]]></category>
		<category><![CDATA[Web Security Vulnerabilities]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15258</guid>

					<description><![CDATA[The most common security vulnerabilities are: SQL Injection Cross Site Scripting Broken Authentication and Session Management Insecure Direct Object References Cross Site Request Forgery Security Misconfiguration Insecure Cryptographic Storage Failure to restrict URL Access Insufficient Transport Layer Protection Unvalidated Redirects and Forwards Web security vulnerabilities are prioritized depending on exploitability, detectability, and impact on software. ... <a title="Most Common Web Security Vulnerabilities" class="read-more" href="https://blog.eduguru.in/it-security/most-common-web-security-vulnerabilities" aria-label="Read more about Most Common Web Security Vulnerabilities">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/most-common-web-security-vulnerabilities/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Info about India`s Physical Setting</title>
		<link>https://blog.eduguru.in/geography/info-about-indias-physical-setting</link>
					<comments>https://blog.eduguru.in/geography/info-about-indias-physical-setting#respond</comments>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 07 Sep 2021 20:18:06 +0000</pubDate>
				<category><![CDATA[Geography]]></category>
		<category><![CDATA[country]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[locations]]></category>
		<category><![CDATA[physical setting]]></category>
		<category><![CDATA[sandy desert]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15254</guid>

					<description><![CDATA[India is the Seventh Largest country in area, and the second largest in population after china in the world. India stretches from the snow-capped Himalaya in the North to sun drenched coastal villages of the south and the highly fertile valley of Brahmaputra in the East to the barren sandy desert in the WEST. It ... <a title="Info about India`s Physical Setting" class="read-more" href="https://blog.eduguru.in/geography/info-about-indias-physical-setting" aria-label="Read more about Info about India`s Physical Setting">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/geography/info-about-indias-physical-setting/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Highest peaks of the Himalaya</title>
		<link>https://blog.eduguru.in/geography/highest-peaks-of-the-himalaya</link>
					<comments>https://blog.eduguru.in/geography/highest-peaks-of-the-himalaya#respond</comments>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 07 Sep 2021 19:50:29 +0000</pubDate>
				<category><![CDATA[Geography]]></category>
		<category><![CDATA[Himalayas]]></category>
		<category><![CDATA[K2]]></category>
		<category><![CDATA[mount everest]]></category>
		<category><![CDATA[peaks]]></category>
		<category><![CDATA[World geography]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15249</guid>

					<description><![CDATA[Mt. Everest = 8848m K2 (Karakoram) = 8611m Kanchenjunga = 8598m Lhotse = 8516m Mahalu = 8463m Cho Oyu = 8201m Dhaulagiri = 8167m manasalu = 8163m Nanga Parbat = 8126m Annapurna = 8091m]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/geography/highest-peaks-of-the-himalaya/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Cybercrime? Cybercrime Types, Tools, and Examples</title>
		<link>https://blog.eduguru.in/it-security/what-is-cybercrime-cybercrime-types-tools-and-examples</link>
					<comments>https://blog.eduguru.in/it-security/what-is-cybercrime-cybercrime-types-tools-and-examples#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 07 Sep 2021 17:04:59 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[example to cybercrime]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tools of cybercrime]]></category>
		<category><![CDATA[what is cybercrime]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15245</guid>

					<description><![CDATA[Here, We will understand cybercrime, cybercrimes types, cybercrime types, cybercrime tool, and a few examples. Let&#8217;s start with What is Cybercrime? What is Cybercrime? Cybercrime is defined as an unlawful action against any person using a computer, its systems, and its online or offline applications. It occurs when information technology is used to commit or ... <a title="What is Cybercrime? Cybercrime Types, Tools, and Examples" class="read-more" href="https://blog.eduguru.in/it-security/what-is-cybercrime-cybercrime-types-tools-and-examples" aria-label="Read more about What is Cybercrime? Cybercrime Types, Tools, and Examples">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/what-is-cybercrime-cybercrime-types-tools-and-examples/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Digital Forensics, Process, Types, and Challenges</title>
		<link>https://blog.eduguru.in/it-security/what-is-digital-forensics-process-types-and-challenges</link>
					<comments>https://blog.eduguru.in/it-security/what-is-digital-forensics-process-types-and-challenges#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 07 Sep 2021 10:49:30 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Digital Forensics]]></category>
		<category><![CDATA[digital forensics challenges]]></category>
		<category><![CDATA[digital forensics process]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[history of Digital forensics history]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15242</guid>

					<description><![CDATA[Here, We will understand Digital Forensics, the History of Digital Forensics, Processes, types, and their challenges. What is Digital Forensics? Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence that can be used by the court of law. It is the science of finding evidence from digital media ... <a title="What is Digital Forensics, Process, Types, and Challenges" class="read-more" href="https://blog.eduguru.in/it-security/what-is-digital-forensics-process-types-and-challenges" aria-label="Read more about What is Digital Forensics, Process, Types, and Challenges">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/what-is-digital-forensics-process-types-and-challenges/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Certified Information Systems Security Professional: CISSP</title>
		<link>https://blog.eduguru.in/it-security/certified-information-systems-security-professional-cissp</link>
					<comments>https://blog.eduguru.in/it-security/certified-information-systems-security-professional-cissp#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 07 Sep 2021 03:03:59 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Certified Information Systems Security Professional]]></category>
		<category><![CDATA[CISSP certification]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[What is a Certified Information System Security Professional]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15238</guid>

					<description><![CDATA[What is a Certified Information System Security Professional or CISSP? Certified Information Systems Security Professional (CISSP) is considered a quality standard in the field of information security. This Cyber certification is offered by (ISC)2 which is an international non-profit organization with more than 200k certified members. The certification was introduced in 1994 and is the most required ... <a title="Certified Information Systems Security Professional: CISSP" class="read-more" href="https://blog.eduguru.in/it-security/certified-information-systems-security-professional-cissp" aria-label="Read more about Certified Information Systems Security Professional: CISSP">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/certified-information-systems-security-professional-cissp/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to prevent Linux hacks</title>
		<link>https://blog.eduguru.in/it-security/how-to-prevent-linux-hacks</link>
					<comments>https://blog.eduguru.in/it-security/how-to-prevent-linux-hacks#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 06 Sep 2021 15:08:05 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[how to prevent linux hacking]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux hack]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[ubuntu hacking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15235</guid>

					<description><![CDATA[Linux is the most widely used server operating system, especially for web servers. It is open-source; this means anybody can have access to the source code. This makes it less secure compared to other operating systems as attackers can study the source code to find vulnerabilities. Linux for Hackers is about exploiting these vulnerabilities to gain unauthorized access ... <a title="How to prevent Linux hacks" class="read-more" href="https://blog.eduguru.in/it-security/how-to-prevent-linux-hacks" aria-label="Read more about How to prevent Linux hacks">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/how-to-prevent-linux-hacks/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SQL DEFAULT Constraint : add Default Value Into a Column</title>
		<link>https://blog.eduguru.in/mysql-2/sql-default-constraint-add-default-value-into-a-column</link>
					<comments>https://blog.eduguru.in/mysql-2/sql-default-constraint-add-default-value-into-a-column#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 06 Sep 2021 12:33:22 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[sql constraint]]></category>
		<category><![CDATA[sql default constraint example]]></category>
		<category><![CDATA[sql default constraints]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15232</guid>

					<description><![CDATA[The DEFAULT constraint is used to set a default value for a column. In the below example City column has the default value Sandnes CREATE TABLE Persons (    ID int NOT NULL,    LastName varchar(255) NOT NULL,    FirstName varchar(255),    Age int,    City varchar(255) DEFAULT &#8216;Sandnes&#8217;); The default value will be added to all new records if no other value is specified. Example of default constraint Example ... <a title="SQL DEFAULT Constraint : add Default Value Into a Column" class="read-more" href="https://blog.eduguru.in/mysql-2/sql-default-constraint-add-default-value-into-a-column" aria-label="Read more about SQL DEFAULT Constraint : add Default Value Into a Column">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/sql-default-constraint-add-default-value-into-a-column/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SQL Injection to Web Application and prevention</title>
		<link>https://blog.eduguru.in/it-security/sql-injection-to-web-application-and-prevention</link>
					<comments>https://blog.eduguru.in/it-security/sql-injection-to-web-application-and-prevention#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 06 Sep 2021 02:58:23 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL injection]]></category>
		<category><![CDATA[SQL injection vulnerabilities]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15229</guid>

					<description><![CDATA[What is SQL Injection? SQL Injection is an attack that poisons dynamic SQL statements to comment out certain parts of the statement or appending a condition that will always be true. It takes advantage of the design flaws in poorly designed web applications to exploit SQL statements to execute malicious SQL code. Data is one ... <a title="SQL Injection to Web Application and prevention" class="read-more" href="https://blog.eduguru.in/it-security/sql-injection-to-web-application-and-prevention" aria-label="Read more about SQL Injection to Web Application and prevention">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/sql-injection-to-web-application-and-prevention/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Hack a Website</title>
		<link>https://blog.eduguru.in/it-security/how-to-hack-a-website</link>
					<comments>https://blog.eduguru.in/it-security/how-to-hack-a-website#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 09:10:10 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[How to Hack a Website]]></category>
		<category><![CDATA[How to Hack a Website Here]]></category>
		<category><![CDATA[you will learn how to hack websites]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15225</guid>

					<description><![CDATA[How to Hack a Website Here, you will learn how to hack websites, and we will introduce you to web application hacking techniques and the countermeasures you can put in place to protect against such attacks. What is a web application? What are Web Threats? A web application (aka website) is an application based on the client-server ... <a title="How to Hack a Website" class="read-more" href="https://blog.eduguru.in/it-security/how-to-hack-a-website" aria-label="Read more about How to Hack a Website">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/how-to-hack-a-website/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is VPN, and why does Home Ministry want to ban it?</title>
		<link>https://blog.eduguru.in/info/what-is-vpn-and-why-does-home-ministry-want-to-ban-it</link>
					<comments>https://blog.eduguru.in/info/what-is-vpn-and-why-does-home-ministry-want-to-ban-it#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 02 Sep 2021 17:35:02 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[and why does Home Ministry want to ban it? Here is all you need to know]]></category>
		<category><![CDATA[What is VPN]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15222</guid>

					<description><![CDATA[What is VPN, and why does Home Ministry want to ban it? A Home Affairs Committee has urged the Indian government to ban VPN services across India for security reasons. Virtual Private Network or VPN is gaining the limelight in India, with alleged reports hinting that the government might soon ban their use in the ... <a title="What is VPN, and why does Home Ministry want to ban it?" class="read-more" href="https://blog.eduguru.in/info/what-is-vpn-and-why-does-home-ministry-want-to-ban-it" aria-label="Read more about What is VPN, and why does Home Ministry want to ban it?">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/info/what-is-vpn-and-why-does-home-ministry-want-to-ban-it/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Hack a Web Server</title>
		<link>https://blog.eduguru.in/it-security/how-to-hack-a-web-server</link>
					<comments>https://blog.eduguru.in/it-security/how-to-hack-a-web-server#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 02 Sep 2021 11:50:46 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[and passwords]]></category>
		<category><![CDATA[email addresses]]></category>
		<category><![CDATA[etc. This has made them targets to attackers. Defaced websites can also be used to communicate religious or political ideologies etc. Here]]></category>
		<category><![CDATA[How to Hack a Web Server]]></category>
		<category><![CDATA[How to Hack a Web Server Most websites store valuable information such as credit card numbers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15220</guid>

					<description><![CDATA[How to Hack a Web Server Most websites store valuable information such as credit card numbers, email addresses, and passwords, etc. This has made them targets to attackers. Defaced websites can also be used to communicate religious or political ideologies etc. Here, we will introduce you to web server hacking techniques and how you can ... <a title="How to Hack a Web Server" class="read-more" href="https://blog.eduguru.in/it-security/how-to-hack-a-web-server" aria-label="Read more about How to Hack a Web Server">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/how-to-hack-a-web-server/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DoS Denial of Service Attack</title>
		<link>https://blog.eduguru.in/it-security/dos-denial-of-service-attack</link>
					<comments>https://blog.eduguru.in/it-security/dos-denial-of-service-attack#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 01 Sep 2021 15:08:16 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[DoS - Denial of Service Attack What is DoS Attack? DOS is an attack used to deny legitimate users access to a resource such as accessing a website]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[etc)]]></category>
		<category><![CDATA[Network]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15218</guid>

					<description><![CDATA[DoS &#8211; Denial of Service Attack What is DoS Attack? DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc., or making it extremely slow. DoS is the acronym for Denial of Service. This type of attack is usually implemented by hitting the target resource such as ... <a title="DoS Denial of Service Attack" class="read-more" href="https://blog.eduguru.in/it-security/dos-denial-of-service-attack" aria-label="Read more about DoS Denial of Service Attack">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/dos-denial-of-service-attack/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WPS Spreadsheets</title>
		<link>https://blog.eduguru.in/linux-2/wps-spreadsheets</link>
					<comments>https://blog.eduguru.in/linux-2/wps-spreadsheets#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 01 Sep 2021 12:35:38 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[a complete office suite from China for Windows]]></category>
		<category><![CDATA[and a PDF editor. wps spreedsheet wps spreedsheet The main advantage of WPS Spreadsheets is its high compatibility with Excel files because it supports XLS]]></category>
		<category><![CDATA[and CSV. Exporting spreadsheets to PDF is available but the output file will contain a watermark]]></category>
		<category><![CDATA[and Linux. Apart from Spreadsheets]]></category>
		<category><![CDATA[How to install WPS Office on Linux]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[pivot tables]]></category>
		<category><![CDATA[so you can easily find the required formula to analyze complex data. Also]]></category>
		<category><![CDATA[Spreadsheets easily allow you to present data using a built-in collection of table and cell styles as well as various formatting tools. Customizable charts]]></category>
		<category><![CDATA[Spreadsheets offers a decent set of features. The app supports hundreds of formulas and functions organized by categories]]></category>
		<category><![CDATA[the suite also includes WPS Presentation]]></category>
		<category><![CDATA[which is a limitation of the free-to-use version. When it comes to editing]]></category>
		<category><![CDATA[WPS Spreadsheets]]></category>
		<category><![CDATA[WPS Spreadsheets WPS Spreadsheets belongs to WPS Office]]></category>
		<category><![CDATA[WPS Writer]]></category>
		<category><![CDATA[XLSX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15211</guid>

					<description><![CDATA[WPS Spreadsheets WPS Spreadsheets belongs to WPS Office, a complete office suite for Windows, macOS, and Linux. Apart from Spreadsheets, the suite also includes WPS Presentation, WPS Writer, and a PDF editor. The main advantage of WPS Spreadsheets is its high compatibility with Excel files because it supports XLS, XLSX, and CSV. Exporting spreadsheets to PDF is available but the output file will contain a ... <a title="WPS Spreadsheets" class="read-more" href="https://blog.eduguru.in/linux-2/wps-spreadsheets" aria-label="Read more about WPS Spreadsheets">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/wps-spreadsheets/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Preventing duplicate cron job executions</title>
		<link>https://blog.eduguru.in/info/preventing-duplicate-cron-job-executions</link>
					<comments>https://blog.eduguru.in/info/preventing-duplicate-cron-job-executions#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 01 Sep 2021 05:07:47 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[Preventing duplicate cron job executions I feel like sometimes cron jobs create more problems than they solve. It's not the fault of the cron]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15208</guid>

					<description><![CDATA[Preventing duplicate cron job executions I feel like sometimes cron jobs create more problems than they solve. It&#8217;s not the fault of the cron, but rather the jobs being executed. As the job is not yet completed and started the other cronjob.  This leads to duplicate instances of cron jobs running for the same task. ... <a title="Preventing duplicate cron job executions" class="read-more" href="https://blog.eduguru.in/info/preventing-duplicate-cron-job-executions" aria-label="Read more about Preventing duplicate cron job executions">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/info/preventing-duplicate-cron-job-executions/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL CHECK Constraint</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-check-constraint</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-check-constraint#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 15:59:01 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[MySQL CHECK Constraint]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15206</guid>

					<description><![CDATA[MySQL CHECK Constraint The CHECK the constraint is used to limit the value range that can be placed in a column. If you define a CHECK constraint on a column it will allow only certain values for this column. If you define a CHECK constraint on a table it can limit the values in certain columns based on values in other ... <a title="MySQL CHECK Constraint" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-check-constraint" aria-label="Read more about MySQL CHECK Constraint">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-check-constraint/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL PRIMARY KEY Constraint</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-primary-key-constraint</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-primary-key-constraint#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 15:06:52 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[and cannot contain NULL values. A table can have only ONE primary key; and in the table]]></category>
		<category><![CDATA[MySQL PRIMARY KEY Constraint]]></category>
		<category><![CDATA[MySQL PRIMARY KEY Constraint The PRIMARY KEY constraint uniquely identifies each record in a table. Primary keys must contain UNIQUE values]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15204</guid>

					<description><![CDATA[MySQL PRIMARY KEY Constraint The PRIMARY KEY constraint uniquely identifies each record in a table. Primary keys must contain UNIQUE values, and cannot contain NULL values. A table can have only ONE primary key; and in the table, this primary key can consist of single or multiple columns (fields). PRIMARY KEY on CREATE TABLE The following SQL ... <a title="MySQL PRIMARY KEY Constraint" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-primary-key-constraint" aria-label="Read more about MySQL PRIMARY KEY Constraint">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-primary-key-constraint/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>UNIQUE Constraint</title>
		<link>https://blog.eduguru.in/mysql-2/unique-constraint</link>
					<comments>https://blog.eduguru.in/mysql-2/unique-constraint#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 13:04:30 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15201</guid>

					<description><![CDATA[UNIQUE Constraint The UNIQUE constraint ensures that all values in a column are different. Both the UNIQUE and PRIMARY KEY constraints provide a guarantee for uniqueness for a column or set of columns. A PRIMARY KEY constraint automatically has a UNIQUE constraint. However, you can have many UNIQUE constraints per table, but only one PRIMARY KEY constraint per table. This constraint ensures that all values inserted into the column ... <a title="UNIQUE Constraint" class="read-more" href="https://blog.eduguru.in/mysql-2/unique-constraint" aria-label="Read more about UNIQUE Constraint">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/unique-constraint/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL &#8211; NOT NULL Constraint</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-not-null-constraint</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-not-null-constraint#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 13:01:18 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[a column can hold NULL values. The "NOT NULL constraint" enforces a column to NOT accept NULL values. This enforces a field to always contain a value]]></category>
		<category><![CDATA[NOT NULL Constraint]]></category>
		<category><![CDATA[NOT NULL Constraint By default]]></category>
		<category><![CDATA[which means that you cannot insert a new record]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15200</guid>

					<description><![CDATA[NOT NULL Constraint By default, a column can hold NULL values. The &#8220;NOT NULL constraint&#8221; enforces a column to NOT accept NULL values. This enforces a field to always contain a value, which means that you cannot insert a new record, or update a record without adding a value to this field. This constraint specifies that ... <a title="MySQL &#8211; NOT NULL Constraint" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-not-null-constraint" aria-label="Read more about MySQL &#8211; NOT NULL Constraint">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-not-null-constraint/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL Constraints</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-constraints</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-constraints#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 12:52:51 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[MySQL Constraints]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15197</guid>

					<description><![CDATA[MySQL Constraints SQL constraints are used to specify rules for data in a table. The constraint in MySQL is used to specify the rule that allows or restricts what values or data will be stored in the table. They provide a suitable method to ensure data accuracy and integrity inside the table. It also helps ... <a title="MySQL Constraints" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-constraints" aria-label="Read more about MySQL Constraints">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-constraints/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL CREATE TABLE Statement</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-create-table-statement</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-create-table-statement#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 11:16:07 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[.... ); The column parameters specify the names of the columns of the table. The datatype parameter specifies the type of data the column can hold (e.g. varchar]]></category>
		<category><![CDATA['DATE']]></category>
		<category><![CDATA[Address]]></category>
		<category><![CDATA[Address varchar(255)]]></category>
		<category><![CDATA[and City columns are of type varchar and will hold characters]]></category>
		<category><![CDATA[and City: Example CREATE TABLE Persons ( PersonID int]]></category>
		<category><![CDATA[and the maximum length for these fields is 255 characters. The empty "Persons" table will now look like this: PersonID LastName FirstName Address City]]></category>
		<category><![CDATA[City varchar(255) ); The PersonID column is of type int and will hold an integer. The LastName]]></category>
		<category><![CDATA[column2 datatype]]></category>
		<category><![CDATA[column3 datatype]]></category>
		<category><![CDATA[etc.). MySQL CREATE TABLE Example The following example creates a table called "Persons" that contains five columns: PersonID]]></category>
		<category><![CDATA[FirstName]]></category>
		<category><![CDATA[FirstName varchar(255)]]></category>
		<category><![CDATA[integer]]></category>
		<category><![CDATA[LastName]]></category>
		<category><![CDATA[LastName varchar(255)]]></category>
		<category><![CDATA[MySQL CREATE TABLE Statement]]></category>
		<category><![CDATA[MySQL CREATE TABLE Statement The MySQL CREATE TABLE Statement The CREATE TABLE statement is used to create a new table in a database. Syntax CREATE TABLE table_name ( column1 datatype]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15195</guid>

					<description><![CDATA[MySQL CREATE TABLE Statement The MySQL CREATE TABLE Statement The CREATE TABLE statement is used to create a new table in a database. Syntax CREATE TABLE table_name (     column1 datatype,     column2 datatype,     column3 datatype, &#8230;. ); The column parameters specify the names of the columns of the table. The datatype parameter specifies the type of data the ... <a title="MySQL CREATE TABLE Statement" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-create-table-statement" aria-label="Read more about MySQL CREATE TABLE Statement">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-create-table-statement/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL AUTO INCREMENT Field</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-auto-increment-field</link>
					<comments>https://blog.eduguru.in/mysql-2/mysql-auto-increment-field#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 11:11:20 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[MySQL AUTO INCREMENT Field]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15193</guid>

					<description><![CDATA[MySQL AUTO INCREMENT Field What is an AUTO INCREMENT Field? Auto-increment allows a unique number to be generated automatically when a new record is inserted into a table. Often this is the primary key field that we would like to be created automatically every time a new record is inserted. MySQL AUTO_INCREMENT Keyword MySQL uses ... <a title="MySQL AUTO INCREMENT Field" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-auto-increment-field" aria-label="Read more about MySQL AUTO INCREMENT Field">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/mysql-2/mysql-auto-increment-field/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Install MariaDB 10.6 on CentOS 7</title>
		<link>https://blog.eduguru.in/linux-2/install-mariadb-10-6-on-centos-7</link>
					<comments>https://blog.eduguru.in/linux-2/install-mariadb-10-6-on-centos-7#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 30 Aug 2021 12:13:39 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Install MariaDB 10.6 on CentOS 7]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15191</guid>

					<description><![CDATA[Install MariaDB 10.6 on CentOS 7 MariaDB is a commonly used OpenSource database mainly known for being robust and scalable with new storage engines. MariaDB is a development of MySQL which puts focus on stability and performance and makes it free to users. It is the default database in most Linux distributions. With a variety ... <a title="Install MariaDB 10.6 on CentOS 7" class="read-more" href="https://blog.eduguru.in/linux-2/install-mariadb-10-6-on-centos-7" aria-label="Read more about Install MariaDB 10.6 on CentOS 7">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/install-mariadb-10-6-on-centos-7/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LibreOffice Calc &#8211; Open-Source Spreadsheet Software for Linux</title>
		<link>https://blog.eduguru.in/linux-2/libreoffice-calc-open-source-spreadsheet-software-for-linux</link>
					<comments>https://blog.eduguru.in/linux-2/libreoffice-calc-open-source-spreadsheet-software-for-linux#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Mon, 30 Aug 2021 09:19:55 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Download LibreOffice]]></category>
		<category><![CDATA[Download the Sourcecode]]></category>
		<category><![CDATA[LibreOffice Calc - Open-Source Spreadsheet Software for Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15185</guid>

					<description><![CDATA[LibreOffice Calc &#8211; Open-Source Spreadsheet Software for Linux The majority of Linux users will mention LibreOffice Calc as spreadsheet software. This open-source application forms part of the LibreOffice suite that offers a set of editors and productivity tools. LibreOffice is a fork of the OpenOffice.org project and it is managed and developed by The Document Foundation with the support of a big ... <a title="LibreOffice Calc &#8211; Open-Source Spreadsheet Software for Linux" class="read-more" href="https://blog.eduguru.in/linux-2/libreoffice-calc-open-source-spreadsheet-software-for-linux" aria-label="Read more about LibreOffice Calc &#8211; Open-Source Spreadsheet Software for Linux">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/libreoffice-calc-open-source-spreadsheet-software-for-linux/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Hack WiFi Password</title>
		<link>https://blog.eduguru.in/it-security/how-to-hack-wifi-password</link>
					<comments>https://blog.eduguru.in/it-security/how-to-hack-wifi-password#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 28 Aug 2021 15:45:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Cracking Wireless network WEP/WPA keys]]></category>
		<category><![CDATA[How to access a wireless network?]]></category>
		<category><![CDATA[How to Crack Wifi (Wireless) Networks]]></category>
		<category><![CDATA[How to Hack WiFi Password]]></category>
		<category><![CDATA[How to Secure wireless networks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15183</guid>

					<description><![CDATA[How to Hack WiFi Password Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. Here, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some ... <a title="How to Hack WiFi Password" class="read-more" href="https://blog.eduguru.in/it-security/how-to-hack-wifi-password" aria-label="Read more about How to Hack WiFi Password">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/how-to-hack-wifi-password/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is ARP Poisoning</title>
		<link>https://blog.eduguru.in/it-security/what-is-arp-poisoning</link>
					<comments>https://blog.eduguru.in/it-security/what-is-arp-poisoning#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 28 Aug 2021 14:00:58 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Deleting an ARP cache entry]]></category>
		<category><![CDATA[What is ARP Poisoning]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15180</guid>

					<description><![CDATA[What is ARP Poisoning ARP is the acronym for Address Resolution Protocol. It is used to convert an IP address to physical addresses [MAC address] on a switch. The host sends an ARP broadcast on the network, and the recipient computer responds with its physical address [MAC Address]. The resolved IP/MAC address is then used ... <a title="What is ARP Poisoning" class="read-more" href="https://blog.eduguru.in/it-security/what-is-arp-poisoning" aria-label="Read more about What is ARP Poisoning">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/what-is-arp-poisoning/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is IP Address and MAC Address</title>
		<link>https://blog.eduguru.in/it-security/what-is-ip-address-and-mac-address</link>
					<comments>https://blog.eduguru.in/it-security/what-is-ip-address-and-mac-address#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 28 Aug 2021 13:37:18 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[and it uses 128-bit numbers. IPv4 addresses are formatted in four groups of numbers separated by dots. The minimum number is 0]]></category>
		<category><![CDATA[IPv6 has been developed]]></category>
		<category><![CDATA[storage disks on a computer network. There are currently two versions of IP addresses. IPv4 uses 32-bit numbers. Due to the massive growth of the internet]]></category>
		<category><![CDATA[What is IP Address and MAC Address]]></category>
		<category><![CDATA[What is IP Address and MAC Address IP Address IP Address is the acronym for Internet Protocol address. An internet protocol address is used to uniquely identify a computer or device such as printers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15178</guid>

					<description><![CDATA[What is IP Address and MAC Address IP Address IP Address is the acronym for Internet Protocol address. An internet protocol address is used to uniquely identify a computer or device such as printers, storage disks on a computer network. There are currently two versions of IP addresses. IPv4 uses 32-bit numbers. Due to the ... <a title="What is IP Address and MAC Address" class="read-more" href="https://blog.eduguru.in/it-security/what-is-ip-address-and-mac-address" aria-label="Read more about What is IP Address and MAC Address">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/what-is-ip-address-and-mac-address/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache MPM performance Test : event -prefork</title>
		<link>https://blog.eduguru.in/http/apache-mpm-performance-test-event-prefork</link>
					<comments>https://blog.eduguru.in/http/apache-mpm-performance-test-event-prefork#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 28 Aug 2021 04:33:57 +0000</pubDate>
				<category><![CDATA[http]]></category>
		<category><![CDATA[apache load testing]]></category>
		<category><![CDATA[apache mpm]]></category>
		<category><![CDATA[Apache MPM performance Test : event -prefork]]></category>
		<category><![CDATA[Apache-Performance-Load-Testing]]></category>
		<category><![CDATA[mpm test apache]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15173</guid>

					<description><![CDATA[Apache MPM performance Test: event -prefork As a basic test, I will create a PHP file that checks the existence of another file named,  test.php in the same directory of two CentOS 7 servers with the same hardware characteristics and load but with different MPM. One of them will use event and the other one will use ... <a title="Apache MPM performance Test : event -prefork" class="read-more" href="https://blog.eduguru.in/http/apache-mpm-performance-test-event-prefork" aria-label="Read more about Apache MPM performance Test : event -prefork">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/http/apache-mpm-performance-test-event-prefork/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Boost the Performance of Your Apache</title>
		<link>https://blog.eduguru.in/http/boost-the-performance-of-your-apache</link>
					<comments>https://blog.eduguru.in/http/boost-the-performance-of-your-apache#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 28 Aug 2021 04:25:17 +0000</pubDate>
				<category><![CDATA[http]]></category>
		<category><![CDATA[Apache keeps experiencing the largest growth among the top web servers]]></category>
		<category><![CDATA[Boost the Performance of Your Apache]]></category>
		<category><![CDATA[Boost the Performance of Your Apache Apache continues to be the most widely used web server among sites and Internet-facing computers. Additionally]]></category>
		<category><![CDATA[even so]]></category>
		<category><![CDATA[followed by Nginx and IIS. Thus]]></category>
		<category><![CDATA[if you are a system administrator in charge of managing Apache installations]]></category>
		<category><![CDATA[please keep in mind that Apache was not designed with the objective of setting benchmark records – but]]></category>
		<category><![CDATA[we will discuss a few tips that will help you ensure that Apache will run smoothly and be able to handle the number of requests you are expecting from remote clients. However]]></category>
		<category><![CDATA[you need to know how to make sure your web server performs at the best of its capacity according to your (or your client’s) needs. Here]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15171</guid>

					<description><![CDATA[Boost the Performance of Your Apache Apache continues to be the most widely used web server among sites and Internet-facing computers. Additionally, Apache keeps experiencing the largest growth among the top web servers, followed by Nginx and IIS. Thus, if you are a system administrator in charge of managing Apache installations, you need to know how to make sure your web ... <a title="Boost the Performance of Your Apache" class="read-more" href="https://blog.eduguru.in/http/boost-the-performance-of-your-apache" aria-label="Read more about Boost the Performance of Your Apache">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/http/boost-the-performance-of-your-apache/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ethical Hacking: Worm, Virus &#038; Trojan Horse</title>
		<link>https://blog.eduguru.in/it-security/ethical-hacking-worm-virus-trojan-horse</link>
					<comments>https://blog.eduguru.in/it-security/ethical-hacking-worm-virus-trojan-horse#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 28 Aug 2021 03:27:15 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[and Worm Differential Table]]></category>
		<category><![CDATA[and Worms countermeasures]]></category>
		<category><![CDATA[Ethical Hacking: Worm]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Virus & Trojan Horse]]></category>
		<category><![CDATA[viruses]]></category>
		<category><![CDATA[What is a Trojan horse]]></category>
		<category><![CDATA[What is a Virus?]]></category>
		<category><![CDATA[What is a worm?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15169</guid>

					<description><![CDATA[Ethical Hacking: Worm, Virus &#38; Trojan Horse Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer-controlled equipment. Some of the ways that ... <a title="Ethical Hacking: Worm, Virus &#038; Trojan Horse" class="read-more" href="https://blog.eduguru.in/it-security/ethical-hacking-worm-virus-trojan-horse" aria-label="Read more about Ethical Hacking: Worm, Virus &#038; Trojan Horse">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/ethical-hacking-worm-virus-trojan-horse/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Crack a Password</title>
		<link>https://blog.eduguru.in/it-security/how-to-crack-a-password</link>
					<comments>https://blog.eduguru.in/it-security/how-to-crack-a-password#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 26 Aug 2021 09:51:09 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[How to Crack a Password]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15165</guid>

					<description><![CDATA[How to Crack a Password What is Password Cracking? Password cracking is the process of attempting to gain unauthorized access to restricted systems using common passwords or algorithms that guess passwords. In other words, it’s the art of obtaining the correct password that gives access to a system protected by an authentication method. Password cracking ... <a title="How to Crack a Password" class="read-more" href="https://blog.eduguru.in/it-security/how-to-crack-a-password" aria-label="Read more about How to Crack a Password">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/how-to-crack-a-password/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cryptography: What is Cryptanalysis, RC4 and CrypTool</title>
		<link>https://blog.eduguru.in/it-security/cryptography-what-is-cryptanalysis-rc4-and-cryptool</link>
					<comments>https://blog.eduguru.in/it-security/cryptography-what-is-cryptanalysis-rc4-and-cryptool#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 26 Aug 2021 02:31:58 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[a business can use cryptology to cipher information. Cryptology involves transforming information into the Nonhuman readable format and vice versa. In this Cryptography and Network Security tutorial]]></category>
		<category><![CDATA[Cryptography: What is Cryptanalysis]]></category>
		<category><![CDATA[etc. Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication]]></category>
		<category><![CDATA[military operations]]></category>
		<category><![CDATA[organizations]]></category>
		<category><![CDATA[RC4 and CrypTool]]></category>
		<category><![CDATA[RC4 and CrypTool Information plays a vital role in the running of businesses]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15162</guid>

					<description><![CDATA[Cryptography: What is Cryptanalysis, RC4 and CrypTool Information plays a vital role in the running of businesses, organizations, military operations, etc. Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication, a business can use cryptology to cipher information. Cryptology involves transforming information into the Nonhuman readable format ... <a title="Cryptography: What is Cryptanalysis, RC4 and CrypTool" class="read-more" href="https://blog.eduguru.in/it-security/cryptography-what-is-cryptanalysis-rc4-and-cryptool" aria-label="Read more about Cryptography: What is Cryptanalysis, RC4 and CrypTool">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/cryptography-what-is-cryptanalysis-rc4-and-cryptool/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Social Engineering : Attacks, Techniques &#038; Prevention</title>
		<link>https://blog.eduguru.in/it-security/social-engineering-attacks-techniques-prevention</link>
					<comments>https://blog.eduguru.in/it-security/social-engineering-attacks-techniques-prevention#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 25 Aug 2021 18:08:57 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[social engineering Attacks]]></category>
		<category><![CDATA[Techniques & Prevention]]></category>
		<category><![CDATA[Top 5 social engineering techniques]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15160</guid>

					<description><![CDATA[Social Engineering: Attacks, Techniques &#38; Prevention Social engineering is the art of exploiting the human elements to gain access to un-authorized resources. Social engineers use a number of techniques to fool the users into revealing sensitive information. Organizations must have security policies that have social engineering countermeasures. What is Social Engineering? Social engineering is the ... <a title="Social Engineering : Attacks, Techniques &#038; Prevention" class="read-more" href="https://blog.eduguru.in/it-security/social-engineering-attacks-techniques-prevention" aria-label="Read more about Social Engineering : Attacks, Techniques &#038; Prevention">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/social-engineering-attacks-techniques-prevention/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Programming languages that are useful to hackers</title>
		<link>https://blog.eduguru.in/it-security/programming-languages-that-are-useful-to-hackers</link>
					<comments>https://blog.eduguru.in/it-security/programming-languages-that-are-useful-to-hackers#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 25 Aug 2021 16:28:11 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Programming languages that are useful to hackers]]></category>
		<category><![CDATA[Programming languages that are useful to hackers Why should hackers learn how to program? Hackers are problem solvers and tool builders]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15158</guid>

					<description><![CDATA[Programming languages that are useful to hackers Why should hackers learn how to program? Hackers are problem solvers and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from script kiddies. Writing programs as a hacker will help you to automate many tasks which would usually take lots ... <a title="Programming languages that are useful to hackers" class="read-more" href="https://blog.eduguru.in/it-security/programming-languages-that-are-useful-to-hackers" aria-label="Read more about Programming languages that are useful to hackers">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/it-security/programming-languages-that-are-useful-to-hackers/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Potential Security Threats To Your Computer Systems</title>
		<link>https://blog.eduguru.in/ethical-hacking/potential-security-threats-to-your-computer-systems</link>
					<comments>https://blog.eduguru.in/ethical-hacking/potential-security-threats-to-your-computer-systems#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 25 Aug 2021 16:16:29 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[accidental]]></category>
		<category><![CDATA[or caused by natural disasters. In this article]]></category>
		<category><![CDATA[Potential Security Threats To Your Computer Systems]]></category>
		<category><![CDATA[Potential Security Threats To Your Computer Systems Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional]]></category>
		<category><![CDATA[What is a Security Threat?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15155</guid>

					<description><![CDATA[Potential Security Threats To Your Computer Systems Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental, or caused by natural disasters. In this article, we will introduce you to the common computer system threats and how you can protect systems against them. A ... <a title="Potential Security Threats To Your Computer Systems" class="read-more" href="https://blog.eduguru.in/ethical-hacking/potential-security-threats-to-your-computer-systems" aria-label="Read more about Potential Security Threats To Your Computer Systems">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/ethical-hacking/potential-security-threats-to-your-computer-systems/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ifconfig</title>
		<link>https://blog.eduguru.in/linux-2/ifconfig</link>
					<comments>https://blog.eduguru.in/linux-2/ifconfig#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 25 Aug 2021 03:41:26 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[creating an alias for the network interface]]></category>
		<category><![CDATA[ifconfig]]></category>
		<category><![CDATA[ifconfig in short "interface configuration" utility for system/network administration in Unix/Linux operating systems to configure]]></category>
		<category><![CDATA[manage and query network interface parameters via command-line interface or in a system configuration scripts. The "ifconfig" command is used for displaying current network configuration information]]></category>
		<category><![CDATA[netmask]]></category>
		<category><![CDATA[or broadcast address to a network interface]]></category>
		<category><![CDATA[setting up an IP address]]></category>
		<category><![CDATA[setting up hardware address]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15153</guid>

					<description><![CDATA[ifconfig in short &#8220;interface configuration&#8221; utility for system/network administration in Unix/Linux operating systems to configure, manage and query network interface parameters via command-line interface or in a system configuration scripts. The &#8220;ifconfig&#8221; command is used for displaying current network configuration information, setting up an IP address, netmask, or broadcast address to a network interface, creating an alias for the network ... <a title="ifconfig" class="read-more" href="https://blog.eduguru.in/linux-2/ifconfig" aria-label="Read more about ifconfig">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/ifconfig/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Install MySQL / MariaDB Server with PhpMyAdmin Centos 8</title>
		<link>https://blog.eduguru.in/linux-2/install-mysql-mariadb-server-with-phpmyadmin</link>
					<comments>https://blog.eduguru.in/linux-2/install-mysql-mariadb-server-with-phpmyadmin#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 24 Aug 2021 12:15:43 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[phpMyAdmin]]></category>
		<category><![CDATA[Install MySQL / MariaDB Server with PhpMyAdmin Centos 8]]></category>
		<category><![CDATA[Install MySQL / MariaDB Server with PhpMyAdmin Centos 8 Install PHP]]></category>
		<category><![CDATA[MySQL support package for PHP]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15151</guid>

					<description><![CDATA[Install MySQL / MariaDB Server with PhpMyAdmin Centos 8 Install PHP, MySQL support package for PHP, and other PHP packages on your system for phpMyAdmin to connect with the database. dnf install -y wget php php-pdo php-pecl-zip php-json php-common php-fpm php-mbstring php-cli php-mysqlnd php-xml tar Install below PHP packages for phpMyAdmin to connect with the ... <a title="Install MySQL / MariaDB Server with PhpMyAdmin Centos 8" class="read-more" href="https://blog.eduguru.in/linux-2/install-mysql-mariadb-server-with-phpmyadmin" aria-label="Read more about Install MySQL / MariaDB Server with PhpMyAdmin Centos 8">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/install-mysql-mariadb-server-with-phpmyadmin/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Linux route command</title>
		<link>https://blog.eduguru.in/linux-2/linux-route-command</link>
					<comments>https://blog.eduguru.in/linux-2/linux-route-command#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 22 Aug 2021 02:53:06 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[Linux route command In Linux and Unix-like systems]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15149</guid>

					<description><![CDATA[Linux route command In Linux and Unix-like systems, a gateway is nothing but a device that connects two networks. Often it is called a router or gateway. In most cases your ISP’s modem act as a default router or gateway. route command: show / manipulate the IP routing table on Linux. IP command: show / ... <a title="Linux route command" class="read-more" href="https://blog.eduguru.in/linux-2/linux-route-command" aria-label="Read more about Linux route command">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/linux-route-command/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kubernetes &#8211; Labels &#038; Selectors</title>
		<link>https://blog.eduguru.in/kubernetes/kubernetes-labels-selectors</link>
					<comments>https://blog.eduguru.in/kubernetes/kubernetes-labels-selectors#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 20 Aug 2021 15:34:44 +0000</pubDate>
				<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[Kubernetes - Labels & Selectors]]></category>
		<category><![CDATA[Kubernetes - Labels & Selectors Labels Labels are key-value pairs that are attached to pods]]></category>
		<category><![CDATA[replication controllers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15147</guid>

					<description><![CDATA[Kubernetes &#8211; Labels &#38; Selectors Labels Labels are key-value pairs that are attached to pods, replication controllers,s and services. They are used as identifying attributes for objects such as pods and replication controllers. They can be added to an object at creation time and can be added or modified at the run time. Labels are ... <a title="Kubernetes &#8211; Labels &#038; Selectors" class="read-more" href="https://blog.eduguru.in/kubernetes/kubernetes-labels-selectors" aria-label="Read more about Kubernetes &#8211; Labels &#038; Selectors">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/kubernetes/kubernetes-labels-selectors/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kubernetes Architecture</title>
		<link>https://blog.eduguru.in/kubernetes/kubernetes-architecture</link>
					<comments>https://blog.eduguru.in/kubernetes/kubernetes-architecture#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 20 Aug 2021 13:49:12 +0000</pubDate>
				<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[Kubernetes Architecture]]></category>
		<category><![CDATA[Kubernetes Architecture Kubernetes follows a client-server architecture. Wherein]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15145</guid>

					<description><![CDATA[Kubernetes Architecture Kubernetes follows a client-server architecture. Wherein, we have master installed on one machine and the node on separate Linux machines. &#160; The key components of master and node are defined in the following section. Kubernetes &#8211; Master Machine Components Following are the components of the Kubernetes Master Machine. etcd It stores the configuration ... <a title="Kubernetes Architecture" class="read-more" href="https://blog.eduguru.in/kubernetes/kubernetes-architecture" aria-label="Read more about Kubernetes Architecture">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/kubernetes/kubernetes-architecture/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kubernetes &#8211; introduction</title>
		<link>https://blog.eduguru.in/kubernetes/kubernetes-introduction</link>
					<comments>https://blog.eduguru.in/kubernetes/kubernetes-introduction#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 20 Aug 2021 13:38:55 +0000</pubDate>
				<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[Features of Kubernetes]]></category>
		<category><![CDATA[Kubernetes - introduction]]></category>
		<category><![CDATA[Kubernetes - introduction Kubernetes is a container management technology developed in Google lab to manage containerized applications in different kinds of environments such as physical]]></category>
		<category><![CDATA[virtual]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15143</guid>

					<description><![CDATA[Kubernetes &#8211; introduction Kubernetes is a container management technology developed in Google lab to manage containerized applications in different kinds of environments such as physical, virtual, and cloud infrastructure. It is an open-source system that helps in creating and managing the containerization of applications. Anyone who wants to understand Kubernetes should have an understating of ... <a title="Kubernetes &#8211; introduction" class="read-more" href="https://blog.eduguru.in/kubernetes/kubernetes-introduction" aria-label="Read more about Kubernetes &#8211; introduction">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/kubernetes/kubernetes-introduction/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>tcpdump : Linux Network Sniffer Tool</title>
		<link>https://blog.eduguru.in/linux-2/tcpdump-linux-network-sniffer-tool</link>
					<comments>https://blog.eduguru.in/linux-2/tcpdump-linux-network-sniffer-tool#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 19 Aug 2021 11:22:01 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[tcpdump : Linux Network Sniffer Tool]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15141</guid>

					<description><![CDATA[tcpdump: Linux Network Sniffer Tool tcpdump is a most powerful and widely used command-line packets sniffer or package analyzer tool which is used to capture or filter TCP/IP packets that are received or transferred over a network on a specific interface. It is available under most of the Linux/Unix-based operating systems. tcpdump also gives us an option to save captured ... <a title="tcpdump : Linux Network Sniffer Tool" class="read-more" href="https://blog.eduguru.in/linux-2/tcpdump-linux-network-sniffer-tool" aria-label="Read more about tcpdump : Linux Network Sniffer Tool">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/tcpdump-linux-network-sniffer-tool/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>nmcli &#8211; Linux command</title>
		<link>https://blog.eduguru.in/linux-2/nmcli-linux-command</link>
					<comments>https://blog.eduguru.in/linux-2/nmcli-linux-command#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 19 Aug 2021 08:07:11 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[nmcli - Linux command nmcli]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15136</guid>

					<description><![CDATA[nmcli &#8211; Linux command nmcli, the network manager command-line interface is a nifty and easy to use tool that saves you lots of time when you need to configure an IP address. To display all the active network interfaces on your Linux system execute the command. $ nmcli connection show OR $ nmcli con show Note that con is ... <a title="nmcli &#8211; Linux command" class="read-more" href="https://blog.eduguru.in/linux-2/nmcli-linux-command" aria-label="Read more about nmcli &#8211; Linux command">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/nmcli-linux-command/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>find command in Linux</title>
		<link>https://blog.eduguru.in/linux-2/find-command-in-linux</link>
					<comments>https://blog.eduguru.in/linux-2/find-command-in-linux#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 18 Aug 2021 05:41:35 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[find command in linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15134</guid>

					<description><![CDATA[find command in Linux The find command in UNIX or Linux is one of the most important and frequently used command. It&#8217;s a command-line utility for walking a file hierarchy. It can be used to find files and directories and perform subsequent operations on them. It supports searching by file, folder, name, creation date, modification date, owner, and ... <a title="find command in Linux" class="read-more" href="https://blog.eduguru.in/linux-2/find-command-in-linux" aria-label="Read more about find command in Linux">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/find-command-in-linux/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ls -lt command</title>
		<link>https://blog.eduguru.in/linux-command/ls-lt-command</link>
					<comments>https://blog.eduguru.in/linux-command/ls-lt-command#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 06 Aug 2021 11:26:41 +0000</pubDate>
				<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ls -lt command]]></category>
		<category><![CDATA[ls -lt command ls -lt: Sorting the Formatted listing by time modification Usages: # ls -lt Output:]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15130</guid>

					<description><![CDATA[ls -lt command ls -lt: Sorting the Formatted listing by time modification Usages: # ls -lt Output: total 160 drwxr-xr-x 2 root root 4096 Oct 22 2019 test2 -rw-r&#8211;r&#8211; 1 root root 5142 Oct 3 2019 ps1.txt -rw-r&#8211;r&#8211; 1 root root 4893 Sep 23 2019 test2.php drwxr-xr-x 2 root root 4096 Sep 13 2019 ivr -rw-r&#8211;r&#8211; 1 root ... <a title="ls -lt command" class="read-more" href="https://blog.eduguru.in/linux-command/ls-lt-command" aria-label="Read more about ls -lt command">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-command/ls-lt-command/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ls -al command</title>
		<link>https://blog.eduguru.in/linux-command/ls-al-command</link>
					<comments>https://blog.eduguru.in/linux-command/ls-al-command#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 06 Aug 2021 10:17:49 +0000</pubDate>
				<category><![CDATA[Linux Command]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15128</guid>

					<description><![CDATA[ls -al command ls -al : Formatted listing with hidden files. Usages: # ls -al Output list of all directories or files in the current directory. This also includes hidden files. # ls -al /root Output list of all directories or files in the /root directory. This also includes hidden files.]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-command/ls-al-command/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ls command</title>
		<link>https://blog.eduguru.in/linux-command/ls-command</link>
					<comments>https://blog.eduguru.in/linux-command/ls-command#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 06 Aug 2021 10:12:33 +0000</pubDate>
				<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ls command]]></category>
		<category><![CDATA[ls command ls - Directory listing Usages : # ls Output list of all directories or files in the current directory. # ls /var Output list of all directories or files in the /var directory.]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15126</guid>

					<description><![CDATA[ls command ls  &#8211; Directory listing Usages : # ls Output list of all directories or files in the current directory. # ls /var Output list of all directories or files in the /var directory. &#160;]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-command/ls-command/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>dirname command</title>
		<link>https://blog.eduguru.in/linux-2/dirname-command</link>
					<comments>https://blog.eduguru.in/linux-2/dirname-command#respond</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 06 Aug 2021 06:58:23 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[command]]></category>
		<category><![CDATA[directory name]]></category>
		<category><![CDATA[dirname]]></category>
		<category><![CDATA[dirname command]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux get last folder name]]></category>
		<category><![CDATA[linux remove laster folder name]]></category>
		<category><![CDATA[remove the trailing forward slashes "/" from the NAME]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=15124</guid>

					<description><![CDATA[dirname Command dirname is mostly used in situations where you need to strip the last component from an absolute file name. used to remove the trailing forward slashes &#8220;/&#8221; from the NAME and prints the remaining portion. If the argument NAME does not contain the forward-slash &#8220;/&#8221; then it simply prints dot &#8220;.&#8221;. Example: # dirname /home/example/foo/ output: /home/example # dirname foo/file.txt output: foo ... <a title="dirname command" class="read-more" href="https://blog.eduguru.in/linux-2/dirname-command" aria-label="Read more about dirname command">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/dirname-command/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>python installation on windows</title>
		<link>https://blog.eduguru.in/python/python-installation-on-windows</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 01 Aug 2021 03:14:46 +0000</pubDate>
				<category><![CDATA[python]]></category>
		<category><![CDATA[python installation on windows]]></category>
		<category><![CDATA[python installation steps]]></category>
		<category><![CDATA[python step by step]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14957</guid>

					<description><![CDATA[python installation on windows Since windows don’t come with Python preinstalled, it needs to be installed explicitly. Here we will define step by step tutorial on How to install Python on Windows. Follow the steps below : Download Python Latest Version from python.org First and foremost step is to open a browser and open https://www.python.org/downloads/windows/ Here, ... <a title="python installation on windows" class="read-more" href="https://blog.eduguru.in/python/python-installation-on-windows" aria-label="Read more about python installation on windows">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Introduction to python</title>
		<link>https://blog.eduguru.in/python/introduction-to-python</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 01 Aug 2021 02:56:53 +0000</pubDate>
				<category><![CDATA[python]]></category>
		<category><![CDATA[and released in 1991. It is used for: web development (server-side)]]></category>
		<category><![CDATA[Introduction to python]]></category>
		<category><![CDATA[Introduction to python What is Python? Python is a popular programming language. It was created by Guido van Rossum]]></category>
		<category><![CDATA[MATHEMATICS]]></category>
		<category><![CDATA[software development]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14955</guid>

					<description><![CDATA[Introduction to python What is Python? Python is a popular programming language. It was created by Guido van Rossum, and released in 1991. It is used for: web development (server-side), software development, mathematics, system scripting. What can Python do? Python can be used on a server to create web applications. Python can be used alongside ... <a title="Introduction to python" class="read-more" href="https://blog.eduguru.in/python/introduction-to-python" aria-label="Read more about Introduction to python">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>PHP connection_status() Function</title>
		<link>https://blog.eduguru.in/php/php-connection_status-function</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 02:31:03 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[php connection status]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14951</guid>

					<description><![CDATA[PHP connection_status() Function Example Return the connection satus: &#60;?php switch (connection_status()) { case CONNECTION_NORMAL: $txt = &#8216;Connection is in a normal state&#8217;; break; case CONNECTION_ABORTED: $txt = &#8216;Connection aborted&#8217;; break; case CONNECTION_TIMEOUT: $txt = &#8216;Connection timed out&#8217;; break; case (CONNECTION_ABORTED &#38; CONNECTION_TIMEOUT): $txt = &#8216;Connection aborted and timed out&#8217;; break; default: $txt = &#8216;Unknown&#8217;; break; } echo $txt; ?&#62; Discuss if any issue or improvement on ... <a title="PHP connection_status() Function" class="read-more" href="https://blog.eduguru.in/php/php-connection_status-function" aria-label="Read more about PHP connection_status() Function">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to get free SSL certificate</title>
		<link>https://blog.eduguru.in/http/how-to-get-free-ssl-certificate</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 24 Jul 2021 06:09:04 +0000</pubDate>
				<category><![CDATA[http]]></category>
		<category><![CDATA[How to get free SSL certificate]]></category>
		<category><![CDATA[How to get the free SSL certificate Let’s Encrypt is a Certificate Authority (CA) that provides free certificates for Transport Layer Security (TLS) encryption]]></category>
		<category><![CDATA[installation]]></category>
		<category><![CDATA[signing]]></category>
		<category><![CDATA[thereby enabling encrypted HTTPS on web servers. It simplifies the process of creation]]></category>
		<category><![CDATA[validation]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14946</guid>

					<description><![CDATA[How to get the free SSL certificate Let’s Encrypt is a Certificate Authority (CA) that provides free certificates for Transport Layer Security (TLS) encryption, thereby enabling encrypted HTTPS on web servers. It simplifies the process of creation, validation, signing, installation, and renewal of certificates by providing a software client that automates most of the steps—Certbot. Here we ... <a title="How to get free SSL certificate" class="read-more" href="https://blog.eduguru.in/http/how-to-get-free-ssl-certificate" aria-label="Read more about How to get free SSL certificate">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>pipe (&#124;) operator in Linux command</title>
		<link>https://blog.eduguru.in/linux-2/pipe-operator-in-linux-command</link>
					<comments>https://blog.eduguru.in/linux-2/pipe-operator-in-linux-command#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 23 Jul 2021 06:03:52 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[pipe (|) operator in Linux command]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14942</guid>

					<description><![CDATA[pipe (&#124;) operator in Linux command Let&#8217;s Start understanding from the below example: $ ifconfig &#124; grep 192 inet 192.168.1.96  netmask 255.255.255.0  broadcast 192.168.1.255 Introduction to pipe (&#124;) One of the most powerful shell operators is the pipe (&#124;). The pipe takes the output from one command and uses it as input for another. And, ... <a title="pipe (&#124;) operator in Linux command" class="read-more" href="https://blog.eduguru.in/linux-2/pipe-operator-in-linux-command" aria-label="Read more about pipe (&#124;) operator in Linux command">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/pipe-operator-in-linux-command/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Hard link in Linux</title>
		<link>https://blog.eduguru.in/linux-2/understanding-hard-link-in-linux</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 23 Jul 2021 03:07:29 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Understanding Hard link in Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14940</guid>

					<description><![CDATA[Understanding Hard link in Linux The concept of a hard link is the most basic thing and here we will discuss it today. Every file on the Linux filesystem starts with a single hard link. What is the hard link? The link is between the filename and the actual data stored on the filesystem. Creating an additional ... <a title="Understanding Hard link in Linux" class="read-more" href="https://blog.eduguru.in/linux-2/understanding-hard-link-in-linux" aria-label="Read more about Understanding Hard link in Linux">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is symbolic link, soft link or symlink</title>
		<link>https://blog.eduguru.in/linux-2/what-is-symbolic-link-soft-link-or-symlink</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 22 Jul 2021 13:02:36 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[soft link]]></category>
		<category><![CDATA[soft link or symlink]]></category>
		<category><![CDATA[What is a symbolic link]]></category>
		<category><![CDATA[What is symbolic link]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14937</guid>

					<description><![CDATA[What is a symbolic link, soft link, or symlink A symbolic link (also known as a soft link or symlink) consists of a special type of file that references another file or directory. Unix/Linux-like operating systems often use symbolic links. Here we will see how to use the ln command to create symbolic/soft links. There ... <a title="What is symbolic link, soft link or symlink" class="read-more" href="https://blog.eduguru.in/linux-2/what-is-symbolic-link-soft-link-or-symlink" aria-label="Read more about What is symbolic link, soft link or symlink">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>22 July today in history</title>
		<link>https://blog.eduguru.in/today-in-history/22-july-today-in-history</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 22 Jul 2021 03:19:34 +0000</pubDate>
				<category><![CDATA[today in history]]></category>
		<category><![CDATA[22 July in history]]></category>
		<category><![CDATA[22 July today in history]]></category>
		<category><![CDATA[22 July today in Indian history]]></category>
		<category><![CDATA[22nd july in history]]></category>
		<category><![CDATA[Pi Approximation Day]]></category>
		<category><![CDATA[Today in History]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14933</guid>

					<description><![CDATA[22 July today in history 1678-Chhatrapati Shivaji Maharaj wins the fort of Vellore. 1981-India’s first geostationary satellite APPLE started functioning. 2012-Pranab Mukherjee was elected 13th President of India. 2019-India’s lunar mission, Chandrayaan-2 successfully takes off from Satish Dhawan Space Center, Sriharikota aiming to be the fourth nation to soft-land on the moon. 1988-Indian National Satellite ... <a title="22 July today in history" class="read-more" href="https://blog.eduguru.in/today-in-history/22-july-today-in-history" aria-label="Read more about 22 July today in history">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>mysql is dead but subsys locked</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-is-dead-but-subsys-locked</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 21 Jul 2021 10:55:01 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[mysql is dead but subsys locked]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14931</guid>

					<description><![CDATA[MySQL is dead but subsys locked Issue Description: When tried to connect to MySQL or run any command. It Displayed The Following Error: Can't connect to local MySQL server through socket '/var/mysql/mysql.sock'(2) When checked the status of MySQL service from the below command: service mysqld status as a root user I got : mysql is dead ... <a title="mysql is dead but subsys locked" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-is-dead-but-subsys-locked" aria-label="Read more about mysql is dead but subsys locked">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Rsync example: automated backup at home</title>
		<link>https://blog.eduguru.in/linux-2/rsync-example-automated-backup-at-home</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 02:29:59 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[automated backup using rsync]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux automated backup]]></category>
		<category><![CDATA[rsync]]></category>
		<category><![CDATA[rsync command]]></category>
		<category><![CDATA[rsync example]]></category>
		<category><![CDATA[Rsync example: automated backup at home]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14928</guid>

					<description><![CDATA[Rsync example: automated backup at home This script just creates a daily backup of Satya work in a ~satya/backup/ directory so he can retrieve any version from the last week. The last line does the rsync of her directory across the modem link to the host samba. Note that I am using the -C option ... <a title="Rsync example: automated backup at home" class="read-more" href="https://blog.eduguru.in/linux-2/rsync-example-automated-backup-at-home" aria-label="Read more about Rsync example: automated backup at home">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Computer: Development of Computer</title>
		<link>https://blog.eduguru.in/info/computer-development-of-computer</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 13 Jun 2021 14:06:41 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Analytical Engine]]></category>
		<category><![CDATA[Computer : Development of Computer]]></category>
		<category><![CDATA[Development of Computer]]></category>
		<category><![CDATA[First-generation computer]]></category>
		<category><![CDATA[FOURTH GENERATION of computer]]></category>
		<category><![CDATA[History of computer]]></category>
		<category><![CDATA[Introduction of computer]]></category>
		<category><![CDATA[LEIBNZ CALCULATOR]]></category>
		<category><![CDATA[NAPIER’S BONES]]></category>
		<category><![CDATA[PASCAL’S CALCULATOR]]></category>
		<category><![CDATA[Personal computer]]></category>
		<category><![CDATA[second generation computer]]></category>
		<category><![CDATA[THE ABACUS]]></category>
		<category><![CDATA[The Generation of computer]]></category>
		<category><![CDATA[Third generation of computer]]></category>
		<category><![CDATA[What is data in computer]]></category>
		<category><![CDATA[what is information in computer]]></category>
		<category><![CDATA[what is processing in computer]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14925</guid>

					<description><![CDATA[Computer: Development of Computer Introduction For most people, a computer is a machine used for calculation or computation, but actually, it is much more than that. PreciselyComputer is an electronic device for performing arithmetic and logical operation. Or “Computer is a device or a flexible machine to process data and converts it into information.” To know about ... <a title="Computer: Development of Computer" class="read-more" href="https://blog.eduguru.in/info/computer-development-of-computer" aria-label="Read more about Computer: Development of Computer">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Rsync: Theoretical mathematics and algorithm</title>
		<link>https://blog.eduguru.in/linux-command/rsync-theoretical-mathematics-and-algorithm</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 12 Jun 2021 06:04:04 +0000</pubDate>
				<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[rsync]]></category>
		<category><![CDATA[rsync protocall]]></category>
		<category><![CDATA[Rsync Started]]></category>
		<category><![CDATA[Rsync: Theoretical mathematics and algorithm]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14922</guid>

					<description><![CDATA[Rsync: Theoretical mathematics and algorithm This article is excellent for understanding theoretical mathematics and some of the mechanics of the rsync algorithm. Unfortunately, they are more about the theory than the implementation of the rsync utility. rsync is an open-source utility that provides fast incremental file transfer. rsync is freely available under the GNU General Public License and is ... <a title="Rsync: Theoretical mathematics and algorithm" class="read-more" href="https://blog.eduguru.in/linux-command/rsync-theoretical-mathematics-and-algorithm" aria-label="Read more about Rsync: Theoretical mathematics and algorithm">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The invention of the telephone</title>
		<link>https://blog.eduguru.in/info/the-invention-of-the-telephone</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 06 Jun 2021 15:35:08 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[1876–1877]]></category>
		<category><![CDATA[as both his wife and mother were deaf. While there’s some controversy over whether Bell was the true pioneer of the telephone]]></category>
		<category><![CDATA[best known for his invention of the telephone]]></category>
		<category><![CDATA[he secured exclusive rights to the technology and launched the Bell Telephone Company in 1877. Ultimately]]></category>
		<category><![CDATA[revolutionized communication as we know it. His interest in sound technology was deep-rooted and personal]]></category>
		<category><![CDATA[story of telephone]]></category>
		<category><![CDATA[The invention of the telephone]]></category>
		<category><![CDATA[The invention of the telephone Alexander Graham Bell]]></category>
		<category><![CDATA[The invention of the telephone Alexander Graham Bell Alexander Graham Bell]]></category>
		<category><![CDATA[the talented scientist held more than 18 patents for his inventions and work in communications. Let's see the story It was at this time]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14918</guid>

					<description><![CDATA[The invention of the telephone Alexander Graham Bell Alexander Graham Bell, best known for his invention of the telephone, revolutionized communication as we know it. His interest in sound technology was deep-rooted and personal, as both his wife and mother were deaf. While there’s some controversy over whether Bell was the true pioneer of the ... <a title="The invention of the telephone" class="read-more" href="https://blog.eduguru.in/info/the-invention-of-the-telephone" aria-label="Read more about The invention of the telephone">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>story of bulb invention</title>
		<link>https://blog.eduguru.in/info/story-of-bulb-invention</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 17:07:27 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Joseph Swan]]></category>
		<category><![CDATA[story of bulb invention]]></category>
		<category><![CDATA[story of bulb invention Though Thomas Edison is usually credited with the invention of the light bulb]]></category>
		<category><![CDATA[The first practical incandescent light bulb]]></category>
		<category><![CDATA[Thomas edison]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14910</guid>

					<description><![CDATA[story of bulb invention Who Invented the Light Bulb? Do you know How bulb invented? Here we tried to solve all these queries. So let&#8217;s start story of bulb invention. Though Thomas Edison is usually credited with the invention of the light bulb, the famous American inventor wasn&#8217;t the only one who contributed to the ... <a title="story of bulb invention" class="read-more" href="https://blog.eduguru.in/info/story-of-bulb-invention" aria-label="Read more about story of bulb invention">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft Windows vs. Linux File System</title>
		<link>https://blog.eduguru.in/linux-2/microsoft-windows-vs-linux-file-system</link>
					<comments>https://blog.eduguru.in/linux-2/microsoft-windows-vs-linux-file-system#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 15:44:08 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[compare os]]></category>
		<category><![CDATA[difference between linux and windows]]></category>
		<category><![CDATA[linux vs windows]]></category>
		<category><![CDATA[Microsoft Windows vs. Linux File System]]></category>
		<category><![CDATA[OPERATING SYSTEM]]></category>
		<category><![CDATA[Windows OS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14908</guid>

					<description><![CDATA[Microsoft Windows vs. Linux File System Which Operating system you like most and why? Share your opinion here https://discuss.eduguru.in/poll/which-operating-system-you-like-most/ Microsoft Windows files are stored on different data drives (C: D: E:). On Linux, beginning with the root directory, files are organized in a tree structure. This directory is the beginning of the file system. It ... <a title="Microsoft Windows vs. Linux File System" class="read-more" href="https://blog.eduguru.in/linux-2/microsoft-windows-vs-linux-file-system" aria-label="Read more about Microsoft Windows vs. Linux File System">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/microsoft-windows-vs-linux-file-system/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Best Wireless Bluetooth Earphones in India</title>
		<link>https://blog.eduguru.in/info/best-wireless-bluetooth-earphones-in-india</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 15:24:01 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[APPLE AIRPODS PRO]]></category>
		<category><![CDATA[Best Wireless Bluetooth Earphones in India]]></category>
		<category><![CDATA[BOSE QUIETCOMFORT EARBUDS]]></category>
		<category><![CDATA[JABRA ELITE 85T]]></category>
		<category><![CDATA[SENNHEISER MOMENTUM TRUE WIRELESS 2]]></category>
		<category><![CDATA[SONY WF-1000XM3]]></category>
		<category><![CDATA[top 5 wireless bluetooth]]></category>
		<category><![CDATA[wireless bluetooth]]></category>
		<category><![CDATA[wireless earphone]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14905</guid>

					<description><![CDATA[Best Wireless Bluetooth Earphones in India With the rapid removal of the 3.5mm audio jack from most modern-day smartphones, wireless Bluetooth earphones are slowly but surely becoming the way to go when it comes to audio solutions for most users. Audio product manufacturers have also understood the widespread appeal of untethered earphones and are bringing ... <a title="Best Wireless Bluetooth Earphones in India" class="read-more" href="https://blog.eduguru.in/info/best-wireless-bluetooth-earphones-in-india" aria-label="Read more about Best Wireless Bluetooth Earphones in India">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to check table Engine in MySQL</title>
		<link>https://blog.eduguru.in/mysql-2/how-to-check-table-engine-in-mysql</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 04 Jun 2021 03:38:51 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[alter mysql table engine]]></category>
		<category><![CDATA[change innodb to myISM]]></category>
		<category><![CDATA[change myISM to innodb]]></category>
		<category><![CDATA[change mysql table engine]]></category>
		<category><![CDATA[check and alter mysql table engine]]></category>
		<category><![CDATA[check table engine in mysql]]></category>
		<category><![CDATA[How to check table Engine in MySQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14903</guid>

					<description><![CDATA[How to check table Engine in MySQL With the help of below query, we can check the table engine in MySQL: SELECT TABLE_NAME, ENGINE FROM information_schema.TABLES WHERE TABLE_SCHEMA = &#8216;nicesys&#8217;; Please change the db name to your DB name. You will get the output like : &#124; TABLE_NAME &#124; ENGINE &#124; +&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;+&#8212;&#8212;&#8211;+ &#124; cdr &#124; ... <a title="How to check table Engine in MySQL" class="read-more" href="https://blog.eduguru.in/mysql-2/how-to-check-table-engine-in-mysql" aria-label="Read more about How to check table Engine in MySQL">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Answer, Playback, and Hangup Applications</title>
		<link>https://blog.eduguru.in/asterisk/answer-playback-and-hangup-applications</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 04 Jun 2021 02:23:32 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[1]]></category>
		<category><![CDATA[and Hangup Applications]]></category>
		<category><![CDATA[and Hangup Applications Answers a ringing channel. Answer([delay]) exten => s]]></category>
		<category><![CDATA[Answer]]></category>
		<category><![CDATA[Answer ;exten => s]]></category>
		<category><![CDATA[Answer() Instructs Asterisk to answer the channel if it is ringing. If the channel is not ringing]]></category>
		<category><![CDATA[Answer(2) exten => 123]]></category>
		<category><![CDATA[in milliseconds]]></category>
		<category><![CDATA[Playback]]></category>
		<category><![CDATA[the behavior may be unexpected. The optional delay parameter specifies how long Asterisk should wait]]></category>
		<category><![CDATA[this application has no effect. It is generally recommended that the channel be answered before other applications are called]]></category>
		<category><![CDATA[unless there is a specific reason for not doing so. Most applications require that the channel be answered before they are run; if this is not done]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14898</guid>

					<description><![CDATA[Answer, Playback, and Hangup Applications Answers a ringing channel. Answer([delay]) exten =&#62; s,1,Answer() exten =&#62; s,1,Answer(2) exten =&#62; 123,1,Answer() Instructs Asterisk to answer the channel if it is ringing. If the channel is not ringing, this application has no effect. It is generally recommended that the channel be answered before other applications are called, unless ... <a title="Answer, Playback, and Hangup Applications" class="read-more" href="https://blog.eduguru.in/asterisk/answer-playback-and-hangup-applications" aria-label="Read more about Answer, Playback, and Hangup Applications">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>MySQL Addtime() : Adding time to datetime</title>
		<link>https://blog.eduguru.in/mysql-2/mysql-addtime-adding-time-to-datetime</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 14:16:34 +0000</pubDate>
				<category><![CDATA[mysql]]></category>
		<category><![CDATA[add seconds in datetime mysql]]></category>
		<category><![CDATA[mysql addtime function. mysql add time to datetime]]></category>
		<category><![CDATA[mysql function]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14895</guid>

					<description><![CDATA[MySQL Addtime() : Adding time to datetime The ADDTIME() function adds a time interval to a time/datetime and then returns the time/datetime. Syntax ADDTIME(datetime, addtime) Parameter Values Parameter Description datetime Required.  The time/datetime to be modified addtime Required. The time interval to add to datetime. Both positive and negative values are allowed Example: SELECT ADDTIME(&#8220;2021-06-03 09:34:21&#8221;, &#8220;2&#8221;); Output: ... <a title="MySQL Addtime() : Adding time to datetime" class="read-more" href="https://blog.eduguru.in/mysql-2/mysql-addtime-adding-time-to-datetime" aria-label="Read more about MySQL Addtime() : Adding time to datetime">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Asterisk Call Recordings with MixMonitor</title>
		<link>https://blog.eduguru.in/asterisk/asterisk-call-recordings-with-mixmonitor</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 03:12:32 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[asterisk call recording]]></category>
		<category><![CDATA[Asterisk Call Recordings with MixMonitor]]></category>
		<category><![CDATA[call recording]]></category>
		<category><![CDATA[how to use mix monitor]]></category>
		<category><![CDATA[Mix Monitor]]></category>
		<category><![CDATA[mixmonitor]]></category>
		<category><![CDATA[record outbound call]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14893</guid>

					<description><![CDATA[Asterisk Call Recordings with MixMonitor MixMonitor() — Records a channel in the background, mixing both directions synchronously. Synopsis MixMonitor(filename.ext,options,command) Records the audio on the current channel to the specified file. If the filename is an absolute path, MixMonitor() uses that path; otherwise it creates the file in the configured monitoring directory from asterisk.conf. If command is specified, it will be ... <a title="Asterisk Call Recordings with MixMonitor" class="read-more" href="https://blog.eduguru.in/asterisk/asterisk-call-recordings-with-mixmonitor" aria-label="Read more about Asterisk Call Recordings with MixMonitor">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Number masking or Call masking services</title>
		<link>https://blog.eduguru.in/info/number-masking-or-call-masking-services</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 08 Apr 2021 17:12:37 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Number masking or Call masking services]]></category>
		<category><![CDATA[Number masking or Call masking services Number masking or call masking is a solution where actual caller number is not being displayed to the customer. Here]]></category>
		<category><![CDATA[we will understand that how this can be accomplished. Before starting we need to understand that why this solution is required? To Increase the call connect ratio in Outbound call: - In General]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14882</guid>

					<description><![CDATA[Number masking or Call masking services Number masking or call masking is a solution where actual caller number is not being displayed to the customer. Here, we will understand that how this can be accomplished. Number masking or call masking is the best way for businesses to safeguard their customers’ identity, and prevent misuse of ... <a title="Number masking or Call masking services" class="read-more" href="https://blog.eduguru.in/info/number-masking-or-call-masking-services" aria-label="Read more about Number masking or Call masking services">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>how to manually pause and unpause recording in dialer</title>
		<link>https://blog.eduguru.in/asterisk/how-to-manually-pause-and-unpause-recording-in-dialer</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 28 Mar 2021 03:19:46 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[Dialer]]></category>
		<category><![CDATA[asterisk mute recording]]></category>
		<category><![CDATA[asterisk pause recording]]></category>
		<category><![CDATA[asterisk stop recording]]></category>
		<category><![CDATA[asterisk support]]></category>
		<category><![CDATA[asterisk unmute recording]]></category>
		<category><![CDATA[asterisk unpause recording]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14874</guid>

					<description><![CDATA[how to manually pause and unpause recording in dialer This article is for the developer who used to develop call center technology. In Some of the scenario, we don&#8217;t want to record all the conversation being from agent side and customer side. This conversation would be like as credit card information or some of the security ... <a title="how to manually pause and unpause recording in dialer" class="read-more" href="https://blog.eduguru.in/asterisk/how-to-manually-pause-and-unpause-recording-in-dialer" aria-label="Read more about how to manually pause and unpause recording in dialer">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Carbon tax found to be the most effective way to cut emissions</title>
		<link>https://blog.eduguru.in/news/carbon-tax-found-to-be-the-most-effective-way-to-cut-emissions</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 06 Mar 2021 10:11:25 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[carbon]]></category>
		<category><![CDATA[Carbon tax found to be the most effective way to cut emissions]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14869</guid>

					<description><![CDATA[Directly charging money for carbon emissions is the cheapest and most efficient policy change for tackling climate change, researchers have said. Ohio State University researchers analysed the costs and effects that a variety of policy changes would have on reducing carbon dioxide emissions from electricity generation in Texas and found that adding a price, based ... <a title="Carbon tax found to be the most effective way to cut emissions" class="read-more" href="https://blog.eduguru.in/news/carbon-tax-found-to-be-the-most-effective-way-to-cut-emissions" aria-label="Read more about Carbon tax found to be the most effective way to cut emissions">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Public invited to act as ‘virtual rangers’ to help protect wildlife using livestream</title>
		<link>https://blog.eduguru.in/news/public-invited-to-act-as-virtual-rangers-to-help-protect-wildlife-using-livestream</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 06 Mar 2021 10:09:27 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[africa]]></category>
		<category><![CDATA[ANIMALS]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[Public invited to act as ‘virtual rangers’ to help protect wildlife using livestream]]></category>
		<category><![CDATA[SOUTH AFRICA]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[WILDLIFE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14867</guid>

					<description><![CDATA[Samsung smartphones are being reused as surveillance cameras in a pilot project based on a South African wildlife reserve, with members of the public encouraged to help conservation efforts by acting as “virtual rangers”.  As part of a pilot project (‘Wildlife Watch’) to protect endangered species from poachers, several recycled Samsung Galaxy S20 FE phones have ... <a title="Public invited to act as ‘virtual rangers’ to help protect wildlife using livestream" class="read-more" href="https://blog.eduguru.in/news/public-invited-to-act-as-virtual-rangers-to-help-protect-wildlife-using-livestream" aria-label="Read more about Public invited to act as ‘virtual rangers’ to help protect wildlife using livestream">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Synthetic biology slated to be game changer</title>
		<link>https://blog.eduguru.in/news/synthetic-biology-slated-to-be-game-changer</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 04 Mar 2021 14:47:59 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[ECONOMY]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[Synthetic biology slated to be game changer]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14865</guid>

					<description><![CDATA[Over the last year, the pandemic has unleashed the true power of science and technology, pharma, biotechnology and research. The stage has been set for innovative breakthroughs in the domains.  For India, Covid is a crisis turned into an opportunity. “With concerted efforts, a huge community of entrepreneurs has come forward to create kits, face ... <a title="Synthetic biology slated to be game changer" class="read-more" href="https://blog.eduguru.in/news/synthetic-biology-slated-to-be-game-changer" aria-label="Read more about Synthetic biology slated to be game changer">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Chinese astronauts in training for four crewed missions</title>
		<link>https://blog.eduguru.in/news/chinese-astronauts-in-training-for-four-crewed-missions</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 04 Mar 2021 14:43:33 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese astronauts in training for four crewed missions]]></category>
		<category><![CDATA[ROCKETS]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE LAUNCH SYSTEMS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14863</guid>

					<description><![CDATA[Astronauts from the China National Space Administration (CNSA) are preparing to partake in four crewed missions this year, the Associated Press has reported.  China is working towards completion of its first permanent orbiting station. The Chinese Space Station will be approximately one-fifth the mass of the ISS at 80-100 tonnes. Under the CNSA’s timetable, it will ... <a title="Chinese astronauts in training for four crewed missions" class="read-more" href="https://blog.eduguru.in/news/chinese-astronauts-in-training-for-four-crewed-missions" aria-label="Read more about Chinese astronauts in training for four crewed missions">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Agency for high-risk, high-reward research up and running by 2022</title>
		<link>https://blog.eduguru.in/news/agency-for-high-risk-high-reward-research-up-and-running-by-2022</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 22 Feb 2021 14:07:16 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Agency for high-risk]]></category>
		<category><![CDATA[FINANCE]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[high-reward research up and running by 2022]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14858</guid>

					<description><![CDATA[The UK government has announced the launch of a new research agency, which will pursue areas of science and technology with the potential to generate ground-breaking discoveries and transformative technology in the long term. Plans for a research agency dedicated to this type of research were first announced in 2019. The agency is inspired by ... <a title="Agency for high-risk, high-reward research up and running by 2022" class="read-more" href="https://blog.eduguru.in/news/agency-for-high-risk-high-reward-research-up-and-running-by-2022" aria-label="Read more about Agency for high-risk, high-reward research up and running by 2022">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install Steam on Ubuntu &#038; Linux Mint</title>
		<link>https://blog.eduguru.in/linux-2/install-steam-on-ubuntu-linux-mint</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 07:11:02 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Install Steam on Ubuntu]]></category>
		<category><![CDATA[Install Steam on Ubuntu & Linux Mint]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14855</guid>

					<description><![CDATA[How to Install Steam on Ubuntu (Easy) Steam is available to install on Ubuntu 16.04 Xenial Xerus and later from Ubuntu Software or through the command line apt programme. Click to Install Steam on Ubuntu If you’d rather do all of the above using the command line just run the following commands: sudo add-apt-repository multiverse sudo ... <a title="Install Steam on Ubuntu &#038; Linux Mint" class="read-more" href="https://blog.eduguru.in/linux-2/install-steam-on-ubuntu-linux-mint" aria-label="Read more about Install Steam on Ubuntu &#038; Linux Mint">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>install ONLYOFFICE Desktop Editors on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/install-onlyoffice-desktop-editors-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 07:00:46 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[install only office]]></category>
		<category><![CDATA[Install ONLYOFFICE Desktop]]></category>
		<category><![CDATA[install ONLYOFFICE Desktop Editors on Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[OnlyOffice Desktop]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14853</guid>

					<description><![CDATA[To install ONLYOFFICE Desktop Editors on Ubuntu 20.04 via snap, simply run the following command: snap install onlyoffice-desktopeditors Once the installation is over, you can run the editors using the terminal command: snap run onlyoffice-desktopeditors]]></description>
		
		
		
			</item>
		<item>
		<title>Install Tilix GTK3 tiling terminal emulator</title>
		<link>https://blog.eduguru.in/linux-2/install-tilix-gtk3-tiling-terminal-emulator</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 06:56:35 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[emulator]]></category>
		<category><![CDATA[Install terminal emulator]]></category>
		<category><![CDATA[Install Tilix GTK3]]></category>
		<category><![CDATA[Install Tilix GTK3 tiling terminal emulator]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14851</guid>

					<description><![CDATA[Tilix GTK3 tiling terminal emulator on Ubuntu / Debian The official Tilix packages are available for stretch-backports, buster and sid. I’m doing this installation on both Debian 10. Run the following commands to install Tilix. $ sudo apt install tilix Reading package lists... Done Building dependency tree Reading state information... Done The following additional packages will be installed: libgtkd-3-0 ... <a title="Install Tilix GTK3 tiling terminal emulator" class="read-more" href="https://blog.eduguru.in/linux-2/install-tilix-gtk3-tiling-terminal-emulator" aria-label="Read more about Install Tilix GTK3 tiling terminal emulator">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install Foliate ePub Reader on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/install-foliate-epub-reader-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 06:09:07 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Foliate ePub Reader]]></category>
		<category><![CDATA[Install Foliate ePub Reader]]></category>
		<category><![CDATA[Install Foliate ePub Reader on Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Reader]]></category>
		<category><![CDATA[reader in ubuntu]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14849</guid>

					<description><![CDATA[Install Foliate on Ubuntu via PPA It’s already possible to download and install Foliate on Ubuntu 18.04 LTS using an installer from the project’s GitHub page: &#8220;Download Foliate for Ubuntu (64-bit .deb)&#8220; The “catch” is that there are no guarantees that a traditional installer will be produced for every future Foliate update and you need to manually go out and check for, ... <a title="Install Foliate ePub Reader on Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/install-foliate-epub-reader-on-ubuntu" aria-label="Read more about Install Foliate ePub Reader on Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install Telegram on Ubuntu Linux</title>
		<link>https://blog.eduguru.in/linux-2/install-telegram-on-ubuntu-linux</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 06:04:46 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Install Telegram]]></category>
		<category><![CDATA[Install Telegram on Ubuntu Linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[Telegram in Linux]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14846</guid>

					<description><![CDATA[How to Install Telegram on Ubuntu Method 1: Official Telegram Download Click the button below to download the tarball package for Linux distros (including Ubuntu) which contains a standalone Telegram runtime and updater: Download Telegram for Linux (64-bit .tar.xz) Download Telegram for Linux (32-bit .tar.xz) If you like to live on the bleeding edge you ... <a title="Install Telegram on Ubuntu Linux" class="read-more" href="https://blog.eduguru.in/linux-2/install-telegram-on-ubuntu-linux" aria-label="Read more about Install Telegram on Ubuntu Linux">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install the Latest Lollypop Music Player in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/install-the-latest-lollypop-music-player-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 05:52:05 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[/latest Lollypop Music Player]]></category>
		<category><![CDATA[Install the Latest Lollypop Music Player in Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[music]]></category>
		<category><![CDATA[Music player]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14844</guid>

					<description><![CDATA[How to Install Lollypop in Ubuntu: 1.) Open terminal from your system application launcher. When it opens, run command to add the PPA: sudo add-apt-repository ppa:gnumdk/lollypop 2.) After adding the PPA, run command in terminal to install the software package: sudo apt install lollypop &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Install Geary Mail on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/install-geary-mail-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 05:44:23 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Geary Mail on ubuntu]]></category>
		<category><![CDATA[Install Geary mail]]></category>
		<category><![CDATA[Install Geary Mail on Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14842</guid>

					<description><![CDATA[Install Geary Mail on Ubuntu Geary is available from Ubuntu software repository. You can use the following command to install it. sudo apt update sudo apt install geary The Ubuntu 16.10 repository contains the latest 0.11.2 version, but Ubuntu 16.04 has version 0.11.0. If you like to get the latest updates as soon as possible, ... <a title="Install Geary Mail on Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/install-geary-mail-on-ubuntu" aria-label="Read more about Install Geary Mail on Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install caffeine in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/install-caffeine-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 05:39:02 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Caffeine]]></category>
		<category><![CDATA[Caffeine in ubuntu]]></category>
		<category><![CDATA[Install caffeine]]></category>
		<category><![CDATA[Install caffeine in Ubuntu]]></category>
		<category><![CDATA[Linix]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14840</guid>

					<description><![CDATA[Install caffeine by entering the following commands in the terminal: sudo apt update sudo apt install caffeine Description: prevent the desktop becoming idle in full-screen mode Caffeine prevents the desktop from becoming idle when an application is running full-screen. A desktop indicator ‘caffeine-indicator’ supplies a manual toggle, and the command ‘caffeinate’ can be used to ... <a title="Install caffeine in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/install-caffeine-in-ubuntu" aria-label="Read more about Install caffeine in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The bigger picture: AI vertical farm, San Francisco</title>
		<link>https://blog.eduguru.in/news/the-bigger-picture-ai-vertical-farm-san-francisco</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 14:01:40 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AGRICULTURE]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[FOOD]]></category>
		<category><![CDATA[San Francisco]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<category><![CDATA[The bigger picture: AI vertical farm]]></category>
		<category><![CDATA[VOLUME 16 ISSUE 2]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14838</guid>

					<description><![CDATA[A San Francisco agritech start-up has created a vertical farm that is run by AI and robots.  Plenty’s upright facility grows as much produce as 720 acres of typical farmland, but with a footprint of just two acres. AI monitors water usage, light, and environmental conditions and it learns how to grow crops faster and ... <a title="The bigger picture: AI vertical farm, San Francisco" class="read-more" href="https://blog.eduguru.in/news/the-bigger-picture-ai-vertical-farm-san-francisco" aria-label="Read more about The bigger picture: AI vertical farm, San Francisco">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Red Bull strikes deal to continue using Honda’s F1 engines until 2025</title>
		<link>https://blog.eduguru.in/news/red-bull-strikes-deal-to-continue-using-hondas-f1-engines-until-2025</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 13:59:31 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[ENGINEERING]]></category>
		<category><![CDATA[MOTORSPORT]]></category>
		<category><![CDATA[Red Bull strikes deal to continue using Honda’s F1 engines until 2025]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[SPORT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14836</guid>

					<description><![CDATA[Red Bull has announced it will continue to use Honda’s Formula One (F1) power units from 2022 until 2025, with the F1 team introducing its own powertrain company.  Japan’s Honda, which is engine partner to Red Bull Racing and Italy-based sister team AlphaTauri, announced last year that it would be leaving the sport as a power unit ... <a title="Red Bull strikes deal to continue using Honda’s F1 engines until 2025" class="read-more" href="https://blog.eduguru.in/news/red-bull-strikes-deal-to-continue-using-hondas-f1-engines-until-2025" aria-label="Read more about Red Bull strikes deal to continue using Honda’s F1 engines until 2025">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>A varied diet need not cost the Earth</title>
		<link>https://blog.eduguru.in/news/young-people-use-video-games-as-vital-social-tool-in-lockdown</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 13:57:11 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CHILDREN]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Games]]></category>
		<category><![CDATA[GAMING]]></category>
		<category><![CDATA[MENTAL HEALTH]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[Young people use video games as vital social tool in lockdown]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14834</guid>

					<description><![CDATA[Video games have become a vital social tool during the lasts year’s lockdowns as a way to keep in touch with friends, a new study has found.  In a survey from Gaming accessories firm HyperX, more than half of 13 to 18 year olds said they used games as a way to socialise with friends. ... <a title="A varied diet need not cost the Earth" class="read-more" href="https://blog.eduguru.in/news/young-people-use-video-games-as-vital-social-tool-in-lockdown" aria-label="Read more about A varied diet need not cost the Earth">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Smallest microchips yet folded from graphene</title>
		<link>https://blog.eduguru.in/news/smallest-microchips-yet-folded-from-graphene</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 13:51:40 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[GRAPHENE]]></category>
		<category><![CDATA[MATERIALS SCIENCE]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[SEMICONDUCTORS]]></category>
		<category><![CDATA[Smallest microchips yet folded from graphene]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14832</guid>

					<description><![CDATA[University of Sussex physicists have applied “nano-origami” to graphene to create a tiny object which behaves like a microchip. This could eventually lead to computers and phones running thousands of times faster than they do today.  The researchers created the microchips from graphene and other 2D materials by creating kinks (defects) in its structure. The ... <a title="Smallest microchips yet folded from graphene" class="read-more" href="https://blog.eduguru.in/news/smallest-microchips-yet-folded-from-graphene" aria-label="Read more about Smallest microchips yet folded from graphene">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Grub’s up for chickens!</title>
		<link>https://blog.eduguru.in/news/grubs-up-for-chickens</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 13:45:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AGRICULTURE]]></category>
		<category><![CDATA[ANIMALS]]></category>
		<category><![CDATA[ENVIRONMENT]]></category>
		<category><![CDATA[FOOD]]></category>
		<category><![CDATA[FOOD AND DRINK]]></category>
		<category><![CDATA[Grub’s up for chickens!]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<category><![CDATA[VOLUME 16 ISSUE 2]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14830</guid>

					<description><![CDATA[How can insect farming contribute to food security? One British firm believes it has the answer.  With the global population set to top nine billion by 2050, it’s estimated that food production needs to increase by around 70 per cent to meet demand, and do so sustainably. Some 820 million people go hungry globally, yet a ... <a title="Grub’s up for chickens!" class="read-more" href="https://blog.eduguru.in/news/grubs-up-for-chickens" aria-label="Read more about Grub’s up for chickens!">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Jaguar to offer only electric-powered cars from 2025</title>
		<link>https://blog.eduguru.in/news/jaguar-to-offer-only-electric-powered-cars-from-2025</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 13:42:31 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[Jaguar to offer only electric-powered cars from 2025]]></category>
		<category><![CDATA[MANUFACTURING]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14828</guid>

					<description><![CDATA[Jaguar Land Rover (JLR) has announced that Jaguar will stop building cars with internal combustion engines by 2025, shaking up its operations in the UK.  In November, the government brought forward a ban on the sale of new petrol and diesel cars to 2030. It had previously set a 2035 target for the transition, which was ... <a title="Jaguar to offer only electric-powered cars from 2025" class="read-more" href="https://blog.eduguru.in/news/jaguar-to-offer-only-electric-powered-cars-from-2025" aria-label="Read more about Jaguar to offer only electric-powered cars from 2025">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hydrogen-powered show homes to open in Gateshead</title>
		<link>https://blog.eduguru.in/news/hydrogen-powered-show-homes-to-open-in-gateshead</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 13:40:00 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[BUILDING SERVICES]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[GAS]]></category>
		<category><![CDATA[hydrogen]]></category>
		<category><![CDATA[Hydrogen-powered show homes to open in Gateshead]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14826</guid>

					<description><![CDATA[The UK’s first homes with household appliances powered entirely by hydrogen will be built in Low Thornley, Gateshead, providing a demonstration of hydrogen-powered living.  The pair of show homes will contain 100 per cent hydrogen appliances including boilers, hobs, cookers, and fires. Unlike natural gas, which is responsible for over 30 per cent of the ... <a title="Hydrogen-powered show homes to open in Gateshead" class="read-more" href="https://blog.eduguru.in/news/hydrogen-powered-show-homes-to-open-in-gateshead" aria-label="Read more about Hydrogen-powered show homes to open in Gateshead">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to grow crops in space</title>
		<link>https://blog.eduguru.in/news/how-to-grow-crops-in-space</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 13:37:41 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AGRICULTURE]]></category>
		<category><![CDATA[FOOD]]></category>
		<category><![CDATA[FOOD AND DRINK]]></category>
		<category><![CDATA[How to grow crops in space]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[VOLUME 16 ISSUE 2]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14824</guid>

					<description><![CDATA[Plants grown in space could feed astronauts, but might new strains contribute to ending a food crisis here on Earth, too?  American commercial space services company Nanoracks has ambitious plans to operate orbital greenhouses where it would create mutant crops that could save the Earth from famine amid progressing climate change. The plan seems to ... <a title="How to grow crops in space" class="read-more" href="https://blog.eduguru.in/news/how-to-grow-crops-in-space" aria-label="Read more about How to grow crops in space">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook Messenger’s encryption plans labelled a ‘disaster’ for child safety</title>
		<link>https://blog.eduguru.in/news/facebook-messengers-encryption-plans-labelled-a-disaster-for-child-safety</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 13 Feb 2021 13:37:56 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CHILDREN]]></category>
		<category><![CDATA[CRIME]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Facebook Messenger’s encryption plans labelled a ‘disaster’ for child safety]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14819</guid>

					<description><![CDATA[  Facebook’s plans to encrypt its messenger service will be a “disaster” for child safety and law enforcement, a senior National Crime Agency (NCA) director has said.  In 2019, Facebook confirmed it was forging ahead with plans to bring end-to-end encryption (E2EE) to its Messenger platform, despite calls from governments that it will make it easier for ... <a title="Facebook Messenger’s encryption plans labelled a ‘disaster’ for child safety" class="read-more" href="https://blog.eduguru.in/news/facebook-messengers-encryption-plans-labelled-a-disaster-for-child-safety" aria-label="Read more about Facebook Messenger’s encryption plans labelled a ‘disaster’ for child safety">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Disadvantaged children face equipment hurdle to access online lessons, study finds</title>
		<link>https://blog.eduguru.in/news/disadvantaged-children-face-equipment-hurdle-to-access-online-lessons-study-finds</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 13 Feb 2021 12:40:22 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CHILDREN]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Disadvantaged children face equipment hurdle to access online lessons]]></category>
		<category><![CDATA[EDUCATION]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[study finds]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14817</guid>

					<description><![CDATA[Online tuition can support disadvantaged pupils to learn remotely but access to equipment and reliable internet connections are key barriers to participation, a study has shown.  The pilot from the Education Endowment Foundation (EEF) was carried out to assess the effectiveness of supporting the learning of pupils from low-income backgrounds during and after partial school ... <a title="Disadvantaged children face equipment hurdle to access online lessons, study finds" class="read-more" href="https://blog.eduguru.in/news/disadvantaged-children-face-equipment-hurdle-to-access-online-lessons-study-finds" aria-label="Read more about Disadvantaged children face equipment hurdle to access online lessons, study finds">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>People trust robots more than humans with money, global study reveals</title>
		<link>https://blog.eduguru.in/news/people-trust-robots-more-than-humans-with-money-global-study-reveals</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 11 Feb 2021 07:44:55 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[ECONOMY]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[FINANCE]]></category>
		<category><![CDATA[global study reveals]]></category>
		<category><![CDATA[People trust robots more than humans with money]]></category>
		<category><![CDATA[ROBOTS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14814</guid>

					<description><![CDATA[A major global survey of consumers and business leaders has suggested there is a growing belief among consumers and business leaders that robots handle financial tasks better than humans.  According to the study by software infrastructure firm Oracle and personal finance expert Farnoosh Torabi, 2020 appears to have changed our relationship with money, with people ... <a title="People trust robots more than humans with money, global study reveals" class="read-more" href="https://blog.eduguru.in/news/people-trust-robots-more-than-humans-with-money-global-study-reveals" aria-label="Read more about People trust robots more than humans with money, global study reveals">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Turkey sets sight on Moon with 10-year space programme</title>
		<link>https://blog.eduguru.in/news/turkey-sets-sight-on-moon-with-10-year-space-programme</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 11 Feb 2021 07:38:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[Moon]]></category>
		<category><![CDATA[ROCKETS]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[TURKEY]]></category>
		<category><![CDATA[Turkey sets sight on Moon with 10-year space programme]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14812</guid>

					<description><![CDATA[Turkish President Recep Tayyip Erdogan has unveiled an ambitious space programme for the country over the next decade, which includes developing satellite systems and sending a Turkish astronaut on a space mission.  The programme is ambitious in its timescale, with Erdogan aiming to establish “first contact with the Moon” in 2023 (‘The Moon Programme’), marking ... <a title="Turkey sets sight on Moon with 10-year space programme" class="read-more" href="https://blog.eduguru.in/news/turkey-sets-sight-on-moon-with-10-year-space-programme" aria-label="Read more about Turkey sets sight on Moon with 10-year space programme">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>RoboCafe in Dubai eases minds of Covid-wary customers</title>
		<link>https://blog.eduguru.in/news/robocafe-in-dubai-eases-minds-of-covid-wary-customers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 11 Feb 2021 07:34:35 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[DUBAI]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[FOOD AND DRINK]]></category>
		<category><![CDATA[HEALTH AND SAFETY]]></category>
		<category><![CDATA[RoboCafe in Dubai eases minds of Covid-wary customers]]></category>
		<category><![CDATA[ROBOTS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14810</guid>

					<description><![CDATA[A café run by robots has opened to customers in one of Dubai’s most popular tourist destinations – ideal in a time where social distancing is still prevalent. It is located in Dubai Festival City, a large residential, business, and entertainment development. Customers can place their orders with German-made robots, who then prepare and deliver the ... <a title="RoboCafe in Dubai eases minds of Covid-wary customers" class="read-more" href="https://blog.eduguru.in/news/robocafe-in-dubai-eases-minds-of-covid-wary-customers" aria-label="Read more about RoboCafe in Dubai eases minds of Covid-wary customers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Silicon lidar chip brings accuracy at low cost to autonomous vehicles</title>
		<link>https://blog.eduguru.in/news/silicon-lidar-chip-brings-accuracy-at-low-cost-to-autonomous-vehicles</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 11 Feb 2021 07:30:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTONOMOUS VEHICLES]]></category>
		<category><![CDATA[IMAGE PROCESSING]]></category>
		<category><![CDATA[LIDAR]]></category>
		<category><![CDATA[PHOTONICS]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[Silicon lidar chip brings accuracy at low cost to autonomous vehicles]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14808</guid>

					<description><![CDATA[A compact 3D lidar imaging system has been developed that its creators say can match the performance and accuracy of most advanced, mechanical systems currently used.  Lidar (light and radar) uses the precision of lasers to sense an environment by emitting them into the nearby environment and measuring the time taken for them to be ... <a title="Silicon lidar chip brings accuracy at low cost to autonomous vehicles" class="read-more" href="https://blog.eduguru.in/news/silicon-lidar-chip-brings-accuracy-at-low-cost-to-autonomous-vehicles" aria-label="Read more about Silicon lidar chip brings accuracy at low cost to autonomous vehicles">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook bans vaccine misinformation, provides Covid-19 jab advice</title>
		<link>https://blog.eduguru.in/news/facebook-bans-vaccine-misinformation-provides-covid-19-jab-advice</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 11:20:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Facebook bans vaccine misinformation]]></category>
		<category><![CDATA[FAKE NEWS]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[provides Covid-19 jab advice]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14806</guid>

					<description><![CDATA[Facebook has said it will direct users on where and how to get vaccinated against Covid-19 as it also announces a ban on misleading information about vaccines in general.  The social network claims it has connected over two billion people from 189 countries to information about the disease through its ‘Covid-19 Information Center’ [sic]. Starting ... <a title="Facebook bans vaccine misinformation, provides Covid-19 jab advice" class="read-more" href="https://blog.eduguru.in/news/facebook-bans-vaccine-misinformation-provides-covid-19-jab-advice" aria-label="Read more about Facebook bans vaccine misinformation, provides Covid-19 jab advice">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>RSC to stage interactive Midsummer’s Night Dream-inspired performance online</title>
		<link>https://blog.eduguru.in/news/rsc-to-stage-interactive-midsummers-night-dream-inspired-performance-online</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 11:18:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[art]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[GAMING]]></category>
		<category><![CDATA[MOTION CAPTURE]]></category>
		<category><![CDATA[RSC to stage interactive Midsummer’s Night Dream-inspired performance online]]></category>
		<category><![CDATA[THEATRE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14804</guid>

					<description><![CDATA[The Royal Shakespeare Company (RSC) is to stage a production inspired by the faerie realm of A Midsummer Night’s Dream, which will allow audiences to remotely interact with characters.  The Midsummer Night’s Dream-inspired performance, ‘Dream’, had originally been scheduled to be staged as a more conventional live performance in spring. However, with most large theatres ... <a title="RSC to stage interactive Midsummer’s Night Dream-inspired performance online" class="read-more" href="https://blog.eduguru.in/news/rsc-to-stage-interactive-midsummers-night-dream-inspired-performance-online" aria-label="Read more about RSC to stage interactive Midsummer’s Night Dream-inspired performance online">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Quantum receiver capable of detecting full spectrum of radio waves</title>
		<link>https://blog.eduguru.in/news/quantum-receiver-capable-of-detecting-full-spectrum-of-radio-waves</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 11:14:58 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMMUNICATIONS]]></category>
		<category><![CDATA[DEFENCE]]></category>
		<category><![CDATA[IDENTIFICATION]]></category>
		<category><![CDATA[QUANTUM ANTENNAS AND PROPAGATION TELECOMMUNICATIONS]]></category>
		<category><![CDATA[Quantum receiver capable of detecting full spectrum of radio waves]]></category>
		<category><![CDATA[RADIO FREQUENCY]]></category>
		<category><![CDATA[SPECTRUM]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14802</guid>

					<description><![CDATA[A quantum sensor has been developed that can analyse the full spectrum of radio frequencies, which could enable new options for military communication.  Researchers for the US army built the quantum sensor, which can sample from zero frequency up to 20GHz, detecting AM and FM radio, Bluetooth, Wi-Fi and other communication signals along the way. ... <a title="Quantum receiver capable of detecting full spectrum of radio waves" class="read-more" href="https://blog.eduguru.in/news/quantum-receiver-capable-of-detecting-full-spectrum-of-radio-waves" aria-label="Read more about Quantum receiver capable of detecting full spectrum of radio waves">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UAE probe nears Mars orbit ahead of China and Nasa missions</title>
		<link>https://blog.eduguru.in/news/uae-probe-nears-mars-orbit-ahead-of-china-and-nasa-missions</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 11:12:23 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Mars]]></category>
		<category><![CDATA[NASA]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[UAE]]></category>
		<category><![CDATA[UAE probe nears Mars orbit ahead of China and Nasa missions]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14800</guid>

					<description><![CDATA[The UAE’s Hope probe is expected to reach Mars tomorrow, just hours before China’s orbiter-rover combo and a week ahead of Nasa’s probe.  The Hope Probe, which was launched from Japan last year, will orbit Mars for more than two years and beam back data about the Martian atmosphere. It will observe the Martian atmosphere from an ... <a title="UAE probe nears Mars orbit ahead of China and Nasa missions" class="read-more" href="https://blog.eduguru.in/news/uae-probe-nears-mars-orbit-ahead-of-china-and-nasa-missions" aria-label="Read more about UAE probe nears Mars orbit ahead of China and Nasa missions">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>North Korea using cyberattacks to advance nuclear weapons, UN warns</title>
		<link>https://blog.eduguru.in/news/north-korea-using-cyberattacks-to-advance-nuclear-weapons-un-warns</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 11:10:10 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CYBERSECURITY]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[NORTH KOREA]]></category>
		<category><![CDATA[North Korea using cyberattacks to advance nuclear weapons]]></category>
		<category><![CDATA[NUCLEAR WEAPONS]]></category>
		<category><![CDATA[UN warns]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14798</guid>

					<description><![CDATA[Experts at the United Nations have accused North Korea of modernising its nuclear weapons by flouting UN sanctions, using cyberattacks to help finance its programmes, and continuing to seek material and technology overseas for its arsenal.  The panel of experts monitoring sanctions on the north-east Asian nation say in a report sent to UN Security ... <a title="North Korea using cyberattacks to advance nuclear weapons, UN warns" class="read-more" href="https://blog.eduguru.in/news/north-korea-using-cyberattacks-to-advance-nuclear-weapons-un-warns" aria-label="Read more about North Korea using cyberattacks to advance nuclear weapons, UN warns">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Robots ‘capture’ shadows to sense touch</title>
		<link>https://blog.eduguru.in/news/robots-capture-shadows-to-sense-touch</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 11:07:26 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[ROBOTS]]></category>
		<category><![CDATA[Robots ‘capture’ shadows to sense touch]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14796</guid>

					<description><![CDATA[Researchers in the US have developed a low-cost method for soft, deformable robots to detect physical interactions, from pats to punches to hugs, without relying on touch.  The method, devised by a team at Cornell University in New York, uses a USB camera located inside the robot that “captures” the shadow movements of hand gestures on ... <a title="Robots ‘capture’ shadows to sense touch" class="read-more" href="https://blog.eduguru.in/news/robots-capture-shadows-to-sense-touch" aria-label="Read more about Robots ‘capture’ shadows to sense touch">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>3D-printed fresh vegetables become reality with new method</title>
		<link>https://blog.eduguru.in/news/3d-printed-fresh-vegetables-become-reality-with-new-method</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 13:59:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[3D PRINTING]]></category>
		<category><![CDATA[3D-printed fresh vegetables become reality with new method]]></category>
		<category><![CDATA[FOOD]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14791</guid>

					<description><![CDATA[A new way to create ‘food inks’ from fresh and frozen vegetables that enables 3D-printed food has been developed by Singapore researchers.  The research team claims their method preserves the nutrition and flavour better than existing methods. Food inks are usually made from pureed foods in liquid or semi-solid form, then 3D-printed by extrusion from ... <a title="3D-printed fresh vegetables become reality with new method" class="read-more" href="https://blog.eduguru.in/news/3d-printed-fresh-vegetables-become-reality-with-new-method" aria-label="Read more about 3D-printed fresh vegetables become reality with new method">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Bioengineering threats rated as a top biosecurity risk</title>
		<link>https://blog.eduguru.in/news/bioengineering-threats-rated-as-a-top-biosecurity-risk</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 13:55:55 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Bioengineering threats rated as a top biosecurity risk]]></category>
		<category><![CDATA[BIOTECHNOLOGY]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[MEDICAL]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[RESILIENCE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14789</guid>

					<description><![CDATA[A global team of experts has put together a list of the most urgent biosecurity threats, with bioengineering threats such as DNA-based surveillance among the top-ranked concerns.  The exercise was facilitated by the Centre for Existential Risk (CSER) and the BioRISC project, both based at the University of Cambridge. A group of 41 academics and ... <a title="Bioengineering threats rated as a top biosecurity risk" class="read-more" href="https://blog.eduguru.in/news/bioengineering-threats-rated-as-a-top-biosecurity-risk" aria-label="Read more about Bioengineering threats rated as a top biosecurity risk">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>AI can detect human emotions with wireless signals</title>
		<link>https://blog.eduguru.in/news/ai-can-detect-human-emotions-with-wireless-signals</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 13:50:02 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI can detect human emotions with wireless signals]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14787</guid>

					<description><![CDATA[An AI has been developed that can reportedly use wireless signals to reveal peoples’ inner emotions.  According to researchers from Queen Mary University of London, the use of radio waves to measure heartrate and breathing signals can be used to predict how someone is feeling even in the absence of any other visual cues, such ... <a title="AI can detect human emotions with wireless signals" class="read-more" href="https://blog.eduguru.in/news/ai-can-detect-human-emotions-with-wireless-signals" aria-label="Read more about AI can detect human emotions with wireless signals">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Microplastics could be eliminated from wastewater at source</title>
		<link>https://blog.eduguru.in/news/microplastics-could-be-eliminated-from-wastewater-at-source</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 13:47:17 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ENVIRONMENT]]></category>
		<category><![CDATA[Microplastics could be eliminated from wastewater at source]]></category>
		<category><![CDATA[PLASTICS POLLUTION]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[WATER SUPPLY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14785</guid>

					<description><![CDATA[A team of researchers from the Institut national de la recherche scientifique (INRS), Quebec, Canada, have developed an electrolytic process for treating wastewater, degrading microplastics at the source.  Microplastics are fragments of plastic less than 5mm long, often contained in toiletries or shedding from polyester clothing. They are present in virtually every corner of the ... <a title="Microplastics could be eliminated from wastewater at source" class="read-more" href="https://blog.eduguru.in/news/microplastics-could-be-eliminated-from-wastewater-at-source" aria-label="Read more about Microplastics could be eliminated from wastewater at source">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Marine plastic litter detected and quantified using deep-learning tool</title>
		<link>https://blog.eduguru.in/news/marine-plastic-litter-detected-and-quantified-using-deep-learning-tool</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 13:43:03 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[DEEP LEARNING]]></category>
		<category><![CDATA[DRONES]]></category>
		<category><![CDATA[MARINE]]></category>
		<category><![CDATA[MARINE ENVIRONMENT]]></category>
		<category><![CDATA[Marine plastic litter detected and quantified using deep-learning tool]]></category>
		<category><![CDATA[PLASTICS POLLUTION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14783</guid>

					<description><![CDATA[Researchers at the University of Barcelona have developed an open-access web app, based on deep learning techniques, which enables the detection and quantification of floating marine litter from aerial photography.  Floating marine plastic is a serious threat to the conservation of marine ecosystems. For instance, marine plastics can cause damage to marine animals through ingestion, suffocation, restraint ... <a title="Marine plastic litter detected and quantified using deep-learning tool" class="read-more" href="https://blog.eduguru.in/news/marine-plastic-litter-detected-and-quantified-using-deep-learning-tool" aria-label="Read more about Marine plastic litter detected and quantified using deep-learning tool">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What New in Asterisk 16</title>
		<link>https://blog.eduguru.in/asterisk/asterisk-asterisk/what-new-in-asterisk-16</link>
					<comments>https://blog.eduguru.in/asterisk/asterisk-asterisk/what-new-in-asterisk-16#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 03:29:27 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA['Macro' dialplan application has been deprecated]]></category>
		<category><![CDATA[app_queue in asterisk 16]]></category>
		<category><![CDATA[Conference Text Messaging and Events]]></category>
		<category><![CDATA[PJSIP Performance in asterisk 16]]></category>
		<category><![CDATA[WEBRTC in asterisk 16]]></category>
		<category><![CDATA[What New in Asterisk 16]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14778</guid>

					<description><![CDATA[What New in Asterisk 16 One of the major improvement in asterisk 16 from the earlier version is the WEBRTC, Text Messaging in Conference, Wrap up time in queue, Originate function and PJSIP Also there is one major changes regarding macro application being used in dialplan. Applications: The &#8216;Macro&#8217; dialplan application has been deprecated and is no ... <a title="What New in Asterisk 16" class="read-more" href="https://blog.eduguru.in/asterisk/asterisk-asterisk/what-new-in-asterisk-16" aria-label="Read more about What New in Asterisk 16">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/asterisk/asterisk-asterisk/what-new-in-asterisk-16/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to automate SSH login with password?</title>
		<link>https://blog.eduguru.in/linux-2/how-to-automate-ssh-login-with-password</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 02:34:25 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14776</guid>

					<description><![CDATA[How to automate SSH login with password? Method 1: Here is the steps to generate passphraseless SSH key Generate a passphraseless SSH key and push it to your other machine. If you already have an SSH key, you can skip this step… Just hit Enter for the key and both passphrases: $ ssh-keygen -t rsa -b 2048 Generating ... <a title="How to automate SSH login with password?" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-automate-ssh-login-with-password" aria-label="Read more about How to automate SSH login with password?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Riding high on MoRTH projects</title>
		<link>https://blog.eduguru.in/news/riding-high-on-morth-projects</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 04 Feb 2021 13:28:12 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[INFRASTRUCTURE]]></category>
		<category><![CDATA[Riding high on MoRTH projects]]></category>
		<category><![CDATA[URBAN INFRASTRUCTURE]]></category>
		<category><![CDATA[URBAN TRAFFIC MANAGEMENT]]></category>
		<category><![CDATA[URBAN TRANSPORT SYSTEMS]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14772</guid>

					<description><![CDATA[Infrastructure development, education and transport are among the highlights of the Union Budget 2021-22.  Union Finance Minister (FM) Nirmala Sitharaman had announced the National Infrastructure Pipeline in December 2019. This first-of-its-kind, whole-of-government exercise undertaken by Government of India was launched with 6,835 projects. The project pipeline has now expanded to 7,400 projects. Around 217 projects ... <a title="Riding high on MoRTH projects" class="read-more" href="https://blog.eduguru.in/news/riding-high-on-morth-projects" aria-label="Read more about Riding high on MoRTH projects">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Learn lessons from Huawei 5G row, MPs warn</title>
		<link>https://blog.eduguru.in/news/learn-lessons-from-huawei-5g-row-mps-warn</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 04 Feb 2021 13:24:54 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMPETITION]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[Learn lessons from Huawei 5G row]]></category>
		<category><![CDATA[MPs warn]]></category>
		<category><![CDATA[POLICY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14770</guid>

					<description><![CDATA[The House of Commons Science and Technology Committee has published a report advising the government to develop a new strategy for implementing new technologies, with consideration for security and competition.  Last year, the government performed a U-turn and blocked network operators from using Huawei equipment in any part of their 5G infrastructure. The government said ... <a title="Learn lessons from Huawei 5G row, MPs warn" class="read-more" href="https://blog.eduguru.in/news/learn-lessons-from-huawei-5g-row-mps-warn" aria-label="Read more about Learn lessons from Huawei 5G row, MPs warn">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install rally in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/install-rally-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 14:00:14 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[COMMANDS]]></category>
		<category><![CDATA[Install rally in Ubuntu]]></category>
		<category><![CDATA[Install tally]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LINUX COMMANDS]]></category>
		<category><![CDATA[rally tool]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14767</guid>

					<description><![CDATA[Install rally by entering the following commands in the terminal: sudo apt update sudo apt install rally]]></description>
		
		
		
			</item>
		<item>
		<title>install Brave Browser</title>
		<link>https://blog.eduguru.in/linux-2/install-brave-browser</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 13:40:03 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[brave browser]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[install Brave Browser]]></category>
		<category><![CDATA[installing brave browser]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[NEW BROWSER]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14765</guid>

					<description><![CDATA[sudo apt install apt-transport-https curl gnupg curl -s https://brave-browser-apt-release.s3.brave.com/brave-core.asc &#124; sudo apt-key --keyring /etc/apt/trusted.gpg.d/brave-browser-release.gpg add - echo "deb [arch=amd64] https://brave-browser-apt-release.s3.brave.com/ stable main" &#124; sudo tee /etc/apt/sources.list.d/brave-browser-release.list sudo apt update sudo apt install brave-browser]]></description>
		
		
		
			</item>
		<item>
		<title>6G demonstrated in lab tests with uncompressed 8K video stream</title>
		<link>https://blog.eduguru.in/news/6g-demonstrated-in-lab-tests-with-uncompressed-8k-video-stream</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 13:14:56 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[6G demonstrated in lab tests with uncompressed 8K video stream]]></category>
		<category><![CDATA[COMMUNICATION NETWORKS AND SERVICES]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[mobile networks]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14763</guid>

					<description><![CDATA[Researchers have made strides developing ‘6G’ wireless technologies by using 300GHz terahertz waves to transfer uncompressed, 8K ultra-high definition (UHD) video with a data rate of 48Gbit/s over the air.  The next-generation 6G mobile communication standard &#8211; which is beyond the present 5G system &#8211; is expected to transmit 8K and other UHD videos with ... <a title="6G demonstrated in lab tests with uncompressed 8K video stream" class="read-more" href="https://blog.eduguru.in/news/6g-demonstrated-in-lab-tests-with-uncompressed-8k-video-stream" aria-label="Read more about 6G demonstrated in lab tests with uncompressed 8K video stream">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Children exposed to air pollution suffer reduced thinking skills</title>
		<link>https://blog.eduguru.in/news/children-exposed-to-air-pollution-suffer-reduced-thinking-skills</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 13:12:27 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[air pollution]]></category>
		<category><![CDATA[CHILDREN]]></category>
		<category><![CDATA[Children exposed to air pollution suffer reduced thinking skills]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[MENTAL HEALTH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14761</guid>

					<description><![CDATA[Exposure to air pollution in childhood is linked to a decline in thinking skills in later life, Edinburgh University researchers have said.  A greater exposure to air pollution at the very start of life was associated with a detrimental effect on people’s cognitive skills up to 60 years later, the research found. The team tested ... <a title="Children exposed to air pollution suffer reduced thinking skills" class="read-more" href="https://blog.eduguru.in/news/children-exposed-to-air-pollution-suffer-reduced-thinking-skills" aria-label="Read more about Children exposed to air pollution suffer reduced thinking skills">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>OneWeb’s broadband satellites could be used to plug rural black hole</title>
		<link>https://blog.eduguru.in/news/onewebs-broadband-satellites-could-be-used-to-plug-rural-black-hole</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 13:09:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[OneWeb’s broadband satellites could be used to plug rural black hole]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14759</guid>

					<description><![CDATA[OneWeb is reportedly in talks with BT to use its satellite broadband technology to provide coverage to rural areas of the UK.  The firm, which was bought by the UK government after nearly going bankrupt last year, intends to launch a network of more than 650 low Earth orbit satellites that will be able to beam down ... <a title="OneWeb’s broadband satellites could be used to plug rural black hole" class="read-more" href="https://blog.eduguru.in/news/onewebs-broadband-satellites-could-be-used-to-plug-rural-black-hole" aria-label="Read more about OneWeb’s broadband satellites could be used to plug rural black hole">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Aero India’s Runway to a Billion Opportunities begins in Bangalore</title>
		<link>https://blog.eduguru.in/news/aero-indias-runway-to-a-billion-opportunities-begins-in-bangalore</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 13:06:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AERO INDIA]]></category>
		<category><![CDATA[AERO INDIA 2021]]></category>
		<category><![CDATA[Aero India’s Runway to a Billion Opportunities begins in Bangalore]]></category>
		<category><![CDATA[AEROSPACE]]></category>
		<category><![CDATA[AIRCRAFT]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14757</guid>

					<description><![CDATA[Aero India 2021, the country’s premier aerospace and defence exhibition, is poised for take off. The event, 3-5 February, is being held in the Yelahanka Air Base in Bangalore. Due to Covid restrictions, the show is a combination of physical and virtual displays and will be the world’s first hybrid aerospace show  Hailed as the ... <a title="Aero India’s Runway to a Billion Opportunities begins in Bangalore" class="read-more" href="https://blog.eduguru.in/news/aero-indias-runway-to-a-billion-opportunities-begins-in-bangalore" aria-label="Read more about Aero India’s Runway to a Billion Opportunities begins in Bangalore">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Future fuels change the balance of power</title>
		<link>https://blog.eduguru.in/news/future-fuels-change-the-balance-of-power</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 12:49:43 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Future fuels change the balance of power]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<category><![CDATA[SUSTAINABLE DEVELOPMENT]]></category>
		<category><![CDATA[SUSTAINABLE ENERGY]]></category>
		<category><![CDATA[VOLUME 16 ISSUE 1]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14755</guid>

					<description><![CDATA[Renewables may actually keep carbon fuels going for decades to come, but a new group of energy-rich countries will emerge.  The outlook for the oil sheikhs of the Middle East or the gas oligarchs of Russia looks increasingly bleak. The value of their underground resources looks poised to fall away permanently as they struggle to ... <a title="Future fuels change the balance of power" class="read-more" href="https://blog.eduguru.in/news/future-fuels-change-the-balance-of-power" aria-label="Read more about Future fuels change the balance of power">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Air pollution in biggest cities four times above safe levels</title>
		<link>https://blog.eduguru.in/news/air-pollution-in-biggest-cities-four-times-above-safe-levels</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 12:42:40 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[air pollution]]></category>
		<category><![CDATA[Air pollution in biggest cities four times above safe levels]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[ENVIRONMENT]]></category>
		<category><![CDATA[WORLD HEALTH ORGANISAITON]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14753</guid>

					<description><![CDATA[An investigation by OpenAQ has found that the average level of air pollution in the world’s largest cities is nearly four times higher than the maximum levels recommended by the WHO.  According to estimates, 90 per cent of the world experiences harmful levels of air pollution; the problem is particularly acute in cities in the ... <a title="Air pollution in biggest cities four times above safe levels" class="read-more" href="https://blog.eduguru.in/news/air-pollution-in-biggest-cities-four-times-above-safe-levels" aria-label="Read more about Air pollution in biggest cities four times above safe levels">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>North Sea oil-flaring practice found to output as much carbon as a coal plant</title>
		<link>https://blog.eduguru.in/news/north-sea-oil-flaring-practice-found-to-output-as-much-carbon-as-a-coal-plant</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 12:30:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[FOSSIL FUELS]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[North Sea oil-flaring practice found to output as much carbon as a coal plant]]></category>
		<category><![CDATA[OIL & GAS]]></category>
		<category><![CDATA[oli]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14751</guid>

					<description><![CDATA[North Sea oil and gas firms produce annual carbon emissions equivalent to a coal plant through flaring and venting activites, an investigation has revealed.  Unearthed, a journalistic investigation body funded by Greenpeace, obtained figures through Environmental Information Regulations requests which show that almost  20m tonnes of CO2 equivalent were released in the five years to ... <a title="North Sea oil-flaring practice found to output as much carbon as a coal plant" class="read-more" href="https://blog.eduguru.in/news/north-sea-oil-flaring-practice-found-to-output-as-much-carbon-as-a-coal-plant" aria-label="Read more about North Sea oil-flaring practice found to output as much carbon as a coal plant">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Responsibilities mounting for CISOs, says BT Security</title>
		<link>https://blog.eduguru.in/news/responsibilities-mounting-for-cisos-says-bt-security</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 12:25:28 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CYBERSECURITY]]></category>
		<category><![CDATA[REMOTE WORKING]]></category>
		<category><![CDATA[Responsibilities mounting for CISOs]]></category>
		<category><![CDATA[says BT Security]]></category>
		<category><![CDATA[SECURITY BUSINESS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14749</guid>

					<description><![CDATA[A report from BT Security has found the role of Chief Information Security Officer (CISO) has been expanding, taking on a far wider set of critical responsibilities, as cyber threats continue to grow.  In its largest ever research project, BT Security carried out a survey of over 7,000 business leaders, employees, and consumers from all ... <a title="Responsibilities mounting for CISOs, says BT Security" class="read-more" href="https://blog.eduguru.in/news/responsibilities-mounting-for-cisos-says-bt-security" aria-label="Read more about Responsibilities mounting for CISOs, says BT Security">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Working towards a Digital Budget</title>
		<link>https://blog.eduguru.in/news/working-towards-a-digital-budget</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 11:58:52 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[FINANCE]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<category><![CDATA[Working towards a Digital Budget]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14747</guid>

					<description><![CDATA[Finance Minister Nirmala Sitharaman has presented the Union Budget 2021-22 in Parliament on 1 February. Here are some highlights.  Sitharaman described this as a digital Budget. There has been a manifold increase in digital payments in the recent past. To give a further boost to digital transactions, a sum of Rs 1,500 crore (15bn rupees, ... <a title="Working towards a Digital Budget" class="read-more" href="https://blog.eduguru.in/news/working-towards-a-digital-budget" aria-label="Read more about Working towards a Digital Budget">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Whenever I switch on Ubuntu I always see the following message.</title>
		<link>https://blog.eduguru.in/linux-2/whenever-i-switch-on-ubuntu-i-always-see-the-following-message</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:46:41 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[fsck manually]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[unexpected inconsistency]]></category>
		<category><![CDATA[UNEXPECTED INCONSISTENCY; RUN fsck MANUALLY]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Whenever I switch on Ubuntu I always see the following message.]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14744</guid>

					<description><![CDATA[Whenever I switch on Ubuntu I always see the following message. (Initramfs): /dev/sda1 contains a file system with errors, check forced. Inodes that were a part of a corrupted orphan linked lost found. /dev/sda1 : UNEXPECTED INCONSISTENCY; RUN fsck manually.(I.e ., without -a or -p options). fsck exited with status code 4. The root filesystem ... <a title="Whenever I switch on Ubuntu I always see the following message." class="read-more" href="https://blog.eduguru.in/linux-2/whenever-i-switch-on-ubuntu-i-always-see-the-following-message" aria-label="Read more about Whenever I switch on Ubuntu I always see the following message.">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Amazon offers distribution services for Biden’s vaccination programme</title>
		<link>https://blog.eduguru.in/news/amazon-offers-distribution-services-for-bidens-vaccination-programme</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:36:57 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Amazon offers distribution services for Biden’s vaccination programme]]></category>
		<category><![CDATA[Distribution services]]></category>
		<category><![CDATA[JOE BIDEN]]></category>
		<category><![CDATA[US]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14742</guid>

					<description><![CDATA[Amazon has sent a letter to US President Joe Biden offering to help roll out the Covid-19 vaccine to US citizens as he vows to inoculate 100 million people in his first 100 days in office.  Dave Clark, chief executive of the online retailer’s consumer business, said Amazon had signed an agreement with a healthcare ... <a title="Amazon offers distribution services for Biden’s vaccination programme" class="read-more" href="https://blog.eduguru.in/news/amazon-offers-distribution-services-for-bidens-vaccination-programme" aria-label="Read more about Amazon offers distribution services for Biden’s vaccination programme">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Google could block its search engine in Australia if it’s forced to pay news outlets</title>
		<link>https://blog.eduguru.in/news/google-could-block-its-search-engine-in-australia-if-its-forced-to-pay-news-outlets</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:28:40 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[Google could block its search engine in Australia if it’s forced to pay news outlets]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14740</guid>

					<description><![CDATA[Google has threatened to discontinue its search engine services in Australia over the government’s plans to force the search giant to pay news outlets for their content.  Last year, Australia announced the plans as a way to halt the decline of news firms amid falling revenues during the coronavirus pandemic. But Google hit back, saying it was “deeply ... <a title="Google could block its search engine in Australia if it’s forced to pay news outlets" class="read-more" href="https://blog.eduguru.in/news/google-could-block-its-search-engine-in-australia-if-its-forced-to-pay-news-outlets" aria-label="Read more about Google could block its search engine in Australia if it’s forced to pay news outlets">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Pets may need their own Covid vaccine, scientists suggest</title>
		<link>https://blog.eduguru.in/news/pets-may-need-their-own-covid-vaccine-scientists-suggest</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:25:03 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ANIMALS NATURE]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[MEDICAL]]></category>
		<category><![CDATA[MEDICINE]]></category>
		<category><![CDATA[Pets may need their own Covid vaccine]]></category>
		<category><![CDATA[scientists suggest]]></category>
		<category><![CDATA[WORLD HEALTH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14738</guid>

					<description><![CDATA[It could prove necessary to vaccinate domestic animals such as cats and dogs against Covid-19 to curb the spread of the virus, scientists have suggested.  It has been proven that coronavirus can infect a wide range of species, including cats, dogs, mink and other domesticated animals. Experts from the University of East Anglia (UEA); the ... <a title="Pets may need their own Covid vaccine, scientists suggest" class="read-more" href="https://blog.eduguru.in/news/pets-may-need-their-own-covid-vaccine-scientists-suggest" aria-label="Read more about Pets may need their own Covid vaccine, scientists suggest">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘Loyal wingman’ autonomous combat aircraft to be produced in Belfast</title>
		<link>https://blog.eduguru.in/news/loyal-wingman-autonomous-combat-aircraft-to-be-produced-in-belfast</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:22:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘Loyal wingman’ autonomous combat aircraft to be produced in Belfast]]></category>
		<category><![CDATA[AIRCRAFT]]></category>
		<category><![CDATA[AUTONOMOUS VEHICLES]]></category>
		<category><![CDATA[DEFENCE]]></category>
		<category><![CDATA[DESIGN AND PRODUCTION]]></category>
		<category><![CDATA[MANUFACTURING]]></category>
		<category><![CDATA[MILITARY]]></category>
		<category><![CDATA[UNMANNED AIRCRAFT SYSTEMS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14736</guid>

					<description><![CDATA[The UK government has invested £30m in the design and manufacture of a new unpiloted combat aircraft, which will be known as the ‘loyal wingman’.  The new aircraft will be designed to fly at high speed alongside Typhoon, F-35 Lightning and eventually Tempest planes. It will be equipped with missiles and unspecified surveillance and electronic ... <a title="‘Loyal wingman’ autonomous combat aircraft to be produced in Belfast" class="read-more" href="https://blog.eduguru.in/news/loyal-wingman-autonomous-combat-aircraft-to-be-produced-in-belfast" aria-label="Read more about ‘Loyal wingman’ autonomous combat aircraft to be produced in Belfast">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Bias study hopes to inspire development of fairer facial recognition technology</title>
		<link>https://blog.eduguru.in/news/bias-study-hopes-to-inspire-development-of-fairer-facial-recognition-technology</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:18:44 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Bias study hopes to inspire development of fairer facial recognition technology]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[Machine learning]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14734</guid>

					<description><![CDATA[A study looking into the accuracy and bias of gender and skin colour in automatic face recognition algorithms tested with real-world data has found that some demographics show higher false positive or false negative rates.  Facial recognition has been routinely used by both private and governmental organisations worldwide. Automatic face recognition can be used for ... <a title="Bias study hopes to inspire development of fairer facial recognition technology" class="read-more" href="https://blog.eduguru.in/news/bias-study-hopes-to-inspire-development-of-fairer-facial-recognition-technology" aria-label="Read more about Bias study hopes to inspire development of fairer facial recognition technology">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Google presses ahead with ‘walled garden’ to replace third-party cookies in Chrome</title>
		<link>https://blog.eduguru.in/news/google-presses-ahead-with-walled-garden-to-replace-third-party-cookies-in-chrome</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:15:32 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[Google presses ahead with ‘walled garden’ to replace third-party cookies in Chrome]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14732</guid>

					<description><![CDATA[Google is pressing ahead with plans to ditch third-party cookies in its Chrome web browser in favour of its own “privacy sandbox”, despite the launch of an investigation by the Competition and Markets Authority (CMA) over whether the practice is anti-competitive.  Third-party cookies are created by entities other than the website that the user is ... <a title="Google presses ahead with ‘walled garden’ to replace third-party cookies in Chrome" class="read-more" href="https://blog.eduguru.in/news/google-presses-ahead-with-walled-garden-to-replace-third-party-cookies-in-chrome" aria-label="Read more about Google presses ahead with ‘walled garden’ to replace third-party cookies in Chrome">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>US has ‘moral imperative’ to pursue AI weapons, panel says</title>
		<link>https://blog.eduguru.in/news/us-has-moral-imperative-to-pursue-ai-weapons-panel-says</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 11:12:31 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[DEFENCE]]></category>
		<category><![CDATA[ETHICS]]></category>
		<category><![CDATA[panel says]]></category>
		<category><![CDATA[ROBOTICS]]></category>
		<category><![CDATA[US has ‘moral imperative’ to pursue AI weapons]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14730</guid>

					<description><![CDATA[A US government-appointed panel has concluded that the nation should not agree to an outright ban on the development of use of autonomous weapons, following a public discussion on the issue.  The National Security Commission on Artificial Intelligence, which is led by former Google CEO Eric Schmidt, held a two-day public discussion on how the ... <a title="US has ‘moral imperative’ to pursue AI weapons, panel says" class="read-more" href="https://blog.eduguru.in/news/us-has-moral-imperative-to-pursue-ai-weapons-panel-says" aria-label="Read more about US has ‘moral imperative’ to pursue AI weapons, panel says">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>A political revolution</title>
		<link>https://blog.eduguru.in/tutorial/a-political-revolution</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 15:01:51 +0000</pubDate>
				<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[A political revolution]]></category>
		<category><![CDATA[INTERNET OF THINGS]]></category>
		<category><![CDATA[IOT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14725</guid>

					<description><![CDATA[The primary claim to data gathering, determining what data is in the first place, what the status of information is, and how knowledge is to be made operational, is no longer wed to universities and academic institutions. Neither is its output: essay, report, document &#8211; the sole format through which broadly shared notions on what ... <a title="A political revolution" class="read-more" href="https://blog.eduguru.in/tutorial/a-political-revolution" aria-label="Read more about A political revolution">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>A mental revolution</title>
		<link>https://blog.eduguru.in/tutorial/a-mental-revolution</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 14:59:41 +0000</pubDate>
				<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[A mental revolution]]></category>
		<category><![CDATA[INTERNET OF THINGS]]></category>
		<category><![CDATA[IOT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14723</guid>

					<description><![CDATA[Artists have always exploited the conditions for technological change, applications and services, from the pencil onwards. In the move towards ubiquitous computing &#8211; from the Internet to the &#8216;Internet of Things&#8217; &#8211; the poetic process of making meaning and creating experiences is no longer only productive at the level of design, but it lies at ... <a title="A mental revolution" class="read-more" href="https://blog.eduguru.in/tutorial/a-mental-revolution" aria-label="Read more about A mental revolution">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>A global revolution</title>
		<link>https://blog.eduguru.in/tutorial/a-global-revolution</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 04:09:11 +0000</pubDate>
				<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[A global revolution]]></category>
		<category><![CDATA[INTERNET OF THINGS]]></category>
		<category><![CDATA[IOT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14721</guid>

					<description><![CDATA[In Carl Schmitt’s political philosophy he makes a distinction between the real enemy and the absolute enemy. This latter enemy is the one that negates your own position, questions your very existence. The real enemy denotes our possibility to act, we can react to challenges and threats. The absolute enemy appears on thresholds to new ... <a title="A global revolution" class="read-more" href="https://blog.eduguru.in/tutorial/a-global-revolution" aria-label="Read more about A global revolution">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>IoT research and technological development in Europe</title>
		<link>https://blog.eduguru.in/tutorial/iot-research-and-technological-development-in-europe</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 03:51:59 +0000</pubDate>
				<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[INTERNET OF THINGS]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[IoT research and technological development in Europe]]></category>
		<category><![CDATA[IT-SECTOR]]></category>
		<category><![CDATA[revolution]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14719</guid>

					<description><![CDATA[The debate about Internet of Things in Europe rose at a time when the structure of the 7th Research Framework Programme (FP7) was already established. It is obvious that the holistic approach adopted by the &#8220;Networked Enterprise and Radio Frequency Identification (RFID)&#8221; unit (DG INFSO/D4) in its initiatives, especially the Communication of June 2009 and ... <a title="IoT research and technological development in Europe" class="read-more" href="https://blog.eduguru.in/tutorial/iot-research-and-technological-development-in-europe" aria-label="Read more about IoT research and technological development in Europe">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Development of the Internet of Things</title>
		<link>https://blog.eduguru.in/tutorial/development-of-the-internet-of-things-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 03:35:57 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Development of the Internet of Things]]></category>
		<category><![CDATA[INTERNET OF THINGS]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[World Wide Web]]></category>
		<category><![CDATA[www]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14717</guid>

					<description><![CDATA[Today, there are roughly 1.5 billion Internet-enabled PCs and over 1 billion Internet-enabled cell phones. The present &#8220;Internet of PCs&#8221; will move towards an &#8220;Internet of Things&#8221; in which 50 to 100 billion devices will be connected to the Internet by 2020. Some projections indicate that in the same year, the number of mobile machine ... <a title="Development of the Internet of Things" class="read-more" href="https://blog.eduguru.in/tutorial/development-of-the-internet-of-things-2" aria-label="Read more about Development of the Internet of Things">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>strftime Asterisk func</title>
		<link>https://blog.eduguru.in/asterisk/strftime-asterisk-func</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 26 Jan 2021 11:38:16 +0000</pubDate>
				<category><![CDATA[Asterisk]]></category>
		<category><![CDATA[strftime Asterisk func]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14715</guid>

					<description><![CDATA[strftime Asterisk func STRFTIME Formats the datetime Synopsis STRFTIME([&#60;epoch&#62;][,[&#60;timezone&#62;][,&#60;format&#62;]]) Description Formats the time specified by &#60;epoch&#62;, localized to &#60;timezone&#62;. The format comes directly from the underlying C function strftime(3). If &#60;epoch&#62; is not specified, defaults to the current time. &#60;timezone&#62; likewise defaults to the timezone on the host computer. A list of possible timezones may be obtained from the directory listing ... <a title="strftime Asterisk func" class="read-more" href="https://blog.eduguru.in/asterisk/strftime-asterisk-func" aria-label="Read more about strftime Asterisk func">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>explode() Function in PHP</title>
		<link>https://blog.eduguru.in/php/explode-function-in-php</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Tue, 26 Jan 2021 11:07:10 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[explode() Function]]></category>
		<category><![CDATA[explode() Function in PHP]]></category>
		<category><![CDATA[php function]]></category>
		<category><![CDATA[Wiki Markup and PHP Array Browse and edit table-data using a comfortable grid Bulk edit tables (move to db]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14712</guid>

					<description><![CDATA[explode() Function in PHP explode() is a built in function in PHP used to split a string in different strings. The explode() function splits a string based on a string delimeter, i.e. it splits the string wherever the delimeter character occurs. This functions returns an array containing the strings formed by splitting the original string. ... <a title="explode() Function in PHP" class="read-more" href="https://blog.eduguru.in/php/explode-function-in-php" aria-label="Read more about explode() Function in PHP">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Stress Testing Metrics</title>
		<link>https://blog.eduguru.in/uncategorized/stress-testing-metrics</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 15:13:56 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[stress testing]]></category>
		<category><![CDATA[Stress Testing Metrics]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14709</guid>

					<description><![CDATA[Metrics are basically key performance indicators. Most commonly used metrics are mentioned below: 1. Average transaction response time It is the Average time taken to perform transactions during each second of the scenario run. 2. Total transactions per second The total number of transactions that passed, the total number of transactions that failed and the ... <a title="Stress Testing Metrics" class="read-more" href="https://blog.eduguru.in/uncategorized/stress-testing-metrics" aria-label="Read more about Stress Testing Metrics">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Stress testing tools</title>
		<link>https://blog.eduguru.in/tutorial/stress-testing-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 15:10:11 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[stress testing]]></category>
		<category><![CDATA[Stress testing tools]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14707</guid>

					<description><![CDATA[Normally all the performance testing tools that are used for load testing could also be used for stress testing. Below mentioned are the ones that are most commonly used: 1. Loadrunner Loadrunner from HP is the widely used tool to perform stress testing and the results provided by Loadrunner are considered as a benchmark. 2. ... <a title="Stress testing tools" class="read-more" href="https://blog.eduguru.in/tutorial/stress-testing-tools" aria-label="Read more about Stress testing tools">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Types of Stress Testing Techniques</title>
		<link>https://blog.eduguru.in/tutorial/types-of-stress-testing-techniques</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 15:08:23 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[stress testing]]></category>
		<category><![CDATA[Techniques]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing techniques]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<category><![CDATA[Types of Stress Testing Techniques]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14705</guid>

					<description><![CDATA[1. Distributed Stress Testing In distributed stress testing, all the clients linked with the server are tested. Distribution of a group of stress tests to each one of the clients and follow up on their status, is the server’s role and responsibility. 2. Transactional Stress Testing As the name suggests, Transactional Stress Testing is used ... <a title="Types of Stress Testing Techniques" class="read-more" href="https://blog.eduguru.in/tutorial/types-of-stress-testing-techniques" aria-label="Read more about Types of Stress Testing Techniques">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Importance of Stress Testing</title>
		<link>https://blog.eduguru.in/tutorial/importance-of-stress-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 15:00:21 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Importance of Stress Testing]]></category>
		<category><![CDATA[Importance of testing Stress testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14703</guid>

					<description><![CDATA[Stress testing tries to break the system under test by overwhelming its resources. The main purpose of stress testing: Make sure that the system fails and recovers easily, this quality is also known as recoverability. Stress Testing Example Let us assume that the performance testing team has been asked to stress test an ecommerce application that sells Camping Gears. In ... <a title="Importance of Stress Testing" class="read-more" href="https://blog.eduguru.in/tutorial/importance-of-stress-testing" aria-label="Read more about Importance of Stress Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Stress testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/stress-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:56:52 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Stress testing in software testing]]></category>
		<category><![CDATA[stress testing testing tools]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14701</guid>

					<description><![CDATA[There are many types of performance testing techniques, one of them is stress testing. It refers to the testing of the software in determining whether its performance is satisfactory under extreme load conditions or not. Most systems are developed for normal operating conditions, therefore if operating conditions become abnormal (for example: if load of simultaneous users visiting the website goes beyond the ... <a title="Stress testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/stress-testing-in-software-testing" aria-label="Read more about Stress testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Volume testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/volume-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:51:43 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing tools]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing types]]></category>
		<category><![CDATA[volume testing]]></category>
		<category><![CDATA[Volume testing in software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14699</guid>

					<description><![CDATA[It is a type of non-functional testing. Volume testing refers to testing a software application or the product with a certain amount of data. E.g., if we want to volume test our application with a specific database size, we need to expand our database to that size and then test the application’s performance on it. ... <a title="Volume testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/volume-testing-in-software-testing" aria-label="Read more about Volume testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Scalability testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/scalability-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:47:06 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[scalability testing]]></category>
		<category><![CDATA[Scalability testing in software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14697</guid>

					<description><![CDATA[It is a type of non-functional testing. Testing the ability of a system, a network, or a process to continue to function well when it is changed in size or volume in order to meet a growing need. It is the testing of a software application for measuring its capability to scale up in terms ... <a title="Scalability testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/scalability-testing-in-software-testing" aria-label="Read more about Scalability testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Security testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/security-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:43:57 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Security testing]]></category>
		<category><![CDATA[Security testing in software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14695</guid>

					<description><![CDATA[It is a type of non-functional testing. Security testing is basically a type of software testing that’s done to check whether the application or the product is secured or not. It checks to see if the application is vulnerable to attacks, if anyone hack the system or login to the application without any authorization. It is a ... <a title="Security testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/security-testing-in-software-testing" aria-label="Read more about Security testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Compatibility testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/compatibility-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:38:50 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[compatibility testing]]></category>
		<category><![CDATA[Compatibility testing in software testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14693</guid>

					<description><![CDATA[It is a type of non-functional testing. Compatibility testing is a type of software testing used to ensure compatibility of the system/application/website built with various other objects such as other web browsers, hardware platforms, users (in case if it’s very specific type of requirement, such as a user who speaks and can read only a particular language), ... <a title="Compatibility testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/compatibility-testing-in-software-testing" aria-label="Read more about Compatibility testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Performance testing in software testing</title>
		<link>https://blog.eduguru.in/uncategorized/performance-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:35:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Performance testing]]></category>
		<category><![CDATA[Performance testing in software testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14691</guid>

					<description><![CDATA[It is  a type of non-functional testing. Performance testing is testing that is performed, to determine how fast some aspect of a system performs under a particular workload. It can serve different purposes like it can demonstrate that the system meets performance criteria. It can compare two systems to find which performs better. Or it ... <a title="Performance testing in software testing" class="read-more" href="https://blog.eduguru.in/uncategorized/performance-testing-in-software-testing" aria-label="Read more about Performance testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Load testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/load-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:24:59 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Load testing]]></category>
		<category><![CDATA[Load testing in software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14689</guid>

					<description><![CDATA[Load testing is a type of non-functional testing. A load test is type of software testing which is conducted to understand the behavior of the application under a specific expected load. Load testing is performed to determine a system’s behavior under both normal and at peak conditions. Load testing one among the different kinds of performance testing that determines the ... <a title="Load testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/load-testing-in-software-testing" aria-label="Read more about Load testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Endurance testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/endurance-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:21:00 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Endurance testing]]></category>
		<category><![CDATA[Endurance testing in software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14687</guid>

					<description><![CDATA[Endurance testing is a non functional type of software testing. It is a type of non-functional testing. It is also known as Soak testing. Endurance testing involves testing a system with a significant load extended over a significant period of time, to discover how the system behaves under sustained use. For example, in software testing, a ... <a title="Endurance testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/endurance-testing-in-software-testing" aria-label="Read more about Endurance testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>documentation testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/documentation-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:17:10 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Documentation testing]]></category>
		<category><![CDATA[documentation testing in software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14685</guid>

					<description><![CDATA[Documentation testing is a non-functional type of software testing. It is a type of non-functional testing. Any written or pictorial information describing, defining, specifying, reporting, or certifying activities, requirements, procedures, or results’. Documentation is as important to a product’s success as the product itself. If the documentation is poor, non-existent, or wrong, it reflects on the quality ... <a title="documentation testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/documentation-testing-in-software-testing" aria-label="Read more about documentation testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Compliance testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/compliance-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:14:16 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Compliance testing]]></category>
		<category><![CDATA[Compliance testing in software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14683</guid>

					<description><![CDATA[It is a type of non-functional software testing. It is related with the IT standards followed by the company and it is the testing done to find the deviations from the company prescribed standards. It determines,whether we are implementing and meeting the defined standards. We should take care while doing this testing,Is there any drawbacks in ... <a title="Compliance testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/compliance-testing-in-software-testing" aria-label="Read more about Compliance testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Baseline testing in software</title>
		<link>https://blog.eduguru.in/tutorial/baseline-testing-in-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:11:59 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Baseline testing]]></category>
		<category><![CDATA[Baseline testing in software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14681</guid>

					<description><![CDATA[It is one of the type of non-functional testing. It refers to the validation of documents and specifications on which test cases would be designed. The requirement specification validation is baseline testing. Generally a baseline is defined as a line that forms the base for any construction or for measurement, comparisons or calculations. Baseline testing also ... <a title="Baseline testing in software" class="read-more" href="https://blog.eduguru.in/tutorial/baseline-testing-in-software" aria-label="Read more about Baseline testing in software">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Portability testing in software</title>
		<link>https://blog.eduguru.in/tutorial/portability-testing-in-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:09:02 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Portability testing]]></category>
		<category><![CDATA[Portability testing in software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[testing types]]></category>
		<category><![CDATA[types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14678</guid>

					<description><![CDATA[It refers to the process of testing the ease with which a computer software component or application can be moved from one environment to another, e.g. moving of any application from Windows 2000 to Windows 10. This is usually measured in terms of the maximum amount of effort permitted. Results are measured in terms of ... <a title="Portability testing in software" class="read-more" href="https://blog.eduguru.in/tutorial/portability-testing-in-software" aria-label="Read more about Portability testing in software">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Maintainability testing in software</title>
		<link>https://blog.eduguru.in/tutorial/maintainability-testing-in-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:04:24 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[maintainability testing]]></category>
		<category><![CDATA[Maintainability testing in software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing types]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14676</guid>

					<description><![CDATA[It basically defines that how easy it is to maintain the system. This means that how easy it is to analyze, change and test the application or product. Maintainability testing shall use a model of the maintainability requirements of the software/system. The maintainability testing shall be specified in terms of the effort required to effect ... <a title="Maintainability testing in software" class="read-more" href="https://blog.eduguru.in/tutorial/maintainability-testing-in-software" aria-label="Read more about Maintainability testing in software">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Efficiency testing in software</title>
		<link>https://blog.eduguru.in/tutorial/efficiency-testing-in-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 14:00:37 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Efficiency]]></category>
		<category><![CDATA[Efficiency testing]]></category>
		<category><![CDATA[Efficiency testing in software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14674</guid>

					<description><![CDATA[Efficiency testing test the amount of code and testing resources required by a program to perform a particular function. Software Test Efficiency is number of test cases executed divided by unit of time (generally per hour). It is internal in the organization how much resources were consumed how much of these resources were utilized. Here ... <a title="Efficiency testing in software" class="read-more" href="https://blog.eduguru.in/tutorial/efficiency-testing-in-software" aria-label="Read more about Efficiency testing in software">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of usability testing</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-usability-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:56:07 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[advantages of testing]]></category>
		<category><![CDATA[Advantages of usability testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Usability testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14672</guid>

					<description><![CDATA[Usability test can be modified to cover many other types of testing such as functional testing, system integration testing, unit testing, smoke testing etc. Usability testing can be very economical if planned properly, yet highly effective and beneficial. If proper resources (experienced and creative testers) are used, usability test can help in fixing all the problems that user may face ... <a title="Advantages of usability testing" class="read-more" href="https://blog.eduguru.in/tutorial/advantages-of-usability-testing" aria-label="Read more about Advantages of usability testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Benefits of usability testing</title>
		<link>https://blog.eduguru.in/tutorial/benefits-of-usability-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:53:50 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Benefits of usability testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Usability testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14670</guid>

					<description><![CDATA[Benefits of usability testing to the end user or the customer: — Better quality software — Software is easier to use — Software is more readily accepted by users — Shortens the learning curve for new users &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Usability testing in software testing</title>
		<link>https://blog.eduguru.in/tutorial/usability-testing-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:52:10 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Usability testing]]></category>
		<category><![CDATA[Usability testing in software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14668</guid>

					<description><![CDATA[In usability testing basically the testers tests the ease with which the user interfaces can be used. It tests that whether the application or the product built is user-friendly or not. Usability Testing is a black box testing technique. Usability testing also reveals whether users feel comfortable with your application or Web site according to different parameters – the flow, ... <a title="Usability testing in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/usability-testing-in-software-testing" aria-label="Read more about Usability testing in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Reliability testing in software</title>
		<link>https://blog.eduguru.in/tutorial/reliability-testing-in-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:48:21 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[reliability testing]]></category>
		<category><![CDATA[Reliability testing in software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14666</guid>

					<description><![CDATA[Reliability Testing is about exercising an application so that failures are discovered and removed before the system is deployed. The purpose of reliability testing is to determine product reliability, and to determine whether the software meets the customer’s reliability requirements. According to ANSI, Software Reliability is defined as: the probability of failure-free software operation for a specified period ... <a title="Reliability testing in software" class="read-more" href="https://blog.eduguru.in/tutorial/reliability-testing-in-software" aria-label="Read more about Reliability testing in software">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>functionality testing in software</title>
		<link>https://blog.eduguru.in/tutorial/functionality-testing-in-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:44:25 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[functionality testing]]></category>
		<category><![CDATA[functionality testing in software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14664</guid>

					<description><![CDATA[Functionality testing is performed to verify that a software application performs and functions correctly according to design specifications. During functionality testing we check the core application functions, text input, menu functions and installation and setup on localized machines, etc.  The following is needed to be checked during the functionality testing: Installation and setup on localized machines ... <a title="functionality testing in software" class="read-more" href="https://blog.eduguru.in/tutorial/functionality-testing-in-software" aria-label="Read more about functionality testing in software">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Test Types</title>
		<link>https://blog.eduguru.in/tutorial/software-test-types-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:42:06 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software Test Types]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14662</guid>

					<description><![CDATA[Software Test types are introduced as a means of clearly defining the objective of a certain level for a program or project.  A test type is focused on a particular test objective, which could be the testing of the function to be performed by the component or system. The test objective could be to test non-functional quality characteristics, such ... <a title="Software Test Types" class="read-more" href="https://blog.eduguru.in/tutorial/software-test-types-2" aria-label="Read more about Software Test Types">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>System testing</title>
		<link>https://blog.eduguru.in/tutorial/system-testing-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:38:50 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[System testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14660</guid>

					<description><![CDATA[In system testing the behavior of whole system/product is tested as defined by the scope of the development project or product. It may include tests based on risks and/or requirement specifications, business process, use cases, or other high level descriptions of system behavior, interactions with the operating systems, and system resources. System testing is most often the final test to ... <a title="System testing" class="read-more" href="https://blog.eduguru.in/tutorial/system-testing-2" aria-label="Read more about System testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>System integration testing</title>
		<link>https://blog.eduguru.in/tutorial/system-integration-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:36:21 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[System integration testing]]></category>
		<category><![CDATA[System intergation]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14658</guid>

					<description><![CDATA[System integration testing (SIT) tests the interactions between different systems and may be done after system testing. It verifies the proper execution of software components and proper interfacing between components within the solution. The objective of SIT Testing is to validate that all software module dependencies are functionally correct and that data integrity is maintained between separate modules ... <a title="System integration testing" class="read-more" href="https://blog.eduguru.in/tutorial/system-integration-testing" aria-label="Read more about System integration testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What are the Software Development Models</title>
		<link>https://blog.eduguru.in/tutorial/what-are-the-software-development-models</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:33:14 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software Development Models]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[What are the Software Development Models]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14656</guid>

					<description><![CDATA[The software development models are the various processes or methodologies that are being selected for the development of the project depending on the project’s aims and goals. There are many development life cycle models that have been developed in order to achieve different required objectives. The models specify the various stages of the process and the order ... <a title="What are the Software Development Models" class="read-more" href="https://blog.eduguru.in/tutorial/what-are-the-software-development-models" aria-label="Read more about What are the Software Development Models">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is Modelling tools in software testing</title>
		<link>https://blog.eduguru.in/tutorial/what-is-modelling-tools-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:28:34 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Modelling tools]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software modelling tools]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[What is Modelling tools in software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14654</guid>

					<description><![CDATA[Modelling tools are basically ‘model-based testing tools’ which actually generates test inputs or test cases from stored information about a particular model, so are classified as test design tools. It helps to validate models of the system or software. For an example a tool can check consistency of data objects in a database and can find ... <a title="What is Modelling tools in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/what-is-modelling-tools-in-software-testing" aria-label="Read more about What is Modelling tools in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Static analysis tools in software testing</title>
		<link>https://blog.eduguru.in/tutorial/static-analysis-tools-in-software-testing-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:24:59 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[analysis tools]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing tools]]></category>
		<category><![CDATA[Static analysis tools]]></category>
		<category><![CDATA[Static analysis tools in software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14652</guid>

					<description><![CDATA[Static analysis tools are generally used by developers as part of the development and component testing process. The key aspect is that the code (or other artefact) is not executed or run but the tool itself is executed, and the source code we are interested in is the input data to the tool. These tools are mostly ... <a title="Static analysis tools in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/static-analysis-tools-in-software-testing-2" aria-label="Read more about Static analysis tools in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Review process support tools</title>
		<link>https://blog.eduguru.in/tutorial/review-process-support-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 13:20:27 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[new software]]></category>
		<category><![CDATA[Review Process]]></category>
		<category><![CDATA[Review process support tools]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software test]]></category>
		<category><![CDATA[supports tools]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14650</guid>

					<description><![CDATA[It is possible to keep track of all the information for a review process using spreadsheets and text documents, but a review tool which is designed for the purpose is more likely to do a better job. For example, one thing that should be monitored for each review is the checking rate (number of pages checked per ... <a title="Review process support tools" class="read-more" href="https://blog.eduguru.in/tutorial/review-process-support-tools" aria-label="Read more about Review process support tools">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>software testing is necessary</title>
		<link>https://blog.eduguru.in/tutorial/software-testing-is-necessary</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 19 Jan 2021 11:08:55 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing is necessary]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14647</guid>

					<description><![CDATA[Software Testing is necessary because we all make mistakes. Some of those mistakes are unimportant, but some of them are expensive or dangerous. We need to check everything and anything we produce because things can always go wrong – humans make mistakes all the time. Since we assume that our work may have mistakes, hence we all ... <a title="software testing is necessary" class="read-more" href="https://blog.eduguru.in/tutorial/software-testing-is-necessary" aria-label="Read more about software testing is necessary">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>WHAT IS SOFTWARE?</title>
		<link>https://blog.eduguru.in/tutorial/what-is-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 19 Jan 2021 11:02:05 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Applications]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[WHAT IS SOFTWARE?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14645</guid>

					<description><![CDATA[Software is a set of instructions, data or programs used to operate computers and execute specific tasks. Opposite of hardware, which describes the physical aspects of a computer, software is a generic term used to refer to applications, scripts and programs that run on a device. Software can be thought of as the variable part of a computer, ... <a title="WHAT IS SOFTWARE?" class="read-more" href="https://blog.eduguru.in/tutorial/what-is-software" aria-label="Read more about WHAT IS SOFTWARE?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>cost of defects in software testing</title>
		<link>https://blog.eduguru.in/tutorial/cost-of-defects-in-software-testing-3</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 18 Jan 2021 15:02:58 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[cost of defects]]></category>
		<category><![CDATA[cost of defects in software testing?]]></category>
		<category><![CDATA[defects]]></category>
		<category><![CDATA[defects list]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14643</guid>

					<description><![CDATA[The cost of defects can be measured by the impact of the defects and when we find them. Earlier the defect is found lesser is the cost of defect. For example if error is found in the requirement specifications during requirements gathering and analysis, then it is somewhat cheap to fix it. The correction to the requirement specification ... <a title="cost of defects in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/cost-of-defects-in-software-testing-3" aria-label="Read more about cost of defects in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Causes of Software Defects</title>
		<link>https://blog.eduguru.in/tutorial/causes-of-software-defects</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:43:53 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Causes of Software Defects]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software defects]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14641</guid>

					<description><![CDATA[Mistakes or errors are made by software developers during production and cause defects in the software. These defects lead to software failure. The software has chances of errors as they are manually designed. The errors produce defects or bugs in the software. These defects can be introduced during the coding phase of the software and ... <a title="Causes of Software Defects" class="read-more" href="https://blog.eduguru.in/tutorial/causes-of-software-defects" aria-label="Read more about Causes of Software Defects">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Write Test Scenarios</title>
		<link>https://blog.eduguru.in/tutorial/how-to-write-test-scenarios</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:41:01 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[How to Write Test Scenarios]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test cases]]></category>
		<category><![CDATA[test Scenarios]]></category>
		<category><![CDATA[write test scenarios]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14639</guid>

					<description><![CDATA[As a tester, you can follow these five steps to create Test Scenarios- Step 1: Read the Requirement Documents like BRS, SRS, FRS, of the System Under Test (SUT).  You could also refer uses cases, books, manuals, etc. of the application to be tested. Step 2: For each requirement, figure out possible users actions and ... <a title="How to Write Test Scenarios" class="read-more" href="https://blog.eduguru.in/tutorial/how-to-write-test-scenarios" aria-label="Read more about How to Write Test Scenarios">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why create Test Scenarios</title>
		<link>https://blog.eduguru.in/tutorial/why-create-test-scenarios</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:36:01 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[create test scenarios]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test Scenarios]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Why create Test Scenarios]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14637</guid>

					<description><![CDATA[Test Scenarios are created for the following reasons, Creating Test Scenarios ensures complete Test Coverage Test Scenarios can be approved by various stakeholders like Business Analyst, Developers, Customers to ensure the Application Under Test is thoroughly tested. It ensures that the software is working for the most common use cases. They serve as a quick ... <a title="Why create Test Scenarios" class="read-more" href="https://blog.eduguru.in/tutorial/why-create-test-scenarios" aria-label="Read more about Why create Test Scenarios">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Scenario Testing</title>
		<link>https://blog.eduguru.in/tutorial/scenario-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:31:50 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Scenario Testing]]></category>
		<category><![CDATA[Scenarios]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test scenario]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14635</guid>

					<description><![CDATA[Scenario Testing in software testing is a method in which actual scenarios are used for testing the software application instead of test cases. The purpose of scenario testing is to test end to end scenarios for a specific complex problem of the software. Scenarios help in an easier way to test and evaluate end to end ... <a title="Scenario Testing" class="read-more" href="https://blog.eduguru.in/tutorial/scenario-testing" aria-label="Read more about Scenario Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Test Scenario</title>
		<link>https://blog.eduguru.in/tutorial/test-scenario</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:29:50 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test scenario]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14633</guid>

					<description><![CDATA[A TEST SCENARIO is defined as any functionality that can be tested. It is also called Test Condition or Test Possibility. As a tester, you should put yourself in the end user’s shoes and figure out the real-world scenarios and use cases of the Application Under Test.]]></description>
		
		
		
			</item>
		<item>
		<title>Why Software Testing</title>
		<link>https://blog.eduguru.in/tutorial/why-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:27:32 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Why Software Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14631</guid>

					<description><![CDATA[Software that does not work correctly can lead to many problems such as: Delay / Loss of time Futility / Loss of effort Wastage / Loss of money Shame / Loss of business reputation Injury or death &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Software Testing Goals</title>
		<link>https://blog.eduguru.in/tutorial/software-testing-goals-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:25:32 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Software Testing Goals]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14629</guid>

					<description><![CDATA[The three main goals of Software Testing are: Defect Detection: Find defects / bugs in the software during all stages of its development (earlier, the better). Defect Prevention: As a consequence of defect detection, help anticipate and prevent defects from occurring at later stages of development or from recurring in the future. User Satisfaction: Ensure customers / users ... <a title="Software Testing Goals" class="read-more" href="https://blog.eduguru.in/tutorial/software-testing-goals-2" aria-label="Read more about Software Testing Goals">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple and Hyundai could sign deal on driverless EVs within weeks</title>
		<link>https://blog.eduguru.in/news/apple-and-hyundai-could-sign-deal-on-driverless-evs-within-weeks</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 13:03:03 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple and Hyundai could sign deal on driverless EVs within weeks]]></category>
		<category><![CDATA[AUTOMOTIVE BUSINESS]]></category>
		<category><![CDATA[AUTONOMOUS VEHICLES]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14627</guid>

					<description><![CDATA[Apple Inc and Hyundai Motor Company are preparing to close a partnership deal to design autonomous electric cars by March, according to Korea IT News.  Last week, Hyundai released a statement revealing that it was in early talks with Apple. This announcement came after South Korea’s Economic Daily reported that the two companies were aiming to launch ... <a title="Apple and Hyundai could sign deal on driverless EVs within weeks" class="read-more" href="https://blog.eduguru.in/news/apple-and-hyundai-could-sign-deal-on-driverless-evs-within-weeks" aria-label="Read more about Apple and Hyundai could sign deal on driverless EVs within weeks">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>General Motors unveils single-seater flying Cadillac</title>
		<link>https://blog.eduguru.in/news/general-motors-unveils-single-seater-flying-cadillac</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 12:58:50 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[AUTOMOTIVE ENGINEERING]]></category>
		<category><![CDATA[AUTONOMOUS VEHICLES]]></category>
		<category><![CDATA[AVIATION FUTURE]]></category>
		<category><![CDATA[CES 2021]]></category>
		<category><![CDATA[General Motors unveils single-seater flying Cadillac]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14625</guid>

					<description><![CDATA[General Motors (GM) has unveiled a flying version of its Cadillac that is autonomous and can take off and land vertically.  At its digital presentation at CES 2021, GM said the new electric vertical takeoff and landing (eVTOL) concept was “reimagining the future of personal transportation”. The concept vehicle, which looks like a combination between ... <a title="General Motors unveils single-seater flying Cadillac" class="read-more" href="https://blog.eduguru.in/news/general-motors-unveils-single-seater-flying-cadillac" aria-label="Read more about General Motors unveils single-seater flying Cadillac">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>5G-enabled system could streamline maintenance at St Pancras</title>
		<link>https://blog.eduguru.in/news/5g-enabled-system-could-streamline-maintenance-at-st-pancras</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 12:54:37 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G-enabled system could streamline maintenance at St Pancras]]></category>
		<category><![CDATA[AUGMENTED REALITY]]></category>
		<category><![CDATA[DIGITAL TWIN]]></category>
		<category><![CDATA[INDUSTRY 4.0 SENSORS]]></category>
		<category><![CDATA[RAILWAY SIGNALLING]]></category>
		<category><![CDATA[RAILWAYS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14623</guid>

					<description><![CDATA[A partnership between University of Sheffield engineers, Pauley Group and HS1 Ltd is to develop an AR platform to help monitor the real-time performance of St Pancras International station services.  The project will allow for engineers to swiftly detect and repair faults within lifts, escalators and travelators in one of the UK’s busiest train stations ... <a title="5G-enabled system could streamline maintenance at St Pancras" class="read-more" href="https://blog.eduguru.in/news/5g-enabled-system-could-streamline-maintenance-at-st-pancras" aria-label="Read more about 5G-enabled system could streamline maintenance at St Pancras">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>YouTube becomes latest social platform to block Donald Trump</title>
		<link>https://blog.eduguru.in/news/youtube-becomes-latest-social-platform-to-block-donald-trump</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 12:51:21 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DONALD TRUMP]]></category>
		<category><![CDATA[POLITICS]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<category><![CDATA[YOUTUBE]]></category>
		<category><![CDATA[YouTube becomes latest social platform to block Donald Trump]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14621</guid>

					<description><![CDATA[YouTube has become the latest social network to suspend US President Donald Trump’s account over concerns about “the ongoing potential for violence”.  The video sharing site said the account would be inaccessible for “a minimum of seven days”, meaning Trump will not have access until after President-elect Joe Biden takes office. Social networks have been ... <a title="YouTube becomes latest social platform to block Donald Trump" class="read-more" href="https://blog.eduguru.in/news/youtube-becomes-latest-social-platform-to-block-donald-trump" aria-label="Read more about YouTube becomes latest social platform to block Donald Trump">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hayabusa2 probe readings suggest mysterious lack of water on Ryugu asteroid</title>
		<link>https://blog.eduguru.in/news/hayabusa2-probe-readings-suggest-mysterious-lack-of-water-on-ryugu-asteroid</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 12:46:05 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Hayabusa2]]></category>
		<category><![CDATA[Hayabusa2 probe readings suggest mysterious lack of water on Ryugu asteroid]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[water]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14619</guid>

					<description><![CDATA[Last month, the probe successfully delivered a capsule back to Earth containing a sample of rocks that it had collected from the surface of the asteroid. While analysis of the samples is still underway, researchers have used data from the spacecraft’s other instruments to reveal new details about the asteroid’s past. They found that Ryugu isn’t quite ... <a title="Hayabusa2 probe readings suggest mysterious lack of water on Ryugu asteroid" class="read-more" href="https://blog.eduguru.in/news/hayabusa2-probe-readings-suggest-mysterious-lack-of-water-on-ryugu-asteroid" aria-label="Read more about Hayabusa2 probe readings suggest mysterious lack of water on Ryugu asteroid">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UV space telescope to study the space between galaxies</title>
		<link>https://blog.eduguru.in/news/uv-space-telescope-to-study-the-space-between-galaxies</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 12:40:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[Telescope]]></category>
		<category><![CDATA[UV space]]></category>
		<category><![CDATA[UV space telescope to study the space between galaxies]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14617</guid>

					<description><![CDATA[A space telescope barely larger than a mini fridge could reveal new secrets about the cosmos, thanks to onboard instruments which observe the ultraviolet spectrum.  The Aspera mission, which will receive around $20m in funding from Nasa, is designed to study the evolution of galaxies and the spaces between them. In particular, the mission seeks ... <a title="UV space telescope to study the space between galaxies" class="read-more" href="https://blog.eduguru.in/news/uv-space-telescope-to-study-the-space-between-galaxies" aria-label="Read more about UV space telescope to study the space between galaxies">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Solar Orbiter makes Venus flyby as it heads towards the Sun</title>
		<link>https://blog.eduguru.in/news/solar-orbiter-makes-venus-flyby-as-it-heads-towards-the-sun-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 12:36:52 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[EUROPEAN]]></category>
		<category><![CDATA[Solar]]></category>
		<category><![CDATA[Solar Orbiter makes Venus flyby as it heads towards the Sun]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE AGENCY]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14615</guid>

					<description><![CDATA[The UK-built Solar Orbiter spacecraft is making a flyby of Venus, using the planet’s gravitational field to slingshot itself closer to the Sun.  The spacecraft, which launched in February, will make its closest approach to the planet just after midday on 27 December. It will fly some 7,500 km from the Venus cloud tops while ... <a title="Solar Orbiter makes Venus flyby as it heads towards the Sun" class="read-more" href="https://blog.eduguru.in/news/solar-orbiter-makes-venus-flyby-as-it-heads-towards-the-sun-2" aria-label="Read more about Solar Orbiter makes Venus flyby as it heads towards the Sun">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Nasa calls quits on its Mars digger’s attempts to burrow into the soil</title>
		<link>https://blog.eduguru.in/news/nasa-calls-quits-on-its-mars-diggers-attempts-to-burrow-into-the-soil</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 12:34:36 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Mars]]></category>
		<category><![CDATA[NASA]]></category>
		<category><![CDATA[Nasa calls quits on its Mars digger’s attempts to burrow into the soil]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14613</guid>

					<description><![CDATA[Nasa will end attempts by its Insight lander to dig down into the soil on Mars after concluding that it had not been able to gain the friction it needed to do so.  One of the digger’s core objectives was to measure the internal heat flow of the planet using a mole called HP3 which ... <a title="Nasa calls quits on its Mars digger’s attempts to burrow into the soil" class="read-more" href="https://blog.eduguru.in/news/nasa-calls-quits-on-its-mars-diggers-attempts-to-burrow-into-the-soil" aria-label="Read more about Nasa calls quits on its Mars digger’s attempts to burrow into the soil">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Disadvantages of WhiteBox Testing</title>
		<link>https://blog.eduguru.in/tutorial/disadvantages-of-whitebox-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:59:31 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[DISADVANTAGES]]></category>
		<category><![CDATA[Disadvantages of WhiteBox Testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[White box testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14610</guid>

					<description><![CDATA[White box testing can be quite complex and expensive. Developers who usually execute white box test cases detest it. The white box testing by developers is not detailed can lead to production errors. White box testing requires professional resources, with a detailed understanding of programming and implementation. White-box testing is time-consuming, bigger programming applications take ... <a title="Disadvantages of WhiteBox Testing" class="read-more" href="https://blog.eduguru.in/tutorial/disadvantages-of-whitebox-testing" aria-label="Read more about Disadvantages of WhiteBox Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of White Box Testing</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-white-box-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:57:40 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Advantages of White Box Testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[White box testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14608</guid>

					<description><![CDATA[Code optimization by finding hidden errors. White box tests cases can be easily automated. Testing is more thorough as all code paths are usually covered. Testing can start early in SDLC even if GUI is not available. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>WHITE Box Testing</title>
		<link>https://blog.eduguru.in/tutorial/white-box-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:55:43 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[White box testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14606</guid>

					<description><![CDATA[White Box Testing is software testing technique in which internal structure, design and coding of software are tested to verify flow of input-output and to improve design, usability and security. In white box testing, code is visible to testers so it is also called Clear box testing, Open box testing, Transparent box testing, Code-based testing and ... <a title="WHITE Box Testing" class="read-more" href="https://blog.eduguru.in/tutorial/white-box-testing" aria-label="Read more about WHITE Box Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>HP ALM</title>
		<link>https://blog.eduguru.in/tutorial/hp-alm</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:47:43 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[HP ALM]]></category>
		<category><![CDATA[management tools]]></category>
		<category><![CDATA[software tesing]]></category>
		<category><![CDATA[software testing management tools]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14604</guid>

					<description><![CDATA[HP ALM (Application Life Cycle Management) is a web based tool that helps organizations to manage the application lifecycle right from project planning, requirements gathering, until Testing &#38; deployment, which otherwise is a time-consuming task. In its earlier avatar as HP Quality Center, the test management tool was developed by Mercury interactive. It is now ... <a title="HP ALM" class="read-more" href="https://blog.eduguru.in/tutorial/hp-alm" aria-label="Read more about HP ALM">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Competition watchdog to investigate Nvidia acquisition of Arm</title>
		<link>https://blog.eduguru.in/tutorial/competition-watchdog-to-investigate-nvidia-acquisition-of-arm</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:43:55 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[BUSINESS ELECTRONICSBUSINESS]]></category>
		<category><![CDATA[CHIPMAKERS]]></category>
		<category><![CDATA[Competition watchdog to investigate Nvidia acquisition of Arm]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14602</guid>

					<description><![CDATA[The UK Competition and Markets Authority (CMA) is inviting initial views ahead of the acquisition of Cambridge-based Arm by US graphics chip designer Nvidia. The regulator will consider the possible effect of the deal on competition in the UK.  The CMA is inviting third parties to submit their initial views on the acquisition’s impact on ... <a title="Competition watchdog to investigate Nvidia acquisition of Arm" class="read-more" href="https://blog.eduguru.in/tutorial/competition-watchdog-to-investigate-nvidia-acquisition-of-arm" aria-label="Read more about Competition watchdog to investigate Nvidia acquisition of Arm">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Google’s ‘walled garden’ under regulatory scrutiny</title>
		<link>https://blog.eduguru.in/tutorial/googles-walled-garden-under-regulatory-scrutiny</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:40:11 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[ADVERTISING]]></category>
		<category><![CDATA[COMPETITION]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[Google’s ‘walled garden’ under regulatory scrutiny]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14600</guid>

					<description><![CDATA[The UK Competition and Markets Authority (CMA) is launching a formal investigation into proposed changes to Google’s Chrome browser over concerns that the company could abuse its dominance in online advertising.  The investigation will look into proposed ‘Privacy Sandbox’ changes to Chrome, specifically how the proposed phase-out of support for third-party cookies and other functionalities ... <a title="Google’s ‘walled garden’ under regulatory scrutiny" class="read-more" href="https://blog.eduguru.in/tutorial/googles-walled-garden-under-regulatory-scrutiny" aria-label="Read more about Google’s ‘walled garden’ under regulatory scrutiny">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Disadvantages of V-model</title>
		<link>https://blog.eduguru.in/tutorial/disadvantages-of-v-model</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 10 Jan 2021 02:02:49 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[development model]]></category>
		<category><![CDATA[disadvantage of v-model]]></category>
		<category><![CDATA[Disadvantages of V-model]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[v-model]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14596</guid>

					<description><![CDATA[Very rigid and least flexible. Software is developed during the implementation phase, so no early prototypes of the software are produced. If any changes happen in midway, then the test documents along with requirement documents has to be updated. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of V-model</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-v-model</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 10 Jan 2021 02:00:30 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Advantages of V-model]]></category>
		<category><![CDATA[development model]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[software development model]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14594</guid>

					<description><![CDATA[Simple and easy to use. Testing activities like planning, test designing happens well before coding. This saves a lot of time. Hence higher chance of success over the waterfall model. Proactive defect tracking – that is defects are found at early stage. Avoids the downward flow of the defects. Works well for small projects where requirements are ... <a title="Advantages of V-model" class="read-more" href="https://blog.eduguru.in/tutorial/advantages-of-v-model" aria-label="Read more about Advantages of V-model">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>V-model in Software testing</title>
		<link>https://blog.eduguru.in/tutorial/v-model-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 10 Jan 2021 01:58:33 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[V-model in Software testing]]></category>
		<category><![CDATA[v-model in testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14591</guid>

					<description><![CDATA[V- model means Verification and Validation model. Just like the waterfall model, the V-Shaped life cycle is a sequential path of execution of processes. Each phase must be completed before the next phase begins. V-Model is one of the many software development models. Testing of the product is planned in parallel with a corresponding phase of development in V-model. The ... <a title="V-model in Software testing" class="read-more" href="https://blog.eduguru.in/tutorial/v-model-in-software-testing" aria-label="Read more about V-model in Software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Waterfall model</title>
		<link>https://blog.eduguru.in/tutorial/waterfall-model</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 10 Jan 2021 01:48:53 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[development model]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[Waterfall model]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14589</guid>

					<description><![CDATA[The Waterfall Model was first Process Model to be introduced. It is also referred to as a linear-sequential life cycle model.  It is very simple to understand and use.  In a waterfall model, each phase must be completed fully before the next phase can begin. This type of software development model is basically used for the project which ... <a title="Waterfall model" class="read-more" href="https://blog.eduguru.in/tutorial/waterfall-model" aria-label="Read more about Waterfall model">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Development Models</title>
		<link>https://blog.eduguru.in/tutorial/software-development-models-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 10 Jan 2021 01:39:32 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Developments models]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software Development Models]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14587</guid>

					<description><![CDATA[The software development models are the various processes or methodologies that are being selected for the development of the project depending on the project’s aims and goals. There are many development life cycle models that have been developed in order to achieve different required objectives. The models specify the various stages of the process and the order ... <a title="Software Development Models" class="read-more" href="https://blog.eduguru.in/tutorial/software-development-models-2" aria-label="Read more about Software Development Models">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Incremental testing in software</title>
		<link>https://blog.eduguru.in/tutorial/incremental-testing-in-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 10 Jan 2021 01:34:02 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Incremental testing in software]]></category>
		<category><![CDATA[inncremental testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14585</guid>

					<description><![CDATA[The incremental testing approach has the advantage that the defects are found early in a smaller assembly when it is relatively easy to detect the cause. Another advantage is that all programs are integrated one by one and a test is carried out after each step.  A disadvantage is that it can be time-consuming since stubs and ... <a title="Incremental testing in software" class="read-more" href="https://blog.eduguru.in/tutorial/incremental-testing-in-software" aria-label="Read more about Incremental testing in software">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Difference between regression testing and retesting</title>
		<link>https://blog.eduguru.in/tutorial/difference-between-regression-testing-and-retesting</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 03:17:58 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Difference between regression testing and retesting]]></category>
		<category><![CDATA[regression testing]]></category>
		<category><![CDATA[retesting]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14582</guid>

					<description><![CDATA[Before we start with the differences between regression testing and retesting it’s good to have simple understanding of each topic. Basically, regression testing is carried out to ensure that the existing functionality is working fine and there are no side effects of any new change or enhancements done in the application. In other words, Regression Testing checks to see ... <a title="Difference between regression testing and retesting" class="read-more" href="https://blog.eduguru.in/tutorial/difference-between-regression-testing-and-retesting" aria-label="Read more about Difference between regression testing and retesting">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Structural testing</title>
		<link>https://blog.eduguru.in/tutorial/structural-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 03:10:06 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Structural testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14580</guid>

					<description><![CDATA[The structural testing is the testing of the structure of the system or component. Structural testing is often referred to as ‘white box testing’ or ‘glass box’ or ‘clear-box testing’ because in structural testing we are interested in what is happening ‘inside the system/application’. In structural testing the testers are required to have the knowledge ... <a title="Structural testing" class="read-more" href="https://blog.eduguru.in/tutorial/structural-testing" aria-label="Read more about Structural testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Non-functional testing</title>
		<link>https://blog.eduguru.in/tutorial/non-functional-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 03:07:34 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Non-functional testing]]></category>
		<category><![CDATA[software test]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14577</guid>

					<description><![CDATA[In non-functional testing the quality characteristics of the component or system is tested. Non-functional refers to aspects of the software that may not be related to a specific function or user action such as scalability or security. Eg. How many people can log in at once? Non-functional testing is also performed at all levels like functional testing. Non-functional ... <a title="Non-functional testing" class="read-more" href="https://blog.eduguru.in/tutorial/non-functional-testing" aria-label="Read more about Non-functional testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Functional testing</title>
		<link>https://blog.eduguru.in/tutorial/functional-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 03:01:07 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Functional testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14575</guid>

					<description><![CDATA[In functional testing basically the testing of the functions of component or system is done. It refers to activities that verify a specific action or function of the code. Functional test tends to answer the questions like “can the user do this” or “does this particular feature work”. This is typically described in a requirements specification or in a functional specification. ... <a title="Functional testing" class="read-more" href="https://blog.eduguru.in/tutorial/functional-testing" aria-label="Read more about Functional testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Test Types</title>
		<link>https://blog.eduguru.in/tutorial/software-test-types</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:57:02 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software Test Types]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14573</guid>

					<description><![CDATA[Software Test types are introduced as a means of clearly defining the objective of a certain level for a program or project.  A test type is focused on a particular test objective, which could be the testing of the function to be performed by the component or system. The test objective could be to test non-functional quality characteristics, such ... <a title="Software Test Types" class="read-more" href="https://blog.eduguru.in/tutorial/software-test-types" aria-label="Read more about Software Test Types">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of beta testing</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-beta-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:50:29 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Advantages of beta testing]]></category>
		<category><![CDATA[Beta testing]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14571</guid>

					<description><![CDATA[You have the opportunity to get your application into the hands of users prior to releasing it to the general public. Users can install, test your application, and send feedback to you during this beta testing period. Your beta testers can discover issues with your application that you may have not noticed, such as confusing ... <a title="Advantages of beta testing" class="read-more" href="https://blog.eduguru.in/tutorial/advantages-of-beta-testing" aria-label="Read more about Advantages of beta testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Beta testing</title>
		<link>https://blog.eduguru.in/tutorial/beta-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:26:04 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Beta]]></category>
		<category><![CDATA[Beta testing]]></category>
		<category><![CDATA[level of testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[types of testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14567</guid>

					<description><![CDATA[Beta Testing is also known as field testing. It takes place at customer’s site. It sends the system/software to users who install it and use it under real-world working conditions. A beta test is the second phase of software testing in which a sampling of the intended audience tries the product out. (Beta is the second letter of the ... <a title="Beta testing" class="read-more" href="https://blog.eduguru.in/tutorial/beta-testing" aria-label="Read more about Beta testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Alpha testing</title>
		<link>https://blog.eduguru.in/tutorial/alpha-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:23:32 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Alpha testing]]></category>
		<category><![CDATA[level of testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14565</guid>

					<description><![CDATA[Alpha testing is one of the most common software testing strategy used in software development. Its specially used by product development organizations. This test takes place at the developer’s site. Developers observe the users and note problems. Alpha testing is testing of an application when development is about to complete. Minor design changes can still be made as a ... <a title="Alpha testing" class="read-more" href="https://blog.eduguru.in/tutorial/alpha-testing" aria-label="Read more about Alpha testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Acceptance testing</title>
		<link>https://blog.eduguru.in/tutorial/acceptance-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:20:29 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Acceptance testing]]></category>
		<category><![CDATA[level of testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14563</guid>

					<description><![CDATA[Acceptance testing is basically done by the user or customer although other stakeholders may be involved as well. The goal of acceptance testing is to establish confidence in the system. Acceptance testing is most often focused on a validation type testing. Acceptance testing may occur at more than just a single level, for example: A Commercial Off the ... <a title="Acceptance testing" class="read-more" href="https://blog.eduguru.in/tutorial/acceptance-testing" aria-label="Read more about Acceptance testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>System testing</title>
		<link>https://blog.eduguru.in/tutorial/system-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:17:14 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[level of testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[System testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14560</guid>

					<description><![CDATA[In system testing the behavior of whole system/product is tested as defined by the scope of the development project or product. It may include tests based on risks and/or requirement specifications, business process, use cases, or other high level descriptions of system behavior, interactions with the operating systems, and system resources. System testing is most often the final test to ... <a title="System testing" class="read-more" href="https://blog.eduguru.in/tutorial/system-testing" aria-label="Read more about System testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of Top-Down approach(Integration Testing)</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-top-down-approachintegration-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:13:29 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Advantages of Top-Down approach(Integration Testing)]]></category>
		<category><![CDATA[Integration testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing testing]]></category>
		<category><![CDATA[Top-Down Approach]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14558</guid>

					<description><![CDATA[The tested product is very consistent because the integration testing is basically performed in an environment that almost similar to that of reality Stubs can be written with lesser time because when compared to the drivers then Stubs are simpler to author. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Integration testing</title>
		<link>https://blog.eduguru.in/tutorial/integration-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:08:34 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Integration testing]]></category>
		<category><![CDATA[levels of testing]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14556</guid>

					<description><![CDATA[Integration testing tests integration or interfaces between components, interactions to different parts of the system such as an operating system, file system and hardware or interfaces between systems. Integration testing is a key aspect of software testing. After integrating two or more different components together we do the integration testing. Integration testing is done by a specific integration tester ... <a title="Integration testing" class="read-more" href="https://blog.eduguru.in/tutorial/integration-testing" aria-label="Read more about Integration testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of Unit testing</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-unit-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 02:00:52 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Advantages of Unit testing]]></category>
		<category><![CDATA[software testing unit testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14554</guid>

					<description><![CDATA[1. Issues are found at early stage. Since unit testing are carried out by developers where they test their individual code before the integration. Hence the issues can be found very early and can be resolved then and there without impacting the other piece of codes. 2. Unit testing helps in maintaining and changing the ... <a title="Advantages of Unit testing" class="read-more" href="https://blog.eduguru.in/tutorial/advantages-of-unit-testing" aria-label="Read more about Advantages of Unit testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unit testing</title>
		<link>https://blog.eduguru.in/tutorial/unit-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 01:57:40 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[testing levels]]></category>
		<category><![CDATA[Unit testing. software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14552</guid>

					<description><![CDATA[A unit test is the smallest testable part of an application like functions, classes, procedures, interfaces. Unit testing is a method by which individual units of source code are tested to determine if they are fit for use. Unit tests are basically written and executed by software developers to make sure that code meets its design and requirements and ... <a title="Unit testing" class="read-more" href="https://blog.eduguru.in/tutorial/unit-testing" aria-label="Read more about Unit testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Testing Levels</title>
		<link>https://blog.eduguru.in/tutorial/software-testing-levels</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 09 Jan 2021 01:40:53 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Software Testing Levels]]></category>
		<category><![CDATA[testing levels]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14550</guid>

					<description><![CDATA[Testing levels are basically to identify missing areas and prevent overlap and repetition between the development life cycle phases. In software development life cycle models there are defined phases like requirement gathering and analysis, design, coding or implementation, testing and deployment.  Each phase goes through the testing. Hence there are various levels of testing. The various ... <a title="Software Testing Levels" class="read-more" href="https://blog.eduguru.in/tutorial/software-testing-levels" aria-label="Read more about Software Testing Levels">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Characteristics of Digital Signals</title>
		<link>https://blog.eduguru.in/tutorial/characteristics-of-digital-signals</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:38:17 +0000</pubDate>
				<category><![CDATA[Digital_Electronics]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Characteristics of Digital Signals]]></category>
		<category><![CDATA[Digital signals]]></category>
		<category><![CDATA[digital signals characteristics]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14547</guid>

					<description><![CDATA[Digital signal are continuous signals This type of electronic l signals can be processed and transmitted better compared to analog signal. Digital signals are versatile, so it is widely used. The accuracy of the digital signal is better than that of the analog signal. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Characteristics OF Analog Signal</title>
		<link>https://blog.eduguru.in/tutorial/characteristics-of-analog-signal</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:34:27 +0000</pubDate>
				<category><![CDATA[Digital_Electronics]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Analog Signal]]></category>
		<category><![CDATA[analog signal characteristics]]></category>
		<category><![CDATA[Characteristics OF Analog Signal]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14545</guid>

					<description><![CDATA[These type of electronic signals are time-varying Minimum and maximum values which is either positive or negative. It can be either periodic or non-periodic. Analog Signal works on continuous data. The accuracy of the analog signal is not high when compared to the digital signal. It helps you to measure natural or physical values. Analog ... <a title="Characteristics OF Analog Signal" class="read-more" href="https://blog.eduguru.in/tutorial/characteristics-of-analog-signal" aria-label="Read more about Characteristics OF Analog Signal">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>KEY DIFFERENCES BETWEEN ANALOG AND DIGITAL SIGNALS</title>
		<link>https://blog.eduguru.in/tutorial/key-differences-between-analog-and-digital-signals</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:32:15 +0000</pubDate>
				<category><![CDATA[Digital_Electronics]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[analog signals]]></category>
		<category><![CDATA[Difference between analog and digital signals]]></category>
		<category><![CDATA[Digital Signal]]></category>
		<category><![CDATA[KEY DIFFERENCES BETWEEN ANALOG AND DIGITAL SIGNALS]]></category>
		<category><![CDATA[Singals]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14543</guid>

					<description><![CDATA[An analog signal is a continuous signal whereas Digital signals are time separated signals. Analog signal is denoted by sine waves while It is denoted by square waves Analog signal uses a continuous range of values that help you to represent information on the other hand digital signal uses discrete 0 and 1 to represent ... <a title="KEY DIFFERENCES BETWEEN ANALOG AND DIGITAL SIGNALS" class="read-more" href="https://blog.eduguru.in/tutorial/key-differences-between-analog-and-digital-signals" aria-label="Read more about KEY DIFFERENCES BETWEEN ANALOG AND DIGITAL SIGNALS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Digital Signal</title>
		<link>https://blog.eduguru.in/tutorial/digital-signal</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:26:21 +0000</pubDate>
				<category><![CDATA[Digital_Electronics]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Digital Electronics]]></category>
		<category><![CDATA[Digital Signal]]></category>
		<category><![CDATA[Signal]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14540</guid>

					<description><![CDATA[A digital signal is a signal that is used to represent data as a sequence of separate values at any point in time. It can only take on one of a fixed number of values. This type of signal represents a real number within a constant range of values. Digital Signal]]></description>
		
		
		
			</item>
		<item>
		<title>Analog Signal</title>
		<link>https://blog.eduguru.in/tutorial/analog-signal</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:21:44 +0000</pubDate>
				<category><![CDATA[Digital_Electronics]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Analog]]></category>
		<category><![CDATA[Analog Signal]]></category>
		<category><![CDATA[Digital Electronics]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[Signals]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14537</guid>

					<description><![CDATA[Analog signal is a continuous signal in which one time-varying quantity represents another time-based variable. These kind of signals works with physical values and natural phenomena such as earthquake, frequency, volcano, speed of wind, weight, lighting, etc. Analog Signal]]></description>
		
		
		
			</item>
		<item>
		<title>Signal</title>
		<link>https://blog.eduguru.in/tutorial/signal</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:17:31 +0000</pubDate>
				<category><![CDATA[Digital_Electronics]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Digital Electronics]]></category>
		<category><![CDATA[Signal]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14535</guid>

					<description><![CDATA[A signal is an electromagnetic or electrical current that is used for carrying data from one system or network to another. The signal is a function that conveys information about a phenomenon. In electronics and telecommunications, it refers to any time-varying voltage that is an electromagnetic wave which carries information. A signal can also be ... <a title="Signal" class="read-more" href="https://blog.eduguru.in/tutorial/signal" aria-label="Read more about Signal">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Self-healing material could make ideal smartphone screen</title>
		<link>https://blog.eduguru.in/news/self-healing-material-could-make-ideal-smartphone-screen</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:06:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[MATERIALS SCIENCE]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[self-healing material]]></category>
		<category><![CDATA[Self-healing material could make ideal smartphone screen]]></category>
		<category><![CDATA[SMART MATERIALS]]></category>
		<category><![CDATA[SMARTPHONES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14533</guid>

					<description><![CDATA[Researchers from the Korea Institute of Science and Technology have led a project to develop a hard, electronic smartphone display material which can self-heal from cracks and other damage.  Smartphone display repair can often cost so much that many owners decide it isn’t worth paying for and simply dump the phone for an entirely new handset ... <a title="Self-healing material could make ideal smartphone screen" class="read-more" href="https://blog.eduguru.in/news/self-healing-material-could-make-ideal-smartphone-screen" aria-label="Read more about Self-healing material could make ideal smartphone screen">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Deep learning harnessed to suggest new purposes for drugs</title>
		<link>https://blog.eduguru.in/news/deep-learning-harnessed-to-suggest-new-purposes-for-drugs</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 02:02:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[DEEP LEARNING]]></category>
		<category><![CDATA[Deep learning harnessed to suggest new purposes for drugs]]></category>
		<category><![CDATA[DRUGS]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[MEDICAL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14531</guid>

					<description><![CDATA[  Researchers from Ohio State University have developed a machine learning method which helps to determine which existing medications could be applied to improve outcomes in diseases for which they have not been prescribed.  Drug repurposing &#8211; which accelerates the commercialisation of drugs and lowers the risk associated with safety testing &#8211; is not a new concept. ... <a title="Deep learning harnessed to suggest new purposes for drugs" class="read-more" href="https://blog.eduguru.in/news/deep-learning-harnessed-to-suggest-new-purposes-for-drugs" aria-label="Read more about Deep learning harnessed to suggest new purposes for drugs">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Singapore police will have access to contact-tracing data</title>
		<link>https://blog.eduguru.in/news/singapore-police-will-have-access-to-contact-tracing-data</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 01:59:27 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[POLICE]]></category>
		<category><![CDATA[SINGAPORE]]></category>
		<category><![CDATA[Singapore police will have access to contact-tracing data]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14529</guid>

					<description><![CDATA[The Singaporean Minister for Home Affairs has confirmed that the state’s police force has the authority to access Covid-19 contact-tracing app data for the purposes of criminal investigations, raising potential privacy concerns.  Singapore’s TraceTogether app was developed in less than two months and was among the first Covid-19 contact tracing apps to be launched. The ... <a title="Singapore police will have access to contact-tracing data" class="read-more" href="https://blog.eduguru.in/news/singapore-police-will-have-access-to-contact-tracing-data" aria-label="Read more about Singapore police will have access to contact-tracing data">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Mice taught to guide computer mouse with brain activity</title>
		<link>https://blog.eduguru.in/news/mice-taught-to-guide-computer-mouse-with-brain-activity</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 01:49:41 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ANIMALS]]></category>
		<category><![CDATA[BRAIN-COMPUTER INTERFACE]]></category>
		<category><![CDATA[Mice taught to guide computer mouse with brain activity]]></category>
		<category><![CDATA[NEUROTECHNOLOGY]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14527</guid>

					<description><![CDATA[Researchers from University College London’s Sainsbury Wellcome Centre have devised a brain-machine interface (BMI) which allows mice to learn to move a cursor to a target using only their brain activity  The study sheds light on how the brain represents causally-controlled objects. When a mouse was controlling the cursor, brain activity in the higher visual ... <a title="Mice taught to guide computer mouse with brain activity" class="read-more" href="https://blog.eduguru.in/news/mice-taught-to-guide-computer-mouse-with-brain-activity" aria-label="Read more about Mice taught to guide computer mouse with brain activity">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘Artificial muscle’ changes colour like octopus skin</title>
		<link>https://blog.eduguru.in/news/artificial-muscle-changes-colour-like-octopus-skin</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 01:46:24 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘Artificial muscle’ changes colour like octopus skin]]></category>
		<category><![CDATA[BIOMIMETICS]]></category>
		<category><![CDATA[DISPLAYS]]></category>
		<category><![CDATA[MATERIALS]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[Science]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14525</guid>

					<description><![CDATA[Engineers from Rutgers University have developed a 3D-printed smart gel that changes shape when exposed to light and can be utilised as a colour-changing “artificial muscle”.  The smart gel is inspired by the ability of cephalopods such as octopuses, squid and cuttlefish to change the colour and texture of their skins for camouflage and communication. ... <a title="‘Artificial muscle’ changes colour like octopus skin" class="read-more" href="https://blog.eduguru.in/news/artificial-muscle-changes-colour-like-octopus-skin" aria-label="Read more about ‘Artificial muscle’ changes colour like octopus skin">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Novel film absorbs sweat to power wearable devices</title>
		<link>https://blog.eduguru.in/news/novel-film-absorbs-sweat-to-power-wearable-devices</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 01:43:45 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[novel film]]></category>
		<category><![CDATA[Novel film absorbs sweat to power wearable devices]]></category>
		<category><![CDATA[POWER SYSTEMS]]></category>
		<category><![CDATA[wearable devices]]></category>
		<category><![CDATA[WEARABLE TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14523</guid>

					<description><![CDATA[A film that effectively evaporates sweat from skin while using the moisture to power wearable electronics has been developed by researchers from the National University of Singapore (NUS).  The main components of the thin film are two hygroscopic chemicals &#8211; cobalt chloride and ethanolamine. Besides being extremely moisture-absorbent, the film can rapidly release water when ... <a title="Novel film absorbs sweat to power wearable devices" class="read-more" href="https://blog.eduguru.in/news/novel-film-absorbs-sweat-to-power-wearable-devices" aria-label="Read more about Novel film absorbs sweat to power wearable devices">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>D I G I TA L S Y S T E M S</title>
		<link>https://blog.eduguru.in/tutorial/d-i-g-i-ta-l-s-y-s-t-e-m-s</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 01:25:44 +0000</pubDate>
				<category><![CDATA[Digital_Electronics]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Binary]]></category>
		<category><![CDATA[D I G I TA L S Y S T E M S]]></category>
		<category><![CDATA[Digital Electronics]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14521</guid>

					<description><![CDATA[Digital systems have such a prominent role in everyday life that we refer to the present technological period as the digital age. Digital systems are used in communication, business transactions, traffic control, spacecraft guidance, medical treatment, weather monitoring, the Internet, and many other commercial, industrial, and scientific enterprises. We have digital telephones, digital televisions, digital ... <a title="D I G I TA L S Y S T E M S" class="read-more" href="https://blog.eduguru.in/tutorial/d-i-g-i-ta-l-s-y-s-t-e-m-s" aria-label="Read more about D I G I TA L S Y S T E M S">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Microplastics carried by wind to remote corners of the ocean</title>
		<link>https://blog.eduguru.in/news/microplastics-carried-by-wind-to-remote-corners-of-the-ocean</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:37:21 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[air pollution]]></category>
		<category><![CDATA[Microplastics carried by wind to remote corners of the ocean]]></category>
		<category><![CDATA[Ocean]]></category>
		<category><![CDATA[PLASTICS]]></category>
		<category><![CDATA[POLLUTION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14518</guid>

					<description><![CDATA[  Microplastics have been found to be so light they can be carried on the wind and transported to far-flung parts of the ocean, including those that appear to be clear of the pollutant.  Microplastics &#8211; which are defined as particles smaller than 5mm in diameter &#8211; can stay airborne for hours or days. This ... <a title="Microplastics carried by wind to remote corners of the ocean" class="read-more" href="https://blog.eduguru.in/news/microplastics-carried-by-wind-to-remote-corners-of-the-ocean" aria-label="Read more about Microplastics carried by wind to remote corners of the ocean">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>traceability in Software testing</title>
		<link>https://blog.eduguru.in/tutorial/traceability-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:28:42 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[traceability]]></category>
		<category><![CDATA[traceability in Software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14516</guid>

					<description><![CDATA[Test conditions should be able to be linked back to their sources in the test basis, this is known as traceability. Traceability can be horizontal through all the test documentation for a given test level (e.g. system testing, from test conditions through test cases to test scripts) or it can be vertical through the layers of development ... <a title="traceability in Software testing" class="read-more" href="https://blog.eduguru.in/tutorial/traceability-in-software-testing" aria-label="Read more about traceability in Software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Static analysis tools in software testing</title>
		<link>https://blog.eduguru.in/tutorial/static-analysis-tools-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:26:20 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static analysis]]></category>
		<category><![CDATA[Static analysis tools]]></category>
		<category><![CDATA[Static analysis tools in software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14514</guid>

					<description><![CDATA[Static analysis tools are generally used by developers as part of the development and component testing process. The key aspect is that the code (or other artefact) is not executed or run but the tool itself is executed, and the source code we are interested in is the input data to the tool. These tools are mostly ... <a title="Static analysis tools in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/static-analysis-tools-in-software-testing" aria-label="Read more about Static analysis tools in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>static analysis</title>
		<link>https://blog.eduguru.in/tutorial/static-analysis</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:23:49 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static analysis]]></category>
		<category><![CDATA[static Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14512</guid>

					<description><![CDATA[Performed on requirement design or code without actually executing the software or before the code is actually run. Goal of static analysis is to find the defects whether or not they may cause failure. Static analysis find defects rather than failures. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>types of review</title>
		<link>https://blog.eduguru.in/tutorial/types-of-review-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:21:14 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[review types]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static Testing]]></category>
		<category><![CDATA[types of review?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14510</guid>

					<description><![CDATA[1.    Walkthrough: It is not a formal process It is led by the authors Author guide the participants through the document according to his or her thought process to achieve a common understanding and to gather feedback. Useful for the people if they are not from the software discipline, who are not used to or cannot ... <a title="types of review" class="read-more" href="https://blog.eduguru.in/tutorial/types-of-review-2" aria-label="Read more about types of review">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>roles and responsibilities involved during a review</title>
		<link>https://blog.eduguru.in/tutorial/roles-and-responsibilities-involved-during-a-review</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:19:03 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[Review Process]]></category>
		<category><![CDATA[roles and responsibilities]]></category>
		<category><![CDATA[roles and responsibilities involved during a review]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14508</guid>

					<description><![CDATA[During a review five types of participants take part. &#160; The moderator: Also known as review leader Performs entry check Follow-up on the rework Schedules the meeting Coaches other team Leads the possible discussion and stores the data that is collected The author: Illuminate the unclear areas and understand the defects found Basic goal should ... <a title="roles and responsibilities involved during a review" class="read-more" href="https://blog.eduguru.in/tutorial/roles-and-responsibilities-involved-during-a-review" aria-label="Read more about roles and responsibilities involved during a review">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Formal review</title>
		<link>https://blog.eduguru.in/tutorial/formal-review</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:14:56 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Formal review]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14506</guid>

					<description><![CDATA[Formal reviews follow a formal process. It is well structured and regulated. A formal review process consists of six main steps: Planning Kick-off Preparation Review meeting Rework Follow-up &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Informal reviews</title>
		<link>https://blog.eduguru.in/tutorial/informal-reviews-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 14:13:32 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Informal reviews]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static Testing]]></category>
		<category><![CDATA[static testing uses]]></category>
		<category><![CDATA[uses of Static Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14504</guid>

					<description><![CDATA[Informal reviews are applied many times during the early stages of the life cycle of the document. A two person team can conduct an informal review. In later stages these reviews often involve more people and a meeting. The goal is to keep the author and to improve the quality of the document. The most ... <a title="Informal reviews" class="read-more" href="https://blog.eduguru.in/tutorial/informal-reviews-2" aria-label="Read more about Informal reviews">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Informal reviews</title>
		<link>https://blog.eduguru.in/tutorial/informal-reviews</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:52:09 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Informal reviews]]></category>
		<category><![CDATA[REVIEWS]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static Testing]]></category>
		<category><![CDATA[technical testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14502</guid>

					<description><![CDATA[Informal reviews are applied many times during the early stages of the life cycle of the document. A two person team can conduct an informal review. In later stages these reviews often involve more people and a meeting. The goal is to keep the author and to improve the quality of the document. The most ... <a title="Informal reviews" class="read-more" href="https://blog.eduguru.in/tutorial/informal-reviews" aria-label="Read more about Informal reviews">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>uses of Static Testing</title>
		<link>https://blog.eduguru.in/tutorial/uses-of-static-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:49:09 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static Testing]]></category>
		<category><![CDATA[static testing uses]]></category>
		<category><![CDATA[testing technique]]></category>
		<category><![CDATA[uses of Static Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14500</guid>

					<description><![CDATA[Since static testing can start early in the life cycle so early feedback on quality issues can be established. As the defects are getting detected at an early stage so the rework cost most often relatively low. Development productivity is likely to increase because of the less rework effort. Types of the defects that are ... <a title="uses of Static Testing" class="read-more" href="https://blog.eduguru.in/tutorial/uses-of-static-testing" aria-label="Read more about uses of Static Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>static Testing</title>
		<link>https://blog.eduguru.in/tutorial/static-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:46:51 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static test]]></category>
		<category><![CDATA[static Testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing technique]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14498</guid>

					<description><![CDATA[Static testing is the testing of the software work products manually, or with a set of tools, but they are not executed. It starts early in the Life cycle and so it is done during the verification process. It does not need computer as the testing of program is done without executing the program. For example:  ... <a title="static Testing" class="read-more" href="https://blog.eduguru.in/tutorial/static-testing" aria-label="Read more about static Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>static test technique</title>
		<link>https://blog.eduguru.in/tutorial/static-test-technique</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:44:17 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[static test]]></category>
		<category><![CDATA[static test technique]]></category>
		<category><![CDATA[test technique]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14496</guid>

					<description><![CDATA[Static test techniques provide a great way to improve the quality and productivity of software development.  It includes the reviews and provides the overview of how they are conducted. The primary objective of static testing is to improve the quality of software products by assisting engineers to recognize and fix their own defects early in ... <a title="static test technique" class="read-more" href="https://blog.eduguru.in/tutorial/static-test-technique" aria-label="Read more about static test technique">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Development Models</title>
		<link>https://blog.eduguru.in/tutorial/software-development-models</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:32:10 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Developments]]></category>
		<category><![CDATA[Developments models]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[Software Development Models]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Software testing techniques]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14494</guid>

					<description><![CDATA[The software development models are the various processes or methodologies that are being selected for the development of the project depending on the project’s aims and goals. There are many development life cycle models that have been developed in order to achieve different required objectives. The models specify the various stages of the process and the order ... <a title="Software Development Models" class="read-more" href="https://blog.eduguru.in/tutorial/software-development-models" aria-label="Read more about Software Development Models">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Quality</title>
		<link>https://blog.eduguru.in/tutorial/software-quality-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:04:44 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Quality of software]]></category>
		<category><![CDATA[Software Quality?]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[softwares]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14492</guid>

					<description><![CDATA[Quality software is reasonably bug or defect free, delivered on time and within budget, meets requirements and/or expectations, and is maintainable. Key aspects of quality for the customer include: Good design – looks and style Good functionality – it does the job well Reliable – acceptable level of breakdowns or failure Consistency Durable – lasts as long ... <a title="Software Quality" class="read-more" href="https://blog.eduguru.in/tutorial/software-quality-2" aria-label="Read more about Software Quality">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of Validation</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-validation</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:02:14 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Advantages of Validation]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[softwares]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[validation]]></category>
		<category><![CDATA[validation advantages]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14489</guid>

					<description><![CDATA[During verification if some defects are missed then during validation process it can be caught as failures. If during verification some specification is misunderstood and development had happened then during validation process while executing that functionality the difference between the actual result and expected result can be understood. Validation is done during testing like feature testing, integration ... <a title="Advantages of Validation" class="read-more" href="https://blog.eduguru.in/tutorial/advantages-of-validation" aria-label="Read more about Advantages of Validation">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Validation in software testing</title>
		<link>https://blog.eduguru.in/tutorial/validation-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 06:00:41 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing Validation]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Validation in software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14487</guid>

					<description><![CDATA[Validation is determining if the system complies with the requirements and performs functions for which it is intended and meets the organization’s goals and user needs. Validation is done at the end of the development process and takes place after verifications are completed. It answers the question like: Am I building the right product? Am I accessing the right ... <a title="Validation in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/validation-in-software-testing" aria-label="Read more about Validation in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Who are the stakeholders in software testing</title>
		<link>https://blog.eduguru.in/tutorial/who-are-the-stakeholders-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 03:21:46 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[stake holders]]></category>
		<category><![CDATA[stake holders in software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Who are the stakeholders in software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14481</guid>

					<description><![CDATA[In general, a stakeholder is someone who has an interest or is concerned with the outcome of the project or activity or decision. This could be an individual, a group or an organization. Stakeholders can impact and / or be impacted by the outcome of the project. Test Managers must be able to identify software testing stakeholders and manage ... <a title="Who are the stakeholders in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/who-are-the-stakeholders-in-software-testing" aria-label="Read more about Who are the stakeholders in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Development Life cycle Activities</title>
		<link>https://blog.eduguru.in/tutorial/software-development-life-cycle-activities</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 03:15:00 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Development life cycle]]></category>
		<category><![CDATA[SDLC Activities]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software Development Life Cycle]]></category>
		<category><![CDATA[Software Development Life cycle Activities]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14479</guid>

					<description><![CDATA[Requirement gathering and management – While determining test scope and estimating test efforts, the Test Manager should also be aware changes in requirements later into the project, undertaking control activities to incorporate the changes in testing as well. It is advisable to make Technical Test Analysts and Test Analysts a part of the requirement reviews. Project Management – ... <a title="Software Development Life cycle Activities" class="read-more" href="https://blog.eduguru.in/tutorial/software-development-life-cycle-activities" aria-label="Read more about Software Development Life cycle Activities">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Test Planning</title>
		<link>https://blog.eduguru.in/tutorial/test-planning</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 03:07:38 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[planning]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[ST]]></category>
		<category><![CDATA[Test Planning]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14477</guid>

					<description><![CDATA[In very simple terms, test planning refers to planning the activities that must be performed during testing in order to achieve the objectives of the test. Test planning for every test level of the project begins at the starting of that level’s testing process and goes on upto the end of closing activities of the level. Planning, ... <a title="Test Planning" class="read-more" href="https://blog.eduguru.in/tutorial/test-planning" aria-label="Read more about Test Planning">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>test process in software testing</title>
		<link>https://blog.eduguru.in/tutorial/test-process-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 03:03:20 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test process]]></category>
		<category><![CDATA[test process in software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14475</guid>

					<description><![CDATA[Testing is a process rather than a single activity. This process starts from test planning then designing test cases, preparing for execution and evaluating status till the test closure. So, we can divide the activities within the fundamental test process into the following basic steps: 1)    Planning and Control: Test planning has following major tasks: i.  To determine the ... <a title="test process in software testing" class="read-more" href="https://blog.eduguru.in/tutorial/test-process-in-software-testing" aria-label="Read more about test process in software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of Sanity testing</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-sanity-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 02:57:36 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Advantages of Sanity testing]]></category>
		<category><![CDATA[Sanity testing]]></category>
		<category><![CDATA[sanity testing advantages]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14473</guid>

					<description><![CDATA[It saves lots of time and effort because Sanity testing is focused on one or few areas of functionality There is no effort put in towards it’s documentation because it’s usually unscripted It helps in identifying the dependent missing objects. It is used to verify that a small functionality of the application is still working ... <a title="Advantages of Sanity testing" class="read-more" href="https://blog.eduguru.in/tutorial/advantages-of-sanity-testing" aria-label="Read more about Advantages of Sanity testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Sanity testing</title>
		<link>https://blog.eduguru.in/tutorial/sanity-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 02:53:21 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Sanity testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14471</guid>

					<description><![CDATA[Sanity testing is usually performed when any minor bug is fixed or when there is a small change in the functionality. It is a kind of software testing which is done by the testers to ensure that the functionality is working as expected. Sanity testing is narrow and deep. Unlike Smoke testing, Sanity testing is focused on one or two ... <a title="Sanity testing" class="read-more" href="https://blog.eduguru.in/tutorial/sanity-testing" aria-label="Read more about Sanity testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Disadvantages of Smoke testing</title>
		<link>https://blog.eduguru.in/tutorial/disadvantages-of-smoke-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 02:51:33 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Disadvantages of Smoke testing]]></category>
		<category><![CDATA[smoke testing disadvantages]]></category>
		<category><![CDATA[software smoke testing]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14469</guid>

					<description><![CDATA[Smoke testing does not cover the detailed testing. It’s a non-exhaustive testing with small number of test cases because of which we not are able to find the other critical issues. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages of Smoke testing</title>
		<link>https://blog.eduguru.in/tutorial/advantages-of-smoke-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 02:48:58 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[ADVANTAGES]]></category>
		<category><![CDATA[Advantages of Smoke testing]]></category>
		<category><![CDATA[advantages of testing]]></category>
		<category><![CDATA[smoke testing?]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14467</guid>

					<description><![CDATA[It helps in finding the bugs in the early stage of testing. It helps in finding the issues that got introduced by the integration of components. It helps in verifying the issues fixed in the previous build are NOT impacting the major functionalities of the application. Very limited number of test cases is required to ... <a title="Advantages of Smoke testing" class="read-more" href="https://blog.eduguru.in/tutorial/advantages-of-smoke-testing" aria-label="Read more about Advantages of Smoke testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>smoke testing</title>
		<link>https://blog.eduguru.in/tutorial/smoke-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 02:47:18 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[smoke]]></category>
		<category><![CDATA[smoke testing?]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14465</guid>

					<description><![CDATA[Smoke testing is a type of software testing which ensures that the major functionalities of the application are working fine. This testing is also known as ‘Build Verification testing’. It is a non-exhaustive testing with very limited test cases to ensure that the important features are working fine and we are good to proceed with the detailed testing. ... <a title="smoke testing" class="read-more" href="https://blog.eduguru.in/tutorial/smoke-testing" aria-label="Read more about smoke testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>principles of testing?</title>
		<link>https://blog.eduguru.in/tutorial/principles-of-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 03 Jan 2021 02:43:55 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[principles of testing?]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing principals]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Testing Principal]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14463</guid>

					<description><![CDATA[There are seven principles of software testing. They are as follows: 1) Testing shows presence of defects: Testing can show the defects are present, but cannot prove that there are no defects. Even after testing the application or product thoroughly we cannot say that the product is 100% defect free. Testing always reduces the number of undiscovered defects remaining in ... <a title="principles of testing?" class="read-more" href="https://blog.eduguru.in/tutorial/principles-of-testing" aria-label="Read more about principles of testing?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>cost of defects in software testing?</title>
		<link>https://blog.eduguru.in/tutorial/cost-of-defects-in-software-testing-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 02 Jan 2021 16:16:46 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[cost of defect]]></category>
		<category><![CDATA[cost of defects in software testing?]]></category>
		<category><![CDATA[defects in software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14461</guid>

					<description><![CDATA[The cost of defects can be measured by the impact of the defects and when we find them. Earlier the defect is found lesser is the cost of defect. For example if error is found in the requirement specifications during requirements gathering and analysis, then it is somewhat cheap to fix it. The correction to the requirement specification ... <a title="cost of defects in software testing?" class="read-more" href="https://blog.eduguru.in/tutorial/cost-of-defects-in-software-testing-2" aria-label="Read more about cost of defects in software testing?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>difference between Severity and Priority?</title>
		<link>https://blog.eduguru.in/tutorial/difference-between-severity-and-priority</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 11:28:50 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[difference between Severity and Priority?]]></category>
		<category><![CDATA[difference in priority and severity]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing priority]]></category>
		<category><![CDATA[software testing severity]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14459</guid>

					<description><![CDATA[There are two key things in defects of the software testing. They are: 1)     Severity 2)     Priority 1)  Severity: It is the extent to which the defect can affect the software. In other words it defines the impact that a given defect has on the system. For example: If an application or web page crashes when a remote link is ... <a title="difference between Severity and Priority?" class="read-more" href="https://blog.eduguru.in/tutorial/difference-between-severity-and-priority" aria-label="Read more about difference between Severity and Priority?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Defect Life Cycle or a Bug life cycle in software testing?</title>
		<link>https://blog.eduguru.in/tutorial/defect-life-cycle-or-a-bug-life-cycle-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 11:19:36 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[bug life cycle]]></category>
		<category><![CDATA[Defect life cycle]]></category>
		<category><![CDATA[defect life cycle in software testing]]></category>
		<category><![CDATA[Defect Life Cycle or a Bug life cycle in software testing?]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14456</guid>

					<description><![CDATA[Defect life cycle is a cycle which a defect goes through during its lifetime. It starts when defect is found and ends when a defect is closed, after ensuring it’s not reproduced. Defect life cycle is related to the bug found during testing. The defect life cycle can vary from organization to organization and also from project to ... <a title="Defect Life Cycle or a Bug life cycle in software testing?" class="read-more" href="https://blog.eduguru.in/tutorial/defect-life-cycle-or-a-bug-life-cycle-in-software-testing" aria-label="Read more about Defect Life Cycle or a Bug life cycle in software testing?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>cost of defects in software testing?</title>
		<link>https://blog.eduguru.in/tutorial/cost-of-defects-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 11:13:27 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[cost of defects]]></category>
		<category><![CDATA[cost of defects in software testing?]]></category>
		<category><![CDATA[defect in software]]></category>
		<category><![CDATA[defects]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14454</guid>

					<description><![CDATA[The cost of defects can be measured by the impact of the defects and when we find them. Earlier the defect is found lesser is the cost of defect. For example if error is found in the requirement specifications during requirements gathering and analysis, then it is somewhat cheap to fix it. The correction to the requirement specification ... <a title="cost of defects in software testing?" class="read-more" href="https://blog.eduguru.in/tutorial/cost-of-defects-in-software-testing" aria-label="Read more about cost of defects in software testing?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Failure in software testing?</title>
		<link>https://blog.eduguru.in/tutorial/failure-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 11:10:44 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[failure]]></category>
		<category><![CDATA[Failure in software testing?]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing failure]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14452</guid>

					<description><![CDATA[If under certain environment and situation defects in the application or product get executed then the system will produce the wrong results causing a failure. Not all defects result in failures, some may stay inactive in the code and we may never notice them. Example:  Defects in dead code will never result in failures. It is not ... <a title="Failure in software testing?" class="read-more" href="https://blog.eduguru.in/tutorial/failure-in-software-testing" aria-label="Read more about Failure in software testing?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Quality?</title>
		<link>https://blog.eduguru.in/tutorial/software-quality</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 11:07:05 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Quality of software]]></category>
		<category><![CDATA[Software Quality?]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14450</guid>

					<description><![CDATA[Quality software is reasonably bug or defect free, delivered on time and within budget, meets requirements and/or expectations, and is maintainable. ISO 8402-1986 standard defines quality as  “the totality of features and characteristics of a product or service that bears its ability to satisfy stated or implied needs.” Key aspects of quality for the customer include: Good ... <a title="Software Quality?" class="read-more" href="https://blog.eduguru.in/tutorial/software-quality" aria-label="Read more about Software Quality?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>software testing objectives and purpose?</title>
		<link>https://blog.eduguru.in/tutorial/software-testing-objectives-and-purpose</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 11:04:53 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing objectives and purpose?]]></category>
		<category><![CDATA[software testing purpose]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing objectives]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14448</guid>

					<description><![CDATA[Software Testing has different goals and objectives.The major objectives of Software testing are as follows: Finding defects which may get created by the programmer while developing the software. Gaining confidence in and providing information about the level of quality. To prevent defects. To make sure that the end result meets the business and user requirements. To ensure that ... <a title="software testing objectives and purpose?" class="read-more" href="https://blog.eduguru.in/tutorial/software-testing-objectives-and-purpose" aria-label="Read more about software testing objectives and purpose?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Defect or bugs or faults in software testing?</title>
		<link>https://blog.eduguru.in/tutorial/defect-or-bugs-or-faults-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 05:51:15 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[bugs]]></category>
		<category><![CDATA[Defect or bugs or faults in software testing?]]></category>
		<category><![CDATA[defects]]></category>
		<category><![CDATA[software faults]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14445</guid>

					<description><![CDATA[A defect is an error or a bug, in the application which is created. A programmer while designing and building the software can make mistakes or error. These mistakes or errors mean that there are flaws in the software. These are called defects. When actual result deviates from the expected result while testing a software application ... <a title="Defect or bugs or faults in software testing?" class="read-more" href="https://blog.eduguru.in/tutorial/defect-or-bugs-or-faults-in-software-testing" aria-label="Read more about Defect or bugs or faults in software testing?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>types of review?</title>
		<link>https://blog.eduguru.in/tutorial/types-of-review</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 05:47:18 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[review types]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[types of review?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14443</guid>

					<description><![CDATA[ 1.    Walkthrough: It is not a formal process It is led by the authors Author guide the participants through the document according to his or her thought process to achieve a common understanding and to gather feedback. Useful for the people if they are not from the software discipline, who are not used to or cannot ... <a title="types of review?" class="read-more" href="https://blog.eduguru.in/tutorial/types-of-review" aria-label="Read more about types of review?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Importance of Review Process</title>
		<link>https://blog.eduguru.in/uncategorized/importance-of-review-process</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 05:21:20 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Importance of Review Process]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[Review Process]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14441</guid>

					<description><![CDATA[Productivity of Dev team is improved and timescales reduced because the correction of defects in early stages and work-products will help to ensure that those work-products are clear and unambiguous. Testing costs and time is reduced as there is enough time spent during the initial phase. Reduction in costs because fewer defects in the final ... <a title="Importance of Review Process" class="read-more" href="https://blog.eduguru.in/uncategorized/importance-of-review-process" aria-label="Read more about Importance of Review Process">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What do you meant by review?</title>
		<link>https://blog.eduguru.in/tutorial/software-testing-tutorial/what-do-you-meant-by-review</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 31 Dec 2020 05:18:35 +0000</pubDate>
				<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[What do you meant by review?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14439</guid>

					<description><![CDATA[A review is a systematic examination of a document by one or more people with the main aim of finding and removing errors early in the software development life cycle. Reviews are used to verify documents such as requirements, system designs, code, test plans and test cases. Reviews are usually performed manually while static analysis ... <a title="What do you meant by review?" class="read-more" href="https://blog.eduguru.in/tutorial/software-testing-tutorial/what-do-you-meant-by-review" aria-label="Read more about What do you meant by review?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Format of C</title>
		<link>https://blog.eduguru.in/tutorial/c-tutorial-tutorial/the-format-of-c</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 29 Dec 2020 14:35:40 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[C code]]></category>
		<category><![CDATA[c language]]></category>
		<category><![CDATA[c programming]]></category>
		<category><![CDATA[C#]]></category>
		<category><![CDATA[The Format of C]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14436</guid>

					<description><![CDATA[Statements are terminated with semicolons. Indentation is ignored by the compiler. C is case sensitive &#8211; all keywords and Standard. Library functions are lowercase. Strings are placed in double quotes. Newlines are handled via \n Programs are capable of flagging success or error, those forgetting to do so have one or other chosen randomly! &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Merits of C Programming</title>
		<link>https://blog.eduguru.in/tutorial/c-tutorial-tutorial/merits-of-c-programming</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 29 Dec 2020 14:31:24 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[c language]]></category>
		<category><![CDATA[C language merits]]></category>
		<category><![CDATA[c programming]]></category>
		<category><![CDATA[C#]]></category>
		<category><![CDATA[Merits of C Programming]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14434</guid>

					<description><![CDATA[1. C is a general purpose programming language. You can generate games, business software, utilities, mathematical models, word processors, spreadsheets and other kinds of software. 2. C is a structured programming language. It uses structured statements such as while, for loops in place of goto statements which cause bugs (error) in the program. 3. System independence- ... <a title="Merits of C Programming" class="read-more" href="https://blog.eduguru.in/tutorial/c-tutorial-tutorial/merits-of-c-programming" aria-label="Read more about Merits of C Programming">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>difference between an Assembler and a Compiler?</title>
		<link>https://blog.eduguru.in/tutorial/c-tutorial-tutorial/difference-between-an-assembler-and-a-compiler</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Dec 2020 15:55:47 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[assembler]]></category>
		<category><![CDATA[compiler]]></category>
		<category><![CDATA[difference]]></category>
		<category><![CDATA[difference between an Assembler and a Compiler?]]></category>
		<category><![CDATA[programming]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14431</guid>

					<description><![CDATA[Compiler is a computer program that reads a program written in one language and translates it in to another language, while an assembler can be considered a special type of compiler which translates only Assembly language to machine code. Compilers usually produce the machine executable code directly from a high level language, But assemblers produce ... <a title="difference between an Assembler and a Compiler?" class="read-more" href="https://blog.eduguru.in/tutorial/c-tutorial-tutorial/difference-between-an-assembler-and-a-compiler" aria-label="Read more about difference between an Assembler and a Compiler?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Error 505</title>
		<link>https://blog.eduguru.in/info/error-505</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 18:56:05 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Error 505]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14429</guid>

					<description><![CDATA[505 is a error that is signaled by browser when HTTP version is not supported by server i.e. when server not able to identify the HTTP protocol version used in request. &#8230; 511 ( server demands user to authenticate) “ network authentication required ” when server needs user authentication to access request.]]></description>
		
		
		
			</item>
		<item>
		<title>Error 504</title>
		<link>https://blog.eduguru.in/info/error-504</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 18:48:51 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Error 504]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14426</guid>

					<description><![CDATA[The HyperText Transfer Protocol (HTTP) 504 Gateway Timeout server error response code indicates that the server, while acting as a gateway or proxy, did not get a response in time from the upstream server that it needed in order to complete the request.]]></description>
		
		
		
			</item>
		<item>
		<title>Error 503</title>
		<link>https://blog.eduguru.in/info/error-503</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 18:41:07 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[503 error]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Error 503]]></category>
		<category><![CDATA[error code]]></category>
		<category><![CDATA[ERROR LIST]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14424</guid>

					<description><![CDATA[The HyperText Transfer Protocol (HTTP) 503 Service Unavailable server error response code indicates that the server is not ready to handle the request. Common causes are a server that is down for maintenance or that is overloaded.]]></description>
		
		
		
			</item>
		<item>
		<title>Error 109</title>
		<link>https://blog.eduguru.in/info/error-109</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 18:22:27 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[109]]></category>
		<category><![CDATA[109 code]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Error 109]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14422</guid>

					<description><![CDATA[Banking error 109 means that your bank&#8217;s website needs you to update your password with them. You try to sign in to your bank&#8217;s website using the old password you entered.]]></description>
		
		
		
			</item>
		<item>
		<title>‘Earables’ the next milestone in wearable tech, say engineers</title>
		<link>https://blog.eduguru.in/news/earables-the-next-milestone-in-wearable-tech-say-engineers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 18:13:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA['AUDIO']]></category>
		<category><![CDATA[‘Earables’ the next milestone in wearable tech]]></category>
		<category><![CDATA[COMPUTING SENSORS]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[say engineers]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[WEARABLE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14419</guid>

					<description><![CDATA[A team of engineers based at the University of Illinois Grainger College of Engineering are exploring a new sub-area of mobile technology based on sophisticated and connected earphones.  “The leap from today’s earphones to ‘earables’ would mimic the transformation that we had seen from basic phones to smartphones,” explained Professor Romit Roy Choudhury, an expert ... <a title="‘Earables’ the next milestone in wearable tech, say engineers" class="read-more" href="https://blog.eduguru.in/news/earables-the-next-milestone-in-wearable-tech-say-engineers" aria-label="Read more about ‘Earables’ the next milestone in wearable tech, say engineers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Deep as chips: the new microprocessors powering AI</title>
		<link>https://blog.eduguru.in/news/deep-as-chips-the-new-microprocessors-powering-ai</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 18:05:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Deep as chips: the new microprocessors powering AI]]></category>
		<category><![CDATA[ELECTRONICS SEMICONDUCTORS]]></category>
		<category><![CDATA[PROCESSORS APPLICATION]]></category>
		<category><![CDATA[SEMICONDUCTOR TECHNOLOGY]]></category>
		<category><![CDATA[SPECIFIC PROCESSORS]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 11]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14417</guid>

					<description><![CDATA[Artificial intelligence is appearing everywhere, but normal CPUs are not efficient platforms for the technology. Efficiency will only come with a new breed of microprocessors that are engineered specifically for the AI workload of the 2020s.  The growing use of artificial intelligence (AI) is upscaling many standard types of IT workload as well as powering ... <a title="Deep as chips: the new microprocessors powering AI" class="read-more" href="https://blog.eduguru.in/news/deep-as-chips-the-new-microprocessors-powering-ai" aria-label="Read more about Deep as chips: the new microprocessors powering AI">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Beijing launches Alibaba antitrust investigation</title>
		<link>https://blog.eduguru.in/news/beijing-launches-alibaba-antitrust-investigation</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 17:44:10 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Beijing launches Alibaba antitrust investigation]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[COMPETITION FINANCE]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14415</guid>

					<description><![CDATA[China has opened an investigation into e-commerce giant Alibaba over alleged anti-competitive behaviour, regulators announced this week. Despite keeping a relatively low profile in Western countries, Alibaba Group is one of the world’s largest corporations, with offerings span e-commerce, AI, cloud computing, gaming, and financial services. Its success has made founder Jack Ma – a ... <a title="Beijing launches Alibaba antitrust investigation" class="read-more" href="https://blog.eduguru.in/news/beijing-launches-alibaba-antitrust-investigation" aria-label="Read more about Beijing launches Alibaba antitrust investigation">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘Comet chaser’ to boldly go where no probe has gone before</title>
		<link>https://blog.eduguru.in/news/comet-chaser-to-boldly-go-where-no-probe-has-gone-before</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 17:33:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘Comet chaser’ to boldly go where no probe has gone before]]></category>
		<category><![CDATA[Comet]]></category>
		<category><![CDATA[probe]]></category>
		<category><![CDATA[SPACE AGENCY]]></category>
		<category><![CDATA[SPACE EUROPEAN]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14413</guid>

					<description><![CDATA[The UK government has confirmed that work will soon begin on a state-of-the-art spacecraft that, for the first time, will track down and map comets in 3D. Thales Alenia Space, the French-Italian aerospace manufacturer with three sites in the UK, has won a contract to design the mothership for the ‘Comet Interceptor’ mission, which will ... <a title="‘Comet chaser’ to boldly go where no probe has gone before" class="read-more" href="https://blog.eduguru.in/news/comet-chaser-to-boldly-go-where-no-probe-has-gone-before" aria-label="Read more about ‘Comet chaser’ to boldly go where no probe has gone before">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Solar Orbiter makes Venus flyby as it heads towards the Sun</title>
		<link>https://blog.eduguru.in/news/solar-orbiter-makes-venus-flyby-as-it-heads-towards-the-sun</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 17:28:28 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Solar]]></category>
		<category><![CDATA[Solar Orbiter makes Venus flyby as it heads towards the Sun]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE AGENCY]]></category>
		<category><![CDATA[SPACE RESEARCH EUROPEAN]]></category>
		<category><![CDATA[Venus]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14411</guid>

					<description><![CDATA[The UK-built Solar Orbiter spacecraft is making a flyby of Venus, using the planet’s gravitational field to slingshot itself closer to the Sun. The spacecraft, which launched in February, will make its closest approach to the planet just after midday on 27 December. It will fly some 7,500 km from the Venus cloud tops while ... <a title="Solar Orbiter makes Venus flyby as it heads towards the Sun" class="read-more" href="https://blog.eduguru.in/news/solar-orbiter-makes-venus-flyby-as-it-heads-towards-the-sun" aria-label="Read more about Solar Orbiter makes Venus flyby as it heads towards the Sun">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Error 108</title>
		<link>https://blog.eduguru.in/info/error-108</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 17:23:42 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[108]]></category>
		<category><![CDATA[Code list]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Error 108]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14409</guid>

					<description><![CDATA[If you experience the error code UI-108, it typically points to either information stored on your device that needs to be refreshed or to a network connectivity problem. Follow the troubleshooting steps for your device below to resolve the issue.]]></description>
		
		
		
			</item>
		<item>
		<title>Error 107</title>
		<link>https://blog.eduguru.in/info/error-107</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 17:21:10 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Error 107]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14407</guid>

					<description><![CDATA[In Samsung TV error code 107 indicates OpenAPI problems. They are associated with the lack of the Internet, without which a smart hub cannot work. As a rule, network access disappears when the Instant-on feature is used.]]></description>
		
		
		
			</item>
		<item>
		<title>Error 106 Code</title>
		<link>https://blog.eduguru.in/info/error-106-code</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 17:19:33 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[106 error]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[error 106]]></category>
		<category><![CDATA[Error 106 Code]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14405</guid>

					<description><![CDATA[Error 106 is a common error experienced by Windows 7 users. Generating as a result of Misconfigured, damaged or corrupt system files on the computer, this is not a critical error. &#8230; Essentially, error 106 is one of the error codes employed by Windows and other compatible driver and software vendors.]]></description>
		
		
		
			</item>
		<item>
		<title>Error 105 Code</title>
		<link>https://blog.eduguru.in/info/error-105-code</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Dec 2020 17:17:49 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[105]]></category>
		<category><![CDATA[Code Error]]></category>
		<category><![CDATA[Error 105 Code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14403</guid>

					<description><![CDATA[ Error 105 is displayed following a DNS lookup failure, which means that after you enter the URL of the website you&#8217;re trying to reach in Google Chrome, the browser tries to translate a website&#8217;s name to its Internet address (IP address) by using a Domain Name System (DNS).]]></description>
		
		
		
			</item>
		<item>
		<title>104 Error</title>
		<link>https://blog.eduguru.in/info/104-error</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Dec 2020 16:07:35 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[!04]]></category>
		<category><![CDATA[104 Error]]></category>
		<category><![CDATA[error]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14399</guid>

					<description><![CDATA[This occurs when a packet is sent from your end of the connection but the other end does not recognize the connection; it will send back a packet with the RST bit set in order to forcibly close the connection. As a user you should try to open the site after some in time.]]></description>
		
		
		
			</item>
		<item>
		<title>103 Error</title>
		<link>https://blog.eduguru.in/info/103-error</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Dec 2020 16:04:16 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[103]]></category>
		<category><![CDATA[103 Error]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14396</guid>

					<description><![CDATA[Error #103 means eMail Verifier was unable to resolve the address that was specified. A prime example of this would be a mistyped IP address, or a domain name of an unknown or unreachable host.]]></description>
		
		
		
			</item>
		<item>
		<title>102 Error</title>
		<link>https://blog.eduguru.in/info/102-error</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Dec 2020 16:00:46 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[102]]></category>
		<category><![CDATA[102 Error]]></category>
		<category><![CDATA[error]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14394</guid>

					<description><![CDATA[The ERR_CONNECTION_REFUSED error is a client-side problem that can be caused by incorrect firewall, system or browser settings, but also by malware or a faulty Internet connection. &#8230; If the 102 error appears on Google Chrome, the browser first provides instructions on how to fix the ERR_CONNECTION_REFUSED message.]]></description>
		
		
		
			</item>
		<item>
		<title>101 Error Code</title>
		<link>https://blog.eduguru.in/info/101-error-code</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Dec 2020 15:57:18 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[101]]></category>
		<category><![CDATA[101 error]]></category>
		<category><![CDATA[101 Error Code]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[error code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14392</guid>

					<description><![CDATA[Runtime Error 101 is a problem that occurs on a Windows PC when a program stops working as a result of a corrupted file. The problem is fairly common among Windows systems, which have many third-party programs installed in the computer.]]></description>
		
		
		
			</item>
		<item>
		<title>HTTP status code 100 ?</title>
		<link>https://blog.eduguru.in/info/http-status-code-100</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Dec 2020 15:53:53 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[00]]></category>
		<category><![CDATA[http]]></category>
		<category><![CDATA[HTTP code]]></category>
		<category><![CDATA[HTTP status code 100 ?]]></category>
		<category><![CDATA[status code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14390</guid>

					<description><![CDATA[An error code 100 is a system error which is displayed as &#8216;ERROR_TOO_MANY_SEMAPHORES&#8217; or as a value 0x64. This error means that the system &#8216;cannot create another system semaphore. &#8216; A semaphore is used in controlling access to parallel programming or a multi-user platform through multiple processes.]]></description>
		
		
		
			</item>
		<item>
		<title>HTTP status code 000?</title>
		<link>https://blog.eduguru.in/info/http-status-code-000</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Dec 2020 15:05:05 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[code 000]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[error code]]></category>
		<category><![CDATA[http]]></category>
		<category><![CDATA[HTTP status code 000?]]></category>
		<category><![CDATA[status code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14386</guid>

					<description><![CDATA[000 is a common code to use when no HTTP code was received due to a network error. According to a knowledge base article for Amazon CloudFront, 000 also means that the client disconnected before completing the request for that service.]]></description>
		
		
		
			</item>
		<item>
		<title>What information does an SSL certificate contain?</title>
		<link>https://blog.eduguru.in/info/what-information-does-an-ssl-certificate-contain</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 16:17:52 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL certificates]]></category>
		<category><![CDATA[SSL certificates information]]></category>
		<category><![CDATA[What information does an SSL certificate contain?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14384</guid>

					<description><![CDATA[SSL certificates include: The domain name that the certificate was issued for Which person, organization, or device it was issued to Which certificate authority issued it The certificate authority&#8217;s digital signature Associated subdomains Issue date of the certificate Expiration date of the certificate The public key (the private key is kept secret) &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>How does SSL/TLS work?</title>
		<link>https://blog.eduguru.in/info/how-does-ssltls-work</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 16:13:58 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[How does SSL/TLS work?]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL work]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[TLS work]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14382</guid>

					<description><![CDATA[In order to provide a high degree of privacy, SSL encrypts data that is transmitted across the web. This means that anyone who tries to intercept this data will only see a garbled mix of characters that is nearly impossible to decrypt. SSL initiates an authentication process called a handshake between two communicating devices to ensure that both devices are ... <a title="How does SSL/TLS work?" class="read-more" href="https://blog.eduguru.in/info/how-does-ssltls-work" aria-label="Read more about How does SSL/TLS work?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Are SSL and TLS the same thing?</title>
		<link>https://blog.eduguru.in/info/are-ssl-and-tls-the-same-thing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 16:12:13 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Are SSL and TLS the same thing?]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[TLS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14380</guid>

					<description><![CDATA[SSL is the direct predecessor of another protocol called TLS (Transport Layer Security). In 1999 the Internet Engineering Task Force (IETF) proposed an update to SSL. Since this update was being developed by the IETF and Netscape was no longer involved, the name was changed to TLS. The differences between the final version of SSL ... <a title="Are SSL and TLS the same thing?" class="read-more" href="https://blog.eduguru.in/info/are-ssl-and-tls-the-same-thing" aria-label="Read more about Are SSL and TLS the same thing?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What are the types of SSL certificates?</title>
		<link>https://blog.eduguru.in/info/what-are-the-types-of-ssl-certificates</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 16:07:33 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL certificates]]></category>
		<category><![CDATA[SSL types]]></category>
		<category><![CDATA[types of SSL Certificates]]></category>
		<category><![CDATA[What are the types of SSL certificates?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14378</guid>

					<description><![CDATA[There are several different types of SSL certificates. One certificate can apply to a single website or several websites, depending on the type: Single-domain: A single-domain SSL certificate applies to only one domain (a &#8220;domain&#8221; is the name of a website, like www.cloudflare.com). Wildcard: Like a single-domain certificate, a wildcard SSL certificate applies to only one domain. However, ... <a title="What are the types of SSL certificates?" class="read-more" href="https://blog.eduguru.in/info/what-are-the-types-of-ssl-certificates" aria-label="Read more about What are the types of SSL certificates?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why is SSL/TLS important?</title>
		<link>https://blog.eduguru.in/info/why-is-ssltls-important</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 16:05:21 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL certificates]]></category>
		<category><![CDATA[Why is SSL/TLS important?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14376</guid>

					<description><![CDATA[Originally, data on the Web was transmitted in plaintext that anyone could read if they intercepted the message. For example, if a consumer visited a shopping website, placed an order, and entered their credit card number on the website, that credit card number would travel across the Internet unconcealed. SSL was created to correct this ... <a title="Why is SSL/TLS important?" class="read-more" href="https://blog.eduguru.in/info/why-is-ssltls-important" aria-label="Read more about Why is SSL/TLS important?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is a self-signed SSL certificate?</title>
		<link>https://blog.eduguru.in/info/what-is-a-self-signed-ssl-certificate</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 16:02:38 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Self-signed SSL certificatess]]></category>
		<category><![CDATA[signed SSl Certificates]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL certificates]]></category>
		<category><![CDATA[What is a self-signed SSL certificate?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14374</guid>

					<description><![CDATA[Technically, anyone can create their own SSL certificate by generating a public-private key pairing and including all the information mentioned above. Such certificates are called self-signed certificates because the digital signature used, instead of being from a CA, would be the website&#8217;s own private key. But with self-signed certificates, there&#8217;s no outside authority to verify ... <a title="What is a self-signed SSL certificate?" class="read-more" href="https://blog.eduguru.in/info/what-is-a-self-signed-ssl-certificate" aria-label="Read more about What is a self-signed SSL certificate?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is SSL?</title>
		<link>https://blog.eduguru.in/info/what-is-ssl</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 15:43:06 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Certificates]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[What is SSL?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14372</guid>

					<description><![CDATA[SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications. SSL is the predecessor to the modern TLS encryption used today. A website that implements SSL/TLS has &#8220;HTTPS&#8221; in its URL instead of &#8220;HTTP.&#8221;]]></description>
		
		
		
			</item>
		<item>
		<title>What is a test scenario?</title>
		<link>https://blog.eduguru.in/info/what-is-a-test-scenario</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 15:38:19 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test scenario]]></category>
		<category><![CDATA[What is a test scenario?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14368</guid>

					<description><![CDATA[A Test Scenario is a statement describing the functionality of the application to be tested. It is used for end to end testing of a feature and is generally derived from the use cases. Test scenarios can serve as the basis for lower-level test case creation. A single test scenario can cover one or more test cases.]]></description>
		
		
		
			</item>
		<item>
		<title>What is test cases in software testing?</title>
		<link>https://blog.eduguru.in/info/what-is-test-cases-in-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 15:35:52 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[cases]]></category>
		<category><![CDATA[new test cases]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[test cases]]></category>
		<category><![CDATA[Tester]]></category>
		<category><![CDATA[What is test cases in software testing?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14366</guid>

					<description><![CDATA[A TEST CASE is a set of actions executed to verify a particular feature or functionality of your software application. A Test Case contains test steps, test data, precondition, postcondition developed for specific test scenario to verify any requirement.]]></description>
		
		
		
			</item>
		<item>
		<title>Light engineering jokes for Christmas</title>
		<link>https://blog.eduguru.in/news/light-engineering-jokes-for-christmas</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 15:32:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CHRISTMAS]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[jokes]]></category>
		<category><![CDATA[Light engineering jokes for Christmas]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 12]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14364</guid>

					<description><![CDATA[It’s not been an easy year for anyone, so to brighten things up a bit we’ve collected together our favourite jokes with a technology twist. In terms of quality control, don’t worry, they’re all as clean as a whistle and definitely safe for work. One or two might even raise a smile.  Three statisticians go ... <a title="Light engineering jokes for Christmas" class="read-more" href="https://blog.eduguru.in/news/light-engineering-jokes-for-christmas" aria-label="Read more about Light engineering jokes for Christmas">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Quantum computer helps solve real-life logistics problem</title>
		<link>https://blog.eduguru.in/news/quantum-computer-helps-solve-real-life-logistics-problem-3</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Dec 2020 02:57:36 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMPUTING]]></category>
		<category><![CDATA[Quantum computer]]></category>
		<category><![CDATA[Quantum computer helps solve real-life logistics problem]]></category>
		<category><![CDATA[QUANTUM COMPUTING]]></category>
		<category><![CDATA[real life logistics]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14353</guid>

					<description><![CDATA[Researchers at Chalmers University of Technology in Sweden have demonstrated that small quantum computers can be used to solve problems with real applications.  Quantum computers hold the potential to exponentially expand computing power, transforming certain sectors such as cyber security and research. In 2019, Google researchers announced that they had reached “quantum supremacy”: a quantum computer ... <a title="Quantum computer helps solve real-life logistics problem" class="read-more" href="https://blog.eduguru.in/news/quantum-computer-helps-solve-real-life-logistics-problem-3" aria-label="Read more about Quantum computer helps solve real-life logistics problem">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install PHP 7.4 on CentOS 8</title>
		<link>https://blog.eduguru.in/php/install-php-7-4-on-centos-8</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 19 Dec 2020 04:03:22 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[00]]></category>
		<category><![CDATA[000 results (0.48 seconds) How to Install PHP 7.4 on CentOS 8 - Tecmintwww.tecmint.com › install-php-on-centos-8 Nov 6]]></category>
		<category><![CDATA[2019 — Step 1: Add EPEL and Remi Repositories. To get started]]></category>
		<category><![CDATA[84]]></category>
		<category><![CDATA[Skip to main contentAccessibility help Accessibility feedback Google php install centos 8 About 1]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14328</guid>

					<description><![CDATA[Install PHP 7.4 on CentOS 8 PHP, a recursive acronym for PHP Hypertext Preprocessor, is a popular server-side scripting language used in web development for creating powerful and dynamic websites. Step 1: Add EPEL and Remi Repositories To get started, you need to add EPEL &#38; Remi repository from where you will be able to install PHP 7.4 on CentOS 8 Linux. To install ... <a title="Install PHP 7.4 on CentOS 8" class="read-more" href="https://blog.eduguru.in/php/install-php-7-4-on-centos-8" aria-label="Read more about Install PHP 7.4 on CentOS 8">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install PhpMyAdmin On CentOS 8</title>
		<link>https://blog.eduguru.in/linux-2/install-phpmyadmin-on-centos-8</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sat, 19 Dec 2020 03:56:52 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[phpMyAdmin]]></category>
		<category><![CDATA[000 results (0.49 seconds) How to Install & Configure phpMyAdmin on CentOS 8phoenixnap.com › install-phpmyadmin-on-centos-8 Jun 2]]></category>
		<category><![CDATA[2020 — Step 1: Install phpMyAdmin on CentOS 8. The phpMyAdmin tool is not included in the default CentOS 8 repositories. However]]></category>
		<category><![CDATA[52]]></category>
		<category><![CDATA[Skip to main contentAccessibility help Accessibility feedback Google install phpmyadmin centos 8 About 7]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14326</guid>

					<description><![CDATA[Install PhpMyAdmin On CentOS 8 PhpMyAdmin is a graphical utility for managing databases. It’s typically used to remotely manage MySQL or MariaDB databases. phpMyAdmin : What is phpMyAdmin? Prerequisites Server with CentOS 8 Linux Installed Working MySQL or MariaDB database Terminal window / command line (Search &#62; terminal) User account with sudo or root privileges The phpMyAdmin tool is not ... <a title="Install PhpMyAdmin On CentOS 8" class="read-more" href="https://blog.eduguru.in/linux-2/install-phpmyadmin-on-centos-8" aria-label="Read more about Install PhpMyAdmin On CentOS 8">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>EU lays out plans for new digital regulatory regime</title>
		<link>https://blog.eduguru.in/news/eu-lays-out-plans-for-new-digital-regulatory-regime</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 16:27:23 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[COMPETITION]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[EU lays out plans for new digital regulatory regime]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14322</guid>

					<description><![CDATA[The EU Commission has outlined its long-awaited plans to overhaul ageing regulations for digital companies. Under the sweeping plans, the largest tech companies could face hefty fines and the threat of being broken up.  The Digital Markets Act and Digital Services Act will update the 20-year-old e-Commerce Directive, which regulates digital services in the EU. ... <a title="EU lays out plans for new digital regulatory regime" class="read-more" href="https://blog.eduguru.in/news/eu-lays-out-plans-for-new-digital-regulatory-regime" aria-label="Read more about EU lays out plans for new digital regulatory regime">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>No room for government complacency on AI, says Lords report</title>
		<link>https://blog.eduguru.in/news/no-room-for-government-complacency-on-ai-says-lords-report</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 16:22:00 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[ETHICS]]></category>
		<category><![CDATA[GOVERNMENT POLICIES]]></category>
		<category><![CDATA[No room for government complacency on AI]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[says Lords report]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14320</guid>

					<description><![CDATA[A new House of Lords report says the UK government needs to better coordinate its artificial intelligence (AI) policy and the use of data and technology by national and local government.  The main conclusions of the House of Lords Liaison Committee’s report, ‘AI in the UK: No Room for Complacency’, are that there is now ... <a title="No room for government complacency on AI, says Lords report" class="read-more" href="https://blog.eduguru.in/news/no-room-for-government-complacency-on-ai-says-lords-report" aria-label="Read more about No room for government complacency on AI, says Lords report">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Social platforms like Gab and 4Chan could face huge fines for misinformation spread</title>
		<link>https://blog.eduguru.in/news/social-platforms-like-gab-and-4chan-could-face-huge-fines-for-misinformation-spread</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 16:18:15 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[FAKE NEWS]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<category><![CDATA[Social platforms like Gab and 4Chan could face huge fines for misinformation spread]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14318</guid>

					<description><![CDATA[Niche social media platforms like Gab, 4Chan and Telegram have been described as “deeply problematic” due to the amount of misinformation they carry, including broad scepticism over the coronavirus vaccine.  Sarah Connolly, who works as director of security and online harms for the UK Department for Digital, Culture, Media and Sport (DCMS), was asked by ... <a title="Social platforms like Gab and 4Chan could face huge fines for misinformation spread" class="read-more" href="https://blog.eduguru.in/news/social-platforms-like-gab-and-4chan-could-face-huge-fines-for-misinformation-spread" aria-label="Read more about Social platforms like Gab and 4Chan could face huge fines for misinformation spread">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Quantum computer helps solve real-life logistics problem</title>
		<link>https://blog.eduguru.in/news/quantum-computer-helps-solve-real-life-logistics-problem</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 12:00:37 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMPUTING]]></category>
		<category><![CDATA[Quantum computer helps solve real-life logistics problem]]></category>
		<category><![CDATA[QUANTUM COMPUTING]]></category>
		<category><![CDATA[real life logistics]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14315</guid>

					<description><![CDATA[Researchers at Chalmers University of Technology in Sweden have demonstrated that small quantum computers can be used to solve problems with real applications.  Quantum computers hold the potential to exponentially expand computing power, transforming certain sectors such as cyber security and research. In 2019, Google researchers announced that they had reached “quantum supremacy”: a quantum computer ... <a title="Quantum computer helps solve real-life logistics problem" class="read-more" href="https://blog.eduguru.in/news/quantum-computer-helps-solve-real-life-logistics-problem" aria-label="Read more about Quantum computer helps solve real-life logistics problem">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Installing Java</title>
		<link>https://blog.eduguru.in/tutorial/java/installing-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 11:55:56 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[installing]]></category>
		<category><![CDATA[Installing Java]]></category>
		<category><![CDATA[java installing]]></category>
		<category><![CDATA[java programming]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14313</guid>

					<description><![CDATA[Here you are with your computer and you can’t wait to start writing Java applications. But first, you need to get yourself a JDK and install it. For this, you need an Internet connection to https://www.oracle.com/in/java/technologies/javase-downloads.html. and download the java in laoptop or pc.]]></description>
		
		
		
			</item>
		<item>
		<title>Videos beamed straight onto human retina via compact laser projector</title>
		<link>https://blog.eduguru.in/news/videos-beamed-straight-onto-human-retina-via-compact-laser-projector</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 14 Dec 2020 07:59:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUGMENTED]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[HUMAN FACTORS]]></category>
		<category><![CDATA[LASER DISPLAYS]]></category>
		<category><![CDATA[REALITY VIDEO]]></category>
		<category><![CDATA[Videos beamed straight onto human retina via compact laser projector]]></category>
		<category><![CDATA[Virtual reality]]></category>
		<category><![CDATA[VISION SYSTEMS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14309</guid>

					<description><![CDATA[A compact device capable of projecting images and video directly onto the retina of a human eye has been developed by researchers from the University of Fukui.  The Fukui team created the device by integrating a laser module capable of outputting red, green and blue lasers with a microelectromechanical (MEMS) mirror. The direction in which ... <a title="Videos beamed straight onto human retina via compact laser projector" class="read-more" href="https://blog.eduguru.in/news/videos-beamed-straight-onto-human-retina-via-compact-laser-projector" aria-label="Read more about Videos beamed straight onto human retina via compact laser projector">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Back story: Inge-Sarah Andersen, signalling engineer at Network Rail</title>
		<link>https://blog.eduguru.in/news/back-story-inge-sarah-andersen-signalling-engineer-at-network-rail</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 14 Dec 2020 07:56:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[BACK STORY]]></category>
		<category><![CDATA[Back story: Inge-Sarah Andersen]]></category>
		<category><![CDATA[ENGINEERING]]></category>
		<category><![CDATA[signalling engineer at Network Rail]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 12]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14307</guid>

					<description><![CDATA[TV presenter Dr Shini Somara talks to signalling engineer Inge-Sarah Andersen from Network Rail about her wealth of experiences and knowledge of industry, her inspirations and how she will continue to make an impact in engineering and technology.  Shini Somara: What technology are you involved with? Inge-Sarah Andersen: I am currently an assistant signalling project engineer at ... <a title="Back story: Inge-Sarah Andersen, signalling engineer at Network Rail" class="read-more" href="https://blog.eduguru.in/news/back-story-inge-sarah-andersen-signalling-engineer-at-network-rail" aria-label="Read more about Back story: Inge-Sarah Andersen, signalling engineer at Network Rail">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Encrypted messaging could increase child abuse cases, report warns</title>
		<link>https://blog.eduguru.in/news/encrypted-messaging-could-increase-child-abuse-cases-report-warns</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:43:18 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CHILDREN]]></category>
		<category><![CDATA[DIGITAL ENGINEERING]]></category>
		<category><![CDATA[Encrypted messaging could increase child abuse cases]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[report warns]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14305</guid>

					<description><![CDATA[Millions of children in England are using messaging platforms that they are not old enough to be accessing and the introduction of end-to-end encryption (E2EE) could increase their risk of exploitation, the Children’s Commissioner for England has warned in a report.  The Commissioner’s report follows announcements by Facebook &#8211; and indications by other social platforms, such as Snap &#8211; ... <a title="Encrypted messaging could increase child abuse cases, report warns" class="read-more" href="https://blog.eduguru.in/news/encrypted-messaging-could-increase-child-abuse-cases-report-warns" aria-label="Read more about Encrypted messaging could increase child abuse cases, report warns">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Servers pump iron</title>
		<link>https://blog.eduguru.in/news/servers-pump-iron</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:38:54 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[COMPUTING]]></category>
		<category><![CDATA[HIGH PERFORMANCE COMPUTING]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[Servers pump iron]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 12]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14303</guid>

					<description><![CDATA[High-powered computers are back, but how do we deal with their thirst for energy?  By the end of the 1980s, big iron was showing more than a touch of rust. Monster machines like the Cray-2 ruled supercomputing. It was an age when, supposedly, no-one got fired for buying IBM: Big Blue dominated enterprise computing with ... <a title="Servers pump iron" class="read-more" href="https://blog.eduguru.in/news/servers-pump-iron" aria-label="Read more about Servers pump iron">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>MIT study suggests promise for non-silicon transistors</title>
		<link>https://blog.eduguru.in/news/mit-study-suggests-promise-for-non-silicon-transistors</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:35:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMPUTING]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[MATERIALS]]></category>
		<category><![CDATA[MIT study suggests promise for non-silicon transistors]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[Science]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14301</guid>

					<description><![CDATA[An MIT study has demonstrated that deterioration in the performance of InGaAs (indium gallium arsenide) transistors at small scales is not an intrinsic property of the material.  For computing power to continue to improve into the future, supporting more computationally expensive processes, engineers will need to develop ever-smaller and more densely packed transistors. For decades, ... <a title="MIT study suggests promise for non-silicon transistors" class="read-more" href="https://blog.eduguru.in/news/mit-study-suggests-promise-for-non-silicon-transistors" aria-label="Read more about MIT study suggests promise for non-silicon transistors">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘All young people should be enabled to understand what engineering is’: Hilary Leevers</title>
		<link>https://blog.eduguru.in/news/all-young-people-should-be-enabled-to-understand-what-engineering-is-hilary-leevers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:33:18 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘All young people should be enabled to understand what engineering is’: Hilary Leevers]]></category>
		<category><![CDATA[CHILDREN]]></category>
		<category><![CDATA[EDUCATION]]></category>
		<category><![CDATA[ENGINEERING]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 12]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14299</guid>

					<description><![CDATA[CEO of EngineeringUK, Dr Hilary Leevers outlines the work being done by her organisation to inspire and engage with ‘tomorrow’s engineers’ in the 11-to-14-year-old age bracket and beyond.  “All young people should be enabled to understand what engineering is and be motivated to engage with it as a career pathway,” says Hilary Leevers. It’s a ... <a title="‘All young people should be enabled to understand what engineering is’: Hilary Leevers" class="read-more" href="https://blog.eduguru.in/news/all-young-people-should-be-enabled-to-understand-what-engineering-is-hilary-leevers" aria-label="Read more about ‘All young people should be enabled to understand what engineering is’: Hilary Leevers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>SDLC  INSTALLATION STAGE</title>
		<link>https://blog.eduguru.in/software-testing/sdlc-installation-stage</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:28:48 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[development]]></category>
		<category><![CDATA[installation stage]]></category>
		<category><![CDATA[SDLC]]></category>
		<category><![CDATA[SDLC INSTALLATION STAGE]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[Software Tester]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14297</guid>

					<description><![CDATA[Install System Components Cutover to the New System Conduct the Postimplementation Evaluation &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>SOFTWARE DEVELOPMENT FINAL CONSTRUCTION STAGE</title>
		<link>https://blog.eduguru.in/software-testing/software-development-final-construction-stage</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:26:02 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Final Stage of Construction of Software]]></category>
		<category><![CDATA[Software Construction]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[SOFTWARE DEVELOPMENT FINAL CONSTRUCTION STAGE]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14295</guid>

					<description><![CDATA[Construct and Test Production-Ready Software Construct and Test a Production-Ready Database or Warehouse Data Repository Install Any Required New Hardware and Connectivity Make Available the Physical Facility Test the Hardware Configuration Complete the Documentation Gain User Acceptance to “Go Live” Train Participants and Users &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>SOFTWARE DEVELOPMENT  DESIGN STAGE</title>
		<link>https://blog.eduguru.in/software-testing/software-development-design-stage</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:22:08 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Design Stage]]></category>
		<category><![CDATA[Development Design Stage of Software]]></category>
		<category><![CDATA[Software Development Design]]></category>
		<category><![CDATA[SOFTWARE DEVELOPMENT DESIGN STAGE]]></category>
		<category><![CDATA[Software Tester]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14293</guid>

					<description><![CDATA[-Identify the Feasible Designs Design the user interfaces (input and output) Design the procedures Design the data Design the interfaces with other systems Design the system controls Design the software -Evaluate the Feasible Designs -Conduct JAD Sessions to Confirm Designs and Evaluations -Select the Best Design &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>SOFTWARE DEVELOPMENT  ANALYSIS STAGE</title>
		<link>https://blog.eduguru.in/software-testing/software-development-analysis-stage</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:16:20 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[development]]></category>
		<category><![CDATA[Software Analysis Stage]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[SOFTWARE DEVELOPMENT ANALYSIS STAGE]]></category>
		<category><![CDATA[Software Tester]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[ST]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14290</guid>

					<description><![CDATA[Analyze Functional Requirements Analyze Existing System Documentation Conduct Personal Interviews Conduct Surveys Conduct JAD Sessions Observe the Existing System Document Functional Requirements &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>SOFTWARE DEVELOPMENT  PRELIMINARY INVESTIGATION STAGE</title>
		<link>https://blog.eduguru.in/software-testing/software-development-preliminary-investigation-stage</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:13:32 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[SOFTWARE DEVELOPMENT PRELIMINARY INVESTIGATION STAGE]]></category>
		<category><![CDATA[Software Tester]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Tester]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14288</guid>

					<description><![CDATA[Perform Enterprise Analysis Define System Goals, Objectives, and Performance Criteria Evaluate System and Project Risk Evaluate System and Project Feasibility Conduct Joint Application Design (JAD) Sessions to Confirm Preliminary Findings Receive Approval to Proceed &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>THE PHASED DEVELOPMENT METHODOLOGY</title>
		<link>https://blog.eduguru.in/software-testing/the-phased-development-methodology</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:10:36 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Development Methodology]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[THE PHASED DEVELOPMENT METHODOLOGY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14286</guid>

					<description><![CDATA[Life Cycle Stages System Development Phases Software Testing in the Stages &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>THE EVOLUTION OF SYSTEM DEVELOPMENT LIFE CYCLES</title>
		<link>https://blog.eduguru.in/software-testing/the-evolution-of-system-development-life-cycles</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:07:33 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Evolution of System Development]]></category>
		<category><![CDATA[Life Cycle]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[System Development Life Cycle]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[THE EVOLUTION OF SYSTEM DEVELOPMENT LIFE CYCLES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14284</guid>

					<description><![CDATA[The Classical SDLC Prototyping Rapid Application Development &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Software Development Life Cycle METHODOLOGIES AND TOOLS</title>
		<link>https://blog.eduguru.in/software-testing/software-development-life-cycle-methodologies-and-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 03:03:36 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Methodologies]]></category>
		<category><![CDATA[SDLC]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[Software Development Life Cycle METHODOLOGIES AND TOOLS]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing methodologies]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14282</guid>

					<description><![CDATA[Two terms that one often hears in relation to information systems development are methodologies and tools. A methodology is a recommended way of doing something, and a tool is a device for accomplishing a task. Relating these terms to the building of a house, the arhchitect’s blueprint is a methodology (the architect’s recommended way of building ... <a title="Software Development Life Cycle METHODOLOGIES AND TOOLS" class="read-more" href="https://blog.eduguru.in/software-testing/software-development-life-cycle-methodologies-and-tools" aria-label="Read more about Software Development Life Cycle METHODOLOGIES AND TOOLS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Ten Principles of Good Software Testing</title>
		<link>https://blog.eduguru.in/software-testing/the-ten-principles-of-good-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 02:59:22 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Good Software Testing]]></category>
		<category><![CDATA[Good Software Testing Principals]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Ten Principal of Testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Testing Principal]]></category>
		<category><![CDATA[The Ten Principles of Good Software Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14279</guid>

					<description><![CDATA[Y2K testing did not start in a vacuum. Several groups of computer professionals realized the need to develop a full repertoire of software testing techniques by the mid-1980s. By the 1990s, software testing whitepapers, seminars, and journal articles began to appear. This indicates that the groups of the 1980s were able to gain practical experience ... <a title="The Ten Principles of Good Software Testing" class="read-more" href="https://blog.eduguru.in/software-testing/the-ten-principles-of-good-software-testing" aria-label="Read more about The Ten Principles of Good Software Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Evolution of Software Testing as a Technology Profession</title>
		<link>https://blog.eduguru.in/software-testing/the-evolution-of-software-testing-as-a-technology-profession</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 02:56:17 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Technology Profession]]></category>
		<category><![CDATA[Testing Technology]]></category>
		<category><![CDATA[The Evolution of Software Testing as a Technology Profession]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14277</guid>

					<description><![CDATA[Back in the 1950s and 1960s, software quality was a hit-or-miss proposition. There were no formal development processes and no formal testing processes. Software developers of the 1970s and 1980s were, for the most part, successful in capturing their best development practices. This capture provided a repeatable level of software reliability and stability. Unfortunately for ... <a title="The Evolution of Software Testing as a Technology Profession" class="read-more" href="https://blog.eduguru.in/software-testing/the-evolution-of-software-testing-as-a-technology-profession" aria-label="Read more about The Evolution of Software Testing as a Technology Profession">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Development Axiom—Quality Must Be Built In Because Quality Cannot Be Tested In</title>
		<link>https://blog.eduguru.in/software-testing/development-axiom-quality-must-be-built-in-because-quality-cannot-be-tested-in</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 02:54:20 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Development Axiom—Quality Must Be Built In Because Quality Cannot Be Tested In]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Tester]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14275</guid>

					<description><![CDATA[Testing is concerned with what is in the product or system and what is missing. Testing can only verify the product or system and its operation against predetermined criteria. Testing neither adds nor takes away anything. Quality is an issue that is decided upon during the requirements and design phases by the development project owners ... <a title="Development Axiom—Quality Must Be Built In Because Quality Cannot Be Tested In" class="read-more" href="https://blog.eduguru.in/software-testing/development-axiom-quality-must-be-built-in-because-quality-cannot-be-tested-in" aria-label="Read more about Development Axiom—Quality Must Be Built In Because Quality Cannot Be Tested In">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>PUTTING SOFTWARE TESTING IN PERSPECTIVE</title>
		<link>https://blog.eduguru.in/software-testing/putting-software-testing-in-perspective</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 02:52:36 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[PUTTING SOFTWARE TESTING IN PERSPECTIVE]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Tester]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14273</guid>

					<description><![CDATA[Billions of dollars in business are lost annually because companies and software vendors fail to adequately test their software systems and products. These kinds of business losses are expected to continue as long as testing is considered just another check mark on a “To-do” list or a task given to employees who are on the ... <a title="PUTTING SOFTWARE TESTING IN PERSPECTIVE" class="read-more" href="https://blog.eduguru.in/software-testing/putting-software-testing-in-perspective" aria-label="Read more about PUTTING SOFTWARE TESTING IN PERSPECTIVE">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Who Is on the Test Team?</title>
		<link>https://blog.eduguru.in/software-testing/who-is-on-the-test-team</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 02:50:31 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Software Tester]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Team]]></category>
		<category><![CDATA[Test Team]]></category>
		<category><![CDATA[Tester Team]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Who Is on the Test Team?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14271</guid>

					<description><![CDATA[As with all other software professions, the software testing profession has entry level skills, intermediate-level skills, and advanced skills. A good test team has a mix of skill levels represented by its members. This enables the more experienced testers to be responsible for the test planning, scheduling, and analysis of test results. The intermediate-level testers ... <a title="Who Is on the Test Team?" class="read-more" href="https://blog.eduguru.in/software-testing/who-is-on-the-test-team" aria-label="Read more about Who Is on the Test Team?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Four Primary Objectives of Testing</title>
		<link>https://blog.eduguru.in/software-testing/the-four-primary-objectives-of-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 02:47:21 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Objectives of Testing]]></category>
		<category><![CDATA[Primary Objectives of Testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[The Four Primary Objectives of Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14269</guid>

					<description><![CDATA[Testing can be applied to a wide range of development projects in a large number of industries. In contrast to the diversity of testing opportunities, there is a common underpinning of objectives. The primary motivation for testing all business development projects is the same: to reduce the risk of unplanned development expense or, worse, the ... <a title="The Four Primary Objectives of Testing" class="read-more" href="https://blog.eduguru.in/software-testing/the-four-primary-objectives-of-testing" aria-label="Read more about The Four Primary Objectives of Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>THE IMPORTANCE OF SOFTWARE TESTING</title>
		<link>https://blog.eduguru.in/software-testing/the-importance-of-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 02:24:48 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[mportance of Software Testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[ST]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[THE IMPORTANCE OF SOFTWARE TESTING]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14267</guid>

					<description><![CDATA[Software Testing: Testing Across the Entire Lifecycle provides the fundamental concepts and approaches to software testing. The topic is important for two reasons. First, according to US Government surveys there has been an estimated $59.5B in business losses since 2000 due to poor quality software. Second, based on the authors’ inability to fi nd experienced ... <a title="THE IMPORTANCE OF SOFTWARE TESTING" class="read-more" href="https://blog.eduguru.in/software-testing/the-importance-of-software-testing" aria-label="Read more about THE IMPORTANCE OF SOFTWARE TESTING">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Windows Security is your home to manage the tools that protect your device and your data</title>
		<link>https://blog.eduguru.in/windows/windows-security-is-your-home-to-manage-the-tools-that-protect-your-device-and-your-data</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 02:22:48 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[manage Tools]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Tools List]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Security]]></category>
		<category><![CDATA[Windows Security is your home to manage the tools that protect your device and your data]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14263</guid>

					<description><![CDATA[Virus &#38; threat protection.  Account protection.  Firewall &#38; network protection.  App &#38; browser control.  Device security.  Device performance &#38; health.  Family options. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>IT Security Tools from Microsoft</title>
		<link>https://blog.eduguru.in/windows/it-security-tools-from-microsoft</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 02:19:47 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[IT Security Tools]]></category>
		<category><![CDATA[IT Security Tools from Microsoft]]></category>
		<category><![CDATA[Microsoft Tools]]></category>
		<category><![CDATA[security tools]]></category>
		<category><![CDATA[Security Tools List]]></category>
		<category><![CDATA[tools list]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14261</guid>

					<description><![CDATA[Windows 10. Windows 10 is Microsoft&#8217;s most secure operating system yet.  Enterprise Mobility + Security.  Azure Active Directory Identity Protection.  Windows Information Protection.  Office 365 Advanced Threat Protection (ATP) . Office 365 Data Loss Prevention.  Office 365 Advanced Security Management. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Free Windows Tools</title>
		<link>https://blog.eduguru.in/windows/free-windows-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 02:17:01 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Free Tools]]></category>
		<category><![CDATA[Free Windows Tools]]></category>
		<category><![CDATA[windows tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14259</guid>

					<description><![CDATA[Toolwiz Time Freeze. Toolwiz Time Freeze is a system sandbox that puts your computer in a deep-freeze state – any changes you or any software make to your system is discarded after reboot.  Comodo Firewall.  Malwarebytes.  Wise Folder Hider.  Free Opener. WPS Office.  WordExpander.  doPDF. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Linux security extensions</title>
		<link>https://blog.eduguru.in/linux-2/linux-security-extensions</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 02:10:54 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux security]]></category>
		<category><![CDATA[Linux security extensions]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security extensions]]></category>
		<category><![CDATA[security features]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14257</guid>

					<description><![CDATA[Unix Security – Discretionary Access Control. Extending Unix Security. Extended DAC. POSIX ACLs. POSIX Capabilities. Namespaces. Network Security. Cryptography. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Most Secure Operating Systems</title>
		<link>https://blog.eduguru.in/info/most-secure-operating-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 02:02:45 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Most Secure Operating Systems]]></category>
		<category><![CDATA[OPERATING SYSTEM]]></category>
		<category><![CDATA[OS]]></category>
		<category><![CDATA[secure operating system]]></category>
		<category><![CDATA[Security operating system]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14254</guid>

					<description><![CDATA[1. Qubes Operating System 2. TAILS OS 3. OpenBSD OS  4. Whonix OS 5. Pure OS 6. Debian OS 7.  IPredia OS 8. Kali Linux 9. BlackArch OS 10. Linux OS &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Google features</title>
		<link>https://blog.eduguru.in/info/google-features</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:55:15 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Features list]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[Google features]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14252</guid>

					<description><![CDATA[FIND THE BEST AND CHEAPEST FLIGHTS. There are a slew of travel sites including CheapTickets, Expedia, Hotwire, Kayak, Orbitz, Priceline, and Travelocity that help you book flights, hotels and vacations.  BUILD STUFF WITH LEGOS.  KEEP TRACK OF TIME.  TRANSLATE LANGUAGES.  COUNT CALORIES.  EXPLORE THE SKY.  USE GOOGLE LIKE A PRO. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>‘To think that technology alone will get us out of this hole is to live in cloud cuckoo land’: Mike Berners-Lee</title>
		<link>https://blog.eduguru.in/news/to-think-that-technology-alone-will-get-us-out-of-this-hole-is-to-live-in-cloud-cuckoo-land-mike-berners-lee</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:48:29 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘To think that technology alone will get us out of this hole is to live in cloud cuckoo land’: Mike Berners-Lee]]></category>
		<category><![CDATA[BOOKS]]></category>
		<category><![CDATA[CLIMATE CHANGE]]></category>
		<category><![CDATA[GLOBAL WARMING]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 12]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14250</guid>

					<description><![CDATA[When ‘There is No Planet B’ first hit our bookshops, this companion to saving the planet became an instant classic. We talk to its author, Mike Berners-Lee.  “Humans have quite suddenly become the biggest thing to affect the ecosystem,” says Mike Berners-Lee. What this new-found influence over the health of the planet means, says the ... <a title="‘To think that technology alone will get us out of this hole is to live in cloud cuckoo land’: Mike Berners-Lee" class="read-more" href="https://blog.eduguru.in/news/to-think-that-technology-alone-will-get-us-out-of-this-hole-is-to-live-in-cloud-cuckoo-land-mike-berners-lee" aria-label="Read more about ‘To think that technology alone will get us out of this hole is to live in cloud cuckoo land’: Mike Berners-Lee">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Science and research celebrated with The Infosys Prize 2020</title>
		<link>https://blog.eduguru.in/news/science-and-research-celebrated-with-the-infosys-prize-2020</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:45:07 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AWARDS]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[Science and research celebrated with The Infosys Prize 2020]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14248</guid>

					<description><![CDATA[The Infosys Science Foundation (ISF) has awarded the winners of the Infosys Prize 2020 for their outstanding contributions to science and research in a virtual awards ceremony on 2 December.  The pandemic has altered physical working conditions, yet technology has aided professionals to work from home. As well as this, the pandemic has urged us ... <a title="Science and research celebrated with The Infosys Prize 2020" class="read-more" href="https://blog.eduguru.in/news/science-and-research-celebrated-with-the-infosys-prize-2020" aria-label="Read more about Science and research celebrated with The Infosys Prize 2020">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Are you job ready?</title>
		<link>https://blog.eduguru.in/news/are-you-job-ready</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:42:05 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Are you job ready?]]></category>
		<category><![CDATA[COMMUNICATIONS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14246</guid>

					<description><![CDATA[The pandemic has thrown open fresh challenges and unknown opportunities. Jobs of the future will never be the same.  The lockdown has unlocked new unchartered avenues for the e-commerce industry, which has become India’s fastest-growing digital business with players like Amazon India’s Flex Delivery programme expanding to 35 cities. This initiative has opened up part-time job ... <a title="Are you job ready?" class="read-more" href="https://blog.eduguru.in/news/are-you-job-ready" aria-label="Read more about Are you job ready?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Chinese probe begins collecting rocks from lunar surface</title>
		<link>https://blog.eduguru.in/news/chinese-probe-begins-collecting-rocks-from-lunar-surface</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:37:19 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese probe begins collecting rocks from lunar surface]]></category>
		<category><![CDATA[Moon]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14244</guid>

					<description><![CDATA[A China National Space Administration spacecraft has touched down successfully on the Moon and started to collect its first rock samples, state media has reported.  The lunar probe, known as Chang’e 5, was launched last week from the tropical island of Hainan. The uncrewed mission aims to retrieve 2kg of lunar samples from a previously ... <a title="Chinese probe begins collecting rocks from lunar surface" class="read-more" href="https://blog.eduguru.in/news/chinese-probe-begins-collecting-rocks-from-lunar-surface" aria-label="Read more about Chinese probe begins collecting rocks from lunar surface">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Telescope maps unseen galaxies in record time</title>
		<link>https://blog.eduguru.in/news/telescope-maps-unseen-galaxies-in-record-time</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:33:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[Telescope]]></category>
		<category><![CDATA[Telescope maps unseen galaxies in record time]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14242</guid>

					<description><![CDATA[A radio telescope located in the Australian outback has mapped approximately three million galaxies in just 300 hours, the country’s national science agency (CSIRO) has said.  The Australian Square Kilometre Array Pathfinder (ASKAP) carried out a continuum survey to create a map of the universe. Most of the millions of star-like points on the map ... <a title="Telescope maps unseen galaxies in record time" class="read-more" href="https://blog.eduguru.in/news/telescope-maps-unseen-galaxies-in-record-time" aria-label="Read more about Telescope maps unseen galaxies in record time">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>SpaceX’s Starship explodes in crash-landing fireball after highest test flight</title>
		<link>https://blog.eduguru.in/news/spacexs-starship-explodes-in-crash-landing-fireball-after-highest-test-flight</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:31:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Mars]]></category>
		<category><![CDATA[RESEARCH]]></category>
		<category><![CDATA[ROCKETS]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACEX SPACE]]></category>
		<category><![CDATA[SpaceX’s Starship explodes in crash-landing fireball after highest test flight]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14240</guid>

					<description><![CDATA[SpaceX’s latest altitude test of its Starship rocket ended in disaster, when the craft burst into flames as it attempted to land. However, the company hailed the test flight as a success.  The Starship SN8 (Serial Number 8) was the latest iteration of a prototype rocket that SpaceX CEO Elon Musk hopes will one day send ... <a title="SpaceX’s Starship explodes in crash-landing fireball after highest test flight" class="read-more" href="https://blog.eduguru.in/news/spacexs-starship-explodes-in-crash-landing-fireball-after-highest-test-flight" aria-label="Read more about SpaceX’s Starship explodes in crash-landing fireball after highest test flight">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>800,000 trees to be planted across UK as part of Green Recovery Challenge</title>
		<link>https://blog.eduguru.in/news/800000-trees-to-be-planted-across-uk-as-part-of-green-recovery-challenge</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:28:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[000 trees to be planted across UK as part of Green Recovery Challenge]]></category>
		<category><![CDATA[800]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[GOVERNMENT POLICIES]]></category>
		<category><![CDATA[LOCAL GOVERNMENT]]></category>
		<category><![CDATA[nature]]></category>
		<category><![CDATA[trees planted]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14238</guid>

					<description><![CDATA[Sixty-eight projects in the UK will receive a multi-million pound boost from the government for green jobs and nature recovery.  The funding is to create over 300 hectares of woodlands, restore hedgerows and plant trees in cities as the UK government aims to deliver on its pledge to “build back greener” from the coronavirus pandemic. ... <a title="800,000 trees to be planted across UK as part of Green Recovery Challenge" class="read-more" href="https://blog.eduguru.in/news/800000-trees-to-be-planted-across-uk-as-part-of-green-recovery-challenge" aria-label="Read more about 800,000 trees to be planted across UK as part of Green Recovery Challenge">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>US antitrust action could force Facebook to divest Instagram and WhatsApp</title>
		<link>https://blog.eduguru.in/news/us-antitrust-action-could-force-facebook-to-divest-instagram-and-whatsapp</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 01:22:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[COMPETITION]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[LEGAL]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<category><![CDATA[US antitrust action could force Facebook to divest Instagram and WhatsApp]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14236</guid>

					<description><![CDATA[Facebook is facing what may be its greatest legal battle yet, with the Federal Trade Commission (FTC) and nearly every US state separately filing antitrust lawsuits against the company.  The competition watchdog has accused Facebook of engaging in a “bury or buy” strategy to eliminate competition, including by purchasing growing rivals Instagram (acquired in 2012 ... <a title="US antitrust action could force Facebook to divest Instagram and WhatsApp" class="read-more" href="https://blog.eduguru.in/news/us-antitrust-action-could-force-facebook-to-divest-instagram-and-whatsapp" aria-label="Read more about US antitrust action could force Facebook to divest Instagram and WhatsApp">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why Java is secure and robust?</title>
		<link>https://blog.eduguru.in/tutorial/java/why-java-is-secure-and-robust</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 16:08:11 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java language]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[secure language]]></category>
		<category><![CDATA[Why Java is secure and robust?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14233</guid>

					<description><![CDATA[Java is robust because: It uses strong memory management. There is a lack of pointers that avoids security problems. There is automatic garbage collection in java which runs on the Java Virtual Machine to get rid of objects which are not being used by a Java application anymore.]]></description>
		
		
		
			</item>
		<item>
		<title>Features of C Language</title>
		<link>https://blog.eduguru.in/tutorial/c-tutorial-tutorial/features-of-c-language-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 16:05:53 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[c language]]></category>
		<category><![CDATA[C Language features]]></category>
		<category><![CDATA[Features of C language]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14231</guid>

					<description><![CDATA[Simple Machine Independent or Portable Mid-level programming language structured programming language Rich Library Memory Management Fast Speed Pointers Recursion Extensible &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>SQL editor tools</title>
		<link>https://blog.eduguru.in/sql-server/sql-editor-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 16:02:35 +0000</pubDate>
				<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[Editor Tools]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL editor tools]]></category>
		<category><![CDATA[sql tools]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14228</guid>

					<description><![CDATA[Microsoft SQL Server Management Studio MySQL Workbench Oracle SQL Developer TablePlus Toad for SQL Server dbForge Studio  DBeaver HeidiSQL datapine SQL Editor DatabaseSpy SQL Editor &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Web Development Tools</title>
		<link>https://blog.eduguru.in/windows/web-development-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 17:06:14 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[development tools]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[Web Development Tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14226</guid>

					<description><![CDATA[Angular.JS. Chrome DevTools. Sass. Grunt. CodePen. TypeScript. GitHub. NPM. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Manual Testing Tools</title>
		<link>https://blog.eduguru.in/software-testing/manual-testing-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 16:55:54 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Manual testing]]></category>
		<category><![CDATA[Manual Testing Tools]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing tools]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14221</guid>

					<description><![CDATA[Selenium JMeter Loadrunner Test Link QTP Quality Center (ALM) Bugzilla Mantis Trac FogBugz &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Automation Tools for Software Testing</title>
		<link>https://blog.eduguru.in/software-testing/automation-tools-for-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 16:51:14 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Automation Tools for Software Testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing tools]]></category>
		<category><![CDATA[testing tools]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14219</guid>

					<description><![CDATA[Selenium TestingWhiz. &#8230; HPE Unified Functional Testing (HP – UFT formerly QTP) &#8230; TestComplete. &#8230; Ranorex. .. Sahi. &#8230; Watir. &#8230; Tosca Testsuite. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Royal Society calls for data-led net-zero transition</title>
		<link>https://blog.eduguru.in/news/royal-society-calls-for-data-led-net-zero-transition</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 14:26:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CHANGE DATA]]></category>
		<category><![CDATA[ENERGY CLIMATE]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[Royal Society calls for data-led net-zero transition]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14216</guid>

					<description><![CDATA[The Royal Society has published a report which identifies how the UK can play a leading role in tackling climate change through a data-led transition supported by the adoption of digital technologies.  While data-enabled technologies such as machine learning have boosted efficiency in some sectors, contributing to reductions in greenhouse gas emissions, they also have ... <a title="Royal Society calls for data-led net-zero transition" class="read-more" href="https://blog.eduguru.in/news/royal-society-calls-for-data-led-net-zero-transition" aria-label="Read more about Royal Society calls for data-led net-zero transition">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook’s Oversight Board tackles hate speech and nudity in first cases</title>
		<link>https://blog.eduguru.in/news/facebooks-oversight-board-tackles-hate-speech-and-nudity-in-first-cases</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 14:20:04 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CRIME]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Facebook’s Oversight Board tackles hate speech and nudity in first cases]]></category>
		<category><![CDATA[HATE]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14213</guid>

					<description><![CDATA[Facebook’s independent Oversight Board has announced the first cases on which it will deliberate, following the opening of user appeals in October.  First announced in 2018, the Board will have the final word on what content is permitted on Facebook and its subsidiary Instagram. It was created in response to criticism from various groups, particularly ... <a title="Facebook’s Oversight Board tackles hate speech and nudity in first cases" class="read-more" href="https://blog.eduguru.in/news/facebooks-oversight-board-tackles-hate-speech-and-nudity-in-first-cases" aria-label="Read more about Facebook’s Oversight Board tackles hate speech and nudity in first cases">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UK households revealed to be second worst in Europe for e-waste</title>
		<link>https://blog.eduguru.in/news/uk-households-revealed-to-be-second-worst-in-europe-for-e-waste</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 14:17:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[EUROPE]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[UK households revealed to be second worst in Europe for e-waste]]></category>
		<category><![CDATA[WASTE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14211</guid>

					<description><![CDATA[Britons produce the second largest amount of e-waste per person in Europe, a study has found.  In 2019 alone, there were 53.6 million tonnes of electronic waste generated globally according to statistics from the United Nations. With Christmas purchases expected to exacerbate the e-waste problem as consumers throw their old devices out, data from the ... <a title="UK households revealed to be second worst in Europe for e-waste" class="read-more" href="https://blog.eduguru.in/news/uk-households-revealed-to-be-second-worst-in-europe-for-e-waste" aria-label="Read more about UK households revealed to be second worst in Europe for e-waste">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Waterborne plastic tracked over thousands of kilometres</title>
		<link>https://blog.eduguru.in/news/waterborne-plastic-tracked-over-thousands-of-kilometres</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 14:14:25 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ENVIRONMENT]]></category>
		<category><![CDATA[PLASTICS]]></category>
		<category><![CDATA[POLLUTION]]></category>
		<category><![CDATA[WASTE]]></category>
		<category><![CDATA[Waterborne plastic tracked over thousands of kilometres]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14209</guid>

					<description><![CDATA[Plastic waste is able to travel thousands of kilometres in just a few months through rivers and oceans, a new study has found.  A team from the University of Exeter and the Zoological Society of London (ZSL) inserted GPS and satellite tags into 500ml bottles and released them into the Ganges river in India. The ... <a title="Waterborne plastic tracked over thousands of kilometres" class="read-more" href="https://blog.eduguru.in/news/waterborne-plastic-tracked-over-thousands-of-kilometres" aria-label="Read more about Waterborne plastic tracked over thousands of kilometres">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Robot fleet dives for climate answers in ‘marine snow’</title>
		<link>https://blog.eduguru.in/news/robot-fleet-dives-for-climate-answers-in-marine-snow</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 14:11:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CLIMATE CHANGE]]></category>
		<category><![CDATA[GLOBAL WARMING SENSORS]]></category>
		<category><![CDATA[MARINE]]></category>
		<category><![CDATA[RESEARCH]]></category>
		<category><![CDATA[Robot fleet dives for climate answers in ‘marine snow’]]></category>
		<category><![CDATA[ROBOTS]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14206</guid>

					<description><![CDATA[An Australian research voyage is under way to investigate how life in the Southern Ocean captures and stores carbon from the atmosphere.  A fleet of new-generation, deep-diving ocean robots will be deployed in the Southern Ocean in a major study of how marine life acts as a handbrake on global warming. The automated probes will ... <a title="Robot fleet dives for climate answers in ‘marine snow’" class="read-more" href="https://blog.eduguru.in/news/robot-fleet-dives-for-climate-answers-in-marine-snow" aria-label="Read more about Robot fleet dives for climate answers in ‘marine snow’">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Cambridge University launches master’s degree in AI ethics</title>
		<link>https://blog.eduguru.in/news/cambridge-university-launches-masters-degree-in-ai-ethics</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 14:07:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Cambridge University launches master’s degree in AI ethics]]></category>
		<category><![CDATA[EDUCATION]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[ETHICS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14204</guid>

					<description><![CDATA[The University of Cambridge will offer a master’s degree course focused on the responsible use of artificial intelligence, which it says will be the UK’s first.  The course will be led by the university’s Leverhulme Centre for the Future of Intelligence (CFI), in partnership with the university’s Institute for Continuing Education. It is designed for ... <a title="Cambridge University launches master’s degree in AI ethics" class="read-more" href="https://blog.eduguru.in/news/cambridge-university-launches-masters-degree-in-ai-ethics" aria-label="Read more about Cambridge University launches master’s degree in AI ethics">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook poised to launch scaled-back Libra cryptocurrency in January</title>
		<link>https://blog.eduguru.in/news/facebook-poised-to-launch-scaled-back-libra-cryptocurrency-in-january</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 16:31:00 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CRYPTOCURRENCY]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Facebook poised to launch scaled-back Libra cryptocurrency in January]]></category>
		<category><![CDATA[FINANCE]]></category>
		<category><![CDATA[Libra cryptocurrency]]></category>
		<category><![CDATA[scaled back]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14202</guid>

					<description><![CDATA[Facebook’s Libra cryptocurrency could finally launch in January, the Financial Times (FT) has reported citing three sources involved in the project.  The social network originally announced the project last year, with tentative plans to launch in 2020 as a way to encourage people to make more financial transactions online. The payment method revolves around a digital ... <a title="Facebook poised to launch scaled-back Libra cryptocurrency in January" class="read-more" href="https://blog.eduguru.in/news/facebook-poised-to-launch-scaled-back-libra-cryptocurrency-in-january" aria-label="Read more about Facebook poised to launch scaled-back Libra cryptocurrency in January">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hollowed-out optical fibres promise big boost for internet infrastructure</title>
		<link>https://blog.eduguru.in/news/hollowed-out-optical-fibres-promise-big-boost-for-internet-infrastructure</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 16:25:26 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMMUNICATIONS]]></category>
		<category><![CDATA[FIBRE OPTICS]]></category>
		<category><![CDATA[Hollowed-out optical fibres promise big boost for internet infrastructure]]></category>
		<category><![CDATA[INFRASTRUCTURE]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[sensors]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14200</guid>

					<description><![CDATA[Optical fibres, the cornerstone technology for high-speed data transfer, can be given a significant performance boost by hollowing out their centre, researchers from Southampton University have discovered.  Optical fibres, which are made of silica glass, have long been the transmission medium of choice for high-speed optical communications as well as for other uses such as ... <a title="Hollowed-out optical fibres promise big boost for internet infrastructure" class="read-more" href="https://blog.eduguru.in/news/hollowed-out-optical-fibres-promise-big-boost-for-internet-infrastructure" aria-label="Read more about Hollowed-out optical fibres promise big boost for internet infrastructure">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Telescope maps most of observable universe in record time</title>
		<link>https://blog.eduguru.in/news/telescope-maps-most-of-observable-universe-in-record-time</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 16:20:32 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[Telescope]]></category>
		<category><![CDATA[Telescope maps most of observable universe in record time]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14197</guid>

					<description><![CDATA[A radio telescope located in the Australian outback has mapped approximately three million galaxies in just 300 hours, the country’s national science agency (CSIRO) has said.  The Australian Square Kilometre Array Pathfinder (ASKAP) carried out a continuum survey to create a map of the universe. Most of the millions of star-like points on the map ... <a title="Telescope maps most of observable universe in record time" class="read-more" href="https://blog.eduguru.in/news/telescope-maps-most-of-observable-universe-in-record-time" aria-label="Read more about Telescope maps most of observable universe in record time">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hybrid 5G/satellite testing facility to open in Oxfordshire next year</title>
		<link>https://blog.eduguru.in/news/hybrid-5gsatellite-testing-facility-to-open-in-oxfordshire-next-year</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 16:17:33 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Hybrid 5G/satellite testing facility to open in Oxfordshire next year]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14195</guid>

					<description><![CDATA[A facility for testing 5G and satellite technology is to be created at the Harwell Campus in Oxfordshire, with £3m in government funding.  The engineering hub, which is due for completion in 2021, will provide a base for UK researchers and businesses to experiment, and will allow teams to test the benefits of hybrid 5G ... <a title="Hybrid 5G/satellite testing facility to open in Oxfordshire next year" class="read-more" href="https://blog.eduguru.in/news/hybrid-5gsatellite-testing-facility-to-open-in-oxfordshire-next-year" aria-label="Read more about Hybrid 5G/satellite testing facility to open in Oxfordshire next year">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Operators must stop installing Huawei 5G kit from next September</title>
		<link>https://blog.eduguru.in/news/operators-must-stop-installing-huawei-5g-kit-from-next-september</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 16:12:00 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[CYBERSECURITY]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[Operators must stop installing Huawei 5G kit from next September]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14193</guid>

					<description><![CDATA[The UK government has announced that UK mobile operators must stop installing new Huawei 5G equipment after September next year, following its decision to impose stricter restrictions on “high risk” vendors.  In July, the Government announced that – despite previously permitting Huawei a limited role providing equipment for the non-core parts of the UK’s 5G network – ... <a title="Operators must stop installing Huawei 5G kit from next September" class="read-more" href="https://blog.eduguru.in/news/operators-must-stop-installing-huawei-5g-kit-from-next-september" aria-label="Read more about Operators must stop installing Huawei 5G kit from next September">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How the Software Development Life Cycle Works</title>
		<link>https://blog.eduguru.in/software-testing/how-the-software-development-life-cycle-works</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 16:02:34 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[How the Software Development Life Cycle Works]]></category>
		<category><![CDATA[SDLC]]></category>
		<category><![CDATA[software development]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14191</guid>

					<description><![CDATA[SDLC works by lowering the cost of software development while simultaneously improving quality and shortening production time. SDLC achieves these apparently divergent goals by following a plan that removes the typical pitfalls of software development projects. That plan starts by evaluating existing systems for deficiencies. Next, it defines the requirements of the new system. It ... <a title="How the Software Development Life Cycle Works" class="read-more" href="https://blog.eduguru.in/software-testing/how-the-software-development-life-cycle-works" aria-label="Read more about How the Software Development Life Cycle Works">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Development Life Cycle</title>
		<link>https://blog.eduguru.in/software-testing/software-development-life-cycle</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 15:59:44 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[SDLC]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[Software Development Life Cycle]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14189</guid>

					<description><![CDATA[The Software Development Life Cycle (SDLC) refers to a methodology with clearly defined processes for creating high-quality software. in detail, the SDLC methodology focuses on the following phases of software development: Requirement analysis Planning Software design such as architectural design Software development Testing Deployment &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Windows Server Administrators Tools</title>
		<link>https://blog.eduguru.in/windows/windows-server-administrators-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 14:59:13 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[server administration. windows server administration tools]]></category>
		<category><![CDATA[server administrators tools]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Server Administrators Tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14185</guid>

					<description><![CDATA[Core Configurators Active Directory Best Practices Analyzer Active Directory Explorer Viewfinity Local Admin Discovery Remote Desktop Manager Desktop Central Free Windows Admin Tools &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>UK government launches information warfare network</title>
		<link>https://blog.eduguru.in/uncategorized/uk-government-launches-information-warfare-network</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 12:49:58 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[DEFENCE]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[FAKE NEWS]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[UK government launches information warfare network]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14183</guid>

					<description><![CDATA[The UK Government has launched a new approach, through a network of technical experts, to find ways to conduct information warfare.  Concepts such as false information, fake news, or information warfare are not novel, but technology and innovation have created an expressway for its dissemination. An information warfare network, called @HutEighteen, has been launched in partnership with ... <a title="UK government launches information warfare network" class="read-more" href="https://blog.eduguru.in/uncategorized/uk-government-launches-information-warfare-network" aria-label="Read more about UK government launches information warfare network">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Early cancer detection and other AI projects receive £20m UK funding</title>
		<link>https://blog.eduguru.in/news/early-cancer-detection-and-other-ai-projects-receive-20m-uk-funding</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 12:41:31 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Early cancer detection and other AI projects receive £20m UK funding]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14181</guid>

					<description><![CDATA[The government has announced £20m funding for AI projects including one that could enable the early detection of cancer.  The Turing AI Acceleration Fellowships will give 15 of the UK’s top AI researchers money to help speed up their projects in everything from medical diagnosis to increasing workplace productivity. The Department for Business, Energy &#38; ... <a title="Early cancer detection and other AI projects receive £20m UK funding" class="read-more" href="https://blog.eduguru.in/news/early-cancer-detection-and-other-ai-projects-receive-20m-uk-funding" aria-label="Read more about Early cancer detection and other AI projects receive £20m UK funding">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Sticky Keys</title>
		<link>https://blog.eduguru.in/windows/sticky-keys</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 03:50:50 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Accessibility Options]]></category>
		<category><![CDATA[modifier keys]]></category>
		<category><![CDATA[Sticky Keys]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[windows key]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14179</guid>

					<description><![CDATA[Sticky Keys is a Microsoft Windows accessibility feature that causes modifier keys to remain active, even after they were pressed and released, making it easier to use keyboard shortcuts. The Sticky Keys feature helps alleviate some stress on your fingers by not having to press and hold keys to use shortcut key combinations. You only need to press ... <a title="Sticky Keys" class="read-more" href="https://blog.eduguru.in/windows/sticky-keys" aria-label="Read more about Sticky Keys">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Take Screenshots</title>
		<link>https://blog.eduguru.in/windows/how-to-take-screenshots</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 03:46:12 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[How to Take Screenshots]]></category>
		<category><![CDATA[screen captures key]]></category>
		<category><![CDATA[screenshots]]></category>
		<category><![CDATA[take screenshots]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14177</guid>

					<description><![CDATA[1. Use the keyboard shortcut: PrtScn (Print Screen) or CTRL + PrtScn 2. Use the keyboard shortcut: Windows + PrtScn 3. Use the keyboard shortcut: Alt + PrtScn 4. Use the keyboard shortcut: Windows + Shift + S (Windows 10 only) 5. Use the Snipping Tool 6. Use the Snip &#38; Sketch app (Windows 10 ... <a title="How to Take Screenshots" class="read-more" href="https://blog.eduguru.in/windows/how-to-take-screenshots" aria-label="Read more about How to Take Screenshots">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Configuring firewalls on Windows 10</title>
		<link>https://blog.eduguru.in/windows/configuring-firewalls-on-windows-10</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 03:40:29 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Configuring firewalls on Windows 10]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[firewalls on windows 10]]></category>
		<category><![CDATA[windows 10]]></category>
		<category><![CDATA[Windows Security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14175</guid>

					<description><![CDATA[These are the steps for opening any specific port on the Windows 10 firewall: 1) Search “firewall” and click on Windows Defender Firewall, as shown below: 2) Click on Inbound Rules, as shown. 3) Click on New Rule, select port and click Next as shown: 4) Enter a specific port number. In this case, it’s 443. Click Next. 5) Allow ... <a title="Configuring firewalls on Windows 10" class="read-more" href="https://blog.eduguru.in/windows/configuring-firewalls-on-windows-10" aria-label="Read more about Configuring firewalls on Windows 10">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>mobile app development tools</title>
		<link>https://blog.eduguru.in/info/mobile-app-development-tool</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 03:26:13 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Qlikview]]></category>
		<category><![CDATA[app development tools name list]]></category>
		<category><![CDATA[app name list]]></category>
		<category><![CDATA[Development software]]></category>
		<category><![CDATA[development tools]]></category>
		<category><![CDATA[mobile app]]></category>
		<category><![CDATA[mobile app development software]]></category>
		<category><![CDATA[mobile app development tool]]></category>
		<category><![CDATA[software list]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14172</guid>

					<description><![CDATA[1. Xcode 2. Android Studio 3. AppCode 4. Appcelerator 5. Xamarin 6. Adobe PhoneGap 7. Ionic 8. React Native 9. MobiLoud 10. Ninox 11. Sencha 12. NativeScript 13. Onsen UI 14. OutSystems 15. Fliplet 16. TrackVIA 17. AppSheet 18. Quick Base 19. Alpha anywhere 20. BuildFire  ]]></description>
		
		
		
			</item>
		<item>
		<title>Task Management Software Tools</title>
		<link>https://blog.eduguru.in/info/task-management-software-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 03:19:05 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Qlikview]]></category>
		<category><![CDATA[management software]]></category>
		<category><![CDATA[management tools list]]></category>
		<category><![CDATA[Software name list]]></category>
		<category><![CDATA[Software tools]]></category>
		<category><![CDATA[task management]]></category>
		<category><![CDATA[Task Management Software Tools]]></category>
		<category><![CDATA[Task management tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14170</guid>

					<description><![CDATA[monday.com Nifty Quire Backlog MeisterTask Quixy Paymo Wrike Asana Centrallo Trello Task Manager Smartsheet Wunderlist Rationalplan &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Server Management &#038; Monitoring Software</title>
		<link>https://blog.eduguru.in/info/server-management-monitoring-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 03:12:20 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Qlikview]]></category>
		<category><![CDATA[management tools]]></category>
		<category><![CDATA[Monitoring software]]></category>
		<category><![CDATA[Monitoring tools list]]></category>
		<category><![CDATA[Server Management & Monitoring Software]]></category>
		<category><![CDATA[server management tools]]></category>
		<category><![CDATA[server management tools name list]]></category>
		<category><![CDATA[tools list]]></category>
		<category><![CDATA[tools name list]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14168</guid>

					<description><![CDATA[1. Hyperic HQ 2. Nagios 3. ZABBIX 1.8 4. SolarWinds – Orion Network Performance Monitor 10.1 5. WhatsUp Gold- Gold Premium: Benefits 6. ManageEngine OpManager 7. Sciencelogic EM 8. GFI Network Server Monitor 9. OpenNMS : OpenNMS 1.6.10 10. Paessler :  PRTG Network Monitor Version  8 11. Spiceworks : Spiceworks Help Desk &#38; Network Monitoring Platform &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Data Recovery Software for Windows</title>
		<link>https://blog.eduguru.in/windows/data-recovery-software-for-windows</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 03:07:03 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Data recovery]]></category>
		<category><![CDATA[Data Recovery Software for Windows]]></category>
		<category><![CDATA[Recovery software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Recovery]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14166</guid>

					<description><![CDATA[1. Disk Drill Data Recovery for Windows 2. Prosoft Data Rescue 5 for Windows 3. Recuva 4. DM Disk Editor and Data Recovery Software 5. R-Studio for Windows 6. Stellar Data Recovery Professional For Windows 7. MiniTool Power Data Recovery &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Administrative Tools in Windows</title>
		<link>https://blog.eduguru.in/windows/administrative-tools-in-windows</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 03:03:43 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Administration tools list]]></category>
		<category><![CDATA[Administrative Tools in Windows]]></category>
		<category><![CDATA[Administrative tools name]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[windows tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14164</guid>

					<description><![CDATA[Component Services Computer Management Defragment and Optimize Drives Disk Cleanup Event Viewer iSCSI Initiator Local Security Policy ODBC Data Sources Performance Monitor Print Management Recovery Drive Registry Editor Resource Monitor Services System Configuration System Information Task Scheduler Windows Firewall with Advanced Security Windows Memory Diagnostic &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>App Development Software</title>
		<link>https://blog.eduguru.in/windows/app-development-software</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 03:00:16 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[App development]]></category>
		<category><![CDATA[App Development Software]]></category>
		<category><![CDATA[Development list]]></category>
		<category><![CDATA[Development software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software name list]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14162</guid>

					<description><![CDATA[Swing2App Quixy AppyPie AppSheet Bizness Apps Appery.io iBuildApp Shoutem Rollbar JIRA AppInstitute GoodBarber Caspio]]></description>
		
		
		
			</item>
		<item>
		<title>Windows OS</title>
		<link>https://blog.eduguru.in/windows/windows-os</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 02:55:19 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[OPERATING SYSTEM]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows OS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14160</guid>

					<description><![CDATA[MS-DOS Windows 1.0 &#8211; 2.0 Windows 3.0 – 3.1 Windows 95 Windows 98 Windows ME &#8211; Millennium Edition Windows NT 31. &#8211; 4.0 Windows 2000 Windows XP Windows Vista Windows 7 Windows 8 Windows 10 Windows Server Windows Home Server Windows CE Windows Mobile Windows Phone 7-10 &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Engineers shrink memory device to one square nanometre</title>
		<link>https://blog.eduguru.in/news/engineers-shrink-memory-device-to-one-square-nanometre</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 02:49:41 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DATA STORAGE]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[Engineers shrink memory device to one square nanometre]]></category>
		<category><![CDATA[MEMORY]]></category>
		<category><![CDATA[NANOTECHNOLOGY]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[Shrink memory]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14158</guid>

					<description><![CDATA[University of Texas-Austin engineers have created the smallest memory device yet which uses just a single atom to control its memory function.  The project builds on a discovery from two years ago, when the same group of researchers created what was then the thinnest memory storage device, with a single atomic layer of thickness. This ... <a title="Engineers shrink memory device to one square nanometre" class="read-more" href="https://blog.eduguru.in/news/engineers-shrink-memory-device-to-one-square-nanometre" aria-label="Read more about Engineers shrink memory device to one square nanometre">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UK reliance on foreign satellites risks ‘economic blackout’</title>
		<link>https://blog.eduguru.in/news/uk-reliance-on-foreign-satellites-risks-economic-blackout</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 02:47:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DEFENCE]]></category>
		<category><![CDATA[Economic blackout]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[UK reliance on foreign satellites risks ‘economic blackout’]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14156</guid>

					<description><![CDATA[Britain could risk an “economic blackout” due to its heavy reliance on foreign satellites, the chairman of UKspace has said.  Analysis by the trade body representing the UK’s space sector found that at least 90 per cent of the data sent through satellite services relies on those sent up by other nations including the US and ... <a title="UK reliance on foreign satellites risks ‘economic blackout’" class="read-more" href="https://blog.eduguru.in/news/uk-reliance-on-foreign-satellites-risks-economic-blackout" aria-label="Read more about UK reliance on foreign satellites risks ‘economic blackout’">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Testing Goals</title>
		<link>https://blog.eduguru.in/software-testing/software-testing-goals</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 15:26:50 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[goals]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Software Testing Goals]]></category>
		<category><![CDATA[testing goals]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14153</guid>

					<description><![CDATA[The three main goals of Software Testing are: Defect Detection: Find defects / bugs in the software during all stages of its development (earlier, the better). Defect Prevention: As a consequence of defect detection, help anticipate and prevent defects from occurring at later stages of development or from recurring in the future. User Satisfaction: Ensure customers / users ... <a title="Software Testing Goals" class="read-more" href="https://blog.eduguru.in/software-testing/software-testing-goals" aria-label="Read more about Software Testing Goals">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>History of software testing</title>
		<link>https://blog.eduguru.in/software-testing/history-of-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 15:24:22 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[History of software testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing history]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14151</guid>

					<description><![CDATA[Debugging period (1947–1956) In 1947, the terms “bug” and “debugging” were coined. Grace Murray, a Harvard University scientist who worked with the Mark II computer, detected that a moth had got stuck in a relay causing it not to make contact. He detailed the incident in the work log, pasting the moth with tape as ... <a title="History of software testing" class="read-more" href="https://blog.eduguru.in/software-testing/history-of-software-testing" aria-label="Read more about History of software testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>China’s electric vehicle push spells doom and gloom for oil demand growth</title>
		<link>https://blog.eduguru.in/news/chinas-electric-vehicle-push-spells-doom-and-gloom-for-oil-demand-growth</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 05:33:14 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[china`s electric vehicle]]></category>
		<category><![CDATA[China’s electric vehicle push spells doom and gloom for oil demand growth]]></category>
		<category><![CDATA[electric cars]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[FOSSIL FUELS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14147</guid>

					<description><![CDATA[China’s push to increase the adoption of electric vehicles (EVs) could curb the growth in oil demand by 70 per cent by 2030, a report from financial think tank Carbon Tracker has found.  It reports that transport in emerging markets will account for more than 80 per cent of all expected growth in oil demand ... <a title="China’s electric vehicle push spells doom and gloom for oil demand growth" class="read-more" href="https://blog.eduguru.in/news/chinas-electric-vehicle-push-spells-doom-and-gloom-for-oil-demand-growth" aria-label="Read more about China’s electric vehicle push spells doom and gloom for oil demand growth">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘Krokodyl’ robot to be installed in HS2 tunnel-boring machines</title>
		<link>https://blog.eduguru.in/news/krokodyl-robot-to-be-installed-in-hs2-tunnel-boring-machines</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 05:30:37 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘Krokodyl’ robot to be installed in HS2 tunnel-boring machines]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[HEALTH AND SAFETY]]></category>
		<category><![CDATA[HS2]]></category>
		<category><![CDATA[INFRASTRUCTURE]]></category>
		<category><![CDATA[RAILWAYS]]></category>
		<category><![CDATA[ROBOTICS]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<category><![CDATA[TUNNELS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14145</guid>

					<description><![CDATA[HS2 Ltd has outlined its plans to incorporate robotic arms in its two tunnel-boring machines (TBMs), used to bore the 16km Chiltern Tunnel.  The two 170m-long, 2,000-tonne TBMs – nicknamed Cecilia and Florence – were revealed in August. Beginning at a site near the M25, they will dig as deep as 90m below the Chilterns, ... <a title="‘Krokodyl’ robot to be installed in HS2 tunnel-boring machines" class="read-more" href="https://blog.eduguru.in/news/krokodyl-robot-to-be-installed-in-hs2-tunnel-boring-machines" aria-label="Read more about ‘Krokodyl’ robot to be installed in HS2 tunnel-boring machines">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Structure of owl feathers inspires prospect of quieter aircraft</title>
		<link>https://blog.eduguru.in/news/structure-of-owl-feathers-inspires-prospect-of-quieter-aircraft</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 05:27:18 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AEROSPACE]]></category>
		<category><![CDATA[AIRCRAFT]]></category>
		<category><![CDATA[ANIMALS]]></category>
		<category><![CDATA[BIOLOGY]]></category>
		<category><![CDATA[nature]]></category>
		<category><![CDATA[Structure of owl feathers inspires prospect of quieter aircraft]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14143</guid>

					<description><![CDATA[A UK study has revealed how micro-structured finlets on owl feathers enable silent flight – a discovery that could pave the way for reducing the noise of future aircraft.  The study was conducted by researchers at City, University of London, led by Professor Christoph Bruecker, and was published in the Institute of Physics journal, Bioinspiration and Biomimetics. ... <a title="Structure of owl feathers inspires prospect of quieter aircraft" class="read-more" href="https://blog.eduguru.in/news/structure-of-owl-feathers-inspires-prospect-of-quieter-aircraft" aria-label="Read more about Structure of owl feathers inspires prospect of quieter aircraft">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Welsh Government deprioritises cars for lower carbon forms of transport</title>
		<link>https://blog.eduguru.in/news/welsh-government-deprioritises-cars-for-lower-carbon-forms-of-transport</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 05:25:07 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[WALES POLITICS]]></category>
		<category><![CDATA[Welsh Government deprioritises cars for lower carbon forms of transport]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14141</guid>

					<description><![CDATA[The Welsh Government has revealed its draft strategy to reduce carbon emissions in the transport sector, placing private cars at the bottom of the list for investment.  Transport currently makes up 17 per cent of Wales’ carbon emissions and the draft strategy, Llwybr Newydd – New Path, is set to shape the country’s transport system over ... <a title="Welsh Government deprioritises cars for lower carbon forms of transport" class="read-more" href="https://blog.eduguru.in/news/welsh-government-deprioritises-cars-for-lower-carbon-forms-of-transport" aria-label="Read more about Welsh Government deprioritises cars for lower carbon forms of transport">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Lower emissions from Covid-19 pandemic fail to halt CO2 surge in the atmosphere</title>
		<link>https://blog.eduguru.in/news/lower-emissions-from-covid-19-pandemic-fail-to-halt-co2-surge-in-the-atmosphere</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 05:22:45 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CLIMATE CHANGE]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[EMISSIONS]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[Lower emissions from Covid-19 pandemic fail to halt CO2 surge in the atmosphere]]></category>
		<category><![CDATA[Pandemic fail]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14139</guid>

					<description><![CDATA[Greenhouse gas concentrations in the atmosphere have continued to increase during 2020 despite unprecedented falls in emissions driven by the coronavirus pandemic.  While lockdowns around the world have cut emissions of many pollutants and greenhouse gases such as carbon dioxide, the drop experienced is no larger than normal annual fluctuations driven by the natural variability ... <a title="Lower emissions from Covid-19 pandemic fail to halt CO2 surge in the atmosphere" class="read-more" href="https://blog.eduguru.in/news/lower-emissions-from-covid-19-pandemic-fail-to-halt-co2-surge-in-the-atmosphere" aria-label="Read more about Lower emissions from Covid-19 pandemic fail to halt CO2 surge in the atmosphere">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>INTRODUCTION TO PENETRATION TESTING</title>
		<link>https://blog.eduguru.in/uncategorized/introduction-to-penetration-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:36:51 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=10823</guid>

					<description><![CDATA[NTRODUCTIONThis article provides a general introduction to the subject of penetrationtesting and provides the security professional with the background need-ed to understand this special area of security analysis. Penetration testingcan be a valuable tool for understanding and improving the security of acomputer or network. However, it can also be used to exploit systemweaknesses and attack ... <a title="INTRODUCTION TO PENETRATION TESTING" class="read-more" href="https://blog.eduguru.in/uncategorized/introduction-to-penetration-testing" aria-label="Read more about INTRODUCTION TO PENETRATION TESTING">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Attacking Other Users</title>
		<link>https://blog.eduguru.in/web-hosting-2/attacking-other-users-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:35:04 +0000</pubDate>
				<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Web Hosting]]></category>
		<category><![CDATA[Website]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=11466</guid>

					<description><![CDATA[The majority of interesting attacks against web applications involve targeting the server-side application itself. Many of these attacks do of course impinge upon other users — for example, an SQL injection attack that steals other users’ data. But the essential methodology of the attacker is to interact with the server in unexpected ways in order ... <a title="Attacking Other Users" class="read-more" href="https://blog.eduguru.in/web-hosting-2/attacking-other-users-2" aria-label="Read more about Attacking Other Users">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How To Install Bacula Server on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-bacula-server-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:33:18 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12756</guid>

					<description><![CDATA[Introduction Bacula is an open source network backup solution that allows you create backups and perform data recovery of your computer systems. It is very flexible and robust, which makes it, while slightly cumbersome to configure, suitable for backups in many situations. A backup system is an important component in most server infrastructures, as recovering ... <a title="How To Install Bacula Server on Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-bacula-server-on-ubuntu" aria-label="Read more about How To Install Bacula Server on Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>roles and responsibilities of a Test Leader</title>
		<link>https://blog.eduguru.in/software-testing/roles-and-responsibilities-of-a-test-leader</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:32:07 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14090</guid>

					<description><![CDATA[Responsibilities of a Test leaders tend to include involvement in the planning, monitoring, and control of the testing activities and tasks. At the outset of the project, test leaders, in collaboration with the other stakeholders, devise the test objectives, organizational test policies, test strategies and test plans. They estimate the testing to be done and negotiate with management to acquire the necessary resources. They recognize ... <a title="roles and responsibilities of a Test Leader" class="read-more" href="https://blog.eduguru.in/software-testing/roles-and-responsibilities-of-a-test-leader" aria-label="Read more about roles and responsibilities of a Test Leader">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to open the Windows registry</title>
		<link>https://blog.eduguru.in/windows/how-to-open-the-windows-registry</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:30:14 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[How to open the Windows registry]]></category>
		<category><![CDATA[registry]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14121</guid>

					<description><![CDATA[Windows 10 Type regedit in the Windows search box on the taskbar and press Enter. If prompted by User Account Control, click Yes to open the Registry Editor. Windows 8 Type regedit on the Start screen and select the regedit option in the search results. If prompted by User Account Control, click Yes to open the Registry Editor. Windows 7 and earlier Click Start or press the Windows key. In the Start ... <a title="How to open the Windows registry" class="read-more" href="https://blog.eduguru.in/windows/how-to-open-the-windows-registry" aria-label="Read more about How to open the Windows registry">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Windows 10 security apps</title>
		<link>https://blog.eduguru.in/windows/windows-10-security-apps</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:23:28 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[App list]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Apps]]></category>
		<category><![CDATA[windows 10]]></category>
		<category><![CDATA[Windows 10 security apps]]></category>
		<category><![CDATA[Windows Security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14119</guid>

					<description><![CDATA[Kaspersky Now Password Padlock McAfee Central Total Virus Scanner VPN Shield Subscription Shredder8 &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Windows 10 Entertainment Apps List</title>
		<link>https://blog.eduguru.in/windows/windows-10-entertainment-apps-list</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:20:05 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[App list]]></category>
		<category><![CDATA[Entertainment App]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[windows 10]]></category>
		<category><![CDATA[Windows 10 Entertainment Apps List]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14117</guid>

					<description><![CDATA[1. VLC 2. Spotify Music 3. Tidal 4. Amazon Music  5. Netflix 6. Hulu 7. Kodi 8. Audible 9. Duolingo 10. WeDo 2.0 LEGO Education 11. TED 12. FlashQuiz 13. Reading Trainer 14. Adobe Photoshop Elements 15. Autodesk SketchBook 16. Paint.NET 17. PhotoDirector 10 Essential 18. Affinity Photo 19. TaskbarX 20. Files UWP &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Manufacturing for both local and global markets</title>
		<link>https://blog.eduguru.in/news/manufacturing-for-both-local-and-global-markets-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:09:06 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[BUSINESS PLANNING]]></category>
		<category><![CDATA[ECONOMY]]></category>
		<category><![CDATA[FUTURE OF MANUFACTURING]]></category>
		<category><![CDATA[MANUFACTURING]]></category>
		<category><![CDATA[Manufacturing for both local and global markets]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14113</guid>

					<description><![CDATA[The manufacturing industry can play a significant role in the vision of making India self reliant or ‘Atma Nirbhar Bharat’. This can happen if manufacturing units raise the bar of production and make products for both the local and global markets.  The pandemic has nudged us from the familiar world of the physical to that ... <a title="Manufacturing for both local and global markets" class="read-more" href="https://blog.eduguru.in/news/manufacturing-for-both-local-and-global-markets-2" aria-label="Read more about Manufacturing for both local and global markets">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Harness biotechnology for society’s betterment</title>
		<link>https://blog.eduguru.in/news/harness-biotechnology-for-societys-betterment</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:05:48 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[BIOTECHNOLOGY]]></category>
		<category><![CDATA[Harness biotechnology for society’s betterment]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[Socitey betterment]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14110</guid>

					<description><![CDATA[Karnataka is India’s biotechnology capital and plans to be a key player in the sector’s growth.  The state contributes to one third of India’s biotech economy and aims to garner a 50 per cent market share of the national biotech economy target of $100bn by 2025. The Government of Karnataka (GoK) is one of the ... <a title="Harness biotechnology for society’s betterment" class="read-more" href="https://blog.eduguru.in/news/harness-biotechnology-for-societys-betterment" aria-label="Read more about Harness biotechnology for society’s betterment">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ineos and Hyundai to partner on hydrogen production</title>
		<link>https://blog.eduguru.in/news/ineos-and-hyundai-to-partner-on-hydrogen-production</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 16:02:45 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTOMOTIVE ENGINEERING]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[hydrogen]]></category>
		<category><![CDATA[HYDROGEN SUSTAINABILITY]]></category>
		<category><![CDATA[Ineos and Hyundai to partner on hydrogen production]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14108</guid>

					<description><![CDATA[Chemicals giant Ineos has partnered with Korean automaker Hyundai to establish a “hydrogen value chain” in Europe.  Under their memorandum of understanding, the companies have committed to “explore new opportunities” to accelerate the hydrogen economy, investigate opportunities for the production and supply of hydrogen and for the global deployment of hydrogen technologies. They will also ... <a title="Ineos and Hyundai to partner on hydrogen production" class="read-more" href="https://blog.eduguru.in/news/ineos-and-hyundai-to-partner-on-hydrogen-production" aria-label="Read more about Ineos and Hyundai to partner on hydrogen production">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>purpose of putty</title>
		<link>https://blog.eduguru.in/linux-2/purpose-of-putty</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 21 Nov 2020 01:46:57 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[purpose of putty]]></category>
		<category><![CDATA[putty]]></category>
		<category><![CDATA[Putty use]]></category>
		<category><![CDATA[putty work]]></category>
		<category><![CDATA[remote connection]]></category>
		<category><![CDATA[SSh key]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14102</guid>

					<description><![CDATA[PuTTY is a terminal emulation program . If you want to manage or configure a device from pc you can use PuTTY for that purpose. It supports SSH,Telnet and Serial ports, so that you can connect directly through serial cable or may take remote session. For example to connect using cables ; take RJ45 cable , connect those ... <a title="purpose of putty" class="read-more" href="https://blog.eduguru.in/linux-2/purpose-of-putty" aria-label="Read more about purpose of putty">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Windows Security Tools</title>
		<link>https://blog.eduguru.in/windows/windows-security-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 21 Nov 2020 01:40:11 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[IT- Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security tools]]></category>
		<category><![CDATA[system security]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Security]]></category>
		<category><![CDATA[Windows Security Tools]]></category>
		<category><![CDATA[windows tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14100</guid>

					<description><![CDATA[1) NordLocker 2) Browser Encryption 3) Virtual Private Networks 4) Password Manager 5) Install Solid Anti-Virus Software &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Kali Linux Tools for Hacking and Penetration Testing</title>
		<link>https://blog.eduguru.in/linux-2/kali-linux-tools-for-hacking-and-penetration-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 21 Nov 2020 01:28:22 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[hacking tools]]></category>
		<category><![CDATA[kali linux]]></category>
		<category><![CDATA[Kali Linux Tools for Hacking and Penetration Testing]]></category>
		<category><![CDATA[linux hacking tools]]></category>
		<category><![CDATA[linux tools]]></category>
		<category><![CDATA[PENETRATION TESTING]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14097</guid>

					<description><![CDATA[1. Nmap Nmap or “Network Mapper” is one of the most popular tools on Kali Linux for information gathering. In other words, to get insights about the host, its IP address, OS detection, and similar network security. 2. Lynis Lynis is a powerful tool for security auditing, compliance testing, and system hardening. Of course, you can also ... <a title="Kali Linux Tools for Hacking and Penetration Testing" class="read-more" href="https://blog.eduguru.in/linux-2/kali-linux-tools-for-hacking-and-penetration-testing" aria-label="Read more about Kali Linux Tools for Hacking and Penetration Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>the new microprocessors powering AI</title>
		<link>https://blog.eduguru.in/news/the-new-microprocessors-powering-ai</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 21 Nov 2020 01:06:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[PROCESSORS APPLICATION]]></category>
		<category><![CDATA[SEMICONDUCTOR TECHNOLOGY]]></category>
		<category><![CDATA[SEMICONDUCTORS]]></category>
		<category><![CDATA[SPECIFIC PROCESSORS]]></category>
		<category><![CDATA[the new microprocessors powering AI]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 11]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14095</guid>

					<description><![CDATA[Artificial intelligence is appearing everywhere, but normal CPUs are not efficient platforms for the technology. Efficiency will only come with a new breed of microprocessors that are engineered specifically for the AI workload of the 2020s.  The growing use of artificial intelligence (AI) is upscaling many standard types of IT workload as well as powering ... <a title="the new microprocessors powering AI" class="read-more" href="https://blog.eduguru.in/news/the-new-microprocessors-powering-ai" aria-label="Read more about the new microprocessors powering AI">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>AI and satellite data used to build British air pollution map</title>
		<link>https://blog.eduguru.in/news/ai-and-satellite-data-used-to-build-british-air-pollution-map</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 21 Nov 2020 01:02:36 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI and satellite data used to build British air pollution map]]></category>
		<category><![CDATA[air pollution]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14093</guid>

					<description><![CDATA[Researchers from London School of Hygiene &#38; Tropical Medicine have led a study using AI and remote-sensing satellite technologies to produce the most detailed nationwide map of air pollution.  The novel method offers an impressive level of detail, with daily measurements provided in a 1x1km grid across Britain. This could transform understanding of the health ... <a title="AI and satellite data used to build British air pollution map" class="read-more" href="https://blog.eduguru.in/news/ai-and-satellite-data-used-to-build-british-air-pollution-map" aria-label="Read more about AI and satellite data used to build British air pollution map">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple to pay $113m for intentionally slowing down iPhones</title>
		<link>https://blog.eduguru.in/news/apple-to-pay-113m-for-intentionally-slowing-down-iphones</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 21 Nov 2020 00:59:11 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple to pay $113m for intentionally slowing down iPhones]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14091</guid>

					<description><![CDATA[Apple is set to pay $113m (£85m) to a coalition of 33 US states over its decision to intentionally slow the processor speeds of ageing iPhones.  In 2017 it emerged that, following a software update, older iPhone models were having their performance gimped, with Apple claiming this was to enable the processor to continue to operate ... <a title="Apple to pay $113m for intentionally slowing down iPhones" class="read-more" href="https://blog.eduguru.in/news/apple-to-pay-113m-for-intentionally-slowing-down-iphones" aria-label="Read more about Apple to pay $113m for intentionally slowing down iPhones">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Testing Roles and Responsibilities</title>
		<link>https://blog.eduguru.in/software-testing/software-testing-roles-and-responsibilities</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 17:40:18 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[role and responsibilities]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[software testing Responsibilities]]></category>
		<category><![CDATA[Software Testing Roles and Responsibilities]]></category>
		<category><![CDATA[testing roles]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14087</guid>

					<description><![CDATA[In case of software testing every company defines its own level of hierarchy, roles and responsibilities but on a broader level, if you take a look you will always find the following two levels in a software testing team: Test lead/manager: A test lead is responsible for: Defining the testing activities for subordinates – testers ... <a title="Software Testing Roles and Responsibilities" class="read-more" href="https://blog.eduguru.in/software-testing/software-testing-roles-and-responsibilities" aria-label="Read more about Software Testing Roles and Responsibilities">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software Testing Importance</title>
		<link>https://blog.eduguru.in/software-testing/software-testing-importance</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 17:18:19 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Software Testing Importance]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[testing importance]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14085</guid>

					<description><![CDATA[In software development, everything needs to double-check before releasing the product. It is important to have a tester team who will test software and invest effort and knowledge to make sure that product is defect-free. Software testing will point out the errors that occur during the development phases. It makes sure that the application’s performances ... <a title="Software Testing Importance" class="read-more" href="https://blog.eduguru.in/software-testing/software-testing-importance" aria-label="Read more about Software Testing Importance">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why is software testing necessary?</title>
		<link>https://blog.eduguru.in/news/why-is-software-testing-necessary</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 17:15:50 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Why is software testing necessary?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14083</guid>

					<description><![CDATA[Errors made by us, when executed can lead to software failures. Some errors and mistakes are minor but some are quite dangerous and require constant evaluation and monitoring. Therefore, it has become vital for software engineers to implement testing throughout the software, to ensure the efficiency of the developed software as well as to verify ... <a title="Why is software testing necessary?" class="read-more" href="https://blog.eduguru.in/news/why-is-software-testing-necessary" aria-label="Read more about Why is software testing necessary?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple Watch Series 6</title>
		<link>https://blog.eduguru.in/news/apple-watch-series-6</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 17:09:03 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[APPLE ELECTRONICS]]></category>
		<category><![CDATA[Apple Watch Series 6]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[gadgets]]></category>
		<category><![CDATA[ISSUE 11]]></category>
		<category><![CDATA[VOLUME 15]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14081</guid>

					<description><![CDATA[Wellbeing defines the latest design evolution.  It is five years since Apple launched its first Watch. Though the recently launched Series 6 family looks virtually identical to its immediate predecessor (and Watch has retained the same rectangular profile throughout), it underlines how the product has evolved in terms of its target market. Where Samsung seems ... <a title="Apple Watch Series 6" class="read-more" href="https://blog.eduguru.in/news/apple-watch-series-6" aria-label="Read more about Apple Watch Series 6">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple lowers App Store fee for small developers but monopoly criticisms remain</title>
		<link>https://blog.eduguru.in/news/apple-lowers-app-store-fee-for-small-developers-but-monopoly-criticisms-remain</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 17:06:08 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple lowers App Store fee for small developers but monopoly criticisms remain]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14079</guid>

					<description><![CDATA[Apple has said it will launch a programme cutting the commission it takes from app sales to 15 per cent for developers who make less than $1m annually through its iOS App Store.  The ‘Small Business Program’ follows legal action taken by Fortnite developer Epic Games, which in August accused Apple of following monopolistic practices for its ... <a title="Apple lowers App Store fee for small developers but monopoly criticisms remain" class="read-more" href="https://blog.eduguru.in/news/apple-lowers-app-store-fee-for-small-developers-but-monopoly-criticisms-remain" aria-label="Read more about Apple lowers App Store fee for small developers but monopoly criticisms remain">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Cerebras AI compute system 200x faster than supercomputer</title>
		<link>https://blog.eduguru.in/news/cerebras-ai-compute-system-200x-faster-than-supercomputer</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 17:03:03 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Cerebras AI compute system 200x faster than supercomputer]]></category>
		<category><![CDATA[CHIPMAKERS]]></category>
		<category><![CDATA[COMPUTING]]></category>
		<category><![CDATA[SIMULATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14077</guid>

					<description><![CDATA[Cerebras has worked with the Department of Energy’s National Energy Technology Laboratory (NETL) to demonstrate its CS-1 system, which is based on the world’s largest chip.  The CS-1 is powered by Cerebras’ Wafer Scale Engine (WSE), which was first presented in November 2019. While chipmakers typically cut a wafer into hundreds of separate chips, Cerebras ... <a title="Cerebras AI compute system 200x faster than supercomputer" class="read-more" href="https://blog.eduguru.in/news/cerebras-ai-compute-system-200x-faster-than-supercomputer" aria-label="Read more about Cerebras AI compute system 200x faster than supercomputer">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Different Types Of Software Testing</title>
		<link>https://blog.eduguru.in/software-testing/different-types-of-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 16:53:36 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Different Types Of Software Testing]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[Types of software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14075</guid>

					<description><![CDATA[Functional Testing types include: Unit Testing Integration Testing System Testing Sanity Testing Smoke Testing Interface Testing Regression Testing Beta/Acceptance Testing Non-functional Testing types include: Performance Testing Load Testing Stress Testing Volume Testing Security Testing Compatibility Testing Install Testing Recovery Testing Reliability Testing Usability Testing Compliance Testing Localization Testing &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>benefits of software testing</title>
		<link>https://blog.eduguru.in/software-testing/benefits-of-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 16:48:09 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Benefits]]></category>
		<category><![CDATA[benefits of software testing]]></category>
		<category><![CDATA[software testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14073</guid>

					<description><![CDATA[Here are the following software testing benefits: Better Quality Products Happier Customers Increase in Sales Cut Costs Improve User Experience Software testing Boosts Customer Satisfaction Promotes Organization, Productivity, and Efficiency &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>What is Software Testing?</title>
		<link>https://blog.eduguru.in/software-testing/what-is-software-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 16:44:58 +0000</pubDate>
				<category><![CDATA[Software Testing]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software test]]></category>
		<category><![CDATA[software testing]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[What is Software Testing?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14071</guid>

					<description><![CDATA[Software testing is a process, to evaluate the functionality of a software application with an intent to find whether the developed software met the specified requirements or not and to identify the defects to ensure that the product is defect-free in order to produce the quality product.]]></description>
		
		
		
			</item>
		<item>
		<title>AI tool could predict future ratings of films</title>
		<link>https://blog.eduguru.in/news/ai-tool-could-predict-future-ratings-of-films</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 15:59:28 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI tool could predict future ratings of films]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[MOVIES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14069</guid>

					<description><![CDATA[Researchers have developed an AI tool that can rate a film’s content in a matter of seconds, based on the film script and before a single scene has been shot.  Ratings can determine a film’s appeal to consumers and the size of its potential audience. Thus, they have an impact on a film’s bottom line. ... <a title="AI tool could predict future ratings of films" class="read-more" href="https://blog.eduguru.in/news/ai-tool-could-predict-future-ratings-of-films" aria-label="Read more about AI tool could predict future ratings of films">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Cut-price lidar sensor could slash cost of autonomous driving</title>
		<link>https://blog.eduguru.in/news/cut-price-lidar-sensor-could-slash-cost-of-autonomous-driving</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 15:39:40 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[AUTOMOTIVE ENGINEERING]]></category>
		<category><![CDATA[AUTONOMOUS VEHICLES]]></category>
		<category><![CDATA[Cut-price lidar sensor could slash cost of autonomous driving]]></category>
		<category><![CDATA[DRIVERLESS]]></category>
		<category><![CDATA[LIDAR]]></category>
		<category><![CDATA[sensors]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14067</guid>

					<description><![CDATA[Velodyne Lidar, which makes one of the most crucial sensors for driverless cars, has announced a new $500 (£380) lidar array with no moving parts that could drastically lower the cost of bringing automation to vehicles.  The high cost of lidar sensors, which act as the eyes of a self-driving car, has been one of ... <a title="Cut-price lidar sensor could slash cost of autonomous driving" class="read-more" href="https://blog.eduguru.in/news/cut-price-lidar-sensor-could-slash-cost-of-autonomous-driving" aria-label="Read more about Cut-price lidar sensor could slash cost of autonomous driving">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Radar could help self-driving cars ‘see’ clearly in foggy conditions</title>
		<link>https://blog.eduguru.in/news/radar-could-help-self-driving-cars-see-clearly-in-foggy-conditions</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 15:36:21 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTONOMOUS VEHICLES]]></category>
		<category><![CDATA[ENVIRONMENT]]></category>
		<category><![CDATA[IMAGE PROCESSING]]></category>
		<category><![CDATA[RADAR]]></category>
		<category><![CDATA[Radar could help self-driving cars ‘see’ clearly in foggy conditions]]></category>
		<category><![CDATA[sensors]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14065</guid>

					<description><![CDATA[Engineers in the US have developed a way to improve the imaging capability of existing radar sensors – a system that could enable self-driving cars to ‘see’ what’s up ahead regardless of the weather.  Inclement weather conditions pose a challenge for the development of self-driving cars. These vehicles rely on technology such as LiDAR and ... <a title="Radar could help self-driving cars ‘see’ clearly in foggy conditions" class="read-more" href="https://blog.eduguru.in/news/radar-could-help-self-driving-cars-see-clearly-in-foggy-conditions" aria-label="Read more about Radar could help self-driving cars ‘see’ clearly in foggy conditions">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Video games shown to improve wellbeing for players</title>
		<link>https://blog.eduguru.in/news/video-games-shown-to-improve-wellbeing-for-players</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 15:28:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[MENTAL HEALTH]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[VIDEO GAMES]]></category>
		<category><![CDATA[Video games shown to improve wellbeing for players]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14063</guid>

					<description><![CDATA[People who spend time video games have been shown to have improved wellbeing according to a new study from Oxford University.  With many people forced to stay at home due to the coronavirus pandemic, gaming firms have enjoyed a record year, with more people playing than ever before, coupled with the recent launch of new ... <a title="Video games shown to improve wellbeing for players" class="read-more" href="https://blog.eduguru.in/news/video-games-shown-to-improve-wellbeing-for-players" aria-label="Read more about Video games shown to improve wellbeing for players">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘Planet hunter’ space telescope gets seal of approval</title>
		<link>https://blog.eduguru.in/news/planet-hunter-space-telescope-gets-seal-of-approval</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 15:24:56 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘Planet hunter’ space telescope gets seal of approval]]></category>
		<category><![CDATA[ASTRONOMY]]></category>
		<category><![CDATA[EUROPEAN SPACE AGENCY]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[Telescope]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14061</guid>

					<description><![CDATA[The European Space Agency (ESA) has approved plans to build the world’s first space telescope dedicated to studying the atmosphere of exoplanets.  The Atmospheric Remote-sensing Infrared Exoplanet Large-survey (Ariel) will be used to investigate the relationship between exoplanet chemistry and environment, collecting data from approximately 1,000 known exoplanets. Around 4,000 planets outside our solar system ... <a title="‘Planet hunter’ space telescope gets seal of approval" class="read-more" href="https://blog.eduguru.in/news/planet-hunter-space-telescope-gets-seal-of-approval" aria-label="Read more about ‘Planet hunter’ space telescope gets seal of approval">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Space junk-grabbing satellite’s control system to be built in UK</title>
		<link>https://blog.eduguru.in/news/space-junk-grabbing-satellites-control-system-to-be-built-in-uk</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 15:20:05 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[EUROPEAN SPACE AGENCY]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE DEBRIS]]></category>
		<category><![CDATA[Space junk-grabbing satellite’s control system to be built in UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14059</guid>

					<description><![CDATA[The attitude and orbit control system of an ESA satellite dubbed ‘the Claw’ that will remove debris from space will be designed and constructed in Britain.  The OECD estimates that there are now more than 160 million objects in object, mostly space debris that varies from defunct satellites to flecks of paint. Due to the ... <a title="Space junk-grabbing satellite’s control system to be built in UK" class="read-more" href="https://blog.eduguru.in/news/space-junk-grabbing-satellites-control-system-to-be-built-in-uk" aria-label="Read more about Space junk-grabbing satellite’s control system to be built in UK">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Nanopores and AI used to classify respiratory viruses</title>
		<link>https://blog.eduguru.in/news/nanopores-and-ai-used-to-classify-respiratory-viruses</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 16:29:50 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[BIOTECHNOLOGY]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Nanopores and AI used to classify respiratory viruses]]></category>
		<category><![CDATA[NANOTECHNOLOGY]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[sensors]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14054</guid>

					<description><![CDATA[Researchers at Osaka University have developed a label-free method for identifying respiratory viruses, based on dips in electrical current as they pass through silicon nanopores. The method could form the basis of a rapid new Covid-19 test.  Efforts to restrict the transmission of the SARS-CoV-2 virus responsible for the Covid-19 pandemic have emphasised rapid, widespread ... <a title="Nanopores and AI used to classify respiratory viruses" class="read-more" href="https://blog.eduguru.in/news/nanopores-and-ai-used-to-classify-respiratory-viruses" aria-label="Read more about Nanopores and AI used to classify respiratory viruses">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data centres get a pandemic push</title>
		<link>https://blog.eduguru.in/news/data-centres-get-a-pandemic-push</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 14:59:55 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Data centres get a pandemic push]]></category>
		<category><![CDATA[ECONOMY]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14052</guid>

					<description><![CDATA[The data centre business has received strong tailwinds over the past six months – from an unlikely source – the Covid-19 pandemic. Even as the pandemic and associated restrictions threw life and business out of gear, stalling growth in most sectors, it became a massive catalyst for digital adoption.  The Government of India (GoI) had ... <a title="Data centres get a pandemic push" class="read-more" href="https://blog.eduguru.in/news/data-centres-get-a-pandemic-push" aria-label="Read more about Data centres get a pandemic push">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advanced face mask kills bacteria and viruses with sun exposure</title>
		<link>https://blog.eduguru.in/news/advanced-face-mask-kills-bacteria-and-viruses-with-sun-exposure</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 14:55:33 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Advanced face mask kills bacteria and viruses with sun exposure]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14050</guid>

					<description><![CDATA[A cotton face mask that uses a special fabric that can kill 99.99 per cent of bacteria and viruses within 60 minutes of daylight exposure has been developed by Californian researchers.  While face masks made of various cloth materials have been shown to filter nanoscale aerosol particles such as those released by a cough or ... <a title="Advanced face mask kills bacteria and viruses with sun exposure" class="read-more" href="https://blog.eduguru.in/news/advanced-face-mask-kills-bacteria-and-viruses-with-sun-exposure" aria-label="Read more about Advanced face mask kills bacteria and viruses with sun exposure">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Air taxi hub to be established in Florida</title>
		<link>https://blog.eduguru.in/news/air-taxi-hub-to-be-established-in-florida</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 14:51:45 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Air taxi hub to be established in Florida]]></category>
		<category><![CDATA[AVIATION]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14048</guid>

					<description><![CDATA[The US’s first regional hub for flying cars is to be built in Orlando, Florida by the Tavistock Development Corp and aviation startup Lilium.  The Lake Nona Vertiport will be built near Orlando International Airport in the Lake Nona community, which has ambitions to become a ‘smart city’ and is already home to medical and ... <a title="Air taxi hub to be established in Florida" class="read-more" href="https://blog.eduguru.in/news/air-taxi-hub-to-be-established-in-florida" aria-label="Read more about Air taxi hub to be established in Florida">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Water sector commits to net-zero carbon plan by 2030</title>
		<link>https://blog.eduguru.in/news/water-sector-commits-to-net-zero-carbon-plan-by-2030</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 14:48:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[WATER MANAGEMENT INFRASTRUCTURE]]></category>
		<category><![CDATA[Water sector commits to net-zero carbon plan by 2030]]></category>
		<category><![CDATA[WATER SUPPLY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14046</guid>

					<description><![CDATA[UK water companies have unveiled a plan to deliver a net-zero carbon water supply for customers by 2030.  Water UK, which represents all the major water firms, has published its Net Zero 2030 Routemap, which sets out they will tackle climate change by reaching net-zero two decades ahead of the UK government’s legally binding target of ... <a title="Water sector commits to net-zero carbon plan by 2030" class="read-more" href="https://blog.eduguru.in/news/water-sector-commits-to-net-zero-carbon-plan-by-2030" aria-label="Read more about Water sector commits to net-zero carbon plan by 2030">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Nokia Power Buds</title>
		<link>https://blog.eduguru.in/news/nokia-power-buds</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 10 Nov 2020 17:37:31 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA['AUDIO']]></category>
		<category><![CDATA[CONSUMER]]></category>
		<category><![CDATA[JACK]]></category>
		<category><![CDATA[LOUGHRAN]]></category>
		<category><![CDATA[Nokia Power Buds]]></category>
		<category><![CDATA[REVIEWS]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14043</guid>

					<description><![CDATA[Just about every smartphone manufacturer under the sun has had a shot at releasing wireless ear buds in recent times. Nokia is the latest to have a go.  The first impressions of the Power Buds are so-so; the chunky case that houses them does not slip into pocket as easily as others. The top lid ... <a title="Nokia Power Buds" class="read-more" href="https://blog.eduguru.in/news/nokia-power-buds" aria-label="Read more about Nokia Power Buds">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Huawei to sell budget smartphone business for $15bn</title>
		<link>https://blog.eduguru.in/news/huawei-to-sell-budget-smartphone-business-for-15bn</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 10 Nov 2020 17:33:34 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CONSUMER]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[Huawei to sell budget smartphone business for $15bn]]></category>
		<category><![CDATA[SMARTPHONES]]></category>
		<category><![CDATA[TECHNOLOGY GADGETS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14041</guid>

					<description><![CDATA[According to a Reuters report, Shenzhen-based tech giant Huawei is planning to sell its budget smartphone subsidiary Honor to a consortium led by the government of Shenzhen and Digital China Group.  Honor was established by Huawei in 2013, offering a range of budget-friendly smartphones mostly targeted at young consumers as an alternative to high-end Huawei-branded ... <a title="Huawei to sell budget smartphone business for $15bn" class="read-more" href="https://blog.eduguru.in/news/huawei-to-sell-budget-smartphone-business-for-15bn" aria-label="Read more about Huawei to sell budget smartphone business for $15bn">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>EU smacks Amazon with antitrust charges over seller data</title>
		<link>https://blog.eduguru.in/news/eu-smacks-amazon-with-antitrust-charges-over-seller-data</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 10 Nov 2020 17:28:15 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[EU COMPETITION]]></category>
		<category><![CDATA[EU smacks Amazon with antitrust charges over seller data]]></category>
		<category><![CDATA[LEGAL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14039</guid>

					<description><![CDATA[The European Commission has filed charges against Amazon, accusing the tech giant of illegal anti-competitive behaviour regarding its use of third-party sales data, and opened a second investigation into other potential antitrust violations.  The Commission accused Amazon of systematically using non-public sales data regarding third-party sellers on its platform in order to inform its own ... <a title="EU smacks Amazon with antitrust charges over seller data" class="read-more" href="https://blog.eduguru.in/news/eu-smacks-amazon-with-antitrust-charges-over-seller-data" aria-label="Read more about EU smacks Amazon with antitrust charges over seller data">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install Dropbox on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-dropbox-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 16:40:33 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[Dropbox installation]]></category>
		<category><![CDATA[How to Install Dropbox on Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14036</guid>

					<description><![CDATA[Dropbox is stand-out player in cloud storage and its Linux clients works really well on Ubuntu once installed properly. While Google Drive comes out of the box on Ubuntu 16.04 LTS and later, Dropbox is still a preferred cloud storage tool on Linux in terms of features it offers. Installing Dropbox from Command Line We ... <a title="How to Install Dropbox on Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-dropbox-on-ubuntu" aria-label="Read more about How to Install Dropbox on Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install Krita in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-krita-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 16:35:57 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to Install Krita in Ubuntu]]></category>
		<category><![CDATA[installation]]></category>
		<category><![CDATA[Krita in Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14034</guid>

					<description><![CDATA[Krita is a free and open-source digital painting, editing and animation application developed by KDE. It has excellent user interface with everything placed perfectly so that you can easily find the tool you need. Installing Krita Ubuntu offers multiple ways for users to install Krita on their computers. The next sections will take a look ... <a title="How to Install Krita in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-krita-in-ubuntu" aria-label="Read more about How to Install Krita in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to install Neofetch in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-neofetch-in-ubuntu-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 16:31:59 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to install Neofetch in Ubuntu]]></category>
		<category><![CDATA[installation]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Neofetch]]></category>
		<category><![CDATA[Neofetch in Ubuntu]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14032</guid>

					<description><![CDATA[Neofetch is a cool system information tool that gives you all the information about your system by running “neofetch” command in Terminal. It is cool tool to have because it gives you information about desktop environment, kernel version, bash version and GTK theme you are running. The repositories have been added. Run the apt update command to ... <a title="How to install Neofetch in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-neofetch-in-ubuntu-2" aria-label="Read more about How to install Neofetch in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to install Mailspring on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-mailspring-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 16:26:09 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to install Mailspring on Ubuntu]]></category>
		<category><![CDATA[installation]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Mailspring]]></category>
		<category><![CDATA[Mailspring install]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14030</guid>

					<description><![CDATA[MailSpring earlier known as Nylas Mail or Nylas N1 is an open-source email client. It saves all the mails locally on computer so that you can access them anytime you need. It features advanced search which uses AND and OR operations so that you can search for mails based on different parameters. The easiest way ... <a title="How to install Mailspring on Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-mailspring-on-ubuntu" aria-label="Read more about How to install Mailspring on Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install clamtk in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-clamtk-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 16:12:05 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[clamtk in Ubuntu]]></category>
		<category><![CDATA[How to Install clamtk in Ubuntu]]></category>
		<category><![CDATA[Install clamtk]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14028</guid>

					<description><![CDATA[As we know viruses meant to harm Windows PC cannot do any harm to Ubuntu but it is always prone to get infected by some mails from Windows PC containing harmful files. So it is safe to have some antivirus applications on Linux too. Install clamtk by entering the following commands in the terminal: $ ... <a title="How to Install clamtk in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-clamtk-in-ubuntu" aria-label="Read more about How to Install clamtk in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install Shotcut in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-shotcut-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 16:04:28 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to Install Shotcut in Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux installation]]></category>
		<category><![CDATA[Shotcut]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14025</guid>

					<description><![CDATA[open terminal (Ctrl+Alt+T) and run command to install snapd daemon: $ sudo apt-get install snapd snapd-xdg-open Then install Shotcut snap app via command: $ sudo snap install shotcut --classic]]></description>
		
		
		
			</item>
		<item>
		<title>How to install WordPress.com desktop app on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-wordpress-com-desktop-app-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 15:01:57 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Desktop App]]></category>
		<category><![CDATA[How to install WordPress.com desktop app on Ubuntu]]></category>
		<category><![CDATA[installation]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14023</guid>

					<description><![CDATA[Start by opening your terminal and executing the following command to install all prerequisites: $ sudo apt install libgtkextra-dev gdebi-core Use your browser to download the wordpress.com Desktop app DEB package or use the following wgetshortcut command: $ wget -O wordpress_app.deb https://bit.ly/2uUiTdz Next, install the wordpress_app.deb package downloaded in the previous step: $ sudo gdebi wordpress_app.deb]]></description>
		
		
		
			</item>
		<item>
		<title>UK government dishes out £7m for new aviation tech</title>
		<link>https://blog.eduguru.in/news/uk-government-dishes-out-7m-for-new-aviation-tech</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 14:54:14 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AVIATION]]></category>
		<category><![CDATA[DRONES]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[FINANCE]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<category><![CDATA[UK government dishes out £7m for new aviation tech]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14021</guid>

					<description><![CDATA[Projects which will explore medical deliveries by drone, hydrogen delivery aircraft, and retrofitting aircraft with electric propulsion are among 20 to receive funding from the UK government.  The £7m funding is part of the £33.5m available via the ‘Future Flight Challenge’, which aims to develop technologies to enable new classes of aircraft and reduce reliance ... <a title="UK government dishes out £7m for new aviation tech" class="read-more" href="https://blog.eduguru.in/news/uk-government-dishes-out-7m-for-new-aviation-tech" aria-label="Read more about UK government dishes out £7m for new aviation tech">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Stretchy, recyclable wearable adheres to human skin</title>
		<link>https://blog.eduguru.in/news/stretchy-recyclable-wearable-adheres-to-human-skin</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 14:51:26 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[HUMAN FACTORS]]></category>
		<category><![CDATA[recyclable wearable adheres to human skin]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[Stretchy]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14019</guid>

					<description><![CDATA[A wearable electronic device that can stretch and adhere to human skin has been developed by researchers at the University of Colorado Boulder.  The device is able to heal itself, much like real skin, and can perform a range of sensory tasks, from measuring the body temperature of users to tracking their daily step counts. ... <a title="Stretchy, recyclable wearable adheres to human skin" class="read-more" href="https://blog.eduguru.in/news/stretchy-recyclable-wearable-adheres-to-human-skin" aria-label="Read more about Stretchy, recyclable wearable adheres to human skin">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Moon rocks turned into oxygen and construction metals for future base</title>
		<link>https://blog.eduguru.in/news/moon-rocks-turned-into-oxygen-and-construction-metals-for-future-base</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 14:48:31 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[EUROPEAN]]></category>
		<category><![CDATA[MATERIALS SCIENCE]]></category>
		<category><![CDATA[Moon]]></category>
		<category><![CDATA[Moon rocks turned into oxygen and construction metals for future base]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE AGENCY]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14017</guid>

					<description><![CDATA[A British firm has won a European Space Agency (ESA) contract to develop methods to process Moon dust into its constituent elements of oxygen and metal alloys.  With plans afoot to build a base on the Moon (possibly powered by nuclear fission) as a jumping-off point for a mission to Mars, work is being undertaken to ... <a title="Moon rocks turned into oxygen and construction metals for future base" class="read-more" href="https://blog.eduguru.in/news/moon-rocks-turned-into-oxygen-and-construction-metals-for-future-base" aria-label="Read more about Moon rocks turned into oxygen and construction metals for future base">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Strings</title>
		<link>https://blog.eduguru.in/front-end-developer/strings</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 14:45:19 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[front End Developer]]></category>
		<category><![CDATA[Front End Development]]></category>
		<category><![CDATA[Strings]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14015</guid>

					<description><![CDATA[The basic data type is the string. Strings are used to represent text. They are written by enclosing their content in quotes. `Down on the sea` &#8220;Lie on the ocean&#8221; &#8216;Float on the ocean&#8217; You can use single quotes, double quotes, or backticks to mark strings, as long as the quotes at the start and ... <a title="Strings" class="read-more" href="https://blog.eduguru.in/front-end-developer/strings" aria-label="Read more about Strings">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Numbers</title>
		<link>https://blog.eduguru.in/front-end-developer/numbers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 14:39:43 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[Front End Development]]></category>
		<category><![CDATA[numbers]]></category>
		<category><![CDATA[numbers type]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14013</guid>

					<description><![CDATA[Values of the number type are, unsurprisingly, numeric values. In a JavaScript program, they are written as follows: 13 Use that in a program, and it will cause the bit pattern for the number 13 to come into existence inside the computer’s memory. JavaScript uses a fixed number of bits, 64 of them, to store ... <a title="Numbers" class="read-more" href="https://blog.eduguru.in/front-end-developer/numbers" aria-label="Read more about Numbers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Values</title>
		<link>https://blog.eduguru.in/front-end-developer/values</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 09 Nov 2020 14:36:17 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[Front End Development]]></category>
		<category><![CDATA[JAVA SCRIPT]]></category>
		<category><![CDATA[Values]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14011</guid>

					<description><![CDATA[Imagine a sea of bits—an ocean of them. A typical modern computer has more than 30 billion bits in its volatile data storage (working memory). Nonvolatile storage (the hard disk or equivalent) tends to have yet a few orders of magnitude more. To be able to work with such quantities of bits without getting lost, ... <a title="Values" class="read-more" href="https://blog.eduguru.in/front-end-developer/values" aria-label="Read more about Values">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>COVID-19 outlook for the US technology industry</title>
		<link>https://blog.eduguru.in/news/covid-19-outlook-for-the-us-technology-industry</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 17:08:28 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[COVID-19 outlook for the US technology industry]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[US Technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14008</guid>

					<description><![CDATA[To recover from the crisis while making a bold play for a thriving future, there are three key strategic issues that technology companies should consider.   Positioning industries for a stronger future The continuing COVID-19 crisis is creating enormous uncertainty and change—and questions with no obvious answers: Which changes will persist? What will the new ... <a title="COVID-19 outlook for the US technology industry" class="read-more" href="https://blog.eduguru.in/news/covid-19-outlook-for-the-us-technology-industry" aria-label="Read more about COVID-19 outlook for the US technology industry">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>2020 technology industry outlook</title>
		<link>https://blog.eduguru.in/news/2020-technology-industry-outlook</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 17:03:53 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[2020 technology industry outlook]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[Industry outlook]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14006</guid>

					<description><![CDATA[Edge computing is accelerating growth in technology Cloud computing and artificial intelligence will once again dominate the technology headlines, but 2020 could be a breakout year for edge computing. Deloitte’s global technology, media, and telecommunications industry leader, Paul Sallomi, shares his perspectives on the advantages of processing data locally and how partnerships will play a ... <a title="2020 technology industry outlook" class="read-more" href="https://blog.eduguru.in/news/2020-technology-industry-outlook" aria-label="Read more about 2020 technology industry outlook">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Problems Does React Solve?</title>
		<link>https://blog.eduguru.in/front-end-developer/what-problems-does-react-solve</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 16:38:45 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[Problems Solving]]></category>
		<category><![CDATA[React]]></category>
		<category><![CDATA[What Problems Does React Solve?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14004</guid>

					<description><![CDATA[React does not set out to solve every problem that you will encounter in user interface design and front-end development. React solves a specific set of problems, and in general, a single problem. As stated by Facebook and Instagram, React builds large-scale user interfaces with data that changes over time. Large-scale user interfaces with data ... <a title="What Problems Does React Solve?" class="read-more" href="https://blog.eduguru.in/front-end-developer/what-problems-does-react-solve" aria-label="Read more about What Problems Does React Solve?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Is React?</title>
		<link>https://blog.eduguru.in/front-end-developer/what-is-react</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 16:34:37 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[React]]></category>
		<category><![CDATA[What Is React?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14002</guid>

					<description><![CDATA[React is a JavaScript framework. React was originally created by engineers at Facebook to solve the challenges involved when developing complex user interfaces with datasets that change over time. This is not a trivial undertaking and must not only be maintainable, but also scalable to work at the scale of Facebook. React was actually born ... <a title="What Is React?" class="read-more" href="https://blog.eduguru.in/front-end-developer/what-is-react" aria-label="Read more about What Is React?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Private prison firm hit with ransomware attack</title>
		<link>https://blog.eduguru.in/news/private-prison-firm-hit-with-ransomware-attack</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 16:27:42 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CRIME]]></category>
		<category><![CDATA[CYBERSECURITY]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Private prison firm hit with ransomware attack]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=14000</guid>

					<description><![CDATA[The GEO Group, the company best known for operating illegal immigration detention centres and private prisons in the US, disclosed that it suffered a ransomware attack this summer, exposing sensitive information about inmates and residents.  Personal data and health information of both inmates and residents were exposed during the attack, which took place on 19 August ... <a title="Private prison firm hit with ransomware attack" class="read-more" href="https://blog.eduguru.in/news/private-prison-firm-hit-with-ransomware-attack" aria-label="Read more about Private prison firm hit with ransomware attack">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Astronomers ‘undistort’ images to map dark matter</title>
		<link>https://blog.eduguru.in/news/astronomers-undistort-images-to-map-dark-matter</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 16:24:37 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Astronomers ‘undistort’ images to map dark matter]]></category>
		<category><![CDATA[ASTRONOMY]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13998</guid>

					<description><![CDATA[Astronomers in Australia have discovered a new way to see the elusive dark matter haloes that surround galaxies. The new technique, created by researchers at the Swinburne University of Technology in Melbourne, draws on the effect called weak gravitational lensing – a feature of Einstein’s general theory of relativity. Scientists estimate that up to 85 per cent ... <a title="Astronomers ‘undistort’ images to map dark matter" class="read-more" href="https://blog.eduguru.in/news/astronomers-undistort-images-to-map-dark-matter" aria-label="Read more about Astronomers ‘undistort’ images to map dark matter">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Astronaut casts vote from International Space Station despite being 408 kms above Earth</title>
		<link>https://blog.eduguru.in/news/astronaut-casts-vote-from-international-space-station-despite-being-408-kms-above-earth</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 01:12:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[astronaut]]></category>
		<category><![CDATA[Astronaut casts vote from International Space Station despite being 408 kms above Earth]]></category>
		<category><![CDATA[International Space Station]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13996</guid>

					<description><![CDATA[  No waiting in a line According to a report by AFP, a US astronaut cast her ballot from the International Space Station on Thursday, making her voice heard in the presidential election despite being 253 miles (408 kilometers) above the Earth. Voting from the ISS &#8220;From the International Space Station: I voted today,&#8221; crew ... <a title="Astronaut casts vote from International Space Station despite being 408 kms above Earth" class="read-more" href="https://blog.eduguru.in/news/astronaut-casts-vote-from-international-space-station-despite-being-408-kms-above-earth" aria-label="Read more about Astronaut casts vote from International Space Station despite being 408 kms above Earth">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Space-based ‘petrol station’ to be built in UK</title>
		<link>https://blog.eduguru.in/news/space-based-petrol-station-to-be-built-in-uk</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 06 Nov 2020 16:00:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[MANUFACTURING]]></category>
		<category><![CDATA[Moon]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[Space-based ‘petrol station’ to be built in UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13992</guid>

					<description><![CDATA[Aerospace manufacturer Thales Alenia Space – which maintains a presence in the UK – will construct a chemical refuelling station, to be launched in 2027, to support Nasa’s Lunar Gateway.  The Lunar Gateway is a planned space station which will orbit the moon and serve as a hub for communications, experimentation and as a stepping ... <a title="Space-based ‘petrol station’ to be built in UK" class="read-more" href="https://blog.eduguru.in/news/space-based-petrol-station-to-be-built-in-uk" aria-label="Read more about Space-based ‘petrol station’ to be built in UK">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Origin of mysterious fast radio bursts from the Milky Way revealed</title>
		<link>https://blog.eduguru.in/news/origin-of-mysterious-fast-radio-bursts-from-the-milky-way-revealed</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 06 Nov 2020 15:55:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Origin of mysterious fast radio bursts from the Milky Way revealed]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13989</guid>

					<description><![CDATA[The origin of mysterious fast radio bursts (FRB) emanating from our own galaxy has been solved by Nasa scientists.  FRBs are intermittent radio waves emanating from a distant object in space and are often so bright that they can be visible across much of the nearby universe. Their unique nature has led scientists to speculate on the ... <a title="Origin of mysterious fast radio bursts from the Milky Way revealed" class="read-more" href="https://blog.eduguru.in/news/origin-of-mysterious-fast-radio-bursts-from-the-milky-way-revealed" aria-label="Read more about Origin of mysterious fast radio bursts from the Milky Way revealed">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Manufacturing for both local and global markets</title>
		<link>https://blog.eduguru.in/news/manufacturing-for-both-local-and-global-markets</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 06 Nov 2020 15:52:35 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[BUSINESS PLANNING]]></category>
		<category><![CDATA[ECONOMY]]></category>
		<category><![CDATA[FUTURE OF MANUFACTURING]]></category>
		<category><![CDATA[MANUFACTURING]]></category>
		<category><![CDATA[Manufacturing for both local and global markets]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13987</guid>

					<description><![CDATA[The manufacturing industry can play a significant role in the vision of making India self reliant or ‘Atma Nirbhar Bharat’. This can happen if manufacturing units raise the bar of production and make products for both the local and global markets.  The pandemic has nudged us from the familiar world of the physical to that ... <a title="Manufacturing for both local and global markets" class="read-more" href="https://blog.eduguru.in/news/manufacturing-for-both-local-and-global-markets" aria-label="Read more about Manufacturing for both local and global markets">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>2020 hindsight: lessons learnt the hard way</title>
		<link>https://blog.eduguru.in/news/2020-hindsight-lessons-learnt-the-hard-way</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 06 Nov 2020 15:48:52 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[2020 hindsight: lessons learnt the hard way]]></category>
		<category><![CDATA[3D PRINTING]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[MANUFACTURING]]></category>
		<category><![CDATA[REMOTE WORKING]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 11]]></category>
		<category><![CDATA[WORLD HEALTH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13984</guid>

					<description><![CDATA[When revolutions take place, things happen quickly. The year of Covid-19 is likely to be an example of how sudden pressure can lead to massive changes, and not necessarily all for the worse once all the consequences are taken into account. The pandemic and associated lockdowns have provided a wake-up call for the world in ... <a title="2020 hindsight: lessons learnt the hard way" class="read-more" href="https://blog.eduguru.in/news/2020-hindsight-lessons-learnt-the-hard-way" aria-label="Read more about 2020 hindsight: lessons learnt the hard way">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Excess heat from steelworks could be stored and reused with new material</title>
		<link>https://blog.eduguru.in/news/excess-heat-from-steelworks-could-be-stored-and-reused-with-new-material</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 06 Nov 2020 15:41:44 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Excess heat from steelworks could be stored and reused with new material]]></category>
		<category><![CDATA[HEAT TRANSFER]]></category>
		<category><![CDATA[MANUFACTURING]]></category>
		<category><![CDATA[MATERIALS SCIENCE]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[STEEL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13982</guid>

					<description><![CDATA[Researchers are looking at how waste heat can be captured from the steelmaking process and reused or even moved to another location.  A team involving scientists from Swansea University and Tata Steel are focusing on a thermochemical heat storage material developed at the University’s SPECIFIC Innovation &#38; Knowledge Centre. Currently, heavy industries can release up ... <a title="Excess heat from steelworks could be stored and reused with new material" class="read-more" href="https://blog.eduguru.in/news/excess-heat-from-steelworks-could-be-stored-and-reused-with-new-material" aria-label="Read more about Excess heat from steelworks could be stored and reused with new material">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to install Neofetch in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-neofetch-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 15:09:42 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to install Neofetch in Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13980</guid>

					<description><![CDATA[Neofetch is a cool system information tool that gives you all the information about your system by running “neofetch” command in Terminal. It is cool tool to have because it gives you information about desktop environment, kernel version, bash version and GTK theme you are running. To install Neofetch in Ubuntu, first add the third ... <a title="How to install Neofetch in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-neofetch-in-ubuntu" aria-label="Read more about How to install Neofetch in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install caffeine in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-caffeine-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 15:03:47 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Caffeine]]></category>
		<category><![CDATA[Caffeine installation]]></category>
		<category><![CDATA[How to Install caffeine in Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13978</guid>

					<description><![CDATA[Imagine you are watching something on YouTube or reading a news article and suddenly Ubuntu locks your screen, I know that is very annoying. It happens with many of us, so Caffeine is the tool that will help you block the Ubuntu lock screen or screensaver. Install caffeine by entering the following commands in the ... <a title="How to Install caffeine in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-caffeine-in-ubuntu" aria-label="Read more about How to Install caffeine in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install SimpleScreenRecorder</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-simplescreenrecorder</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 14:55:31 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to Install SimpleScreenRecorder]]></category>
		<category><![CDATA[installation]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[SimpleScreenRecorder]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13976</guid>

					<description><![CDATA[SimpleScreenRecorder is available in Ubuntu Software Centre in most of the recent Ubuntu releases. But somehow if you don’t find it there you can run following command in Terminal to install this screen video recorder. $ sudo add-apt-repository ppa:marten-baert/simplescreenrecorder $ sudo apt-get update $ sudo apt-get install simplescreenrecorder]]></description>
		
		
		
			</item>
		<item>
		<title>How to install Ubuntu Cleaner in Linux</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-ubuntu-cleaner-in-linux</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 14:48:52 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Cleaner]]></category>
		<category><![CDATA[How to install Ubuntu Cleaner in Linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Ubuntu Cleaner]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13974</guid>

					<description><![CDATA[&#160; $sudo apt install software-properties-common $sudo add-apt-repository ppa:gerardpuig/ppa $sudo apt update $sudo apt install ubuntu-cleaner]]></description>
		
		
		
			</item>
		<item>
		<title>How to install Franz Messenger App in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/ubuntu/how-to-install-franz-messenger-app-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 14:43:15 +0000</pubDate>
				<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to install Franz Messenger App in Ubuntu]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13972</guid>

					<description><![CDATA[Franz is your messaging app for WhatsApp, Facebook Messenger, Slack, Telegram and many many more. Follow the below steps to install Franz Messenger App in Ubuntu 18.04: root@mangesh:~$ sudo apt-get update root@mangesh:~$ wget https://github.com/meetfranz/franz-app/releases/download/4.0.4/Franz-linux-x64-4.0.4.tgz root@mangesh:~$ mkdir franz root@mangesh:~$ tar -xzvf Franz-linux-x64–4.0.4.tgz -C franz/ root@mangesh:~$ cd franz/ root@mangesh:~/franz$ ls root@mangesh:~/franz$ ./Franz]]></description>
		
		
		
			</item>
		<item>
		<title>NCSC forced to ramp up response to escalating cyber attacks during pandemic</title>
		<link>https://blog.eduguru.in/news/ncsc-forced-to-ramp-up-response-to-escalating-cyber-attacks-during-pandemic</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 14:27:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[NCSC forced to ramp up response to escalating cyber attacks during pandemic]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SECURITY IN THE MODERN WORLD]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13970</guid>

					<description><![CDATA[The National Cyber Security Centre (NCSC) has defended the UK from more than 700 cyber attacks in the last year alone, according to figures given in its annual review. The UK has been beset by cyber attacks since the outbreak of Covid-19 in March and the NCSC has been focusing its resources on the pandemic response. The ... <a title="NCSC forced to ramp up response to escalating cyber attacks during pandemic" class="read-more" href="https://blog.eduguru.in/news/ncsc-forced-to-ramp-up-response-to-escalating-cyber-attacks-during-pandemic" aria-label="Read more about NCSC forced to ramp up response to escalating cyber attacks during pandemic">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Heart disease detected by body-powered electronic rubber patch</title>
		<link>https://blog.eduguru.in/news/heart-disease-detected-by-body-powered-electronic-rubber-patch</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 14:24:58 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[Heart Disease]]></category>
		<category><![CDATA[Heart disease detected by body-powered electronic rubber patch]]></category>
		<category><![CDATA[MEDICAL]]></category>
		<category><![CDATA[MEDICAL DIAGNOSTICS]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13968</guid>

					<description><![CDATA[Scientists have created a patch made from rubbery electronics that can be placed directly onto the heart to collect data that can help treat heart disease.  The flexible patch is capable of measuring electrophysiological activity, temperature, heartbeat and other indicators, all at the same time. The University of Houston team behind the project said their ... <a title="Heart disease detected by body-powered electronic rubber patch" class="read-more" href="https://blog.eduguru.in/news/heart-disease-detected-by-body-powered-electronic-rubber-patch" aria-label="Read more about Heart disease detected by body-powered electronic rubber patch">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>4G on the Moon, as Nasa picks Nokia for lunar network</title>
		<link>https://blog.eduguru.in/news/4g-on-the-moon-as-nasa-picks-nokia-for-lunar-network</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 17:07:47 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[4g]]></category>
		<category><![CDATA[4G on the Moon]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[as Nasa picks Nokia for lunar network]]></category>
		<category><![CDATA[mobile networks]]></category>
		<category><![CDATA[Moon]]></category>
		<category><![CDATA[NASA]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[TELECOMMUNICATIONS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13966</guid>

					<description><![CDATA[Finnish telecommunications giant Nokia has been selected by Nasa to deploy a “space-hardened” 4G network on the surface of the Moon, as part of its plans to establish a sustainable human presence on Earth’s planetary satellite by 2028.  Nasa’s ambitious ‘Artemis’ project aims to return humans to the Moon; to set up a long-term human ... <a title="4G on the Moon, as Nasa picks Nokia for lunar network" class="read-more" href="https://blog.eduguru.in/news/4g-on-the-moon-as-nasa-picks-nokia-for-lunar-network" aria-label="Read more about 4G on the Moon, as Nasa picks Nokia for lunar network">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Valuable lessons engineers can learn about risk from Covid-19</title>
		<link>https://blog.eduguru.in/news/valuable-lessons-engineers-can-learn-about-risk-from-covid-19</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 15:57:24 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Comment]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[RISK MANAGEMENT]]></category>
		<category><![CDATA[Valuable lessons engineers can learn about risk from Covid-19]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13960</guid>

					<description><![CDATA[The engineering profession needs to do more to explain to the public how its work is related to science and the part played by ‘unknown unknowns’.  Risk is in the news more than ever at the moment. Our collective behaviour depends on understanding it, but public debate reveals confusion that I believe needs to be ... <a title="Valuable lessons engineers can learn about risk from Covid-19" class="read-more" href="https://blog.eduguru.in/news/valuable-lessons-engineers-can-learn-about-risk-from-covid-19" aria-label="Read more about Valuable lessons engineers can learn about risk from Covid-19">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Space engineering technician apprenticeships launch in 2021</title>
		<link>https://blog.eduguru.in/news/space-engineering-technician-apprenticeships-launch-in-2021</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 15:52:29 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[EDUCATION]]></category>
		<category><![CDATA[Jobs]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[SKILLS]]></category>
		<category><![CDATA[Space engineering technician apprenticeships launch in 2021]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13957</guid>

					<description><![CDATA[The UK Government has announced the establishment of a new apprenticeship designed to train space engineering technicians, equipping them with the technical skills needed for a career in the space industry.  Currently, apprentices training for roles in the space sector gain qualifications as general apprentices or craft apprentices. The new scheme – which will begin ... <a title="Space engineering technician apprenticeships launch in 2021" class="read-more" href="https://blog.eduguru.in/news/space-engineering-technician-apprenticeships-launch-in-2021" aria-label="Read more about Space engineering technician apprenticeships launch in 2021">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Deep Space Network dish upgrade lets Nasa talk to Voyager 2 again</title>
		<link>https://blog.eduguru.in/news/deep-space-network-dish-upgrade-lets-nasa-talk-to-voyager-2-again</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 15:49:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMMUNICATIONS]]></category>
		<category><![CDATA[Deep Space Network dish upgrade lets Nasa talk to Voyager 2 again]]></category>
		<category><![CDATA[NASA]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13955</guid>

					<description><![CDATA[After months of extensive upgrades to its Deep Space Network dish in Australia, Nasa has made contact once more with the Voyager 2 probe, which had been flying solo since March.  The Voyager 2 probe, which last year became only the second man-made object to leave the solar system after its sibling Voyager 1, can now only ... <a title="Deep Space Network dish upgrade lets Nasa talk to Voyager 2 again" class="read-more" href="https://blog.eduguru.in/news/deep-space-network-dish-upgrade-lets-nasa-talk-to-voyager-2-again" aria-label="Read more about Deep Space Network dish upgrade lets Nasa talk to Voyager 2 again">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Printed plastic webs could save smashed smartphone screens</title>
		<link>https://blog.eduguru.in/news/printed-plastic-webs-could-save-smashed-smartphone-screens</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 15:39:27 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[3D PRINTING MATERIALS]]></category>
		<category><![CDATA[INNOVATION]]></category>
		<category><![CDATA[PLASTICS]]></category>
		<category><![CDATA[Printed plastic webs could save smashed smartphone screens]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[RESILIENCE]]></category>
		<category><![CDATA[SCIENCE MATERIAL]]></category>
		<category><![CDATA[SMART MATERIALS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13953</guid>

					<description><![CDATA[A spider web-inspired solution made possible using 3D printing could provide unprecedented protection for smartphone screens in the future.  A research team at Polytechnique Montréal, Canada, has demonstrated a fabric designed using additive manufacturing which they claim can absorb up to 96 per cent of impact energy without breaking. This could lead to the creation ... <a title="Printed plastic webs could save smashed smartphone screens" class="read-more" href="https://blog.eduguru.in/news/printed-plastic-webs-could-save-smashed-smartphone-screens" aria-label="Read more about Printed plastic webs could save smashed smartphone screens">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Effectiveness of ‘digital self-help’ app under scrutiny</title>
		<link>https://blog.eduguru.in/news/effectiveness-of-digital-self-help-app-under-scrutiny</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 15:33:12 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[DIGITALIZATION]]></category>
		<category><![CDATA[Effectiveness of ‘digital self-help’ app under scrutiny]]></category>
		<category><![CDATA[gadgets]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[MENTAL HEALTH]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13951</guid>

					<description><![CDATA[Researchers are looking to recruit young people to use their MyMoodCoach app in order to assess the effectiveness of digital self-help apps.  The app is designed to prevent anxiety and depression and improve wellbeing and brings together the latest research on self-monitoring, self-help techniques and cognitive behavioural therapy. The team from the University of Exeter ... <a title="Effectiveness of ‘digital self-help’ app under scrutiny" class="read-more" href="https://blog.eduguru.in/news/effectiveness-of-digital-self-help-app-under-scrutiny" aria-label="Read more about Effectiveness of ‘digital self-help’ app under scrutiny">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Self-watering soil could transform farming</title>
		<link>https://blog.eduguru.in/news/self-watering-soil-could-transform-farming</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 15:27:23 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AGRICULTURE]]></category>
		<category><![CDATA[CLIMATE CHANGE]]></category>
		<category><![CDATA[FOOD]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[Self-watering soil could transform farming]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13949</guid>

					<description><![CDATA[A new type of soil created by engineers at The University of Texas at Austin can pull water from the air and distribute it to plants, potentially expanding the map of farmable land around the globe to previously inhospitable places and reducing water use in agriculture at a time of growing droughts.  The team’s atmospheric ... <a title="Self-watering soil could transform farming" class="read-more" href="https://blog.eduguru.in/news/self-watering-soil-could-transform-farming" aria-label="Read more about Self-watering soil could transform farming">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>IBM to spin out infrastructure business and focus on cloud</title>
		<link>https://blog.eduguru.in/news/ibm-to-spin-out-infrastructure-business-and-focus-on-cloud</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 02 Nov 2020 16:13:35 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[CLOUD COMPUTING]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[IBM to spin out infrastructure business and focus on cloud]]></category>
		<category><![CDATA[INFRASTRUCTURE]]></category>
		<category><![CDATA[IT BUSINESS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13947</guid>

					<description><![CDATA[IBM has announced that it will split into two companies by the end of 2021. It will concentrate on forward-facing services such as cloud computing and AI, and form a new company to manage legacy IT infrastructure.  The new company will be created from IBM’s Managed Infrastructure Services, which belongs to its Global Technology Services ... <a title="IBM to spin out infrastructure business and focus on cloud" class="read-more" href="https://blog.eduguru.in/news/ibm-to-spin-out-infrastructure-business-and-focus-on-cloud" aria-label="Read more about IBM to spin out infrastructure business and focus on cloud">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>AI identifies individual photographers by analysing huge trove of WWII photos</title>
		<link>https://blog.eduguru.in/news/ai-identifies-individual-photographers-by-analysing-huge-trove-of-wwii-photos</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 02 Nov 2020 16:10:15 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI identifies individual photographers by analysing huge trove of WWII photos]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[PHOTOGRAPHY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13945</guid>

					<description><![CDATA[An AI has been developed using a trove of historical photos from WW2 that is able to recognise the identity of photographers based on the content of photos taken by them.  Researchers from both Aarhus and Tampere University used AI to trawl through photographs taken by 23 well-known Finnish photographers during the Second World War. ... <a title="AI identifies individual photographers by analysing huge trove of WWII photos" class="read-more" href="https://blog.eduguru.in/news/ai-identifies-individual-photographers-by-analysing-huge-trove-of-wwii-photos" aria-label="Read more about AI identifies individual photographers by analysing huge trove of WWII photos">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>AI model detects Covid-19 from sound of coughing</title>
		<link>https://blog.eduguru.in/news/ai-model-detects-covid-19-from-sound-of-coughing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 02 Nov 2020 16:07:29 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA['AUDIO']]></category>
		<category><![CDATA[AI model detects Covid-19 from sound of coughing]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[BIOTECHNOLOGY]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Machine learning]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13943</guid>

					<description><![CDATA[MIT researchers have developed a model which can distinguish people with asymptomatic Covid-19 from healthy people, using the sound of their coughs. These differences are impossible to detect with the human ear.  Previously, researchers have trained algorithms to detect conditions such as pneumonia and asthma based on basic phone recordings of coughs. The MIT team, ... <a title="AI model detects Covid-19 from sound of coughing" class="read-more" href="https://blog.eduguru.in/news/ai-model-detects-covid-19-from-sound-of-coughing" aria-label="Read more about AI model detects Covid-19 from sound of coughing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Battery-powered door handle disinfects itself from Covid-19</title>
		<link>https://blog.eduguru.in/news/battery-powered-door-handle-disinfects-itself-from-covid-19</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 02 Nov 2020 16:04:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Battery-powered door handle disinfects itself from Covid-19]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13941</guid>

					<description><![CDATA[A door handle capable of disinfecting itself has been launched by Swiss tech company Tweaq as a way to help businesses tackle the coronavirus pandemic.  The handle integrates a peristaltic pump that brings disinfectant liquid from the casing to a sponge inside the ring around the door handle. Once the £400 handle is released by ... <a title="Battery-powered door handle disinfects itself from Covid-19" class="read-more" href="https://blog.eduguru.in/news/battery-powered-door-handle-disinfects-itself-from-covid-19" aria-label="Read more about Battery-powered door handle disinfects itself from Covid-19">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Covid-19 speeding shift to automation in the workplace, report finds</title>
		<link>https://blog.eduguru.in/news/covid-19-speeding-shift-to-automation-in-the-workplace-report-finds</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 02 Nov 2020 16:01:57 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[AUTOMATION JOBS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Covid-19 speeding shift to automation in the workplace. report finds]]></category>
		<category><![CDATA[FUTURE OF MANUFACTURING]]></category>
		<category><![CDATA[REMOTE WORKING FUTURE]]></category>
		<category><![CDATA[ROBOTICS BUSINESS PROCESS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13938</guid>

					<description><![CDATA[The ongoing coronavirus pandemic is speeding up the pace of automation in the workplace, painting a mixed picture for future jobs, the World Economic Forum (WEF) has said.  In its Future of Jobs Report 2020, the WEF found that 43 per cent of businesses surveyed said they would reduce their workforce due to technology integration. Although the ... <a title="Covid-19 speeding shift to automation in the workplace, report finds" class="read-more" href="https://blog.eduguru.in/news/covid-19-speeding-shift-to-automation-in-the-workplace-report-finds" aria-label="Read more about Covid-19 speeding shift to automation in the workplace, report finds">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Digital twins help with failure management</title>
		<link>https://blog.eduguru.in/news/digital-twins-help-with-failure-management</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 02 Nov 2020 15:58:40 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[DIGITAL TWIN]]></category>
		<category><![CDATA[Digital twins help with failure management]]></category>
		<category><![CDATA[DIGITALIZATION]]></category>
		<category><![CDATA[FUTURE OF MANUFACTURING]]></category>
		<category><![CDATA[INTERNET OF THINGS]]></category>
		<category><![CDATA[PRODUCT LIFECYCLE MANAGEMENT]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13936</guid>

					<description><![CDATA[India is preparing to mould into a global manufacturing hub, with 5G and digitisation fuelling the growth of the manufacturing industry.  Digital technologies are revolutionising the manufacturing industry. Products can be scaled up and solutions used to drive operational efficiencies, improve safety and asset efficiencies. Smart and efficient are the new hallmarks of manufacturing. Various ... <a title="Digital twins help with failure management" class="read-more" href="https://blog.eduguru.in/news/digital-twins-help-with-failure-management" aria-label="Read more about Digital twins help with failure management">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ministry of Defence takes back control of UK’s nuclear weapons contract</title>
		<link>https://blog.eduguru.in/news/ministry-of-defence-takes-back-control-of-uks-nuclear-weapons-contract</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 02 Nov 2020 15:55:18 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[DEFENCE]]></category>
		<category><![CDATA[Ministry of Defence takes back control of UK’s nuclear weapons contract]]></category>
		<category><![CDATA[NUCLEAR WEAPONS]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13934</guid>

					<description><![CDATA[The UK Ministry of Defence (MoD) has informed contractor Serco that it will take back control of the UK’s nuclear weapon warheads in June 2021.  The Atomic Weapons Establishment (AWE) is currently being run by a consortium of Serco, Lockheed Martin and Jacobs Engineering. The AWE was originally outsourced in 1999 under a 25 year ... <a title="Ministry of Defence takes back control of UK’s nuclear weapons contract" class="read-more" href="https://blog.eduguru.in/news/ministry-of-defence-takes-back-control-of-uks-nuclear-weapons-contract" aria-label="Read more about Ministry of Defence takes back control of UK’s nuclear weapons contract">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>MathWorks, committed to supporting Innovation</title>
		<link>https://blog.eduguru.in/news/mathworks-committed-to-supporting-innovation</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 18:17:56 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AWARDS]]></category>
		<category><![CDATA[committed to supporting Innovation]]></category>
		<category><![CDATA[INNOVATION]]></category>
		<category><![CDATA[MATHS]]></category>
		<category><![CDATA[MathWorks]]></category>
		<category><![CDATA[SPONSORED]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13931</guid>

					<description><![CDATA[MathWorks continue to champion the critical work of engineers, scientists and technologists as the Headline Sponsor and the Sponsor of the Intelligent Systems category of the E&#38;T Innovation Awards 2020. Here they explain why this is so important to them.  What does it mean to your company to be a part of this awards programme? ... <a title="MathWorks, committed to supporting Innovation" class="read-more" href="https://blog.eduguru.in/news/mathworks-committed-to-supporting-innovation" aria-label="Read more about MathWorks, committed to supporting Innovation">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Transforming Engineering from the inside out</title>
		<link>https://blog.eduguru.in/news/transforming-engineering-from-the-inside-out</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 18:12:08 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DESIGN]]></category>
		<category><![CDATA[ENGINEERING MANAGEMENT]]></category>
		<category><![CDATA[SPONSORED]]></category>
		<category><![CDATA[Transforming Engineering]]></category>
		<category><![CDATA[Transforming Engineering from the inside out]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13928</guid>

					<description><![CDATA[From clearing the papers on a CEO’s desk to proving a point by becoming a published author, we join Will Beer on his journey to save engineering departments from themselves.  Inspired from a young age by stories of his great grandfather John Francis ‘Frank’ Tunley, who worked in the 1940s as a pattern maker, to ... <a title="Transforming Engineering from the inside out" class="read-more" href="https://blog.eduguru.in/news/transforming-engineering-from-the-inside-out" aria-label="Read more about Transforming Engineering from the inside out">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Instagram made to crack down on ‘hidden advertising’</title>
		<link>https://blog.eduguru.in/news/instagram-made-to-crack-down-on-hidden-advertising</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 17:51:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ADVERTISING]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Instagram made to crack down on ‘hidden advertising]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13926</guid>

					<description><![CDATA[Instagram’s owner Facebook has agreed to make it more difficult for users to post advertising content to its photo-sharing platform without clearly labelling it as such.  Popular users often sign deals to advertise a product or service on their feed, but the distinction between paid-for content and standard posted content is not always clear. Clear labelling ... <a title="Instagram made to crack down on ‘hidden advertising’" class="read-more" href="https://blog.eduguru.in/news/instagram-made-to-crack-down-on-hidden-advertising" aria-label="Read more about Instagram made to crack down on ‘hidden advertising’">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>US launches landmark antitrust complaint against Google</title>
		<link>https://blog.eduguru.in/news/us-launches-landmark-antitrust-complaint-against-google</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 17:43:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[COMPETITION]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[LEGAL]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[US launches landmark antitrust complaint against Google]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13924</guid>

					<description><![CDATA[The US Justice Department has initiated legal proceedings against Google, alleging that the company has abused its market dominance in online search and advertising. The case has been filed in federal court in Washington DC. It alleges that the trillion-dollar search giant uses billions of dollars raised from advertisers to pay Apple, Samsung, and other ... <a title="US launches landmark antitrust complaint against Google" class="read-more" href="https://blog.eduguru.in/news/us-launches-landmark-antitrust-complaint-against-google" aria-label="Read more about US launches landmark antitrust complaint against Google">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Big tech CEOs defend Section 230 in acrimonious Senate hearing</title>
		<link>https://blog.eduguru.in/news/big-tech-ceos-defend-section-230-in-acrimonious-senate-hearing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 17:37:03 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA['USA']]></category>
		<category><![CDATA[Big tech CEOs defend Section 230 in acrimonious Senate hearing]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[FAKE NEWS]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<category><![CDATA[POLITICS]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<category><![CDATA[TWITTER]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13922</guid>

					<description><![CDATA[During a US Senate Commerce Committee hearing, CEOs of Google, Facebook, and Twitter defended a law that shields them from liability for questionable content on their platforms. Section 230 of the Communications Decency Act 1996, which protects companies from liability over content posted by users on their platforms (declaring that the company is not a ... <a title="Big tech CEOs defend Section 230 in acrimonious Senate hearing" class="read-more" href="https://blog.eduguru.in/news/big-tech-ceos-defend-section-230-in-acrimonious-senate-hearing" aria-label="Read more about Big tech CEOs defend Section 230 in acrimonious Senate hearing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Brussels won’t block new nuclear plants, says EU climate chief</title>
		<link>https://blog.eduguru.in/news/brussels-wont-block-new-nuclear-plants-says-eu-climate-chief</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 17:32:18 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Brussels won’t block new nuclear plants]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[FINANCE]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[NUCLEAR RENEWABLES]]></category>
		<category><![CDATA[POLICY]]></category>
		<category><![CDATA[says EU climate chief]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13920</guid>

					<description><![CDATA[The EU Commission will “certainly not stand in [the] way” of governments which plan to decarbonise by building new nuclear power stations, said Frans Timmermans, the EU Commissioner for Climate Action.  Nuclear power accounts for 27 per cent of electricity generated across the EU and approximately half of low-carbon electricity. Member states have varying attitudes ... <a title="Brussels won’t block new nuclear plants, says EU climate chief" class="read-more" href="https://blog.eduguru.in/news/brussels-wont-block-new-nuclear-plants-says-eu-climate-chief" aria-label="Read more about Brussels won’t block new nuclear plants, says EU climate chief">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Japan sets 2050 target for carbon neutrality</title>
		<link>https://blog.eduguru.in/news/japan-sets-2050-target-for-carbon-neutrality-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 17:28:08 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ECONOMY SUSTAINABILITY]]></category>
		<category><![CDATA[FOSSIL FUELS]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Japan sets 2050 target for carbon neutrality]]></category>
		<category><![CDATA[LOW CARBON]]></category>
		<category><![CDATA[NUCLEAR]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13918</guid>

					<description><![CDATA[Prime Minister of Japan Yoshihide Suga has announced that the country will aim to achieve zero-carbon emissions by 2050, framing decarbonisation as an economic opportunity rather than as a burden.  Suga announced the target in his first policy speech to Parliament since taking office in September. Previously, Japan was aiming to cut its carbon emissions ... <a title="Japan sets 2050 target for carbon neutrality" class="read-more" href="https://blog.eduguru.in/news/japan-sets-2050-target-for-carbon-neutrality-2" aria-label="Read more about Japan sets 2050 target for carbon neutrality">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Tech self-reliance at core of China’s five-year plan</title>
		<link>https://blog.eduguru.in/news/tech-self-reliance-at-core-of-chinas-five-year-plan</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 17:24:24 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[POLITICS]]></category>
		<category><![CDATA[SEMICONDUCTORS]]></category>
		<category><![CDATA[Tech self-reliance at core of China’s five-year plan]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13916</guid>

					<description><![CDATA[Under the governing Chinese Communist Party (CCP)’s next five-year plan, China will promote “scientific and technological self-reliance” and a sustainable, low-carbon future.  The key strategic pillars of the five-year plan for 2021-2015 were published this week, following four days of private meetings between President Xi Jinping and the CCP’s top decision-making body, the Central Committee. ... <a title="Tech self-reliance at core of China’s five-year plan" class="read-more" href="https://blog.eduguru.in/news/tech-self-reliance-at-core-of-chinas-five-year-plan" aria-label="Read more about Tech self-reliance at core of China’s five-year plan">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>3D-printed human tongue developed for food tests and dry mouth cures</title>
		<link>https://blog.eduguru.in/news/3d-printed-human-tongue-developed-for-food-tests-and-dry-mouth-cures</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 20:04:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[3D PRINTING]]></category>
		<category><![CDATA[3D-printed human tongue developed for food tests and dry mouth cures]]></category>
		<category><![CDATA[3D-printed tongue]]></category>
		<category><![CDATA[FOOD AND DRINK]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[HUMAN FACTORS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13913</guid>

					<description><![CDATA[Scientists have 3D-printed synthetic, soft surfaces with tongue-like textures that could be used to test the oral processing properties of food, nutritional technologies, pharmaceutics and dry mouth therapies.  The highly sophisticated surface design of a human tongue has been replicated with a synthetic silicone structure that mimics the topology, elasticity and wettability of the tongue’s ... <a title="3D-printed human tongue developed for food tests and dry mouth cures" class="read-more" href="https://blog.eduguru.in/news/3d-printed-human-tongue-developed-for-food-tests-and-dry-mouth-cures" aria-label="Read more about 3D-printed human tongue developed for food tests and dry mouth cures">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ban on locked phones coming into force in 2021</title>
		<link>https://blog.eduguru.in/news/ban-on-locked-phones-coming-into-force-in-2021</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 19:59:39 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ban locked phones]]></category>
		<category><![CDATA[Ban on locked phones coming into force in 2021]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[Vodafones]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13911</guid>

					<description><![CDATA[Ofcom has said it will ban mobile networks from selling ‘locked’ handsets to consumers, as part of a new set of rules intended to make switching simpler.  Currently, firms including EE, Tesco Mobile and Vodafone sell mobile phones that cannot be used on other networks unless they are unlocked. The potentially complicated process can cost ... <a title="Ban on locked phones coming into force in 2021" class="read-more" href="https://blog.eduguru.in/news/ban-on-locked-phones-coming-into-force-in-2021" aria-label="Read more about Ban on locked phones coming into force in 2021">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>PayPal to permit cryptocurrency payments from 2021</title>
		<link>https://blog.eduguru.in/news/paypal-to-permit-cryptocurrency-payments-from-2021</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 19:56:35 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[BITCOIN]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[CRYPTOCURRENCY]]></category>
		<category><![CDATA[FINANCE]]></category>
		<category><![CDATA[PayPal to permit cryptocurrency payments from 2021]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13909</guid>

					<description><![CDATA[PayPal has been granted a licence by the New York State Department of Financial Services, allowing it to roll out cryptocurrency payments via PayPal accounts from early 2021.  The Department granted PayPal a Bitlicense, which regulates any company or individual based in New York which uses virtual currencies. A limited number of companies have been ... <a title="PayPal to permit cryptocurrency payments from 2021" class="read-more" href="https://blog.eduguru.in/news/paypal-to-permit-cryptocurrency-payments-from-2021" aria-label="Read more about PayPal to permit cryptocurrency payments from 2021">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ericsson to replace Huawei in BT’s 5G infrastructure</title>
		<link>https://blog.eduguru.in/news/ericsson-to-replace-huawei-in-bts-5g-infrastructure</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 19:54:05 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Ericsson to replace Huawei in BT’s 5G infrastructure]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[mobile networks]]></category>
		<category><![CDATA[TELECOMMUNICATIONS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13907</guid>

					<description><![CDATA[Ericsson has signed a deal with BT to supply equipment for the non-core parts of its 5G network across UK cities, replacing equipment provided by Huawei.  In July, the UK government announced that it would ban Huawei equipment from any part of the UK’s 5G network. Operators were given until 2027 to remove any existing equipment and ... <a title="Ericsson to replace Huawei in BT’s 5G infrastructure" class="read-more" href="https://blog.eduguru.in/news/ericsson-to-replace-huawei-in-bts-5g-infrastructure" aria-label="Read more about Ericsson to replace Huawei in BT’s 5G infrastructure">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Intel to sell NAND chip business to SK Hynix</title>
		<link>https://blog.eduguru.in/news/intel-to-sell-nand-chip-business-to-sk-hynix</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 19:51:21 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[FLASH]]></category>
		<category><![CDATA[Intel to sell NAND chip business to SK Hynix]]></category>
		<category><![CDATA[MEMORY]]></category>
		<category><![CDATA[SOUTH KOREA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13905</guid>

					<description><![CDATA[Intel has entered a deal to sell its NAND flash memory business to South Korean chipmaker SK Hynix for $9bn in cash over almost five years.  Under the terms of the deal, Intel would sell all of its NAND business, including its solid-state drive business, NAND component and wafer operation, and its factory in Dalian, ... <a title="Intel to sell NAND chip business to SK Hynix" class="read-more" href="https://blog.eduguru.in/news/intel-to-sell-nand-chip-business-to-sk-hynix" aria-label="Read more about Intel to sell NAND chip business to SK Hynix">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>2D materials tailored to improve optical and electronic devices</title>
		<link>https://blog.eduguru.in/news/2d-materials-tailored-to-improve-optical-and-electronic-devices</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 19:47:40 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[2D materials tailored to improve optical and electronic devices]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[INNOVATION]]></category>
		<category><![CDATA[MATERIALS]]></category>
		<category><![CDATA[OPTICS]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[SMARTPHONES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13902</guid>

					<description><![CDATA[Researchers have found that altering 2D materials could improve the capabilities of optical and electronic devices.  The research, led by Shengxi Huang, assistant professor of electrical engineering and biomedical engineering at Penn State University, found that altering the material in two different ways – atomically and physically – could enhance light emission and increase signal strength in many devices that ... <a title="2D materials tailored to improve optical and electronic devices" class="read-more" href="https://blog.eduguru.in/news/2d-materials-tailored-to-improve-optical-and-electronic-devices" aria-label="Read more about 2D materials tailored to improve optical and electronic devices">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>AMD powers into the AI chip market’s blowoff top</title>
		<link>https://blog.eduguru.in/news/amd-powers-into-the-ai-chip-markets-blowoff-top</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 19:44:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AMD powers into the AI chip market’s blowoff top]]></category>
		<category><![CDATA[APPLICATION SPECIFIC PROCESSORS]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[AUTONOMOUS VEHICLES]]></category>
		<category><![CDATA[CLOUD COMPUTING]]></category>
		<category><![CDATA[COMPUTER VISION]]></category>
		<category><![CDATA[ELECTRONIC CONNECTIONS]]></category>
		<category><![CDATA[FPGA]]></category>
		<category><![CDATA[GPU]]></category>
		<category><![CDATA[INTEGRATED CIRCUITS]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[NATURAL LANGUAGE]]></category>
		<category><![CDATA[PROCESSING ELECTRONICS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13900</guid>

					<description><![CDATA[The AI surge makes the PC processor maker’s purchase of Xilinx look like a one-way bet, but trouble may surface not that long from now.  The parabolic blowoff top is a common feature of stock markets. Sometimes things get so frothy that there is no stopping investors and traders from piling into buying a particular ... <a title="AMD powers into the AI chip market’s blowoff top" class="read-more" href="https://blog.eduguru.in/news/amd-powers-into-the-ai-chip-markets-blowoff-top" aria-label="Read more about AMD powers into the AI chip market’s blowoff top">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is ReactJS?</title>
		<link>https://blog.eduguru.in/front-end-developer/what-is-reactjs</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 15:34:56 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[JAVA SCRIPT]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[ReactJS]]></category>
		<category><![CDATA[What is ReactJS?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13897</guid>

					<description><![CDATA[ReactJS is an open-source, component based front end library responsible only for the view layer of the application. It is maintained by Facebook. ReactJS uses virtual DOM based mechanism to fill in data (views) in HTML DOM. The virtual DOM works fast owning to the fact that it only changes individual DOM elements instead of ... <a title="What is ReactJS?" class="read-more" href="https://blog.eduguru.in/front-end-developer/what-is-reactjs" aria-label="Read more about What is ReactJS?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Inline Images in HTML: The  Tag</title>
		<link>https://blog.eduguru.in/front-end-developer/inline-images-in-html-the-tag</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 15:23:23 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[HTML Tag]]></category>
		<category><![CDATA[Inline]]></category>
		<category><![CDATA[Inline Images]]></category>
		<category><![CDATA[Inline Images in HTML: The Tag]]></category>
		<category><![CDATA[Inline Tag]]></category>
		<category><![CDATA[Tag]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13895</guid>

					<description><![CDATA[After you have an image ready to go, you can include it on your web page. Inline images are placed in HTML documents using the &#60;img&#62; tag. This tag, like the &#60;hr&#62; and &#60;br&#62; tags, has no closing tag in HTML. The &#60;img&#62; tag has many attributes that enable you to control how the image ... <a title="Inline Images in HTML: The  Tag" class="read-more" href="https://blog.eduguru.in/front-end-developer/inline-images-in-html-the-tag" aria-label="Read more about Inline Images in HTML: The  Tag">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Image Formats</title>
		<link>https://blog.eduguru.in/front-end-developer/image-formats</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 15:18:55 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[Formats]]></category>
		<category><![CDATA[Image Formats]]></category>
		<category><![CDATA[IMG]]></category>
		<category><![CDATA[JPEG]]></category>
		<category><![CDATA[JPG]]></category>
		<category><![CDATA[PNG]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13893</guid>

					<description><![CDATA[GIF Graphics Interchange Format, also known as GIF, was once the most widely used image format. It was developed by CompuServe to fill the need for a cross-platform image format. The GIF format is okay for logos, icons, line art, and other simple images. It doesn’t work as well for highly detailed images because each ... <a title="Image Formats" class="read-more" href="https://blog.eduguru.in/front-end-developer/image-formats" aria-label="Read more about Image Formats">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UK scientists develop five-minute Covid-19 antigen test</title>
		<link>https://blog.eduguru.in/news/uk-scientists-develop-five-minute-covid-19-antigen-test</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 04:39:57 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CORONAVIRUS TEST]]></category>
		<category><![CDATA[HEALTH AND SAFETY]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[UK scientists develop five-minute Covid-19 antigen test]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13891</guid>

					<description><![CDATA[Scientists at Oxford University have developed a rapid Covid-19 test, which is capable of identifying the virus in less than five minutes.  The researchers behind the test suggested it could be used in mass testing at airports. The university aims to start product development in early 2021 and have an approved device available six months afterwards. ... <a title="UK scientists develop five-minute Covid-19 antigen test" class="read-more" href="https://blog.eduguru.in/news/uk-scientists-develop-five-minute-covid-19-antigen-test" aria-label="Read more about UK scientists develop five-minute Covid-19 antigen test">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Heated face mask promises to deactivate the Covid-19 virus</title>
		<link>https://blog.eduguru.in/news/heated-face-mask-promises-to-deactivate-the-covid-19-virus</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 04:36:35 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[HEALTHCARE TECHNOLOGIES]]></category>
		<category><![CDATA[Heated face mask]]></category>
		<category><![CDATA[Heated face mask promises to deactivate the Covid-19 virus]]></category>
		<category><![CDATA[MIT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13889</guid>

					<description><![CDATA[A face mask that comes with a built-in heated copper mesh that can inactivate viruses such as Covid-19 is being developed by MIT researchers.  While N95 masks have already been shown to be effective at filtering out viruses and reducing the risk of infection, the heat mesh could take this level of protection one step ... <a title="Heated face mask promises to deactivate the Covid-19 virus" class="read-more" href="https://blog.eduguru.in/news/heated-face-mask-promises-to-deactivate-the-covid-19-virus" aria-label="Read more about Heated face mask promises to deactivate the Covid-19 virus">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Green tech transition needs long-term planning, not eye-catching ideas</title>
		<link>https://blog.eduguru.in/news/green-tech-transition-needs-long-term-planning-not-eye-catching-ideas</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 04:32:58 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[ENVIRONMENT]]></category>
		<category><![CDATA[ENVIRONMENT COMMENT]]></category>
		<category><![CDATA[Green Tech]]></category>
		<category><![CDATA[Green tech transition needs long-term planning]]></category>
		<category><![CDATA[not eye-catching ideas]]></category>
		<category><![CDATA[RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13887</guid>

					<description><![CDATA[Clear understanding of the consequences of moving to sustainable technologies is needed if the billions planned to be spent on helping economies recovering from the current pandemic are to have lasting results.  Across the globe, hopes are being pinned on development and investments in green technologies and sustainable solutions to fuel economic recovery from the ... <a title="Green tech transition needs long-term planning, not eye-catching ideas" class="read-more" href="https://blog.eduguru.in/news/green-tech-transition-needs-long-term-planning-not-eye-catching-ideas" aria-label="Read more about Green tech transition needs long-term planning, not eye-catching ideas">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Covid-19 stimulus packages should focus on ‘global low-carbon transformation’</title>
		<link>https://blog.eduguru.in/news/covid-19-stimulus-packages-should-focus-on-global-low-carbon-transformation</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 04:29:46 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CARBON FREE ECONOMY]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Covid-19 stimulus packages should focus on ‘global low-carbon transformation’]]></category>
		<category><![CDATA[ECONOMY]]></category>
		<category><![CDATA[GOVERNMENT POLICIES]]></category>
		<category><![CDATA[LOW CARBON]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13885</guid>

					<description><![CDATA[Global stimulus packages designed to get economies back on their feet after the shock delivered by the Covid-19 pandemic should in part be focused on measures to combat climate change, a group of researchers have said.  More than $12tr (£9.3tr) has been pledged worldwide in such packages so far. This is around three times more ... <a title="Covid-19 stimulus packages should focus on ‘global low-carbon transformation’" class="read-more" href="https://blog.eduguru.in/news/covid-19-stimulus-packages-should-focus-on-global-low-carbon-transformation" aria-label="Read more about Covid-19 stimulus packages should focus on ‘global low-carbon transformation’">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Japan sets 2050 target for carbon neutrality</title>
		<link>https://blog.eduguru.in/news/japan-sets-2050-target-for-carbon-neutrality</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 04:26:57 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ECONOMY SUSTAINABILITY]]></category>
		<category><![CDATA[FOSSIL FUELS]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Japan sets 2050 target for carbon neutrality]]></category>
		<category><![CDATA[LOW CARBON]]></category>
		<category><![CDATA[NUCLEAR]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13883</guid>

					<description><![CDATA[Prime Minister of Japan Yoshihide Suga has announced that the country will aim to achieve zero-carbon emissions by 2050, framing decarbonisation as an economic opportunity rather than as a burden.  Suga announced the target in his first policy speech to Parliament since taking office in September. Previously, Japan was aiming to cut its carbon emissions ... <a title="Japan sets 2050 target for carbon neutrality" class="read-more" href="https://blog.eduguru.in/news/japan-sets-2050-target-for-carbon-neutrality" aria-label="Read more about Japan sets 2050 target for carbon neutrality">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Huawei Mate 40 smartphone range could be ‘last hurrah’ in Europe for Chinese firm</title>
		<link>https://blog.eduguru.in/front-end-developer/huawei-mate-40-smartphone-range-could-be-last-hurrah-in-europe-for-chinese-firm</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 18:36:57 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[gadgets]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[Huawei Mate 40 smartphone range could be ‘last hurrah’ in Europe for Chinese firm]]></category>
		<category><![CDATA[US]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13881</guid>

					<description><![CDATA[Huawei’s new range of smartphones could be the company’s ‘last hurrah’ outside China, according to an industry expert, as US sanctions continue to squeeze its business.  Huawei unveiled its new Mate 40 line-up of smartphones yesterday, along with a new smartwatch &#8211; the GT 2 &#8211; and augmented reality glasses. However, the ongoing sanctions imposed ... <a title="Huawei Mate 40 smartphone range could be ‘last hurrah’ in Europe for Chinese firm" class="read-more" href="https://blog.eduguru.in/front-end-developer/huawei-mate-40-smartphone-range-could-be-last-hurrah-in-europe-for-chinese-firm" aria-label="Read more about Huawei Mate 40 smartphone range could be ‘last hurrah’ in Europe for Chinese firm">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook Oversight Board starts hearing content moderation appeal cases</title>
		<link>https://blog.eduguru.in/front-end-developer/facebook-oversight-board-starts-hearing-content-moderation-appeal-cases</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 18:27:18 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Facebook Oversight Board starts hearing content moderation appeal cases]]></category>
		<category><![CDATA[Moderation]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13879</guid>

					<description><![CDATA[Facebook has announced the start of its independent Oversight Board on content moderation decisions. Facebook users can now appeal content-moderation decisions directly with its independent oversight board. The social media giant said users could go through this system once they had “exhausted the company’s appeal process”. The Board has the ability to overrule Facebook’s verdict ... <a title="Facebook Oversight Board starts hearing content moderation appeal cases" class="read-more" href="https://blog.eduguru.in/front-end-developer/facebook-oversight-board-starts-hearing-content-moderation-appeal-cases" aria-label="Read more about Facebook Oversight Board starts hearing content moderation appeal cases">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>relevant CSS standards</title>
		<link>https://blog.eduguru.in/front-end-developer/relevant-css-standards</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 18:19:23 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[CSS]]></category>
		<category><![CDATA[relevant CSS standards]]></category>
		<category><![CDATA[Style Sheet]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13877</guid>

					<description><![CDATA[There are three CSS recommendations from the W3C: CSS1, CSS2, and CSS3. Most modern browsers support a large part of CSS1 and CSS2, as well as parts of CSS3. You can find out more at http://www.w3.org/Style/CSS/. If you’re curious about how well your browser supports CSS or the effect that properties have in real browsers, ... <a title="relevant CSS standards" class="read-more" href="https://blog.eduguru.in/front-end-developer/relevant-css-standards" aria-label="Read more about relevant CSS standards">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What are the relevant CSS standards?</title>
		<link>https://blog.eduguru.in/front-end-developer/what-are-the-relevant-css-standards</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 17:54:45 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[CSS]]></category>
		<category><![CDATA[Style Sheet]]></category>
		<category><![CDATA[What are the relevant CSS standards?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13875</guid>

					<description><![CDATA[There are three CSS recommendations from the W3C: CSS1, CSS2, and CSS3. Most modern browsers support a large part of CSS1 and CSS2, as well as parts of CSS3. You can find out more at http://www.w3.org/Style/CSS/. If you’re curious about how well your browser supports CSS or the effect that properties have in real browsers, ... <a title="What are the relevant CSS standards?" class="read-more" href="https://blog.eduguru.in/front-end-developer/what-are-the-relevant-css-standards" aria-label="Read more about What are the relevant CSS standards?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Including Style Sheets in a Page</title>
		<link>https://blog.eduguru.in/front-end-developer/including-style-sheets-in-a-page</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 17:45:56 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[Creating Page-Level Styles]]></category>
		<category><![CDATA[Including Style Sheet]]></category>
		<category><![CDATA[Including Style Sheets in a Page]]></category>
		<category><![CDATA[Pages]]></category>
		<category><![CDATA[Style Sheets]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13873</guid>

					<description><![CDATA[Creating Page-Level Styles First , let’s look at how we can apply styles to our page at the page level. Thus far, you’ve seen how styles are applied, but you haven’t seen any style sheets. Here’s what one looks like: &#60;style type=&#8221;text/css&#8221;&#62; h1 { font-size: x-large; font-weight: bold; } h2 { font-size: large; font-weight: bold; ... <a title="Including Style Sheets in a Page" class="read-more" href="https://blog.eduguru.in/front-end-developer/including-style-sheets-in-a-page" aria-label="Read more about Including Style Sheets in a Page">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What’s the most common use of the  tag?</title>
		<link>https://blog.eduguru.in/front-end-developer/whats-the-most-common-use-of-the-tag</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 17:24:57 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[HTML Tag]]></category>
		<category><![CDATA[What’s the most common use of the tag?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13871</guid>

					<description><![CDATA[The &#60;address&#62; tag is most commonly used for signature-like entities on a web page. These include the name of the author of the web page, contact information, dates, copyright notices, or warnings. Address information usually appears at the bottom of a web page.]]></description>
		
		
		
			</item>
		<item>
		<title>What makes an HTML tag semantic?</title>
		<link>https://blog.eduguru.in/front-end-developer/what-makes-an-html-tag-semantic</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 17:21:26 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[HTML Tag]]></category>
		<category><![CDATA[HTML Tag Semantic]]></category>
		<category><![CDATA[Semantic]]></category>
		<category><![CDATA[What makes an HTML tag semantic?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13869</guid>

					<description><![CDATA[Semantic HTML tags are tags that provide meaning to the enclosed content, beyond just the framework of the document.]]></description>
		
		
		
			</item>
		<item>
		<title>If line breaks appear in HTML. can I also do page breaks?</title>
		<link>https://blog.eduguru.in/front-end-developer/if-line-breaks-appear-in-html-can-i-also-do-page-breaks</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 17:16:54 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[HTML Links]]></category>
		<category><![CDATA[HTML page Breaks]]></category>
		<category><![CDATA[HTML Pages]]></category>
		<category><![CDATA[If line breaks appear in HTML. can I also do page breaks?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13867</guid>

					<description><![CDATA[HTML doesn’t have a page break tag. Consider what the term page means in a web document. If each document on the web is a single page, the only way to produce a page break is to split your HTML document into separate files and link them. Even within a single document, browsers have no ... <a title="If line breaks appear in HTML. can I also do page breaks?" class="read-more" href="https://blog.eduguru.in/front-end-developer/if-line-breaks-appear-in-html-can-i-also-do-page-breaks" aria-label="Read more about If line breaks appear in HTML. can I also do page breaks?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Can I put any URL in a link?</title>
		<link>https://blog.eduguru.in/front-end-developer/can-i-put-any-url-in-a-link</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 17:07:30 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[Can I put any URL in a link?]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[URL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13865</guid>

					<description><![CDATA[You bet. If you can get to a URL using your browser, you can put that URL in a link. Note, however, that some browsers support URLs that others don’t. For example, Lynx is really good with mailto URLs (URLs that enable you to send electronic mail to a person’s email address). When you select ... <a title="Can I put any URL in a link?" class="read-more" href="https://blog.eduguru.in/front-end-developer/can-i-put-any-url-in-a-link" aria-label="Read more about Can I put any URL in a link?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Kinds of URLs</title>
		<link>https://blog.eduguru.in/front-end-developer/kinds-of-urls</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 17:03:52 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[Kinds of URLs]]></category>
		<category><![CDATA[URLs]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13863</guid>

					<description><![CDATA[Many kinds of URLs are defined by the Uniform Resource Locator specification. This post describes some of the more popular URLs and some situations to look out for when using them. HTTP HTTP URLs are by far the most common type of URLs because they point to other documents on the Web. HTTP is the protocol ... <a title="Kinds of URLs" class="read-more" href="https://blog.eduguru.in/front-end-developer/kinds-of-urls" aria-label="Read more about Kinds of URLs">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Creating Links</title>
		<link>https://blog.eduguru.in/front-end-developer/creating-links-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 16:41:33 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[Creating Links]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[HTML Links]]></category>
		<category><![CDATA[HTML Tag]]></category>
		<category><![CDATA[Links]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13859</guid>

					<description><![CDATA[To create a link in HTML, you need two things:  The name of the file (or the URL) to which you want to link  The text that will serve as the clickable link Only the text included within the link tag is actually visible on your page. When your readers click the link, the browser ... <a title="Creating Links" class="read-more" href="https://blog.eduguru.in/front-end-developer/creating-links-2" aria-label="Read more about Creating Links">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Is it possible to put HTML tags inside comments?</title>
		<link>https://blog.eduguru.in/front-end-developer/is-it-possible-to-put-html-tags-inside-comments-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 25 Oct 2020 15:45:24 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[HTML Comments]]></category>
		<category><![CDATA[HTML Tags]]></category>
		<category><![CDATA[Is it possible to put HTML tags inside comments?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13857</guid>

					<description><![CDATA[Yes, you can enclose HTML tags within comments, and the browser will not display them. In fact, it’s common to use comments to temporarily hide sections of a page, especially when testing things. Programmers (and web developers) generally refer to this as “commenting it out.”]]></description>
		
		
		
			</item>
		<item>
		<title>What Is a Front-End Developer?</title>
		<link>https://blog.eduguru.in/front-end-developer/what-is-a-front-end-developer</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:50:08 +0000</pubDate>
				<category><![CDATA[Front End developer]]></category>
		<category><![CDATA[CSS]]></category>
		<category><![CDATA[Front End Development]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[JAVA SCRIPT]]></category>
		<category><![CDATA[What Is a Front-End Developer]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13807</guid>

					<description><![CDATA[Front-end web development, also known as client-side development is the practice of producing HTML, CSS and JavaScript for a website or Web Application so that a user can see and interact with them directly. The challenge associated with front end development is that the tools and techniques used to create the front end of a ... <a title="What Is a Front-End Developer?" class="read-more" href="https://blog.eduguru.in/front-end-developer/what-is-a-front-end-developer" aria-label="Read more about What Is a Front-End Developer?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The eccentric engineer: that light-bulb moment for an eminent man of electrical science</title>
		<link>https://blog.eduguru.in/news/the-eccentric-engineer-that-light-bulb-moment-for-an-eminent-man-of-electrical-science</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:41:50 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[bulb]]></category>
		<category><![CDATA[eccentric engineeer]]></category>
		<category><![CDATA[ENGINEERING]]></category>
		<category><![CDATA[light]]></category>
		<category><![CDATA[lightbulb]]></category>
		<category><![CDATA[Science]]></category>
		<category><![CDATA[The eccentric engineer: that light-bulb moment for an eminent man of electrical science]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13805</guid>

					<description><![CDATA[This edition tells the story of the illuminating life of Lewis Latimer, whose work in science was an achievement and his personal life ‘a work of art’. Many an engineer’s story is one of rags to riches – or vice versa. For Lewis Howard Latimer, the climb was even harder, but stoically undertaken. Latimer did ... <a title="The eccentric engineer: that light-bulb moment for an eminent man of electrical science" class="read-more" href="https://blog.eduguru.in/news/the-eccentric-engineer-that-light-bulb-moment-for-an-eminent-man-of-electrical-science" aria-label="Read more about The eccentric engineer: that light-bulb moment for an eminent man of electrical science">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft takes legal action, disrupts massive botnet</title>
		<link>https://blog.eduguru.in/news/microsoft-takes-legal-action-disrupts-massive-botnet</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:37:21 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[botnets]]></category>
		<category><![CDATA[CRIME]]></category>
		<category><![CDATA[CYBERSECURITY]]></category>
		<category><![CDATA[disrupts]]></category>
		<category><![CDATA[disrupts massive botnet]]></category>
		<category><![CDATA[LEGAL]]></category>
		<category><![CDATA[legal action]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Microsoft takes legal action]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13803</guid>

					<description><![CDATA[Microsoft has executed a plan to take down a vast ransomware distributor after successfully arguing in court that its copyright has been violated.  The action is focused on a botnet called Trickbot, one of the world’s most prolific ransomware distributors. Trickbot began life in 2016 as a banking trojan. Since then, its operators (mainly Russian-speaking ... <a title="Microsoft takes legal action, disrupts massive botnet" class="read-more" href="https://blog.eduguru.in/news/microsoft-takes-legal-action-disrupts-massive-botnet" aria-label="Read more about Microsoft takes legal action, disrupts massive botnet">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to engineer self-driving cars with risk and responsibility in mind</title>
		<link>https://blog.eduguru.in/news/how-to-engineer-self-driving-cars-with-risk-and-responsibility-in-mind</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:32:11 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ASSURANCE ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[AUTONOMOUS]]></category>
		<category><![CDATA[Comment]]></category>
		<category><![CDATA[CONTROL AND AUTOMATION]]></category>
		<category><![CDATA[How to engineer self-driving cars with risk and responsibility in mind]]></category>
		<category><![CDATA[LEGAL]]></category>
		<category><![CDATA[ROAD SAFETY]]></category>
		<category><![CDATA[SAFETY]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<category><![CDATA[VEHICLES]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13801</guid>

					<description><![CDATA[However careful manufacturers and drivers are, autonomous vehicles will inevitably be involved in accidents. A rigorous approach to the design of their system architectures can help establish clarity around questions of legal liability.  We all know that connected and autonomous cars are coming. The level of autonomy is increasing, even if we don’t know when ... <a title="How to engineer self-driving cars with risk and responsibility in mind" class="read-more" href="https://blog.eduguru.in/news/how-to-engineer-self-driving-cars-with-risk-and-responsibility-in-mind" aria-label="Read more about How to engineer self-driving cars with risk and responsibility in mind">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Shared mobility could be catalyst for electric vehicle future</title>
		<link>https://blog.eduguru.in/news/shared-mobility-could-be-catalyst-for-electric-vehicle-future</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:28:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[ENGINEERING]]></category>
		<category><![CDATA[HYBRID VEHICLES]]></category>
		<category><![CDATA[Shared mobility could be catalyst for electric vehicle future]]></category>
		<category><![CDATA[TRANSPORT]]></category>
		<category><![CDATA[URBAN TRAFFIC MANAGEMENT]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13799</guid>

					<description><![CDATA[Smart and clean mobility requires strategy planning, policy making and a calibrated approach, whereby manufacturing needs to be attuned to consumer demands.  When the transport industry completely shifts from ICE (Internal Combustion Engine) to electric and hybrid mobility, the impact it will make on India will go beyond traffic-related matters. Electric and hybrid mobility will ... <a title="Shared mobility could be catalyst for electric vehicle future" class="read-more" href="https://blog.eduguru.in/news/shared-mobility-could-be-catalyst-for-electric-vehicle-future" aria-label="Read more about Shared mobility could be catalyst for electric vehicle future">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Electrification of EVs is a journey, not a switch</title>
		<link>https://blog.eduguru.in/news/electrification-of-evs-is-a-journey-not-a-switch</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:23:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[CLIMATE CHANGE]]></category>
		<category><![CDATA[Electric car]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[Electrification of EVs is a journey]]></category>
		<category><![CDATA[FOSSIL FUELS]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[not a switch]]></category>
		<category><![CDATA[PARIS AGREEMENT]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13797</guid>

					<description><![CDATA[India has pledged to reduce its greenhouse gas emissions and carbon footprint as per the Paris Agreement. A transition from fossil-fuel vehicles to electric vehicles (EVs) is a move in the right direction.  The electrification of EVs needs to be ramped up and power hybridised to become more efficient. Karnataka is preparing the ground as ... <a title="Electrification of EVs is a journey, not a switch" class="read-more" href="https://blog.eduguru.in/news/electrification-of-evs-is-a-journey-not-a-switch" aria-label="Read more about Electrification of EVs is a journey, not a switch">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Largest CO2 emissions drop in history due to Covid-19 pandemic</title>
		<link>https://blog.eduguru.in/news/largest-co2-emissions-drop-in-history-due-to-covid-19-pandemic</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:19:44 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[air pollution]]></category>
		<category><![CDATA[CLIMATE CHANGE]]></category>
		<category><![CDATA[Co2]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[ECONOMY]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[Largest CO2 emissions drop in history due to Covid-19 pandemic]]></category>
		<category><![CDATA[LOW CARBON]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13795</guid>

					<description><![CDATA[The first half of 2020 has seen the largest-ever drop in carbon emissions in a single year, with bigger falls than the financial crisis of 2008, the 1979 oil crisis and even World War II.  An international team of researchers estimated that the world saw 8.8 per cent less carbon dioxide emitted in 2020 than ... <a title="Largest CO2 emissions drop in history due to Covid-19 pandemic" class="read-more" href="https://blog.eduguru.in/news/largest-co2-emissions-drop-in-history-due-to-covid-19-pandemic" aria-label="Read more about Largest CO2 emissions drop in history due to Covid-19 pandemic">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Humans, not technology, are getting us through this pandemic</title>
		<link>https://blog.eduguru.in/news/humans-not-technology-are-getting-us-through-this-pandemic</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 20:16:21 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[are getting us through this pandemic]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[HEALTH AND SAFETY]]></category>
		<category><![CDATA[Humans]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[not technology]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[REMOTE WORKING]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13793</guid>

					<description><![CDATA[Technology’s failure to come up with a quick solution to Covid-19 reveals how organisations all over the world are nowhere near as digitally advanced as they thought they were.  Not a single person alive was prepared for what 2020 has brought. Yet, while we may not have been able to predict coronavirus, we live in ... <a title="Humans, not technology, are getting us through this pandemic" class="read-more" href="https://blog.eduguru.in/news/humans-not-technology-are-getting-us-through-this-pandemic" aria-label="Read more about Humans, not technology, are getting us through this pandemic">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Windows 10 &#8211; GUI Basics</title>
		<link>https://blog.eduguru.in/windows/windows-10-gui-basics</link>
					<comments>https://blog.eduguru.in/windows/windows-10-gui-basics#comments</comments>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 17 Oct 2020 10:59:21 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[GUI]]></category>
		<category><![CDATA[GUI Basics]]></category>
		<category><![CDATA[OPERATING SYSTEM]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[windows 10]]></category>
		<category><![CDATA[Windows 10 - GUI Basics]]></category>
		<category><![CDATA[Windows operating System]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13790</guid>

					<description><![CDATA[Once you get to the Windows Desktop screen, here are some basic features you will see. One of the most important parts of your Desktop is the Taskbar. By default, it sits at the bottom of your screen giving you access to the Start Menu, several application icons, and the Notification Area. Windows In Windows ... <a title="Windows 10 &#8211; GUI Basics" class="read-more" href="https://blog.eduguru.in/windows/windows-10-gui-basics" aria-label="Read more about Windows 10 &#8211; GUI Basics">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/windows/windows-10-gui-basics/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>5G’s low latency to be tapped for satellite communication</title>
		<link>https://blog.eduguru.in/news/5gs-low-latency-to-be-tapped-for-satellite-communication</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 16 Oct 2020 11:55:36 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G’s low latency to be tapped for satellite communication]]></category>
		<category><![CDATA[COMMUNICATION]]></category>
		<category><![CDATA[INDIA COMMUNICATIONS]]></category>
		<category><![CDATA[NETWORKS AND SERVICES]]></category>
		<category><![CDATA[Satellite Communication]]></category>
		<category><![CDATA[SATELLITES]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13787</guid>

					<description><![CDATA[Technologies such as 5G, millimetre wave and next-gen channel emulation will disrupt the aerospace and defence (A&#38;D) industries across the globe. India is no exception. Earlier in the year the Union Cabinet announced its decision to open up the country’s space activities for the private sector’s participation. It is being initiated through a new space ... <a title="5G’s low latency to be tapped for satellite communication" class="read-more" href="https://blog.eduguru.in/news/5gs-low-latency-to-be-tapped-for-satellite-communication" aria-label="Read more about 5G’s low latency to be tapped for satellite communication">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Australian telescope to enable high-speed data connections from space</title>
		<link>https://blog.eduguru.in/news/australian-telescope-to-enable-high-speed-data-connections-from-space</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 16 Oct 2020 11:51:47 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian telescope to enable high-speed data connections from space]]></category>
		<category><![CDATA[COMMUNICATIONS]]></category>
		<category><![CDATA[Data Connections]]></category>
		<category><![CDATA[High speed data]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[Telescope]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13785</guid>

					<description><![CDATA[Astronauts will soon be able to send high-speed data transmissions from space with the construction of a new optical communications station in Western Australia.  The ground station has the potential to receive high-definition video footage in real time and will probably be how video from Nasa’s next Artemis mission to the Moon in 2024 is beamed back down ... <a title="Australian telescope to enable high-speed data connections from space" class="read-more" href="https://blog.eduguru.in/news/australian-telescope-to-enable-high-speed-data-connections-from-space" aria-label="Read more about Australian telescope to enable high-speed data connections from space">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook users’ attitude towards known Russian propaganda changes, study suggests</title>
		<link>https://blog.eduguru.in/news/facebook-users-attitude-towards-known-russian-propaganda-changes-study-suggests</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 16 Oct 2020 11:47:22 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DISINFORMATION]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Facebook users’ attitude towards known Russian propaganda changes]]></category>
		<category><![CDATA[FAKE NEWS]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<category><![CDATA[study suggests]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13783</guid>

					<description><![CDATA[Facebook users are less likely to press the ‘Like’ button on content they learn is part of a foreign propaganda campaign, a report in the US has found.  Researchers have said that Russia is using political memes to polarise Americans, particularly those at the extreme ends of the political spectrum who typically like and share ... <a title="Facebook users’ attitude towards known Russian propaganda changes, study suggests" class="read-more" href="https://blog.eduguru.in/news/facebook-users-attitude-towards-known-russian-propaganda-changes-study-suggests" aria-label="Read more about Facebook users’ attitude towards known Russian propaganda changes, study suggests">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Instagram made to crackdown on ‘hidden advertising’ by the CMA</title>
		<link>https://blog.eduguru.in/news/instagram-made-to-crackdown-on-hidden-advertising-by-the-cma</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 16 Oct 2020 11:44:00 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ADVERTISING]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[instagram]]></category>
		<category><![CDATA[Instagram made to crackdown on ‘hidden advertising’ by the CMA]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[SOCIAL NETWORKS]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13781</guid>

					<description><![CDATA[Instagram’s owner Facebook has agreed to make it more difficult for users to post advertising content to its photo-sharing platform without clearly labelling it as such. Popular users often sign deals to advertise a product or service on their feed, but the distinction between paid-for content and standard posted content is not always clear. Clear labelling ... <a title="Instagram made to crackdown on ‘hidden advertising’ by the CMA" class="read-more" href="https://blog.eduguru.in/news/instagram-made-to-crackdown-on-hidden-advertising-by-the-cma" aria-label="Read more about Instagram made to crackdown on ‘hidden advertising’ by the CMA">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ubuntu 18.04 LTS Desktop Installation Guide</title>
		<link>https://blog.eduguru.in/unix/ubuntu-18-04-lts-desktop-installation-guide</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 16 Oct 2020 07:08:17 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Desktop Installation]]></category>
		<category><![CDATA[Installation Guide]]></category>
		<category><![CDATA[Laptop OS installation]]></category>
		<category><![CDATA[Operating System installation]]></category>
		<category><![CDATA[Ubuntu 18.04 LTS Desktop Installation Guide]]></category>
		<category><![CDATA[Ubuntu installation]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13777</guid>

					<description><![CDATA[Ubuntu 18.04 LTS – New Features: Ubuntu 18.04 LTS has been released with a lot of new features and improvements, some of the important features are listed below: Support and Updates of Ubuntu 18.04 LTS for next 5 Years (April 2023) New latest and stable Linux Kernel version 4.15 Installer offer a new option of ... <a title="Ubuntu 18.04 LTS Desktop Installation Guide" class="read-more" href="https://blog.eduguru.in/unix/ubuntu-18-04-lts-desktop-installation-guide" aria-label="Read more about Ubuntu 18.04 LTS Desktop Installation Guide">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unix Printer Commands (linux; kprinter)</title>
		<link>https://blog.eduguru.in/unix/unix-printer-commands-linux-kprinter</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 13 Oct 2020 06:09:14 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[COMMANDS]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[UNIX COMMANDS]]></category>
		<category><![CDATA[Unix Kprintert]]></category>
		<category><![CDATA[Unix Printer Commands (linux; kprinter)]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13773</guid>

					<description><![CDATA[linux understands both the Berkely lpr and the System V (lp) set of printer commands. Most distributions include a graphical-based utility allowing people more flexibility in their printing. kprinter allows people to select which printer to use, and which properties to enable, all with the click of a mouse. It is part of the CUPS ... <a title="Unix Printer Commands (linux; kprinter)" class="read-more" href="https://blog.eduguru.in/unix/unix-printer-commands-linux-kprinter" aria-label="Read more about Unix Printer Commands (linux; kprinter)">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>A quantum leap into the future</title>
		<link>https://blog.eduguru.in/news/a-quantum-leap-into-the-future</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 13 Oct 2020 06:03:08 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[A quantum leap into the future]]></category>
		<category><![CDATA[AEROSPACE]]></category>
		<category><![CDATA[Future]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[QUANTUM COMPUTING]]></category>
		<category><![CDATA[Quantum Leap]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13771</guid>

					<description><![CDATA[Quantum computing is expected to gain momentum during this decade as economic powers around the world ramp up their investments in quantum technologies.  The fact that economies have begun to invest in this technology has raised hope for it. “In India, the National Mission of Quantum Technology and Application plans to invest $1.12 billion over ... <a title="A quantum leap into the future" class="read-more" href="https://blog.eduguru.in/news/a-quantum-leap-into-the-future" aria-label="Read more about A quantum leap into the future">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unix File system Commands: Files</title>
		<link>https://blog.eduguru.in/unix/unix-file-system-commands-files</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 13 Oct 2020 05:55:31 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[COMMANDS]]></category>
		<category><![CDATA[COMMANDS LIST]]></category>
		<category><![CDATA[File System ystem]]></category>
		<category><![CDATA[files]]></category>
		<category><![CDATA[UNIX COMMANDS]]></category>
		<category><![CDATA[Unix File System]]></category>
		<category><![CDATA[Unix File system Commands: Files]]></category>
		<category><![CDATA[Unix S]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13769</guid>

					<description><![CDATA[This article is concerned with the creation, deletion, and manipulation of files. By the end of this section, the user should be able to identify all files within a directory, create new ones, remove others, display the contents of some, rename others, and more. ls: Listing The contents of a directory can be displayed using ... <a title="Unix File system Commands: Files" class="read-more" href="https://blog.eduguru.in/unix/unix-file-system-commands-files" aria-label="Read more about Unix File system Commands: Files">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unix File system Commands: Directories</title>
		<link>https://blog.eduguru.in/unix/unix-file-system-commands-directories</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 13 Oct 2020 05:33:45 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[DIRECTORIES]]></category>
		<category><![CDATA[File System. Commands]]></category>
		<category><![CDATA[UNIX COMMANDS]]></category>
		<category><![CDATA[UNIX COMMANDS LIST]]></category>
		<category><![CDATA[Unix Directories]]></category>
		<category><![CDATA[Unix File system Commands: Directories]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13767</guid>

					<description><![CDATA[Now that the UNIX tree-structured file system has been introduced, it would be useful to know how to find our way through the system and how to create files, delete them and rename them. cd: Change Directory To move from one directory to another the cd command is used. Use as: cd [directory] directory may ... <a title="Unix File system Commands: Directories" class="read-more" href="https://blog.eduguru.in/unix/unix-file-system-commands-directories" aria-label="Read more about Unix File system Commands: Directories">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unix Login Related Commands</title>
		<link>https://blog.eduguru.in/unix/unix-login-related-commands</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 13 Oct 2020 04:56:08 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[COMMANDS]]></category>
		<category><![CDATA[Login Commands]]></category>
		<category><![CDATA[Logins]]></category>
		<category><![CDATA[UNIX COMMANDS]]></category>
		<category><![CDATA[Unix Login Related Commands]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13765</guid>

					<description><![CDATA[This article will deal with how to log on to the UNIX system, and how to log out. Logging On Initially, a user needs to get a userid and, optionally, a password. The userid is typed in at the login prompt, which usually looks like: login: Following the logon, the password prompt will appear: password: ... <a title="Unix Login Related Commands" class="read-more" href="https://blog.eduguru.in/unix/unix-login-related-commands" aria-label="Read more about Unix Login Related Commands">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UNIX TCP Wrappers</title>
		<link>https://blog.eduguru.in/unix/unix-tcp-wrappers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 20:40:42 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[TCP]]></category>
		<category><![CDATA[UNIX TCP Wrappers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13762</guid>

					<description><![CDATA[Traditionally, UNIX systems allow any host, from anywhere, to connect to its various services (such as telnetd, ftpd, POP/IMAP). Since the majority of NRC’s systems are connected directly off the Internet, it means anyone may have access to the systems and their services. To restrict who has access to which service, TCP wrappers are used ... <a title="UNIX TCP Wrappers" class="read-more" href="https://blog.eduguru.in/unix/unix-tcp-wrappers" aria-label="Read more about UNIX TCP Wrappers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unix SSH</title>
		<link>https://blog.eduguru.in/unix/unix-ssh</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 20:37:13 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[SSH]]></category>
		<category><![CDATA[Unix SSH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13760</guid>

					<description><![CDATA[SSH (Secure SHell) is a protocol used to provide secure connections between two hosts. The secure connection is provided by encrypting the entire session between the two systems. Each system has a pair of keys: a private and a public key. The keys are created at the same time, so they do have a direct ... <a title="Unix SSH" class="read-more" href="https://blog.eduguru.in/unix/unix-ssh" aria-label="Read more about Unix SSH">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unix Root Password</title>
		<link>https://blog.eduguru.in/unix/unix-root-password</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 20:12:41 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[PASSWORD]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[Root password]]></category>
		<category><![CDATA[Unix password]]></category>
		<category><![CDATA[Unix Root Password]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13758</guid>

					<description><![CDATA[To system administrators: use the rules. make sure every user uses a password. limit the number of people who know the root password, to at least one more than yourself, but not too many. use the root account only when performing system administration work. &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Unix File Permissions</title>
		<link>https://blog.eduguru.in/unix/unix-file-permissions</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 20:07:55 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[File Permissions]]></category>
		<category><![CDATA[Unix File Permissions]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13755</guid>

					<description><![CDATA[File permissions have already been introduced in the File System article. USE them. If you have a file, or a directory which contains sensitive information, close it to everyone but yourself (using chmod 700 file). If a file is to be run, but the contents should not be seen by any user, do not allow ... <a title="Unix File Permissions" class="read-more" href="https://blog.eduguru.in/unix/unix-file-permissions" aria-label="Read more about Unix File Permissions">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Shells</title>
		<link>https://blog.eduguru.in/unix/shells</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 20:00:29 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[Shells]]></category>
		<category><![CDATA[Unix Shell]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13753</guid>

					<description><![CDATA[A shell is a program that interprets and runs the commands typed at the console by the user. The shell sends requests to the kernel, which executes them. UNIX comes with various shells, the most common being the C Shell, the Bourne Shell and the Korn Shell. IRIX adds the Tenex Shell. linux includes both ... <a title="Shells" class="read-more" href="https://blog.eduguru.in/unix/shells" aria-label="Read more about Shells">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UNIX Philosophy</title>
		<link>https://blog.eduguru.in/unix/unix-philosophy</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 19:55:07 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Philosophy]]></category>
		<category><![CDATA[UNIX Philosophy]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13751</guid>

					<description><![CDATA[UNIX’s philosophy is the same as the C language’s: it assumes users know what they are doing!!! &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>The UNIX Operating System</title>
		<link>https://blog.eduguru.in/unix/the-unix-operating-system</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 19:51:31 +0000</pubDate>
				<category><![CDATA[UNIX]]></category>
		<category><![CDATA[FILE SYSTEM]]></category>
		<category><![CDATA[kernel]]></category>
		<category><![CDATA[OPERATING SYSTEM]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[The UNIX Operating System]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13749</guid>

					<description><![CDATA[The UNIX system is mainly composed of three different parts: the kernel, the file system, and the shell. [The kernel] is that part of the system which manages the resources of whatever computer system it lives on, to keep track of the disks, tapes, printers, terminals, communication lines and any other devices. The file system ... <a title="The UNIX Operating System" class="read-more" href="https://blog.eduguru.in/unix/the-unix-operating-system" aria-label="Read more about The UNIX Operating System">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Troubleshoot a Network</title>
		<link>https://blog.eduguru.in/networking/how-to-troubleshoot-a-network</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 18:21:09 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[How to Troubleshoot a Network]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Network Troubleshoot]]></category>
		<category><![CDATA[NETWORKING]]></category>
		<category><![CDATA[Troubleshoot]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13747</guid>

					<description><![CDATA[Check the hardware. When you’re beginning the troubleshooting process, check all your hardware to make sure it’s connected properly, turned on, and working. If a cord has come loose or somebody has switched off an important router, this could be the problem behind your networking issues. There’s no point in going through the process of ... <a title="How to Troubleshoot a Network" class="read-more" href="https://blog.eduguru.in/networking/how-to-troubleshoot-a-network" aria-label="Read more about How to Troubleshoot a Network">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘The Ten Equations that Rule the World’ by David Sumpter</title>
		<link>https://blog.eduguru.in/news/the-ten-equations-that-rule-the-world-by-david-sumpter</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 18:26:45 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘The Ten Equations that Rule the World’ by David Sumpter]]></category>
		<category><![CDATA[BOOKS]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[MATHEMATICS]]></category>
		<category><![CDATA[REVIEWS]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13745</guid>

					<description><![CDATA[Understanding the mathematics that govern our daily lives, and how you can use it to your advantage.  There’s something irresistible in the idea that everything that seems vague, random and unpredictable in our lives can be explained with mathematics. That there’s an equation tucked away in some seldom-visited corner of academia able to provide answers ... <a title="‘The Ten Equations that Rule the World’ by David Sumpter" class="read-more" href="https://blog.eduguru.in/news/the-ten-equations-that-rule-the-world-by-david-sumpter" aria-label="Read more about ‘The Ten Equations that Rule the World’ by David Sumpter">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>United Arab Emirates plans Moon landing in 2024</title>
		<link>https://blog.eduguru.in/news/united-arab-emirates-plans-moon-landing-in-2024</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 18:18:46 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Moon]]></category>
		<category><![CDATA[Plans moon Landing in 2024]]></category>
		<category><![CDATA[SPACE]]></category>
		<category><![CDATA[SPACE RESEARCH]]></category>
		<category><![CDATA[UAE]]></category>
		<category><![CDATA[United Arab Emirates plans Moon landing in 2024]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13743</guid>

					<description><![CDATA[The United Arab Emirates (UAE) plans to send an unmanned spacecraft to the Moon in 2024, according to a senior official.  Sheikh Mohammed bin Rashid Al Maktoum, the ruler of Dubai, announced the news, which follows the launch of a Mars probe earlier this year by the UAE. “It will be an Emirati-made lunar rover ... <a title="United Arab Emirates plans Moon landing in 2024" class="read-more" href="https://blog.eduguru.in/news/united-arab-emirates-plans-moon-landing-in-2024" aria-label="Read more about United Arab Emirates plans Moon landing in 2024">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exoplanets discovered with better conditions for life than Earth</title>
		<link>https://blog.eduguru.in/news/exoplanets-discovered-with-better-conditions-for-life-than-earth</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 18:13:47 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[earth]]></category>
		<category><![CDATA[eXOPLANETS]]></category>
		<category><![CDATA[Exoplanets discovered with better conditions for life than Earth]]></category>
		<category><![CDATA[SPACE SEARCH FOR ALIENS SPACE RESEARCH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13741</guid>

					<description><![CDATA[Researchers have identified two dozen planets outside our solar system that may be better than the Earth at supporting life.  The Washington State University study defines these as “superhabitable” planets which are typically older, larger, slightly warmer and possibly wetter than the Earth. Life could also more easily thrive on planets that circle more slowly ... <a title="Exoplanets discovered with better conditions for life than Earth" class="read-more" href="https://blog.eduguru.in/news/exoplanets-discovered-with-better-conditions-for-life-than-earth" aria-label="Read more about Exoplanets discovered with better conditions for life than Earth">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Startups navigating the new normal</title>
		<link>https://blog.eduguru.in/news/startups-navigating-the-new-normal</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 18:06:18 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[BUSINESS PLANNING]]></category>
		<category><![CDATA[CONTINUITY AND RECOVERY]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[INNOVATION]]></category>
		<category><![CDATA[MANAGEMENT]]></category>
		<category><![CDATA[REMOTE WORKING]]></category>
		<category><![CDATA[Startups navigating the new normal]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13739</guid>

					<description><![CDATA[One outcome of the pandemic has seen homegrown startups creating innovative digital solutions and platforms for customers to adapt to the ‘new normal’.  E-commerce has had a big push during the lockdown. Riding high on this wave, tech startup Detel launched an electric bike in August. Described as the ‘Detel Easy EV’, the bike’s unique ... <a title="Startups navigating the new normal" class="read-more" href="https://blog.eduguru.in/news/startups-navigating-the-new-normal" aria-label="Read more about Startups navigating the new normal">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Humans favour robots for mental health support at work</title>
		<link>https://blog.eduguru.in/news/humans-favour-robots-for-mental-health-support-at-work</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 18:00:36 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ANDROID ROBOTS]]></category>
		<category><![CDATA[ARTIFICIAL INTELLIGENCE ROBOTS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[BUSINESS PLANNING]]></category>
		<category><![CDATA[CONTINUITY AND RECOVERY]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY]]></category>
		<category><![CDATA[HR MANAGEMENT]]></category>
		<category><![CDATA[Humans favour robots for mental health support at work]]></category>
		<category><![CDATA[IN SOCIETY]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[MANAGEMENT]]></category>
		<category><![CDATA[MENTAL HEALTH]]></category>
		<category><![CDATA[REMOTE WORKING]]></category>
		<category><![CDATA[U.S]]></category>
		<category><![CDATA[workplace]]></category>
		<category><![CDATA[WORLD HEALTH]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13737</guid>

					<description><![CDATA[Eighty-two per cent of people believe robots can support their mental health better than humans, according to a study by Oracle and HR research and advisory firm Workplace Intelligence.  The Covid-19 pandemic has made 2020 one of the most stressful years in living memory, negatively affecting the mental health of many people, both at home ... <a title="Humans favour robots for mental health support at work" class="read-more" href="https://blog.eduguru.in/news/humans-favour-robots-for-mental-health-support-at-work" aria-label="Read more about Humans favour robots for mental health support at work">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Linux Filesystem</title>
		<link>https://blog.eduguru.in/linux-2/the-linux-filesystem</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 17:44:34 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[filesystem]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Filesystem]]></category>
		<category><![CDATA[The Linux Filesystem]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13734</guid>

					<description><![CDATA[The Linux filesystem structure is somewhat different from that of Windows. Linux doesn’t have a physical drive (such as the C: drive) at the base of the filesystem but uses a logical filesystem instead. At the very top of the filesystem structure is /, which is often referred to as the root of the filesystem, ... <a title="The Linux Filesystem" class="read-more" href="https://blog.eduguru.in/linux-2/the-linux-filesystem" aria-label="Read more about The Linux Filesystem">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why Hackers Use Linux</title>
		<link>https://blog.eduguru.in/linux-2/why-hackers-use-linux</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 17:31:24 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Is Open Source]]></category>
		<category><![CDATA[Linux Is Transparent]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Why Hackers Use Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13732</guid>

					<description><![CDATA[So why do hackers use Linux over other operating systems? Mostly because Linux offers a far higher level of control via a few different methods. Linux Is Open Source Unlike Windows, Linux is open source, meaning that the source code of the operating system is available to you. As such, you can change and manipulate ... <a title="Why Hackers Use Linux" class="read-more" href="https://blog.eduguru.in/linux-2/why-hackers-use-linux" aria-label="Read more about Why Hackers Use Linux">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Linux Memory Issues</title>
		<link>https://blog.eduguru.in/linux-2/linux-memory-issues</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 05:51:03 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Memory Issues]]></category>
		<category><![CDATA[MEMORY]]></category>
		<category><![CDATA[Memory Issues]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13729</guid>

					<description><![CDATA[A simple truism: memory issues exist. The very fact that we program in languages such as C (and C++) implicitly gives rise to literally infinite types of issues! At some point, one realizes (perhaps a bit pessimistically) that programming with care in a managed memory-safe language is ultimately the (only?) realistic way to avoid memory ... <a title="Linux Memory Issues" class="read-more" href="https://blog.eduguru.in/linux-2/linux-memory-issues" aria-label="Read more about Linux Memory Issues">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>SMIC evaluating impacts of blacklisting by White House</title>
		<link>https://blog.eduguru.in/news/smic-evaluating-impacts-of-blacklisting-by-white-house</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 05:41:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[DONALD TRUMP]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[SEMICONDUCTOR TECHNOLOGY]]></category>
		<category><![CDATA[SEMICONDUCTORS]]></category>
		<category><![CDATA[SMIC evaluating impacts of blacklisting by White House]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13727</guid>

					<description><![CDATA[China’s largest chipmaker, Semiconductor Manufacturing International Corporation (SMIC), is in discussions with the US Bureau of Industry and Security after being notified that it will be subject to export restrictions.  Last week, reports emerged that the White House had imposed sanctions against Shanghai-based SMIC – requiring its US suppliers to obtain a license from the government – ... <a title="SMIC evaluating impacts of blacklisting by White House" class="read-more" href="https://blog.eduguru.in/news/smic-evaluating-impacts-of-blacklisting-by-white-house" aria-label="Read more about SMIC evaluating impacts of blacklisting by White House">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple sues recycling company, alleges theft of 100,000 devices</title>
		<link>https://blog.eduguru.in/news/apple-sues-recycling-company-alleges-theft-of-100000-devices</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 05:19:57 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[000 devices]]></category>
		<category><![CDATA[alleges theft of 100]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple sues]]></category>
		<category><![CDATA[Apple sues recycling company]]></category>
		<category><![CDATA[CONSUMER TECHNOLOGY]]></category>
		<category><![CDATA[ELECTRONICS]]></category>
		<category><![CDATA[ETHICS]]></category>
		<category><![CDATA[gadgets]]></category>
		<category><![CDATA[LEGAL RECYCLING]]></category>
		<category><![CDATA[Recycling]]></category>
		<category><![CDATA[Tech updates]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13725</guid>

					<description><![CDATA[Apple is taking legal action against Geep Canada, which it contracted to recycle its used devices. Apple alleges that Geep stole and resold more than 100,000 of these devices. Quantum Lifecycle Partners subsidiary Geep received more than 500,000 Apple devices (iPhones, iPads and Apple Watches) between January 2015 and December 2017 and was paid by ... <a title="Apple sues recycling company, alleges theft of 100,000 devices" class="read-more" href="https://blog.eduguru.in/news/apple-sues-recycling-company-alleges-theft-of-100000-devices" aria-label="Read more about Apple sues recycling company, alleges theft of 100,000 devices">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>CLI, not GUI</title>
		<link>https://blog.eduguru.in/linux-2/cli-not-gui</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 05:03:31 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[CLI]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[not GUI]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13723</guid>

					<description><![CDATA[The Unix OS, and all its applications, utilities, and tools, were always built to be used from a command-line-interface (CLI), typically, the shell. From the 1980s onward, the need for a Graphical User Interface (GUI) became apparent. Robert Scheifler of MIT, considered the chief design architect behind the X Window System, built an exceedingly clean ... <a title="CLI, not GUI" class="read-more" href="https://blog.eduguru.in/linux-2/cli-not-gui" aria-label="Read more about CLI, not GUI">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Unix philosophy in a nutshell</title>
		<link>https://blog.eduguru.in/linux-2/the-unix-philosophy-in-a-nutshell</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 04:51:46 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Nutshell]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[The Unix philosophy in a nutshell]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13721</guid>

					<description><![CDATA[To understand anyone (or anything), one must strive to first understand their (or its) underlying philosophy; to begin to understand Linux is to begin to understand the Unix philosophy. Here, we shall not attempt to delve into every minute detail; rather, an overall understanding of the essentials of the Unix philosophy is our goal. Also, ... <a title="The Unix philosophy in a nutshell" class="read-more" href="https://blog.eduguru.in/linux-2/the-unix-philosophy-in-a-nutshell" aria-label="Read more about The Unix philosophy in a nutshell">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Configuring CentOS Run Levels and Services</title>
		<link>https://blog.eduguru.in/linux-2/configuring-centos-run-levels-and-services</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 14:00:26 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[centos 7 run level]]></category>
		<category><![CDATA[CentOS Run levels Descriptions]]></category>
		<category><![CDATA[check centos 7 run level]]></category>
		<category><![CDATA[configure centos 7 run level]]></category>
		<category><![CDATA[Configuring CentOS Run Levels and Services]]></category>
		<category><![CDATA[Configuring CentOS Run Levels and Services Understanding CentOS Run Levels CentOS can be configured to boot into one of a number of different run levels. During the boot sequence]]></category>
		<category><![CDATA[Configuring the Default CentOS 6 Run level]]></category>
		<category><![CDATA[Understanding CentOS Run Levels]]></category>
		<category><![CDATA[Understanding CentOS Services]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13715</guid>

					<description><![CDATA[Configuring CentOS Run Levels and Services Understanding CentOS Run Levels CentOS can be configured to boot into one of a number of different run levels. During the boot sequence, a process named init looks in the /etc/inittab file to find the default run level. Having identified the run level it proceeds to execute the corresponding startup scripts ... <a title="Configuring CentOS Run Levels and Services" class="read-more" href="https://blog.eduguru.in/linux-2/configuring-centos-run-levels-and-services" aria-label="Read more about Configuring CentOS Run Levels and Services">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why Use Linux?</title>
		<link>https://blog.eduguru.in/linux-2/why-use-linux-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 03 Oct 2020 15:59:30 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Use]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Use of Linux]]></category>
		<category><![CDATA[Why Use Linux?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13713</guid>

					<description><![CDATA[The reason that you should learn Linux and start deploying Linux is for server functionality. Linux is incredibly rock-solid. Once you install Linux, and once you get through all the quirks and you set up all the configurations, a Linux server will run until the CPU overheats and dies. It would just run non-stop. A ... <a title="Why Use Linux?" class="read-more" href="https://blog.eduguru.in/linux-2/why-use-linux-2" aria-label="Read more about Why Use Linux?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Server vs. Desktop</title>
		<link>https://blog.eduguru.in/linux-2/server-vs-desktop-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 03 Oct 2020 15:53:54 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Server vs. Desktop]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13711</guid>

					<description><![CDATA[There are generally two versions of Linux that everybody is going to provide. Whether you get Red Hat Linux, Ubuntu Linux, Fedora Linux, or whatever distribution that may be, they will normally have two versions of the distribution. One is going to be the server version while the other is going to be the desktop ... <a title="Server vs. Desktop" class="read-more" href="https://blog.eduguru.in/linux-2/server-vs-desktop-2" aria-label="Read more about Server vs. Desktop">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Capitalization</title>
		<link>https://blog.eduguru.in/linux-2/capitalization</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 03 Oct 2020 14:03:09 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Capitalization]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13709</guid>

					<description><![CDATA[Let us now talk about something that just messes with every Windows user’s head when making the switch to Linux: Capitalization. So basically, you have uppercase and lowercase letters. In the Windows operating system, it doesn’t care whether you put in an uppercase or a lowercase letter. If you have a folder named “Home” in ... <a title="Capitalization" class="read-more" href="https://blog.eduguru.in/linux-2/capitalization" aria-label="Read more about Capitalization">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Linux Shell</title>
		<link>https://blog.eduguru.in/linux-2/the-linux-shell</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 03 Oct 2020 13:55:26 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Shell]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[The Linux Shell]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13707</guid>

					<description><![CDATA[let us now talk about the shell of the Linux operating system. So what is a shell? The shell of an operating system is the screen that you use to interact with the operating system. If you’re thinking about Microsoft Windows, the Windows shell is that graphical user interface where we have the little mouse ... <a title="The Linux Shell" class="read-more" href="https://blog.eduguru.in/linux-2/the-linux-shell" aria-label="Read more about The Linux Shell">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Intel gets green light to continue working with Huawei</title>
		<link>https://blog.eduguru.in/news/intel-gets-green-light-to-continue-working-with-huawei</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 15:55:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[intel]]></category>
		<category><![CDATA[Intel gets green light to continue working with Huawei]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13705</guid>

					<description><![CDATA[Intel has received licenses from US authorities to continue shipping certain products to Huawei, according to a report by Reuters.  In May 2019, US President Donald Trump added Shenzhen-based Huawei Technologies to the US ‘Entity List’, effectively preventing US companies from working with Huawei unless they received a license to do so from the government. Trump ... <a title="Intel gets green light to continue working with Huawei" class="read-more" href="https://blog.eduguru.in/news/intel-gets-green-light-to-continue-working-with-huawei" aria-label="Read more about Intel gets green light to continue working with Huawei">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Germany tightens 5G network security, may informally exclude Huawei</title>
		<link>https://blog.eduguru.in/news/germany-tightens-5g-network-security-may-informally-exclude-huawei</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 15:53:32 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[5G Network Security]]></category>
		<category><![CDATA[CYBERSECURITY]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Germany tightens 5G network security]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[may informally exclude Huawei]]></category>
		<category><![CDATA[mobile networks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13703</guid>

					<description><![CDATA[The German government is reportedly planning stricter oversight of telecommunications network vendors. This will make it harder for Shenzhen-based Huawei to hold its place in the German market, whilst stopping short of an outright ban.  Government sources told media that an agreement had been reached to extend scrutiny of the governance and technology of 5G ... <a title="Germany tightens 5G network security, may informally exclude Huawei" class="read-more" href="https://blog.eduguru.in/news/germany-tightens-5g-network-security-may-informally-exclude-huawei" aria-label="Read more about Germany tightens 5G network security, may informally exclude Huawei">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>A Brief History of UNIX and C</title>
		<link>https://blog.eduguru.in/linux-2/a-brief-history-of-unix-and-c</link>
					<comments>https://blog.eduguru.in/linux-2/a-brief-history-of-unix-and-c#comments</comments>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 15:46:54 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[A Brief History of UNIX and C]]></category>
		<category><![CDATA[C#]]></category>
		<category><![CDATA[History of C]]></category>
		<category><![CDATA[History of Unix]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13701</guid>

					<description><![CDATA[The first UNIX implementation was developed in 1969 (the same year that Linus Torvalds was born) by Ken Thompson at Bell Laboratories, a division of the tele- phone corporation, AT&#38;T. It was written in assembler for a Digital PDP-7 mini- computer. The name UNIX was a pun on MULTICS (Multiplexed Information and Computing Service), the ... <a title="A Brief History of UNIX and C" class="read-more" href="https://blog.eduguru.in/linux-2/a-brief-history-of-unix-and-c" aria-label="Read more about A Brief History of UNIX and C">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/linux-2/a-brief-history-of-unix-and-c/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Bootstrap icon bar with CSS</title>
		<link>https://blog.eduguru.in/bootstrap/bootstrap-icon-bar-with-css</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 01:41:03 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[bootstrap example]]></category>
		<category><![CDATA[Bootstrap icon bar with CSS]]></category>
		<category><![CDATA[bootstrap iconbar]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13698</guid>

					<description><![CDATA[Bootstrap icon bar with CSS Example: &#160; &#160; &#160; &#60;!DOCTYPE html&#62; &#60;html&#62; &#60;meta name="viewport" content="width=device-width, initial-scale=1"&#62; &#60;link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css"&#62; &#60;style&#62; body {margin:0} .icon-bar { width: 90px; background-color: #555; } .icon-bar a { display: block; text-align: center; padding: 16px; transition: all 0.3s ease; color: white; font-size: 36px; } .icon-bar a:hover { background-color: #000; } .active { ... <a title="Bootstrap icon bar with CSS" class="read-more" href="https://blog.eduguru.in/bootstrap/bootstrap-icon-bar-with-css" aria-label="Read more about Bootstrap icon bar with CSS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>bootstrap : Responsive Navbar with Links of Same Width</title>
		<link>https://blog.eduguru.in/bootstrap/bootstrap-responsive-navbar-with-links-of-same-width</link>
					<comments>https://blog.eduguru.in/bootstrap/bootstrap-responsive-navbar-with-links-of-same-width#comments</comments>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 01:35:17 +0000</pubDate>
				<category><![CDATA[bootstrap]]></category>
		<category><![CDATA[navbar]]></category>
		<category><![CDATA[Responsive Navbar with Links of Same Width]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13694</guid>

					<description><![CDATA[bootstrap : Responsive Navbar with Links of Same Width Example: Responsive Navbar with Links of Same Width Try to resize the browser window to see the responsive effect. Home Search Contact Login Here is the code &#60;!DOCTYPE html&#62; &#60;html&#62; &#60;meta name="viewport" content="width=device-width, initial-scale=1"&#62; &#60;link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css"&#62; &#60;style&#62; * {box-sizing: border-box} body {font-family: Arial, Helvetica, sans-serif;} ... <a title="bootstrap : Responsive Navbar with Links of Same Width" class="read-more" href="https://blog.eduguru.in/bootstrap/bootstrap-responsive-navbar-with-links-of-same-width" aria-label="Read more about bootstrap : Responsive Navbar with Links of Same Width">Read more</a>]]></description>
		
					<wfw:commentRss>https://blog.eduguru.in/bootstrap/bootstrap-responsive-navbar-with-links-of-same-width/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Automation, timing and speed, new dimensions of security</title>
		<link>https://blog.eduguru.in/news/automation-timing-and-speed-new-dimensions-of-security</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 11:35:09 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[new dimensions of security]]></category>
		<category><![CDATA[REMOTE WORKING]]></category>
		<category><![CDATA[timing and speed]]></category>
		<category><![CDATA[VIEW FROM INDIA]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13685</guid>

					<description><![CDATA[One of the spinoffs of the pandemic is the surge in digital services. The security landscape has transited to a new level, thanks to the speed at which digital transactions take place.  Around 95-99 per cent of operations are automated. “Customers need not visit ‘on site.’ Physical documents are on the decline. Matters related to ... <a title="Automation, timing and speed, new dimensions of security" class="read-more" href="https://blog.eduguru.in/news/automation-timing-and-speed-new-dimensions-of-security" aria-label="Read more about Automation, timing and speed, new dimensions of security">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>AI-ready nations in danger of entrenching inequality</title>
		<link>https://blog.eduguru.in/news/ai-ready-nations-in-danger-of-entrenching-inequality</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 11:31:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI-ready nations in danger of entrenching inequality]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[ETHICS]]></category>
		<category><![CDATA[Machine learning]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13683</guid>

					<description><![CDATA[A report from Oxford Insights and the International Development Research Centre (IDRC) has assessed countries on the basis of their AI readiness and responsibility and found that some are at risk of furthering inequality and marginalisation. The ‘Government AI Readiness Index’ in the report ranked the US at number one and the UK at number two ... <a title="AI-ready nations in danger of entrenching inequality" class="read-more" href="https://blog.eduguru.in/news/ai-ready-nations-in-danger-of-entrenching-inequality" aria-label="Read more about AI-ready nations in danger of entrenching inequality">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Evading Firewalls</title>
		<link>https://blog.eduguru.in/it-security/evading-firewalls</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 11:22:45 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Evading Firewalls]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[Firewalls Security]]></category>
		<category><![CDATA[Fragmentation]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[IP Address Spoofing]]></category>
		<category><![CDATA[IP Addresses to Access Websites]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13681</guid>

					<description><![CDATA[IP Address Spoofing One effective way an attacker can evade a firewall is to appear as something else, such as a trusted host. Using spoofing to modify address information, the attacker can make the source of an attack appear to come from someplace else rather than the malicious party. Source Routing Using this technique, the ... <a title="Evading Firewalls" class="read-more" href="https://blog.eduguru.in/it-security/evading-firewalls" aria-label="Read more about Evading Firewalls">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Honeypots</title>
		<link>https://blog.eduguru.in/it-security/honeypots</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 11:13:05 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[High vs. Low Interaction]]></category>
		<category><![CDATA[Honeypots]]></category>
		<category><![CDATA[Honeypots Security]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13679</guid>

					<description><![CDATA[One of the more interesting systems you will encounter is a honeypot. A honeypot may sound like something out of a Winnie the Pooh book, but it is actually a device or system used to attract and trap attackers that are trying to gain access to a system. However, honeypots are far from being just ... <a title="Honeypots" class="read-more" href="https://blog.eduguru.in/it-security/honeypots" aria-label="Read more about Honeypots">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What’s That Firewall Running?</title>
		<link>https://blog.eduguru.in/it-security/whats-that-firewall-running</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 11:01:39 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Firewall Running]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[Firewalls Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[What’s That Firewall Running?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13677</guid>

					<description><![CDATA[To determine a type of firewall and even a brand, you can use your experience with port scanning and tools to build information about the firewall your target is running. By identifying certain ports, you can link the results to a specific firewall and from that point determine the type of attack or process to ... <a title="What’s That Firewall Running?" class="read-more" href="https://blog.eduguru.in/it-security/whats-that-firewall-running" aria-label="Read more about What’s That Firewall Running?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Firewall Configurations</title>
		<link>https://blog.eduguru.in/it-security/firewall-configurations</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:54:50 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Bastion Host]]></category>
		<category><![CDATA[configuration]]></category>
		<category><![CDATA[Demilitarized Zone (DMZ)]]></category>
		<category><![CDATA[Firewall Configurations]]></category>
		<category><![CDATA[firewall security]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Multihomed Firewall]]></category>
		<category><![CDATA[Screened Subnet]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13675</guid>

					<description><![CDATA[Not all firewalls or firewall setups are created equal, so you need to be familiar with each setup and how it works. Firewalls can be set up and arranged in several ways, each offering its own advantages and disadvantages. In this section we’ll cover each method. Bastion Host A bastion host is intended to be ... <a title="Firewall Configurations" class="read-more" href="https://blog.eduguru.in/it-security/firewall-configurations" aria-label="Read more about Firewall Configurations">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Firewalls</title>
		<link>https://blog.eduguru.in/it-security/firewalls-3</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:50:07 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[FIREWALL]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[system firewall]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13673</guid>

					<description><![CDATA[Firewalls are another protective device for networks that stand in the way of a penetration tester or attacker. Firewalls represent a barrier or logical delineation between two zones or areas of trust. In its simplest form an implementation of a firewall represents the barrier between a private and a public network. When discussing firewalls, it ... <a title="Firewalls" class="read-more" href="https://blog.eduguru.in/it-security/firewalls-3" aria-label="Read more about Firewalls">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>IDS Detection Methods</title>
		<link>https://blog.eduguru.in/it-security/ids-detection-methods</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:45:49 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[IDS Detection]]></category>
		<category><![CDATA[IDS Detection Methods]]></category>
		<category><![CDATA[Methods]]></category>
		<category><![CDATA[Protocol Anomaly Detection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Signature Detection]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13670</guid>

					<description><![CDATA[Signature Detection The first form of detection or recognition is based on signature; this method is also sometimes called misuse detection. The system compares traffic to known models and when matches are found it reports the attack. Pattern matching is the most basic form of detecting and is used in many systems. The process relies ... <a title="IDS Detection Methods" class="read-more" href="https://blog.eduguru.in/it-security/ids-detection-methods" aria-label="Read more about IDS Detection Methods">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Signs of an Intrusion</title>
		<link>https://blog.eduguru.in/it-security/signs-of-an-intrusion</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:40:30 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Host System Intrusions]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Network Intrusions]]></category>
		<category><![CDATA[Nonspecific Signs of Intrusion]]></category>
		<category><![CDATA[Signs of an Intrusion]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13668</guid>

					<description><![CDATA[what type of activities are indications of a potential attack? What type of actions can an IDS respond to? Let’s take a look at activities that may indicate an intrusion has occurred. Host System Intrusions What is an indicator of an attack on a host? A wide range of activities could be construed as an ... <a title="Signs of an Intrusion" class="read-more" href="https://blog.eduguru.in/it-security/signs-of-an-intrusion" aria-label="Read more about Signs of an Intrusion">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Inner Workings of an IDS</title>
		<link>https://blog.eduguru.in/it-security/the-inner-workings-of-an-ids</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:34:23 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[The Inner Workings of an IDS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13666</guid>

					<description><![CDATA[The main purpose of an IDS is to detect and alert an administrator about an attack. The administrator can then determine, based on the information received from the IDS, what action to take. An IDS functions in the following way: The IDS monitors network activity for anomalies—that is, signatures or behaviors that may indicate an ... <a title="The Inner Workings of an IDS" class="read-more" href="https://blog.eduguru.in/it-security/the-inner-workings-of-an-ids" aria-label="Read more about The Inner Workings of an IDS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Four Types of Intrusion Detection Systems</title>
		<link>https://blog.eduguru.in/it-security/the-four-types-of-intrusion-detection-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:31:52 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[intrusion Detection System]]></category>
		<category><![CDATA[The Four Types of Intrusion Detection Systems]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13664</guid>

					<description><![CDATA[The first type, and one of the most common, is the NIDS. The NIDS is designed to inspect every packet entering the network for the presence of malicious or damaging behavior and, when malicious activity is detected, throw an alert. The NIDS is able to monitor traffic from the router to the host itself. Much ... <a title="The Four Types of Intrusion Detection Systems" class="read-more" href="https://blog.eduguru.in/it-security/the-four-types-of-intrusion-detection-systems" aria-label="Read more about The Four Types of Intrusion Detection Systems">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Role of Intrusion Detection Systems</title>
		<link>https://blog.eduguru.in/it-security/the-role-of-intrusion-detection-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:28:01 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[intrusion detection]]></category>
		<category><![CDATA[The Role of Intrusion Detection Systems]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13662</guid>

					<description><![CDATA[An intrusion detection system (IDS) is an application or device used to gather and analyzev information that passes across a network or host. An IDS is designed to analyze, identify, and report on any violations or misuse of a network or host. Let’s take a close look at how an IDS works. An IDS is ... <a title="The Role of Intrusion Detection Systems" class="read-more" href="https://blog.eduguru.in/it-security/the-role-of-intrusion-detection-systems" aria-label="Read more about The Role of Intrusion Detection Systems">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hacking Bluetooth</title>
		<link>https://blog.eduguru.in/it-security/hacking-bluetooth</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 10:24:55 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Bluejacking]]></category>
		<category><![CDATA[Bluesnarfing]]></category>
		<category><![CDATA[Bluetooth]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Hacking Bluetooth]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13660</guid>

					<description><![CDATA[Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to a short-range wireless technology commonly used to connect devices such as headsets, media players, and other types of technologies. Bluetooth operates in the 2.4 GHz frequency range and is designed to work at distances up to ... <a title="Hacking Bluetooth" class="read-more" href="https://blog.eduguru.in/it-security/hacking-bluetooth" aria-label="Read more about Hacking Bluetooth">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Choosing the Right Wireless Card</title>
		<link>https://blog.eduguru.in/it-security/choosing-the-right-wireless-card</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 07:58:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Choosing the Right Wireless Card]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Network Card]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[Wireless card]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13658</guid>

					<description><![CDATA[The subject of wireless cards and chipsets is important. Although in many cases the chipset on the card and the wireless card itself may not matter, some tools require the presence of certain chipsets in order to function. Items to consider include: Operating system in use. Application in use. Whether packet injection is required (Windows ... <a title="Choosing the Right Wireless Card" class="read-more" href="https://blog.eduguru.in/it-security/choosing-the-right-wireless-card" aria-label="Read more about Choosing the Right Wireless Card">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ways to Locate Wireless Networks</title>
		<link>https://blog.eduguru.in/it-security/ways-to-locate-wireless-networks</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 07:55:35 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Traffic Analysis]]></category>
		<category><![CDATA[Ways to Locate Wireless Networks]]></category>
		<category><![CDATA[Wireless Networks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13656</guid>

					<description><![CDATA[In order to attack, you must first find a target, and though site surveys can make this easier, they cannot help in every case. Several tools and mechanisms make locating a target network easier. The following are methods that can complement wardriving or be used on their own: OpenSignal is a useful app that can ... <a title="Ways to Locate Wireless Networks" class="read-more" href="https://blog.eduguru.in/it-security/ways-to-locate-wireless-networks" aria-label="Read more about Ways to Locate Wireless Networks">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Wireless Antennas</title>
		<link>https://blog.eduguru.in/it-security/wireless-antennas</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 29 Sep 2020 16:32:06 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[Wireless Antennas]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13652</guid>

					<description><![CDATA[Something else you should be aware of when talking about wireless networks is the type of antenna in use. If you are working with consumer-grade access points, this typically is not a big concern as the antenna is built in or provided with these products. However, when working with enterprise and commercial-grade access points you ... <a title="Wireless Antennas" class="read-more" href="https://blog.eduguru.in/it-security/wireless-antennas" aria-label="Read more about Wireless Antennas">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Wi-Fi Authentication Modes</title>
		<link>https://blog.eduguru.in/it-security/wi-fi-authentication-modes</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 29 Sep 2020 16:21:55 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Securioty]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Wi-Fi Authentication Modes]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13650</guid>

					<description><![CDATA[When you are authenticating clients to a wireless network, two processes are available. The first, known as open system authentication, is used in situations where you want to make your network available to a wide range of clients. This type of authentication occurs when an authentication frame is sent from a client to an access ... <a title="Wi-Fi Authentication Modes" class="read-more" href="https://blog.eduguru.in/it-security/wi-fi-authentication-modes" aria-label="Read more about Wi-Fi Authentication Modes">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Wireless Vocabulary</title>
		<link>https://blog.eduguru.in/it-security/wireless-vocabulary</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 29 Sep 2020 16:16:52 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vocabulary]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[Wireless Vocabulary]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13647</guid>

					<description><![CDATA[TA B L E &#8211; Common wireless terms]]></description>
		
		
		
			</item>
		<item>
		<title>Wireless Standards in Use</title>
		<link>https://blog.eduguru.in/it-security/wireless-standards-in-use</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 16:25:04 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[Wireless Standards]]></category>
		<category><![CDATA[Wireless Standards in Use]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13590</guid>

					<description><![CDATA[Not all wireless standards are the same, and you should become familiar with the differences and similarities of each. TA B L E  Wireless standards So why all the different letters in the 802.11 family? Well, the short answer is that the additional letters correspond to the working groups that came up with the modifications ... <a title="Wireless Standards in Use" class="read-more" href="https://blog.eduguru.in/it-security/wireless-standards-in-use" aria-label="Read more about Wireless Standards in Use">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Wi-Fi</title>
		<link>https://blog.eduguru.in/it-security/wi-fi</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 16:21:52 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Wireless Networks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13588</guid>

					<description><![CDATA[Wireless networks, or Wi-Fi, fall into the range of technologies covered under the IEEE 802.11 standard. The technology has been adapted for use by everything from laptops and personal computers to smartphones and videogame consoles. Through the use of wireless technology, users can connect to the Internet and share resources in ways that weren’t possible ... <a title="Wi-Fi" class="read-more" href="https://blog.eduguru.in/it-security/wi-fi" aria-label="Read more about Wi-Fi">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Cloud services see exponential growth</title>
		<link>https://blog.eduguru.in/news/cloud-services-see-exponential-growth</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 15:30:44 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud services]]></category>
		<category><![CDATA[Cloud services see exponential growth]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13584</guid>

					<description><![CDATA[Covid 19 has changed the cyber-security threat landscape of the country. This has accelerated the usage of cloud. Companies are going beyond just legacy IT operations. They are going that extra mile to build overall resilience, besides factoring digital trust into the system  Cloud security is important than anything else now and it has to ... <a title="Cloud services see exponential growth" class="read-more" href="https://blog.eduguru.in/news/cloud-services-see-exponential-growth" aria-label="Read more about Cloud services see exponential growth">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exploring Defensive Strategies</title>
		<link>https://blog.eduguru.in/it-security/exploring-defensive-strategies</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 11:51:18 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Defensive]]></category>
		<category><![CDATA[Exploring Defensive Strategies]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Strategies]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13579</guid>

					<description><![CDATA[Session hijacking relies, in part, on many of the prerequisites needed to successfully sniff a network. For instance, session hijacking attacks increase in complexity for external and switched networks. In other words, sitting on the local LAN (for example, as a disgruntled employee) is a much better strategic position for an attack than sitting outside ... <a title="Exploring Defensive Strategies" class="read-more" href="https://blog.eduguru.in/it-security/exploring-defensive-strategies" aria-label="Read more about Exploring Defensive Strategies">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Network Session Hijacking</title>
		<link>https://blog.eduguru.in/it-security/network-session-hijacking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 11:45:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Hijacking]]></category>
		<category><![CDATA[Network Hijacking]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Network Session Hijacking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13576</guid>

					<description><![CDATA[Network-level session hijacking is a hijacking method that focuses on exploiting a TCP/IP connection after initialization or authentication has occurred. There are some specific hijacking techniques that are in this category of attack. Some common ones we will discuss are TCP/IP hijacking, man-in-the-middle attacks, and UDP session hijacking. TCP/IP Session Hijacking TCP/IP session hijacking is ... <a title="Network Session Hijacking" class="read-more" href="https://blog.eduguru.in/it-security/network-session-hijacking" aria-label="Read more about Network Session Hijacking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Session Hijacking and Web Apps</title>
		<link>https://blog.eduguru.in/it-security/session-hijacking-and-web-apps</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 11:38:40 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Session Hijacking]]></category>
		<category><![CDATA[Session Hijacking and Web Apps]]></category>
		<category><![CDATA[Web Apps]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13574</guid>

					<description><![CDATA[Session hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the victim. Essentially, a session ID is an identifier that is applied to a user’s session that allows the server or web resource to identify the “conversation” it is having with the client. So, for example, ... <a title="Session Hijacking and Web Apps" class="read-more" href="https://blog.eduguru.in/it-security/session-hijacking-and-web-apps" aria-label="Read more about Session Hijacking and Web Apps">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Active and Passive Attacks</title>
		<link>https://blog.eduguru.in/it-security/active-and-passive-attacks</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 11:34:47 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Active and Passive Attacks]]></category>
		<category><![CDATA[Active Attacks]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[Passive Attacks]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13570</guid>

					<description><![CDATA[You can categorize a session hijacking attack as either an active attack or a passive attack. Let’s look at both. Active Attack A session hijacking attack is considered active when the attacker assumes the session as their own, thereby taking over the legitimate client’s connection to the resource. In an active attack the attacker is ... <a title="Active and Passive Attacks" class="read-more" href="https://blog.eduguru.in/it-security/active-and-passive-attacks" aria-label="Read more about Active and Passive Attacks">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Spoofing vs. Hijacking</title>
		<link>https://blog.eduguru.in/it-security/spoofing-vs-hijacking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 11:28:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Hijacking]]></category>
		<category><![CDATA[SPOOFING]]></category>
		<category><![CDATA[Spoofing vs. Hijacking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13551</guid>

					<description><![CDATA[you should know that spoofing and hijacking are two distinctly different acts. Spoofing is when an attacking party pretends to be something or someone else, such as a user or computer. The attacker does not take over any session. In hijacking, the attacker takes over an existing active session. In this process, the attacker waits ... <a title="Spoofing vs. Hijacking" class="read-more" href="https://blog.eduguru.in/it-security/spoofing-vs-hijacking" aria-label="Read more about Spoofing vs. Hijacking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Session Hijacking</title>
		<link>https://blog.eduguru.in/it-security/session-hijacking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 09:45:40 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Hijacking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[session]]></category>
		<category><![CDATA[Session Hijacking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13548</guid>

					<description><![CDATA[Session hijacking is synonymous with a stolen session, in which an attacker intercepts and takes over a legitimately established session between a user and a host. The user-host relationship can apply to access of any authenticated resource, such as a web server, Telnet session, or other TCP-based connection. Attackers place themselves between the user and ... <a title="Session Hijacking" class="read-more" href="https://blog.eduguru.in/it-security/session-hijacking" aria-label="Read more about Session Hijacking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>DoS Pen Testing Considerations</title>
		<link>https://blog.eduguru.in/it-security/dos-pen-testing-considerations</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 09:38:19 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[DoS]]></category>
		<category><![CDATA[DoS Attack]]></category>
		<category><![CDATA[DoS Pen Testing]]></category>
		<category><![CDATA[DoS Pen Testing Considerations]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13546</guid>

					<description><![CDATA[When you’re pen testing for DoS vulnerabilities, a major area of concern is taking down integral resources during the testing phase. The ripple effect of taking out a file server or web resource can be pretty far reaching, especially if bringing the system back online proves challenging after a successful DoS test attack. As with ... <a title="DoS Pen Testing Considerations" class="read-more" href="https://blog.eduguru.in/it-security/dos-pen-testing-considerations" aria-label="Read more about DoS Pen Testing Considerations">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>DoS Defensive Strategies</title>
		<link>https://blog.eduguru.in/it-security/dos-defensive-strategies</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 09:35:48 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[DoS]]></category>
		<category><![CDATA[DoS Attack]]></category>
		<category><![CDATA[DoS Defensive Strategies]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13544</guid>

					<description><![CDATA[Let’s look at some DoS defensive strategies: Disabling Unnecessary Services You can help protect against DoS and DDoS attacks by hardening individual systems and by implementing network measures that protect against such attacks. Using Anti-Malware Real-time virus protection can help prevent bot installations by reducing Trojan infections with bot payloads. This has the effect of ... <a title="DoS Defensive Strategies" class="read-more" href="https://blog.eduguru.in/it-security/dos-defensive-strategies" aria-label="Read more about DoS Defensive Strategies">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Types of DoS Attacks</title>
		<link>https://blog.eduguru.in/it-security/types-of-dos-attacks</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 27 Sep 2020 06:21:29 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[DoS attacks]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Types of DoS Attacks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13537</guid>

					<description><![CDATA[DoS attacks come in many flavors, each of which is critical to your understanding of the nature of the DoS attack class. Service Request Floods In this form of DoS attack, a service such as a web server or web application is flooded with requests until all resources are used up. This would be the ... <a title="Types of DoS Attacks" class="read-more" href="https://blog.eduguru.in/it-security/types-of-dos-attacks" aria-label="Read more about Types of DoS Attacks">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>DoS Targets</title>
		<link>https://blog.eduguru.in/it-security/dos-targets</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 27 Sep 2020 06:11:44 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[DoS]]></category>
		<category><![CDATA[DoS attacks]]></category>
		<category><![CDATA[DoS Targets]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13535</guid>

					<description><![CDATA[DoS attacks result in a multitude of consequences. Let’s look at some common examples of what is seen in the real world, and what you’ll most likely see on the exam: Web Server Compromise A successful DoS attack and subsequent compromise of a web server constitutes the widest public exposure against a specific target. What ... <a title="DoS Targets" class="read-more" href="https://blog.eduguru.in/it-security/dos-targets" aria-label="Read more about DoS Targets">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Understanding DoS</title>
		<link>https://blog.eduguru.in/it-security/understanding-dos</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 27 Sep 2020 06:07:03 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[DoS Attack]]></category>
		<category><![CDATA[Understanding DoS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13533</guid>

					<description><![CDATA[Denial of service is an attack that aims at preventing normal communication with a resource by disabling the resource itself, or by disabling an infrastructure device providing connectivity to it. The disabled resource could be in the form of customer data, website resources, or a specific service, to name a few. The most common form ... <a title="Understanding DoS" class="read-more" href="https://blog.eduguru.in/it-security/understanding-dos" aria-label="Read more about Understanding DoS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Countermeasures for Social Networking</title>
		<link>https://blog.eduguru.in/it-security/countermeasures-for-social-networking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 27 Sep 2020 06:00:40 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Countermeasures]]></category>
		<category><![CDATA[Countermeasures for Social Networking]]></category>
		<category><![CDATA[Social networking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13531</guid>

					<description><![CDATA[social networking has exploded in popularity so quickly, companies and individuals have not had much time to deal with the problems the technology has brought to bear. Surveys taken in recent years have found that many companies either do not have a policy in place regarding social networking or are unaware of the risks. Recently, ... <a title="Countermeasures for Social Networking" class="read-more" href="https://blog.eduguru.in/it-security/countermeasures-for-social-networking" aria-label="Read more about Countermeasures for Social Networking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Mistakes in Social Media and Social Networking</title>
		<link>https://blog.eduguru.in/it-security/mistakes-in-social-media-and-social-networking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 27 Sep 2020 05:47:33 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Mistakes in Social Media]]></category>
		<category><![CDATA[Mistakes in Social Media and Social Networking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[Social networking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13529</guid>

					<description><![CDATA[Social media can be made safer if you take simple steps to strengthen your accounts. In fact, it has been found in many cases that with a little care and effort, you can lessen or avoid many common security issues and risks. You can reuse some of the guidance from earlier chapters and apply it ... <a title="Mistakes in Social Media and Social Networking" class="read-more" href="https://blog.eduguru.in/it-security/mistakes-in-social-media-and-social-networking" aria-label="Read more about Mistakes in Social Media and Social Networking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Social Networking?</title>
		<link>https://blog.eduguru.in/it-security/what-is-social-networking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 27 Sep 2020 05:40:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Social networking]]></category>
		<category><![CDATA[What Is Social Networking?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13527</guid>

					<description><![CDATA[Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies lets millions of users each day post on Facebook, Twitter, and many other networks. What type of information are they posting? ■ Personal information ■ Photos ■ Location information ■ Friend ... <a title="What Is Social Networking?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-social-networking" aria-label="Read more about What Is Social Networking?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Common Targets of Social Engineering</title>
		<link>https://blog.eduguru.in/it-security/common-targets-of-social-engineering</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 17:49:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Common Target]]></category>
		<category><![CDATA[Common Targets of Social Engineering]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social engineering Attacks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13525</guid>

					<description><![CDATA[An attacker will look for targets of opportunity or potential victims who have the most to offer. Some common targets include receptionists, help desk personnel, users, executives, system administrators, and outside vendors. Let’s look at each and see why this is. Receptionists—one of the first people visitors see in many companies—represent prime targets. They see ... <a title="Common Targets of Social Engineering" class="read-more" href="https://blog.eduguru.in/it-security/common-targets-of-social-engineering" aria-label="Read more about Common Targets of Social Engineering">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Is the Impact of Social Engineering?</title>
		<link>https://blog.eduguru.in/it-security/what-is-the-impact-of-social-engineering</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 17:45:38 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social engineering Attacks]]></category>
		<category><![CDATA[What Is the Impact of Social Engineering?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13523</guid>

					<description><![CDATA[Social engineering can have many potential outcomes on an organization, some obvious and some less so. It is important that you understand each of these, because they can have far-reaching effects: Economic Loss This one is fairly obvious. A social engineer may cause a company or organization to lose money through deception, lost productivity, or ... <a title="What Is the Impact of Social Engineering?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-the-impact-of-social-engineering" aria-label="Read more about What Is the Impact of Social Engineering?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Social-engineering Phases</title>
		<link>https://blog.eduguru.in/it-security/social-engineering-phases</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 17:35:40 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[security attacks]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Social-engineering Phases]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13521</guid>

					<description><![CDATA[Social engineering, like the other attacks we have explored in this book, consists of multiple phases, each designed to move the attacker one step closer to the ultimate goal. Let’s look at each of these phases and how the information gained from one leads to the next: 1. Gather information and details about a target ... <a title="Social-engineering Phases" class="read-more" href="https://blog.eduguru.in/it-security/social-engineering-phases" aria-label="Read more about Social-engineering Phases">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why is Social Engineering Successful?</title>
		<link>https://blog.eduguru.in/it-security/why-is-social-engineering-successful</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 17:33:27 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[security attacks]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Why is Social Engineering Successful?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13519</guid>

					<description><![CDATA[Why has social engineering been successful, and why will it continue to be so? To answer this, you must first understand why it works and what this means to you as a pentesters. Going after the human being instead of the technology works for a number of reasons: Trust Human beings are a trusting lot. ... <a title="Why is Social Engineering Successful?" class="read-more" href="https://blog.eduguru.in/it-security/why-is-social-engineering-successful" aria-label="Read more about Why is Social Engineering Successful?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Social Engineering?</title>
		<link>https://blog.eduguru.in/it-security/what-is-social-engineering</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 17:27:54 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[What Is Social Engineering?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13517</guid>

					<description><![CDATA[Social engineering is a term that is widely used but poorly understood. It’s generally defined as any type of attack that is nontechnical in nature and that involves some type of human interaction with the goal of trying to trick or coerce a victim into revealing information or violate normal security practices. Social engineers are ... <a title="What Is Social Engineering?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-social-engineering" aria-label="Read more about What Is Social Engineering?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Sniffing Tools</title>
		<link>https://blog.eduguru.in/it-security/sniffing-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 17:08:06 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Sniffing Tools]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13515</guid>

					<description><![CDATA[Sniffing tools are extremely common applications. A few interesting ones are: Wireshark One of the most widely known and used packet sniffers. Offers a tremendous number of features designed to assist in the dissection and analysis of traffic. TCPdump A well-known command-line packet analyzer. Provides the ability to intercept and observe TCP/IP and other packets ... <a title="Sniffing Tools" class="read-more" href="https://blog.eduguru.in/it-security/sniffing-tools" aria-label="Read more about Sniffing Tools">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Device fitted to car wheel collects harmful tyre dust</title>
		<link>https://blog.eduguru.in/news/device-fitted-to-car-wheel-collects-harmful-tyre-dust</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:52:52 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[air pollution]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[car device]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[Device fitted to car wheel collects harmful tyre dust]]></category>
		<category><![CDATA[dust]]></category>
		<category><![CDATA[harmful dust]]></category>
		<category><![CDATA[PLASTICS]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13513</guid>

					<description><![CDATA[A system that collects tyre dust – particles of tyre that are emitted when a vehicle is in operation – as they are emitted, has won its creators the James Dyson Award.  Tyre wear is the second-largest microplastic pollutant in our ocean after single-use plastic and accounts for up to 50 per cent of PM2.5 ... <a title="Device fitted to car wheel collects harmful tyre dust" class="read-more" href="https://blog.eduguru.in/news/device-fitted-to-car-wheel-collects-harmful-tyre-dust" aria-label="Read more about Device fitted to car wheel collects harmful tyre dust">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Tesco joins calls to bring forward diesel and petrol ban to 2030</title>
		<link>https://blog.eduguru.in/news/tesco-joins-calls-to-bring-forward-diesel-and-petrol-ban-to-2030</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:49:41 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[2030]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[CLIMATE CHANGE]]></category>
		<category><![CDATA[ELECTRIC VEHICLES]]></category>
		<category><![CDATA[FOSSIL FUELS]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[SUSTAINABILITY]]></category>
		<category><![CDATA[SUSTAINABLE DEVELOPMENT]]></category>
		<category><![CDATA[Tesco joins calls to bring forward diesel and petrol ban to 2030]]></category>
		<category><![CDATA[Tesco Technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13511</guid>

					<description><![CDATA[Tesco has joined a group of large businesses including Dixons Carphone, E.ON, Heathrow, Lime and SSE that have called on the Government to bring forward the date for when new petrol and diesel vehicles should be banned from sale to 2030.  The original 2040 date for the ban was announced in 2017, although some MPs ... <a title="Tesco joins calls to bring forward diesel and petrol ban to 2030" class="read-more" href="https://blog.eduguru.in/news/tesco-joins-calls-to-bring-forward-diesel-and-petrol-ban-to-2030" aria-label="Read more about Tesco joins calls to bring forward diesel and petrol ban to 2030">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Tesla’s new affordable battery promises major range boost</title>
		<link>https://blog.eduguru.in/news/teslas-new-affordable-battery-promises-major-range-boost</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:46:19 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AUTOMOTIVE]]></category>
		<category><![CDATA[BATTERIES]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[ELECTRIC VEHICLES MANUFACTURING]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[Tesla’s new affordable battery promises major range boost]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13509</guid>

					<description><![CDATA[Tesla founder Elon Musk has unveiled his firm’s latest battery technology which promises more affordable cars that can travel longer distances, but the three-year timeframe necessary before commercialisation has not impressed investors.  Musk envisions future electric cars priced as low as $25,000 (£19,657) that will be able to drive themselves once the new battery tech comes to ... <a title="Tesla’s new affordable battery promises major range boost" class="read-more" href="https://blog.eduguru.in/news/teslas-new-affordable-battery-promises-major-range-boost" aria-label="Read more about Tesla’s new affordable battery promises major range boost">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Overt and Covert Channels</title>
		<link>https://blog.eduguru.in/it-security/overt-and-covert-channels</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:41:39 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Channels]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Overt and Covert Channels]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13507</guid>

					<description><![CDATA[When you are working with Trojans and other malware, you need to be aware of covert and overt channels. As mentioned earlier in the chapter , the difference between the two is that an overt channel is put in place by design and represents the legitimate or intended way for the system or process to ... <a title="Overt and Covert Channels" class="read-more" href="https://blog.eduguru.in/it-security/overt-and-covert-channels" aria-label="Read more about Overt and Covert Channels">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Tools for Creating Trojans</title>
		<link>https://blog.eduguru.in/it-security/tools-for-creating-trojans</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:36:24 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Creating Trojans]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Tools for Creating Trojans]]></category>
		<category><![CDATA[Trojans]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13505</guid>

					<description><![CDATA[A wide range of tools exist that are used to take control of a victim’s system and leave behind a gift in the form of a backdoor. This is not an exhaustive list, and newer versions of many of these are released regularly: let me rule—A remote access Trojan authored entirely in Delphi. It uses ... <a title="Tools for Creating Trojans" class="read-more" href="https://blog.eduguru.in/it-security/tools-for-creating-trojans" aria-label="Read more about Tools for Creating Trojans">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Detecting Trojans and Viruses</title>
		<link>https://blog.eduguru.in/it-security/detecting-trojans-and-viruses</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:32:07 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Detecting Trojans and Viruses]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13503</guid>

					<description><![CDATA[A Trojan can be detected in many ways. Port scanning, which can prove very effective if you know what to look for. Because a Trojan is used to allow access through backdoors or covert channels, a port must be opened to allow this communication. A port scan using a tool such as Nmap reveals these ... <a title="Detecting Trojans and Viruses" class="read-more" href="https://blog.eduguru.in/it-security/detecting-trojans-and-viruses" aria-label="Read more about Detecting Trojans and Viruses">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Trojans</title>
		<link>https://blog.eduguru.in/it-security/trojans</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:28:04 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[warms]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13501</guid>

					<description><![CDATA[One of the older and potentially widely misunderstood forms of malware is the Trojan. Simply put, a Trojan is a software application that is designed to provide covert access to a victim’s system. The malicious code is packaged in such a way that it appears harmless and thus gets around both the scrutiny of the ... <a title="Trojans" class="read-more" href="https://blog.eduguru.in/it-security/trojans" aria-label="Read more about Trojans">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Scareware</title>
		<link>https://blog.eduguru.in/it-security/scareware</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:25:57 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Scareware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13499</guid>

					<description><![CDATA[A relatively new type of software is scareware. This type of malware warns the victim of potential harm that could befall them if they don’t take some action. Typically, this action involves providing a credit card or doing something else to buy a utility they need to clean their system. In many cases, the utility ... <a title="Scareware" class="read-more" href="https://blog.eduguru.in/it-security/scareware" aria-label="Read more about Scareware">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Adware</title>
		<link>https://blog.eduguru.in/it-security/adware</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:24:48 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13497</guid>

					<description><![CDATA[Adware is a well-known type of malware. Many systems are actively infected with this type of malware from the various installations and other activities they perform. When this type of software is deployed onto a victim’s system, it displays ads, pop-ups, and nag screens, and may even change the start page of the browser. Typically, ... <a title="Adware" class="read-more" href="https://blog.eduguru.in/it-security/adware" aria-label="Read more about Adware">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Methods of Spyware Infection</title>
		<link>https://blog.eduguru.in/it-security/methods-of-spyware-infection</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:23:09 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Methods of Spyware Infection]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[Spyware infection]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13495</guid>

					<description><![CDATA[Spyware can be placed on a system in a number of different ways, each offering its own benefits. Once the software is installed, it stays hidden and carries out its goals. Methods of infection include, but are not limited to, the following: Peer-to-peer networks (P2P)—This delivery mechanism has become very popular because of the increased ... <a title="Methods of Spyware Infection" class="read-more" href="https://blog.eduguru.in/it-security/methods-of-spyware-infection" aria-label="Read more about Methods of Spyware Infection">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Spyware</title>
		<link>https://blog.eduguru.in/it-security/spyware</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:19:18 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13493</guid>

					<description><![CDATA[Spyware is a type of malware that is designed to collect and forward information regarding a victim’s activities to an interested party. The defining characteristic is that the application acts behind the scenes to gather this information without the user’s consent or knowledge. The information gathered by spyware can be anything that the creator of ... <a title="Spyware" class="read-more" href="https://blog.eduguru.in/it-security/spyware" aria-label="Read more about Spyware">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Functioning of Computer Worms</title>
		<link>https://blog.eduguru.in/it-security/the-functioning-of-computer-worms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 10:18:07 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[The Functioning of Computer Worms]]></category>
		<category><![CDATA[Worms]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13491</guid>

					<description><![CDATA[Worms are an advanced form of malware, compared to viruses, and have different goals in many cases. One of the main characteristics of worms is their inherent ability to replicate and spread across networks extremely quickly, as the previous Slammer example demonstrated. Most worms share certain features that help define how they work and what ... <a title="The Functioning of Computer Worms" class="read-more" href="https://blog.eduguru.in/it-security/the-functioning-of-computer-worms" aria-label="Read more about The Functioning of Computer Worms">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Worms</title>
		<link>https://blog.eduguru.in/it-security/worms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 08:56:30 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Worms]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13489</guid>

					<description><![CDATA[When we speak of viruses, the topic of worms is not far behind. They are another major menace. Unlike viruses, which by definition require some sort of action to occur in order to trigger their mischief, worms are entirely self replicating. Worms effectively use the power of networks, malware, and speed to spread very dangerous ... <a title="Worms" class="read-more" href="https://blog.eduguru.in/it-security/worms" aria-label="Read more about Worms">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Create a Virus</title>
		<link>https://blog.eduguru.in/it-security/how-to-create-a-virus</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 08:49:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[hackers hacking]]></category>
		<category><![CDATA[How to Create a Virus]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13484</guid>

					<description><![CDATA[Creating a virus is a process that can be very complicated or something that happens with a few button clicks (see Exercise 1). Advanced programmers may choose to code the malware from scratch. The less savvy or experienced may have to pursue other options, such as hiring someone to write the virus, purchasing code, or ... <a title="How to Create a Virus" class="read-more" href="https://blog.eduguru.in/it-security/how-to-create-a-virus" aria-label="Read more about How to Create a Virus">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Kinds of Viruses</title>
		<link>https://blog.eduguru.in/it-security/kinds-of-viruses</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 08:45:39 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Kinds of Viruses]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13482</guid>

					<description><![CDATA[Modern viruses come in many varieties: ■ A system or boot sector virus is designed to infect and place its own code into the master boot record (MBR) of a system. Once this infection takes place, the system’s boot sequence is effectively altered, meaning the virus or other code can be loaded before the system ... <a title="Kinds of Viruses" class="read-more" href="https://blog.eduguru.in/it-security/kinds-of-viruses" aria-label="Read more about Kinds of Viruses">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Process of developing a virus</title>
		<link>https://blog.eduguru.in/it-security/process-of-developing-a-virus</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 08:36:09 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[Process of developing a virus]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[virus development]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13480</guid>

					<description><![CDATA[The process of developing a virus is very methodical. The author is concerned with creating an effective virus that can be spread easily. The process occurs in six steps: 1. Design. The author envisions and creates the virus. The author may choose to create the virus completely from scratch or use one of the many ... <a title="Process of developing a virus" class="read-more" href="https://blog.eduguru.in/it-security/process-of-developing-a-virus" aria-label="Read more about Process of developing a virus">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Viruses</title>
		<link>https://blog.eduguru.in/it-security/viruses</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 08:32:40 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13478</guid>

					<description><![CDATA[A virus represents the oldest form of malware and is by far the best known to the public. But what is a virus? What separates a virus from other forms of malware? How is a virus created, and how does it target its victim? This section explores these questions and how they affect you, the ... <a title="Viruses" class="read-more" href="https://blog.eduguru.in/it-security/viruses" aria-label="Read more about Viruses">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Categories of Malware</title>
		<link>https://blog.eduguru.in/it-security/categories-of-malware</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 08:29:43 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Categories of Malware]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13476</guid>

					<description><![CDATA[malware is an extremely broad term that blankets a range of software packages. We can say that malware is anything that steals resources, time, identity, or just about anything else while it is in operation. In order to understand what malware is, let’s look at the major types before we delve deeper into the mechanics ... <a title="Categories of Malware" class="read-more" href="https://blog.eduguru.in/it-security/categories-of-malware" aria-label="Read more about Categories of Malware">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Malware and the Law</title>
		<link>https://blog.eduguru.in/it-security/malware-and-the-law</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 08:26:43 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Malware and the Law]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13474</guid>

					<description><![CDATA[Ethical hackers should be mindful of the web of laws that relates to the deployment and use of malware. Over the years, malware has been subjected to increasing legal attention as the technology has evolved from being harmless to much more malicious and expansive in its abilities. The creation and use of malware have led ... <a title="Malware and the Law" class="read-more" href="https://blog.eduguru.in/it-security/malware-and-the-law" aria-label="Read more about Malware and the Law">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Malware</title>
		<link>https://blog.eduguru.in/it-security/malware</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 16:12:55 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13472</guid>

					<description><![CDATA[Malware is a term that is frequently used but frequently misapplied, so let’s first clarify its meaning. The term malware is short for malicious software, which accurately explains what this class of software is designed to do: to perform malicious and disruptive actions. Simply put, malware is any type of software that performs actions without ... <a title="Malware" class="read-more" href="https://blog.eduguru.in/it-security/malware" aria-label="Read more about Malware">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Executing Applications</title>
		<link>https://blog.eduguru.in/it-security/executing-applications</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 15:59:41 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Executing Applications]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13470</guid>

					<description><![CDATA[Once you gain access to a system and obtain sufficient privileges, it’s time to compromise the system and carry out the attack. Which applications are executed at this point is up to the attacker, but they can either be custom-built applications or off-the-shelf software. An attacker executes different applications on a system with specific goals ... <a title="Executing Applications" class="read-more" href="https://blog.eduguru.in/it-security/executing-applications" aria-label="Read more about Executing Applications">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Authentication on Microsoft Platforms</title>
		<link>https://blog.eduguru.in/it-security/authentication-on-microsoft-platforms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 11:22:44 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Authentication on Microsoft Platforms]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[Microsoft platforms]]></category>
		<category><![CDATA[NTLM Authentication]]></category>
		<category><![CDATA[Privilege Escalation]]></category>
		<category><![CDATA[Security Accounts Manager (SAM)]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13468</guid>

					<description><![CDATA[Security Accounts Manager (SAM) Inside the Windows operating system is a database that stores security principals (accounts or any entity that can be authenticated). In the Microsoft world, these principals can be stored locally in a database known as the Security Accounts Manager (SAM). Credentials, passwords, and other account information are stored in this database; ... <a title="Authentication on Microsoft Platforms" class="read-more" href="https://blog.eduguru.in/it-security/authentication-on-microsoft-platforms" aria-label="Read more about Authentication on Microsoft Platforms">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>EU could shut misbehaving tech firms out of single market</title>
		<link>https://blog.eduguru.in/news/eu-could-shut-misbehaving-tech-firms-out-of-single-market</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 17:09:54 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[EU could shut misbehaving tech firms out of single market]]></category>
		<category><![CDATA[LEGISLATION AND REGULATION]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[TAX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13466</guid>

					<description><![CDATA[According to the Financial Times, the European Commission is due to propose a new set of rules known as the Digital Services Act, which will seek to hold tech companies to higher standards. Under extreme circumstances, offending companies could be excluded from the EU.  In an interview with The Financial Times, Thierry Breton, the EU commissioner for international ... <a title="EU could shut misbehaving tech firms out of single market" class="read-more" href="https://blog.eduguru.in/news/eu-could-shut-misbehaving-tech-firms-out-of-single-market" aria-label="Read more about EU could shut misbehaving tech firms out of single market">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The UK Government is prone to IT disasters. Here’s what it should do</title>
		<link>https://blog.eduguru.in/news/the-uk-government-is-prone-to-it-disasters-heres-what-it-should-do</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 17:06:50 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Comment]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY]]></category>
		<category><![CDATA[GOVERNMENT AND POLITICS]]></category>
		<category><![CDATA[IN]]></category>
		<category><![CDATA[INFORMATION AND COMMUNICATIONS]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[PROJECT MANAGEMENT]]></category>
		<category><![CDATA[SOCIETY MANAGEMENT]]></category>
		<category><![CDATA[The UK Government is prone to IT disasters. Here’s what it should do]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13464</guid>

					<description><![CDATA[Months ago, when the UK was in the midst of a nationwide lockdown brought on by the outbreak of Covid-19, Health Secretary Matt Hancock announced the release of an NHSX contact-tracing app that would be at the heart of the Government’s strategy to ease restrictions. Although the app was touted for a mid-May release, after ... <a title="The UK Government is prone to IT disasters. Here’s what it should do" class="read-more" href="https://blog.eduguru.in/news/the-uk-government-is-prone-to-it-disasters-heres-what-it-should-do" aria-label="Read more about The UK Government is prone to IT disasters. Here’s what it should do">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook in legal battle over ban on transatlantic data transfer</title>
		<link>https://blog.eduguru.in/news/facebook-in-legal-battle-over-ban-on-transatlantic-data-transfer</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 17:03:46 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[ENGINEERING AND TECHNOLOGY IN SOCIETY]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[Facebook in legal battle over ban on transatlantic data transfer]]></category>
		<category><![CDATA[FACEBOOK LEGAL]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[SURVEILLANCE]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13462</guid>

					<description><![CDATA[Facebook is fighting demands from European data regulators to stop transferring user data from the EU to US servers. In a lawsuit filed in Dublin, the company warned that it would not be able to provide services to EU users if forced to comply with the order.  Earlier this month, the Wall Street Journal reported that Ireland’s ... <a title="Facebook in legal battle over ban on transatlantic data transfer" class="read-more" href="https://blog.eduguru.in/news/facebook-in-legal-battle-over-ban-on-transatlantic-data-transfer" aria-label="Read more about Facebook in legal battle over ban on transatlantic data transfer">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>SMTP Enumeration</title>
		<link>https://blog.eduguru.in/it-security/smtp-enumeration</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 16:58:32 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Enumeration]]></category>
		<category><![CDATA[SMTP]]></category>
		<category><![CDATA[SMTP Enumeration]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13459</guid>

					<description><![CDATA[Gathering information from a target is through the use of SMTP. This protocol is designed to send messages between servers that send and receive e-mail. SMTP is the standard used by the majority of e-mail servers and clients today. So how is this protocol used to gather information from a server? The process is quite ... <a title="SMTP Enumeration" class="read-more" href="https://blog.eduguru.in/it-security/smtp-enumeration" aria-label="Read more about SMTP Enumeration">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Enumeration Using NTP</title>
		<link>https://blog.eduguru.in/it-security/enumeration-using-ntp</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 16:52:38 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Enumeration Using NTP]]></category>
		<category><![CDATA[ntp]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13457</guid>

					<description><![CDATA[Another effective way to gather information about a network and the resources on it is through use of the Network Time Protocol (NTP). Before you look at how to exploit this protocol for information-gathering purposes, you need to understand what the protocol does and what purpose it serves. NTP is a protocol used to synchronize ... <a title="Enumeration Using NTP" class="read-more" href="https://blog.eduguru.in/it-security/enumeration-using-ntp" aria-label="Read more about Enumeration Using NTP">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>LDAP and Directory Service Enumeration</title>
		<link>https://blog.eduguru.in/it-security/ldap-and-directory-service-enumeration</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 16:50:19 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[ldap]]></category>
		<category><![CDATA[LDAP and Directory Service Enumeration]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13455</guid>

					<description><![CDATA[The Lightweight Directory Access Protocol (LDAP) is used to interact with and organize databases. LDAP is very widely used due to the fact that it is an open standard that is used by a number of vendors in their own products—in many cases a directory service like Microsoft’s Active Directory. A directory is a database, ... <a title="LDAP and Directory Service Enumeration" class="read-more" href="https://blog.eduguru.in/it-security/ldap-and-directory-service-enumeration" aria-label="Read more about LDAP and Directory Service Enumeration">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Unix and Linux Enumeration</title>
		<link>https://blog.eduguru.in/it-security/unix-and-linux-enumeration</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 16:35:40 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Enumeration]]></category>
		<category><![CDATA[ETHICAL HACKING]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[Unix and Linux Enumeration]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13453</guid>

					<description><![CDATA[Linux and Unix systems are no different from Windows systems and can be enumerated as well. The difference lies in the tools and the approach. In this section you will take a look at a handful of the tools that have proven useful in exploring these systems. finger The finger command is designed to return ... <a title="Unix and Linux Enumeration" class="read-more" href="https://blog.eduguru.in/it-security/unix-and-linux-enumeration" aria-label="Read more about Unix and Linux Enumeration">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Enumeration with SNMP</title>
		<link>https://blog.eduguru.in/it-security/enumeration-with-snmp</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 16:26:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Enumeration]]></category>
		<category><![CDATA[Enumeration with SNMP]]></category>
		<category><![CDATA[SNMP]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13451</guid>

					<description><![CDATA[Another useful mechanism for enumerating a target system is the Simple Network Manage- ment Protocol (SNMP). This protocol is used to assist in the management of devices such as routers, hubs, and switches, among others. SNMP comes in three versions: SNMPv1 This version of the protocol was introduced as a standardized mechanism for managing network ... <a title="Enumeration with SNMP" class="read-more" href="https://blog.eduguru.in/it-security/enumeration-with-snmp" aria-label="Read more about Enumeration with SNMP">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Windows Basics</title>
		<link>https://blog.eduguru.in/it-security/windows-basics</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 22 Sep 2020 16:14:08 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Groups]]></category>
		<category><![CDATA[NULL Sessions]]></category>
		<category><![CDATA[PsTools Suite]]></category>
		<category><![CDATA[Security Identifiers]]></category>
		<category><![CDATA[Services and Ports of Interest]]></category>
		<category><![CDATA[Users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Basics]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13449</guid>

					<description><![CDATA[The Microsoft Windows operating system is designed to be used as either a stand-alone or a networked environment; however, for this discussion you will assume a networked setup only. In the Windows world, securing access to resources, objects, and other components is handled through many mechanisms, but there are some things that are common to ... <a title="Windows Basics" class="read-more" href="https://blog.eduguru.in/it-security/windows-basics" aria-label="Read more about Windows Basics">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Enumeration?</title>
		<link>https://blog.eduguru.in/it-security/what-is-enumeration</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 10:04:35 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Enumeration]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[What Is Enumeration?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13447</guid>

					<description><![CDATA[Enumeration is the process of extracting information from a target system in an organized and methodical manner. During enumeration you should be able to extract information such as usernames, machine names, shares, and services from a system as well as other information depending on the operating environment. Unlike with previous phases, you are initiating active ... <a title="What Is Enumeration?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-enumeration" aria-label="Read more about What Is Enumeration?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Checking for Live Systems</title>
		<link>https://blog.eduguru.in/it-security/checking-for-live-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:59:48 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Checking for Live Systems]]></category>
		<category><![CDATA[checking system]]></category>
		<category><![CDATA[ETHICAL HACKING]]></category>
		<category><![CDATA[live system]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13445</guid>

					<description><![CDATA[How do you check for live systems in a targeted environment? There are plenty of ways to accomplish this. Some common ways to perform these types of scans are: ■ Wardialing ■ Wardriving ■ Pinging ■ Port scanning Each of these techniques, along with others we will explore, offers something that the others don’t, or ... <a title="Checking for Live Systems" class="read-more" href="https://blog.eduguru.in/it-security/checking-for-live-systems" aria-label="Read more about Checking for Live Systems">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Network Scanning?</title>
		<link>https://blog.eduguru.in/it-security/what-is-network-scanning</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:53:31 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[network scanning]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[What Is Network Scanning?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13443</guid>

					<description><![CDATA[Networking scanning is a methodical process that involves probing a target network with the intent of finding out information about it and using that information for attack phases. If you have a command of network and system fundamentals, coupled with thorough reconnaissance it is possible to get a reasonable picture of a network—in some cases, ... <a title="What Is Network Scanning?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-network-scanning" aria-label="Read more about What Is Network Scanning?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Footprinting Process</title>
		<link>https://blog.eduguru.in/it-security/the-footprinting-process</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:48:17 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Footprinting]]></category>
		<category><![CDATA[google hacking]]></category>
		<category><![CDATA[Location and Geography]]></category>
		<category><![CDATA[Network Information]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Social Networking and Information Gathering]]></category>
		<category><![CDATA[The Footprinting Process]]></category>
		<category><![CDATA[Working with E-mail]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13441</guid>

					<description><![CDATA[There are many steps in the footprinting process, each of which will yield a different type of information. Remember to log each piece of information that you gather no matter how insignificant it may seem at the time. Using Search Engines One of the first steps in the process of footprinting tends to be using ... <a title="The Footprinting Process" class="read-more" href="https://blog.eduguru.in/it-security/the-footprinting-process" aria-label="Read more about The Footprinting Process">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Threats Introduced by Footprinting</title>
		<link>https://blog.eduguru.in/it-security/threats-introduced-by-footprinting</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:31:26 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Footprinting]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Threats Introduced by Footprinting]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13439</guid>

					<description><![CDATA[Social Engineering One of the easiest ways to gain information about a target or to get information in general is to just ask for it. When asking doesn’t work, you can try manipulating people with the goal of getting that gem of information that can give you useful insight. Network and System Attacks These are ... <a title="Threats Introduced by Footprinting" class="read-more" href="https://blog.eduguru.in/it-security/threats-introduced-by-footprinting" aria-label="Read more about Threats Introduced by Footprinting">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Terminology in Footprinting</title>
		<link>https://blog.eduguru.in/it-security/terminology-in-footprinting</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:28:13 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Footprinting]]></category>
		<category><![CDATA[Terminology]]></category>
		<category><![CDATA[Terminology in Footprinting]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13437</guid>

					<description><![CDATA[Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the least aggressive. Basically the process relies on obtaining information from those sources that are typically publicly available and out in the open. Potential sources include newspapers, websites, discussion groups, press releases, television, social networking, blogs, ... <a title="Terminology in Footprinting" class="read-more" href="https://blog.eduguru.in/it-security/terminology-in-footprinting" aria-label="Read more about Terminology in Footprinting">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Goals of the Footprinting Process</title>
		<link>https://blog.eduguru.in/it-security/goals-of-the-footprinting-process</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:24:16 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Footprinting]]></category>
		<category><![CDATA[Goals of footprinting]]></category>
		<category><![CDATA[Goals of the Footprinting Process]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13435</guid>

					<description><![CDATA[Before you start doing footprinting and learn the techniques, you must set some expectations as to what you are looking for and what you should have in your hands at the end of the process. Keep in mind that the list of information here is not exhaustive, nor should you expect to be able to ... <a title="Goals of the Footprinting Process" class="read-more" href="https://blog.eduguru.in/it-security/goals-of-the-footprinting-process" aria-label="Read more about Goals of the Footprinting Process">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why Perform Footprinting?</title>
		<link>https://blog.eduguru.in/it-security/why-perform-footprinting</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:21:20 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Footprinting]]></category>
		<category><![CDATA[perform footprinting]]></category>
		<category><![CDATA[Why Perform Footprinting?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13433</guid>

					<description><![CDATA[Footprinting is about gathering information and formulating a hacking strategy. With proper care you, as the attacking party, may be able to uncover the path of least resistance into an organization. Passively gathering information is by far the easiest and most effective method. If done by a skilled, inventive, and curious party (you!), the amount ... <a title="Why Perform Footprinting?" class="read-more" href="https://blog.eduguru.in/it-security/why-perform-footprinting" aria-label="Read more about Why Perform Footprinting?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Footprinting?</title>
		<link>https://blog.eduguru.in/it-security/what-is-footprinting</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:18:46 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[What Is Footprinting?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13431</guid>

					<description><![CDATA[Now let’s circle back around to the first step in the process of ethical hacking: footprinting. Footprinting, or reconnaissance, is a method of observing and collecting information about a potential target with the intention of finding a way to attack the target. Foot-printing looks for information and later analyzes it, looking for weaknesses or potential ... <a title="What Is Footprinting?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-footprinting" aria-label="Read more about What Is Footprinting?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Understanding the Steps of Ethical Hacking</title>
		<link>https://blog.eduguru.in/it-security/understanding-the-steps-of-ethical-hacking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 09:16:27 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[ETHICAL HACKING]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Understanding the Steps of Ethical Hacking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13429</guid>

					<description><![CDATA[For an overview of the process, let’s look at the steps of ethical hacking to see where foot-printing fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject of this article. This phase consists of passively gaining information about ... <a title="Understanding the Steps of Ethical Hacking" class="read-more" href="https://blog.eduguru.in/it-security/understanding-the-steps-of-ethical-hacking" aria-label="Read more about Understanding the Steps of Ethical Hacking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Applications of Cryptography</title>
		<link>https://blog.eduguru.in/it-security/applications-of-cryptography</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 08:59:07 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Applications of Cryptography]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[cryptography applications]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13423</guid>

					<description><![CDATA[Cryptography can be applied in communication of data and information, which we will see in the form of IPSec, SSL, and PGP. In this article we will examine these applications and see how cryptography fits in. IPSec Internet Protocol Security (IPSec) is a set of protocols designed to protect the confidentiality and integrity of data ... <a title="Applications of Cryptography" class="read-more" href="https://blog.eduguru.in/it-security/applications-of-cryptography" aria-label="Read more about Applications of Cryptography">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Issues with Cryptography</title>
		<link>https://blog.eduguru.in/it-security/issues-with-cryptography</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 17:29:53 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Issues with Cryptography]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13418</guid>

					<description><![CDATA[Much like any system that will be explored in this text, cryptography has its faults and potential attacks. Attacks are designed to leverage weaknesses in both implementation and logic in many cases. However one thing that should always be kept in mind is that no matter how strong or well designed a system may be, ... <a title="Issues with Cryptography" class="read-more" href="https://blog.eduguru.in/it-security/issues-with-cryptography" aria-label="Read more about Issues with Cryptography">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Symmetric Cryptography</title>
		<link>https://blog.eduguru.in/it-security/symmetric-cryptography</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 17:22:25 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Symmetric Cryptography]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13416</guid>

					<description><![CDATA[Symmetric algorithms do some things really well and other things not so well. Modern symmetric algorithms are great at all of the following: ■ Preserving confidentiality ■ Increasing speed ■ Ensuring simplicity (relatively speaking, of course) ■ Providing authenticity .ymmetric algorithms have their drawbacks in these areas: ■ Key management issues ■ Lack of nonrepudiation ... <a title="Symmetric Cryptography" class="read-more" href="https://blog.eduguru.in/it-security/symmetric-cryptography" aria-label="Read more about Symmetric Cryptography">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Cryptography in Action</title>
		<link>https://blog.eduguru.in/it-security/cryptography-in-action</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 17:19:03 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Cryptography in Action]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13414</guid>

					<description><![CDATA[You will encounter cryptography in many forms throughout this book. It is applied to many different technologies and situations and, as such, is something you need to have a firm grasp of. Some examples of applied cryptography are: Public key infrastructure (PKI)  Digital certificates  Authentication  E-commerce  RSA  MD-5 Secure Hash Algorithm (SHA)  Secure Sockets Layer ... <a title="Cryptography in Action" class="read-more" href="https://blog.eduguru.in/it-security/cryptography-in-action" aria-label="Read more about Cryptography in Action">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Tracing the Evolution in cryptography</title>
		<link>https://blog.eduguru.in/it-security/tracing-the-evolution-in-cryptography</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 15:09:34 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[evolution in cryptography]]></category>
		<category><![CDATA[Tracing the Evolution in cryptography]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13412</guid>

					<description><![CDATA[As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is kept secret is one thing, but in the ... <a title="Tracing the Evolution in cryptography" class="read-more" href="https://blog.eduguru.in/it-security/tracing-the-evolution-in-cryptography" aria-label="Read more about Tracing the Evolution in cryptography">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>History of Cryptography</title>
		<link>https://blog.eduguru.in/it-security/history-of-cryptography</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 14:57:36 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[History of Cryptography]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13410</guid>

					<description><![CDATA[you can learn things by studying the history of cryptography that can help you relate to the techniques a little better. Early cultures taught us that cryptography is simply a technique or group of techniques used to protect information. The primitive techniques of times past may look antiquated and simple in the face of today’s ... <a title="History of Cryptography" class="read-more" href="https://blog.eduguru.in/it-security/history-of-cryptography" aria-label="Read more about History of Cryptography">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Knowing Operating Systems</title>
		<link>https://blog.eduguru.in/it-security/knowing-operating-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 14:49:33 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Knowing Operating Systems]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13408</guid>

					<description><![CDATA[Windows Although there are many different operating systems, in all likelihood it will be a flavor of Microsoft’s Windows OS that you will test against. There are other OSs in the wild that have a certain amount of enterprise market presence, but Microsoft still has a massive foot-hold on the OS market. By the end ... <a title="Knowing Operating Systems" class="read-more" href="https://blog.eduguru.in/it-security/knowing-operating-systems" aria-label="Read more about Knowing Operating Systems">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Backups and Archiving</title>
		<link>https://blog.eduguru.in/it-security/backups-and-archiving</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 14:40:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[Backups and Archiving]]></category>
		<category><![CDATA[DATA BACKUP]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13406</guid>

					<description><![CDATA[Backing up data is essential to the survival and continuation of integral operations. Anyone in the support field who has spent an entire weeknight restoring a server can attest to this. Let’s cover a few of the basic backup schemes you’ll see in the wild. Full Backup A full backup resets the archive bit of ... <a title="Backups and Archiving" class="read-more" href="https://blog.eduguru.in/it-security/backups-and-archiving" aria-label="Read more about Backups and Archiving">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Network Security</title>
		<link>https://blog.eduguru.in/it-security/network-security</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 10:21:38 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13402</guid>

					<description><![CDATA[Firewalls and IDS/IPS appliances are part of a secure network, but in this article we’ll look briefly at the placement and functional value of each device. As you venture through the details, keep in mind that securing a network is a holistic process; breaking into a network, on the other hand, is a focused process. ... <a title="Network Security" class="read-more" href="https://blog.eduguru.in/it-security/network-security" aria-label="Read more about Network Security">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Intrusion Prevention and Intrusion Detection Systems</title>
		<link>https://blog.eduguru.in/it-security/intrusion-prevention-and-intrusion-detection-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 10:13:25 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[intrusion Detection System]]></category>
		<category><![CDATA[intrusion preventing]]></category>
		<category><![CDATA[Intrusion Prevention and Intrusion Detection Systems]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13400</guid>

					<description><![CDATA[Intrusion prevention systems (IPSs) and intrusion detection systems (IDSs) are important considerations for any smart hacker. It is important for you, as a hacker, to cover your tracks and keep a low profile—as in no profile at all. It should be common sense, but consider this: If instead of tiptoeing around a network, you slam ... <a title="Intrusion Prevention and Intrusion Detection Systems" class="read-more" href="https://blog.eduguru.in/it-security/intrusion-prevention-and-intrusion-detection-systems" aria-label="Read more about Intrusion Prevention and Intrusion Detection Systems">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Firewalls</title>
		<link>https://blog.eduguru.in/it-security/firewalls-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 10:06:47 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[security wall]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13398</guid>

					<description><![CDATA[The firewall category includes proxy firewalls; however, because of a proxy’s varied functions it seems appropriate to give them their own subsection. Firewalls are most commonly broken down into the following main categories: Packet filtering Stateful packet filtering  Application proxies, which we covered earlier Packet filtering firewalls look at the header information of the packets ... <a title="Firewalls" class="read-more" href="https://blog.eduguru.in/it-security/firewalls-2" aria-label="Read more about Firewalls">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Proxies</title>
		<link>https://blog.eduguru.in/it-security/proxies</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 19 Sep 2020 10:00:34 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[Proxies]]></category>
		<category><![CDATA[proxy]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13396</guid>

					<description><![CDATA[Proxy servers work in the middle of the traffic scene. You may have been exposed to the forwarding side of proxies; for example, your browser at work may have been pointed to a proxy server to enable access to an outside resource such as a website. There are multiple reasons to implement such a solution. ... <a title="Proxies" class="read-more" href="https://blog.eduguru.in/it-security/proxies" aria-label="Read more about Proxies">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Brain’s memory inspires neural networks to be less ‘forgetful’</title>
		<link>https://blog.eduguru.in/it-security/brains-memory-inspires-neural-networks-to-be-less-forgetful</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 12:33:27 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Brain’s memory inspires neural networks to be less ‘forgetful’]]></category>
		<category><![CDATA[NEURAL NETWORKS]]></category>
		<category><![CDATA[NEUROLOGY]]></category>
		<category><![CDATA[NEUROTECHNOLOGY]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13392</guid>

					<description><![CDATA[Researchers say they have successfully addressed what they call a ‘major, long-standing obstacle to increasing AI capabilities’ by drawing inspiration from a human brain memory mechanism known as ‘replay’. Artificial intelligence (AI) experts at the University of Massachusetts (UMass) Amherst and the Baylor College of Medicine said they have developed a new method to protect – ... <a title="Brain’s memory inspires neural networks to be less ‘forgetful’" class="read-more" href="https://blog.eduguru.in/it-security/brains-memory-inspires-neural-networks-to-be-less-forgetful" aria-label="Read more about Brain’s memory inspires neural networks to be less ‘forgetful’">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Network Devices</title>
		<link>https://blog.eduguru.in/it-security/network-devices</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 12:26:41 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Devices]]></category>
		<category><![CDATA[Routers]]></category>
		<category><![CDATA[Switches]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13390</guid>

					<description><![CDATA[Routers Let’s begin with routers. Our aim here is to give you a firm understanding of the basic functions of routers, so you’ll use this knowledge for more complex hacking techniques and tools. A quick overview of the fundamentals: a router’s main function is to direct packets (layer 3 traffic) to the appropriate location based ... <a title="Network Devices" class="read-more" href="https://blog.eduguru.in/it-security/network-devices" aria-label="Read more about Network Devices">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Domain Name System</title>
		<link>https://blog.eduguru.in/it-security/domain-name-system</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 12:20:35 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Domain Name]]></category>
		<category><![CDATA[Domain Name System]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13388</guid>

					<description><![CDATA[Domain Name System (DNS) and its ability to translate names to IP addresses and back. The DNS that you may already be aware of, even if you don’t actively think about it, is the one used to translate names to IPs on the Internet. DNS is incredibly powerful and easy to use, but at the ... <a title="Domain Name System" class="read-more" href="https://blog.eduguru.in/it-security/domain-name-system" aria-label="Read more about Domain Name System">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exploring TCP/IP Ports</title>
		<link>https://blog.eduguru.in/it-security/exploring-tcpip-ports</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 12:17:14 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Exploring TCP/IP Ports]]></category>
		<category><![CDATA[TCP/IP]]></category>
		<category><![CDATA[TCP/IP Ports]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13386</guid>

					<description><![CDATA[Ports allow computers to send data out the door while simultaneously identifying that data by category. What this means is each of the common ports you use is associated with a particular protocol or particular application. For example, sending data from port 21 signifies to the receiving system that the traffic received is an FTP ... <a title="Exploring TCP/IP Ports" class="read-more" href="https://blog.eduguru.in/it-security/exploring-tcpip-ports" aria-label="Read more about Exploring TCP/IP Ports">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hexadecimal vs. Binary</title>
		<link>https://blog.eduguru.in/it-security/hexadecimal-vs-binary</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 11:36:55 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Binary]]></category>
		<category><![CDATA[Hexadecimal]]></category>
		<category><![CDATA[Hexadecimal vs. Binary]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13383</guid>

					<description><![CDATA[Understanding hexadecimal and binary conversion is an important skill to have for the exam. In the real world, for most network administrators conversion is done either by a calculator or is not needed, but as an ethical hacker, you have opportunities to apply the basic conversions to something useful. See Table for the basic conversion ... <a title="Hexadecimal vs. Binary" class="read-more" href="https://blog.eduguru.in/it-security/hexadecimal-vs-binary" aria-label="Read more about Hexadecimal vs. Binary">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>IP Subnetting</title>
		<link>https://blog.eduguru.in/it-security/ip-subnetting</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 11:29:11 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IP]]></category>
		<category><![CDATA[IP Subnetting]]></category>
		<category><![CDATA[Subnetting]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13381</guid>

					<description><![CDATA[Subnetting is the logical breakdown of a network address space into progressively smaller subnetworks. That’s it. Stop thinking and take it for what it is! Now, as you break down your address space into smaller subnetworks, you determine the numbers of network bits and host bits by the requirements of your network. Network bits and ... <a title="IP Subnetting" class="read-more" href="https://blog.eduguru.in/it-security/ip-subnetting" aria-label="Read more about IP Subnetting">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Dissecting the TCP/IP Suite</title>
		<link>https://blog.eduguru.in/it-security/dissecting-the-tcpip-suite</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 11:23:41 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Dissecting the TCP/IP Suite]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13376</guid>

					<description><![CDATA[Complementary to the OSI model is the TCP/IP protocol suite. TCP/IP is not necessarily a direct offshoot, but it’s a progressive step from the standard OSI version of traffic flow. Each layer of the TCP/IP suite maps to one or several layers of the OSI model. The TCP/ IP suite is important for protocol reference ... <a title="Dissecting the TCP/IP Suite" class="read-more" href="https://blog.eduguru.in/it-security/dissecting-the-tcpip-suite" aria-label="Read more about Dissecting the TCP/IP Suite">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>History of email and When the first email sent</title>
		<link>https://blog.eduguru.in/networking/history-of-email-and-when-the-first-email-sent</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 02:33:50 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[History of email and When the first email sent]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13371</guid>

					<description><![CDATA[History of email and When the first email sent Electronic mail (email or e-mail) is a method of exchanging messages (&#8220;mail&#8221;) between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient ... <a title="History of email and When the first email sent" class="read-more" href="https://blog.eduguru.in/networking/history-of-email-and-when-the-first-email-sent" aria-label="Read more about History of email and When the first email sent">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Working with the Open Systems Interconnection Model</title>
		<link>https://blog.eduguru.in/networking/working-with-the-open-systems-interconnection-model</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 18:13:23 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Basic network model]]></category>
		<category><![CDATA[NETWORKING]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Osi Model]]></category>
		<category><![CDATA[OSI Model layer]]></category>
		<category><![CDATA[Working with the Open Systems Interconnection Model]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13366</guid>

					<description><![CDATA[No network discussion or network device explanation would be complete without a brief overview of the Open Systems Interconnection (OSI) model. Although this model may seem overly complex, it does have value in our later discussions of attacks, defenses, and infrastructure, as you will see. The OSI model is a general framework that enables network ... <a title="Working with the Open Systems Interconnection Model" class="read-more" href="https://blog.eduguru.in/networking/working-with-the-open-systems-interconnection-model" aria-label="Read more about Working with the Open Systems Interconnection Model">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exploring Network Topologies</title>
		<link>https://blog.eduguru.in/it-security/exploring-network-topologies</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 17:57:42 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Exploring Network Topologies]]></category>
		<category><![CDATA[network topologies]]></category>
		<category><![CDATA[topologies]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13364</guid>

					<description><![CDATA[Network topologies represent the physical side of the network, and they form part of the foundation of our overall system. Before we explore too far, the first thing you need to understand is that you must consider two opposing yet related concepts in this article: the physical layout of the network and the logical layout ... <a title="Exploring Network Topologies" class="read-more" href="https://blog.eduguru.in/it-security/exploring-network-topologies" aria-label="Read more about Exploring Network Topologies">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Vulnerability Research and Tools</title>
		<link>https://blog.eduguru.in/it-security/vulnerability-research-and-tools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 17:42:05 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulnerability Research and Tools]]></category>
		<category><![CDATA[vulnerability tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13362</guid>

					<description><![CDATA[`An important part of your toolkit as an ethical hacker will be the information gathered from vulnerability research. This process involves searching for and uncovering vulnerabilities in a system and determining their nature. Additionally, the research seeks to classify each vulnerability as high, medium, or low. You or other security personnel can use this research ... <a title="Vulnerability Research and Tools" class="read-more" href="https://blog.eduguru.in/it-security/vulnerability-research-and-tools" aria-label="Read more about Vulnerability Research and Tools">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hacking Methodologies</title>
		<link>https://blog.eduguru.in/it-security/hacking-methodologies</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 16:12:36 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Black hat hackers]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[Hacking Methodologies]]></category>
		<category><![CDATA[Methodologies]]></category>
		<category><![CDATA[white hat hackers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13359</guid>

					<description><![CDATA[A hacking methodology refers to the step-by-step approach used by an aggressor to attack a target such as a computer network. There is no specific step-by-step approach used by all hackers. As can be expected when a group operates outside the rules as hackers do, rules do not apply the same way. A major difference ... <a title="Hacking Methodologies" class="read-more" href="https://blog.eduguru.in/it-security/hacking-methodologies" aria-label="Read more about Hacking Methodologies">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Delivering the internet to Africa</title>
		<link>https://blog.eduguru.in/news/delivering-the-internet-to-africa</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 15:48:05 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[africa]]></category>
		<category><![CDATA[cell network]]></category>
		<category><![CDATA[Delivering the internet to Africa]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[internet network]]></category>
		<category><![CDATA[mobile networks]]></category>
		<category><![CDATA[Network]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13357</guid>

					<description><![CDATA[More than half the population of Africa cannot access the internet, but this is changing thanks to mobile networks and ambitious new engineering projects. In fact, Africa recorded the highest growth in internet use globally between 2005 and 2018, proving that it’s possible to close the digital divide. “The working-age population in Africa is expected ... <a title="Delivering the internet to Africa" class="read-more" href="https://blog.eduguru.in/news/delivering-the-internet-to-africa" aria-label="Read more about Delivering the internet to Africa">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How it works: 3D touchscreens</title>
		<link>https://blog.eduguru.in/info/how-it-works-3d-touchscreens</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 15:38:05 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[3D touch screen]]></category>
		<category><![CDATA[How it works: 3D touchscreens]]></category>
		<category><![CDATA[RESEARCH AND INNOVATION]]></category>
		<category><![CDATA[SMART MATERIALS]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[TOUCHSCREEN]]></category>
		<category><![CDATA[VOLUME 15 ISSUE 9]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13355</guid>

					<description><![CDATA[Heavily inspired by graffiti spray art, a team of researchers at the University of Bristol have developed a special spray coat that allows the creation of interactive displays on 3D objects. Eclipsing the appeal of traditional square and rectangular casings, the new technology, called ProtoSpray, makes it possible to ‘spray’ touch-sensitive screens onto objects as ... <a title="How it works: 3D touchscreens" class="read-more" href="https://blog.eduguru.in/info/how-it-works-3d-touchscreens" aria-label="Read more about How it works: 3D touchscreens">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>US-China tensions overshadow closing of Oracle-ByteDance deal</title>
		<link>https://blog.eduguru.in/news/us-china-tensions-overshadow-closing-of-oracle-bytedance-deal</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 15:28:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[byte dance]]></category>
		<category><![CDATA[Byte-dance deal]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[Social networking]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[US-China tension]]></category>
		<category><![CDATA[US-China tensions overshadow closing of Oracle-ByteDance deal]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13353</guid>

					<description><![CDATA[Demands from President Donald Trump that TikTok must be quickly sold to a US company or face a nationwide ban sparked frantic talks between TikTok parent company ByteDance and US companies, including Microsoft, Twitter, Walmart and Oracle. These talks have been disrupted by complications, including Trump’s insistence that the US government should receive a financial “cut” of ... <a title="US-China tensions overshadow closing of Oracle-ByteDance deal" class="read-more" href="https://blog.eduguru.in/news/us-china-tensions-overshadow-closing-of-oracle-bytedance-deal" aria-label="Read more about US-China tensions overshadow closing of Oracle-ByteDance deal">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>pen test logic</title>
		<link>https://blog.eduguru.in/it-security/pen-test-logic</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 15:22:31 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[black box]]></category>
		<category><![CDATA[ETHICAL HACKING]]></category>
		<category><![CDATA[gray box]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[pen test]]></category>
		<category><![CDATA[pen test logic]]></category>
		<category><![CDATA[white box]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13351</guid>

					<description><![CDATA[A pen test is the next logical step beyond ethical hacking. Although ethical hacking sometimes occurs without a formal set of rules of engagement, pen testing does require rules to be agreed on in advance in every case. If you choose to perform a pen test without having certain parameters determined ahead of time, it ... <a title="pen test logic" class="read-more" href="https://blog.eduguru.in/it-security/pen-test-logic" aria-label="Read more about pen test logic">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Installing Apache Cassandra on CentOS 7</title>
		<link>https://blog.eduguru.in/linux-2/installing-apache-cassandra-on-centos-7</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 10:57:09 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[Cassandra]]></category>
		<category><![CDATA[Installing Apache Cassandra on CentOS 7]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13349</guid>

					<description><![CDATA[Prerequisites The user you are logged in as must have sudo privileges to be able to install packages. Installing Apache Cassandra The recommended way to install Apache Cassandra on CentOS 7 is by installing the rpm package from the official Apache Cassandra repository. To install OpenJDK , on your system type: $ sudo yum install java-1.8.0-openjdk-devel Verify the Java installation by ... <a title="Installing Apache Cassandra on CentOS 7" class="read-more" href="https://blog.eduguru.in/linux-2/installing-apache-cassandra-on-centos-7" aria-label="Read more about Installing Apache Cassandra on CentOS 7">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>As an ethical hacker you must agree to the some code of ethics</title>
		<link>https://blog.eduguru.in/it-security/as-an-ethical-hacker-you-must-agree-to-the-some-code-of-ethics</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 17:56:58 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[As an ethical hacker you must agree to the some code of ethics]]></category>
		<category><![CDATA[ethical]]></category>
		<category><![CDATA[Ethical hackers]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[hacking some hackers code]]></category>
		<category><![CDATA[white hat hackers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13345</guid>

					<description><![CDATA[Keep private and confidential information gained in your professional work (in particular as it pertains to client lists and client personal information). Do not collect, give, sell, or transfer any personal information (such as name, e-mail address, social security number, or other unique identifier) to a third party without prior client consent. Protect the intellectual ... <a title="As an ethical hacker you must agree to the some code of ethics" class="read-more" href="https://blog.eduguru.in/it-security/as-an-ethical-hacker-you-must-agree-to-the-some-code-of-ethics" aria-label="Read more about As an ethical hacker you must agree to the some code of ethics">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ethical Hacking and Penetration Testing</title>
		<link>https://blog.eduguru.in/it-security/ethical-hacking-and-penetration-testing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 17:32:05 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[ETHICAL HACKING]]></category>
		<category><![CDATA[Ethical Hacking and Penetration Testing]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[PENETRATION TESTING]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13343</guid>

					<description><![CDATA[Ethical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking, most tend to use the term pen tester, which is short for penetration tester. Pen testers do simply that: penetrate systems like a hacker, but for benign purposes. As an ethical hacker and future test ... <a title="Ethical Hacking and Penetration Testing" class="read-more" href="https://blog.eduguru.in/it-security/ethical-hacking-and-penetration-testing" aria-label="Read more about Ethical Hacking and Penetration Testing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Bad Guys and Good Guys or Hackers and Ethical Hackers</title>
		<link>https://blog.eduguru.in/it-security/bad-guys-and-good-guys-or-hackers-and-ethical-hackers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 11:58:07 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Bad Guys and Good Guys or Hackers and Ethical Hackers]]></category>
		<category><![CDATA[bad hackers]]></category>
		<category><![CDATA[Black hat hackers]]></category>
		<category><![CDATA[good hackers]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[white hat hackers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13341</guid>

					<description><![CDATA[The difference between an ethical hacker and a hacker is something that can easily get you into an argument. Just saying the word hacker in the wrong place can get you into an hours-long conversation of the history of hacking and how hackers are all good guys who mean nothing but the best for the ... <a title="Bad Guys and Good Guys or Hackers and Ethical Hackers" class="read-more" href="https://blog.eduguru.in/it-security/bad-guys-and-good-guys-or-hackers-and-ethical-hackers" aria-label="Read more about Bad Guys and Good Guys or Hackers and Ethical Hackers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Evolution and Growth of Hacking</title>
		<link>https://blog.eduguru.in/it-security/the-evolution-and-growth-of-hacking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 11:52:39 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[evolution of hacking]]></category>
		<category><![CDATA[growth of hacking]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[hackers worlds]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[The Evolution and Growth of Hacking]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13339</guid>

					<description><![CDATA[Attackers have constantly sought to “up” their game with new tactics and strategies to include new types of malware such as worms, spam, spyware, adware, and even rootkits. Although they already knew how to harass and irritate the public, in recent years they have caused ever bolder disruptions of today’s world by preying on our ... <a title="The Evolution and Growth of Hacking" class="read-more" href="https://blog.eduguru.in/it-security/the-evolution-and-growth-of-hacking" aria-label="Read more about The Evolution and Growth of Hacking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hacking: Fun or Criminal Activity?</title>
		<link>https://blog.eduguru.in/it-security/hacking-fun-or-criminal-activity</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 11:45:27 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Criminal activity]]></category>
		<category><![CDATA[fun activity]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[hacking fun]]></category>
		<category><![CDATA[Hacking: Fun or Criminal Activity?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13337</guid>

					<description><![CDATA[Hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. It is only for a portion of the time since then that hacking has been viewed as a crime and a situation that needs to be addressed. Here’s a look at some famous hacks over time: ... <a title="Hacking: Fun or Criminal Activity?" class="read-more" href="https://blog.eduguru.in/it-security/hacking-fun-or-criminal-activity" aria-label="Read more about Hacking: Fun or Criminal Activity?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Current Developments in Hacking</title>
		<link>https://blog.eduguru.in/it-security/current-developments-in-hacking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 11:41:02 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Current Developments in Hacking]]></category>
		<category><![CDATA[current situation in hacking]]></category>
		<category><![CDATA[development in hacking]]></category>
		<category><![CDATA[Development list]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[hackers list]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[IT- Security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13335</guid>

					<description><![CDATA[In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In fact, in the first few years of the new millennium the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following, among many more: ■ Denial-of-service attacks ■ Manipulation of ... <a title="Current Developments in Hacking" class="read-more" href="https://blog.eduguru.in/it-security/current-developments-in-hacking" aria-label="Read more about Current Developments in Hacking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Early Days of Hacking</title>
		<link>https://blog.eduguru.in/it-security/the-early-days-of-hacking</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 11:34:29 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Black hat hackers]]></category>
		<category><![CDATA[CYBER ATTACKES]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[The Early Days of Hacking]]></category>
		<category><![CDATA[white hat hackers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13333</guid>

					<description><![CDATA[As the story goes, the earliest hackers were a group of people who were passionate and curious about new technology. They were the equivalent of those modern-day individuals who not only want the latest technology, such as a smartphone or iPhone, but also want to learn all the juicy details about what the device does ... <a title="The Early Days of Hacking" class="read-more" href="https://blog.eduguru.in/it-security/the-early-days-of-hacking" aria-label="Read more about The Early Days of Hacking">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What are Fuzzy Systems ?</title>
		<link>https://blog.eduguru.in/artificial-intelligent/what-are-fuzzy-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 18:04:05 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[artificial intelligence (AI)]]></category>
		<category><![CDATA[Artificial Intelligence and related fields]]></category>
		<category><![CDATA[Artificial intelligence technology]]></category>
		<category><![CDATA[Artificial related field]]></category>
		<category><![CDATA[Fuzzy logic]]></category>
		<category><![CDATA[fuzzy set]]></category>
		<category><![CDATA[What are Fuzzy Systems ?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13330</guid>

					<description><![CDATA[• Fuzzy Systems include Fuzzy Logic and Fuzzy Set Theory. • Knowledge exists in two distinct forms : − the Objective knowledge that exists in mathematical form is used in engineering problems; and − the Subjective knowledge that exists in linguistic form, usually impossible to quantify. Fuzzy Logic can coordinate these two forms of knowledge ... <a title="What are Fuzzy Systems ?" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/what-are-fuzzy-systems" aria-label="Read more about What are Fuzzy Systems ?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Introduction of Fuzzy</title>
		<link>https://blog.eduguru.in/artificial-intelligent/introduction-of-fuzzy</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 17:13:14 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence (AI)]]></category>
		<category><![CDATA[Artificial Intelligence and related fields]]></category>
		<category><![CDATA[Artificial intelligence technology]]></category>
		<category><![CDATA[fuzzy set]]></category>
		<category><![CDATA[Introduction of Fuzzy]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13328</guid>

					<description><![CDATA[In real world, there exists much fuzzy knowledge; Knowledge that is vague, imprecise, uncertain, ambiguous, inexact, or probabilistic in nature. Human thinking originating from and reasoning inherently frequently inexact human involve fuzzy concepts. information, Humans, can give satisfactory answers, which are probably true. However, is, our systems most systems are unable to answer many questions. ... <a title="Introduction of Fuzzy" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/introduction-of-fuzzy" aria-label="Read more about Introduction of Fuzzy">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is Fuzzy Set ?</title>
		<link>https://blog.eduguru.in/artificial-intelligent/what-is-fuzzy-set</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 17:03:36 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Artificial intelligence(AI)]]></category>
		<category><![CDATA[fuzzy set]]></category>
		<category><![CDATA[fuzzy set in artificial intelligence]]></category>
		<category><![CDATA[What is Fuzzy Set ?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13326</guid>

					<description><![CDATA[• The word &#8220;fuzzy&#8221; means &#8220;vagueness&#8221;. Fuzziness occurs when the boundary of a piece of information is not clear-cut. • Fuzzy sets have been introduced by Lotfi A. Zadeh (1965) as an extension of the classical notion of set. • Classical set theory allows the membership of the elements in the set in binary terms, ... <a title="What is Fuzzy Set ?" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/what-is-fuzzy-set" aria-label="Read more about What is Fuzzy Set ?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Early work in Artificial Intelligence</title>
		<link>https://blog.eduguru.in/artificial-intelligent/early-work-in-artificial-intelligence</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 16:53:37 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Early work in AI]]></category>
		<category><![CDATA[Early work in Artificial Intelligence]]></category>
		<category><![CDATA[work in artificial intelligence]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13324</guid>

					<description><![CDATA[“Artificial Intelligence (AI) is the part of computer science concerned with designing intelligent computer systems, that is, systems that exhibit characteristics we associate with intelligence in human behaviour – understanding language, learning, reasoning, solving problems, and so on.” Scientific Goal To determine which ideas about knowledge representation, learning, rule systems, search, and so on, explain ... <a title="Early work in Artificial Intelligence" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/early-work-in-artificial-intelligence" aria-label="Read more about Early work in Artificial Intelligence">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Artificial Intelligence and related fields</title>
		<link>https://blog.eduguru.in/artificial-intelligent/artificial-intelligence-and-related-fields</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 12:08:18 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Fields]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Artificial Intelligence and related fields]]></category>
		<category><![CDATA[Artificial related field]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13321</guid>

					<description><![CDATA[Logical AI-  What a program knows about the world in general the facts of the specific situation in which it must act, and its goals are all represented by sentences of some mathematical logical language. The program decides what to do by inferring that certain actions are appropriate for achieving its goals.  Search &#8211; AI programs ... <a title="Artificial Intelligence and related fields" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/artificial-intelligence-and-related-fields" aria-label="Read more about Artificial Intelligence and related fields">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Importance of AI(artificial intelligence)</title>
		<link>https://blog.eduguru.in/artificial-intelligent/importance-of-aiartificial-intelligence</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 10:17:39 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Important]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[importance of AI]]></category>
		<category><![CDATA[Importance of AI(artificial intelligence)]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13319</guid>

					<description><![CDATA[Game Playing- You can buy machines that can play master level chess for a few hundred dollars. There is some AI in them, but they play well against people mainly through brute force computation&#8211;looking at hundreds of thousands of positions. To beat a world champion by brute force and known reliable heuristics requires being able ... <a title="Importance of AI(artificial intelligence)" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/importance-of-aiartificial-intelligence" aria-label="Read more about Importance of AI(artificial intelligence)">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is AI(Artificial Intelligence) ?</title>
		<link>https://blog.eduguru.in/artificial-intelligent/what-is-aiartificial-intelligence</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 10:07:11 +0000</pubDate>
				<category><![CDATA[Artificial Intelligent]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Concepts]]></category>
		<category><![CDATA[AI technology]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Artificial intelligence technology]]></category>
		<category><![CDATA[What is AI(Artificial Intelligence) ?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13317</guid>

					<description><![CDATA[Artificial Intelligence (AI) is a branch of Science which deals with helping machines find solutions to complex problems in a more human-like fashion. This generally involves borrowing characteristics from human intelligence, and applying them as algorithms in a computer friendly way. A more or less flexible or efficient approach can be taken depending on the ... <a title="What is AI(Artificial Intelligence) ?" class="read-more" href="https://blog.eduguru.in/artificial-intelligent/what-is-aiartificial-intelligence" aria-label="Read more about What is AI(Artificial Intelligence) ?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Russian Hackers Named &#8216;Cozy Bear&#8217; Are Targeting COVID-19 Vaccines</title>
		<link>https://blog.eduguru.in/news/russian-hackers-named-cozy-bear-are-targeting-covid-19-vaccines</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 09:52:44 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cozy Bear]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[russian hacker]]></category>
		<category><![CDATA[russian hackers]]></category>
		<category><![CDATA[Russian Hackers Named 'Cozy Bear' Are Targeting COVID-19 Vaccines]]></category>
		<category><![CDATA[target Covid-19]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13315</guid>

					<description><![CDATA[A security organization in the U.K. says a group of Russian hackers is targeting research centers involved in COVID-19 (coronavirus) vaccine development. The adversary group is using spear-phishing to target the research centers, a practice that uses deception to get victims to click on links with hidden malware. These attacks come at a time when U.S.- and U.K.-based ... <a title="Russian Hackers Named &#8216;Cozy Bear&#8217; Are Targeting COVID-19 Vaccines" class="read-more" href="https://blog.eduguru.in/news/russian-hackers-named-cozy-bear-are-targeting-covid-19-vaccines" aria-label="Read more about Russian Hackers Named &#8216;Cozy Bear&#8217; Are Targeting COVID-19 Vaccines">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How Hackers Can Pick Your Locks Just By Listening</title>
		<link>https://blog.eduguru.in/news/how-hackers-can-pick-your-locks-just-by-listening</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 09:47:43 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[black hat hacking]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[hackers can pic your locks]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[How Hackers Can Pick Your Locks Just By Listening]]></category>
		<category><![CDATA[locks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13312</guid>

					<description><![CDATA[When someone is watching over your shoulder, it&#8217;s second nature to cover up your keyboard before typing in a password on your computer, or even unlocking your phone if you still use a pin passcode. But there&#8217;s another place where you should be cautious: the front door. Hackers could be recording the sounds that your keys make ... <a title="How Hackers Can Pick Your Locks Just By Listening" class="read-more" href="https://blog.eduguru.in/news/how-hackers-can-pick-your-locks-just-by-listening" aria-label="Read more about How Hackers Can Pick Your Locks Just By Listening">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How a $1 million plot to hack Tesla failed</title>
		<link>https://blog.eduguru.in/news/how-a-1-million-plot-to-hack-tesla-failed</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 16:50:56 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[hack Tesla]]></category>
		<category><![CDATA[How a $1 million plot to hack Tesla failed]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[Tesla car]]></category>
		<category><![CDATA[Tesla failed]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13310</guid>

					<description><![CDATA[ A Tesla employee was offered a $1 million bribe in early August to install ransomware on the car company’s networks in Nevada, a scheme that could have netted a cybercrime gang many more millions in extortion, according to a newly unsealed US Justice Department indictment (pdf). Egor Igorevich Kriuchkov, a 27-year-old Russian, came to the United States ... <a title="How a $1 million plot to hack Tesla failed" class="read-more" href="https://blog.eduguru.in/news/how-a-1-million-plot-to-hack-tesla-failed" aria-label="Read more about How a $1 million plot to hack Tesla failed">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Google to power all its facilities with carbon-free energy by 2030</title>
		<link>https://blog.eduguru.in/news/google-to-power-all-its-facilities-with-carbon-free-energy-by-2030</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 16:43:24 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[2030]]></category>
		<category><![CDATA[carbon-free energy]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[google power]]></category>
		<category><![CDATA[Google to power all its facilities with carbon-free energy by 2030]]></category>
		<category><![CDATA[low carbon economy]]></category>
		<category><![CDATA[power facilities]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13308</guid>

					<description><![CDATA[Google has announced that it aims to power all its data centres and offices with carbon-free energy by 2030, matching pledges by rival Apple earlier in the year.  In a blog post, CEO Sundar Pichai wrote that the firm has always valued sustainability and said the world “must act now” to avoid the worst consequences of ... <a title="Google to power all its facilities with carbon-free energy by 2030" class="read-more" href="https://blog.eduguru.in/news/google-to-power-all-its-facilities-with-carbon-free-energy-by-2030" aria-label="Read more about Google to power all its facilities with carbon-free energy by 2030">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data-driven Disney monitors your every move</title>
		<link>https://blog.eduguru.in/news/data-driven-disney-monitors-your-every-move</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 16:33:24 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[data-driven]]></category>
		<category><![CDATA[Data-driven Disney monitors your every move]]></category>
		<category><![CDATA[Disney]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13306</guid>

					<description><![CDATA[Clever use of data to enhance the customer experience or invasion of privacy? It’s a fine line at the Magic Kingdom, but smiles usually win the day.  Imagine living in a place where your every move is surveilled. A place created in the image of one almost mythological figure, where every step you take is ... <a title="Data-driven Disney monitors your every move" class="read-more" href="https://blog.eduguru.in/news/data-driven-disney-monitors-your-every-move" aria-label="Read more about Data-driven Disney monitors your every move">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What will happen when the raw materials run out?</title>
		<link>https://blog.eduguru.in/news/what-will-happen-when-the-raw-materials-run-out</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 13:08:26 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Earth’s crust]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[raw materials]]></category>
		<category><![CDATA[run out raw material]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[What will happen when the raw materials run out?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13303</guid>

					<description><![CDATA[The reserves of some rare earth minerals used in electronics, medical equipment and renewable energy could run out in less than 100 years. Rare earth minerals are naturally occurring resources, which cannot be recreated or replaced. Some are present in only very small quantities in the Earth’s crust. They were created when the extreme heat ... <a title="What will happen when the raw materials run out?" class="read-more" href="https://blog.eduguru.in/news/what-will-happen-when-the-raw-materials-run-out" aria-label="Read more about What will happen when the raw materials run out?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Covid-19 antibody test developed to be scalable</title>
		<link>https://blog.eduguru.in/news/covid-19-antibody-test-developed-to-be-scalable</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 12:44:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[antibody test]]></category>
		<category><![CDATA[Corona Virus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Covid-19 antibody test developed to be scalable]]></category>
		<category><![CDATA[covid-19 fights]]></category>
		<category><![CDATA[covid-19 update]]></category>
		<category><![CDATA[covid-19 vaccinwe]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13301</guid>

					<description><![CDATA[Scientists have developed an antibody test for the virus that causes Covid-19 that they say is more accurate and can handle a larger number of donor samples at lower overall cost than standard antibody tests currently in use.  In the short term, the test, developed by researchers at the University of Texas at Austin in collaboration ... <a title="Covid-19 antibody test developed to be scalable" class="read-more" href="https://blog.eduguru.in/news/covid-19-antibody-test-developed-to-be-scalable" aria-label="Read more about Covid-19 antibody test developed to be scalable">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Women of Science Tarot</title>
		<link>https://blog.eduguru.in/news/women-of-science-tarot</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 12 Sep 2020 17:19:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[Science tarot]]></category>
		<category><![CDATA[tarot]]></category>
		<category><![CDATA[womem in technology]]></category>
		<category><![CDATA[Women of Science Tarot]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13298</guid>

					<description><![CDATA[This is a thoughtfully designed, informative, and inspiring tarot deck celebrating the history of science and its forgotten women.  What is your reaction when you hear the phrase “women of science tarot”? If you’re rolling your eyes already, you’re probably not going to be won over. This is just one of those things where your ... <a title="Women of Science Tarot" class="read-more" href="https://blog.eduguru.in/news/women-of-science-tarot" aria-label="Read more about Women of Science Tarot">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Covid-19 lockdown failed to reduce air pollution in Scotland. study finds</title>
		<link>https://blog.eduguru.in/news/covid-19-lockdown-failed-to-reduce-air-pollution-in-scotland-study-finds</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 17:56:35 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[air pollution]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Covid-19 lockdown failed to reduce air pollution in Scotland. study finds]]></category>
		<category><![CDATA[Covid-19 scotland]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[lockdown fails]]></category>
		<category><![CDATA[scotland lockdown fails]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13293</guid>

					<description><![CDATA[The level of toxic fine particles in Scotland’s air failed to go down during the Covid-19 lockdown, despite a significant drop in the number of vehicles on the roads, according to researchers at the University of Stirling.  Analysis of fine particulate air pollution (PM2.5) in the first month of restrictions found little change, despite a ... <a title="Covid-19 lockdown failed to reduce air pollution in Scotland. study finds" class="read-more" href="https://blog.eduguru.in/news/covid-19-lockdown-failed-to-reduce-air-pollution-in-scotland-study-finds" aria-label="Read more about Covid-19 lockdown failed to reduce air pollution in Scotland. study finds">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Samsung and SK Hynix to halt chip sales to Huawei</title>
		<link>https://blog.eduguru.in/news/samsung-and-sk-hynix-to-halt-chip-sales-to-huawei</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 17:50:56 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[halp chip]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Samsung and SK Hynix to halt chip sales to Huawei]]></category>
		<category><![CDATA[SK Hynix]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13291</guid>

					<description><![CDATA[The two South Korean electronics companies have been forced to halt their sale of semiconductors to Shenzhen-based Huawei as the latest US restrictions come into force. Amid the US-China trade war, US President Donald Trump has focused much of his energy on attacking Chinese technology companies such as Huawei, Tencent and ByteDance, primarily through the signing of ... <a title="Samsung and SK Hynix to halt chip sales to Huawei" class="read-more" href="https://blog.eduguru.in/news/samsung-and-sk-hynix-to-halt-chip-sales-to-huawei" aria-label="Read more about Samsung and SK Hynix to halt chip sales to Huawei">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Harmony OS will come to Huawei phones in 2021</title>
		<link>https://blog.eduguru.in/news/harmony-os-will-come-to-huawei-phones-in-2021</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 17:47:28 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Harmony]]></category>
		<category><![CDATA[Harmony OS will come to Huawei phones in 2021]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[OS]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[SMART PHONES]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13289</guid>

					<description><![CDATA[As Huawei’s relationship with the US government has deteriorated, the White House has taken action to cut the company off from American partners like Google, forcing it to launch its Mate 30 range using the open-source version of Android and without Google apps like Gmail, Google Maps and YouTube. This year, the White House restricted Huawei’s access to ... <a title="Harmony OS will come to Huawei phones in 2021" class="read-more" href="https://blog.eduguru.in/news/harmony-os-will-come-to-huawei-phones-in-2021" aria-label="Read more about Harmony OS will come to Huawei phones in 2021">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How would people like coronavirus contact-tracing to be carried out?</title>
		<link>https://blog.eduguru.in/news/how-would-people-like-coronavirus-contact-tracing-to-be-carried-out</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 17:43:44 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Corona Virus]]></category>
		<category><![CDATA[data protaction]]></category>
		<category><![CDATA[How would people like coronavirus contact-tracing to be carried out?]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[tracing]]></category>
		<category><![CDATA[vovid-19]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13287</guid>

					<description><![CDATA[The research, conducted by a team at the University of Exeter, found that people are more concerned about who runs the process than the risks of others having unauthorised access to their private information, or their data being stolen. Most people who took part in the research were in favour of the NHS processing personal data rather than ... <a title="How would people like coronavirus contact-tracing to be carried out?" class="read-more" href="https://blog.eduguru.in/news/how-would-people-like-coronavirus-contact-tracing-to-be-carried-out" aria-label="Read more about How would people like coronavirus contact-tracing to be carried out?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to find anyone anywhere with online facial recognition</title>
		<link>https://blog.eduguru.in/news/how-to-find-anyone-anywhere-with-online-facial-recognition</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 16:44:29 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[face recognition]]></category>
		<category><![CDATA[How to find anyone anywhere with online facial recognition]]></category>
		<category><![CDATA[online face]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13285</guid>

					<description><![CDATA[Facial recognition technology is turning up in ever more applications – from the useful, like unlocking smartphones, and the fun, like Facebook tagging, to the essential, like crime detection, or the life-saving, like prevention of terrorism. Our faces too are photographed, filmed and sometimes clocked almost everywhere we go. We post them ourselves, on social ... <a title="How to find anyone anywhere with online facial recognition" class="read-more" href="https://blog.eduguru.in/news/how-to-find-anyone-anywhere-with-online-facial-recognition" aria-label="Read more about How to find anyone anywhere with online facial recognition">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data structures</title>
		<link>https://blog.eduguru.in/tutorial/data-structure/data-structures</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 16:30:05 +0000</pubDate>
				<category><![CDATA[Data Structure]]></category>
		<category><![CDATA[algo]]></category>
		<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[Data structures]]></category>
		<category><![CDATA[programm]]></category>
		<category><![CDATA[programming]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13283</guid>

					<description><![CDATA[A data structure is a way to store and organize data in order to facilitate access and modifications. No single data structure works well for all purposes, and so it is important to know the strengths and limitations of several of them.]]></description>
		
		
		
			</item>
		<item>
		<title>What kinds of problems are solved by algorithms?</title>
		<link>https://blog.eduguru.in/tutorial/algorithm/what-kinds-of-problems-are-solved-by-algorithms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 19:07:28 +0000</pubDate>
				<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[algo concepts]]></category>
		<category><![CDATA[problem solving]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programming]]></category>
		<category><![CDATA[What kinds of problems are solved by algorithms?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13280</guid>

					<description><![CDATA[ The Human Genome Project has made great progress toward the goals of identifying all the 100,000 genes in human DNA, determining the sequences of the 3 billion chemical base pairs that make up human DNA, storing this information in databases, and developing tools for data analysis. Each of these stepsrequires sophisticated algorithms. Although the ... <a title="What kinds of problems are solved by algorithms?" class="read-more" href="https://blog.eduguru.in/tutorial/algorithm/what-kinds-of-problems-are-solved-by-algorithms" aria-label="Read more about What kinds of problems are solved by algorithms?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Algorithm</title>
		<link>https://blog.eduguru.in/tutorial/algorithm/algorithm-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 18:56:30 +0000</pubDate>
				<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[algo]]></category>
		<category><![CDATA[computer algorithms]]></category>
		<category><![CDATA[programming]]></category>
		<category><![CDATA[programming comcepts]]></category>
		<category><![CDATA[What is algorithm]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13278</guid>

					<description><![CDATA[an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output. We can also view an algorithm as a tool for solving a ... <a title="Algorithm" class="read-more" href="https://blog.eduguru.in/tutorial/algorithm/algorithm-2" aria-label="Read more about Algorithm">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>a program to read the data for the customer, calculate the interest and service charge, and print the customer’s name, average balance, interest, and service charge.</title>
		<link>https://blog.eduguru.in/tutorial/c-tutorial-tutorial/a-program-to-read-the-data-for-the-customer-calculate-the-interest-and-service-charge-and-print-the-customers-name-average-balance-interest-and-service-charge</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 17:12:34 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[a program to read the data for the customer]]></category>
		<category><![CDATA[and print the customer’s name]]></category>
		<category><![CDATA[and service charge.]]></category>
		<category><![CDATA[average balance]]></category>
		<category><![CDATA[c language]]></category>
		<category><![CDATA[c program]]></category>
		<category><![CDATA[c programming]]></category>
		<category><![CDATA[c tutorials]]></category>
		<category><![CDATA[C#]]></category>
		<category><![CDATA[calculate the interest and service charge]]></category>
		<category><![CDATA[interest]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13276</guid>

					<description><![CDATA[//calculate interest and service charge for bank customer #include &#60;stdio.h&#62; int main() { char customer[30], acctNum[30]; double avgBalance, interest, service; int numTrans; printf(&#8220;Name? &#8220;); gets(customer); printf(&#8220;Account number? &#8220;); gets(acctNum); printf(&#8220;Average balance? &#8220;); scanf(&#8220;%lf&#8221;, &#38;avgBalance); printf(&#8220;Number of transactions? &#8220;); scanf(&#8220;%d&#8221;, &#38;numTrans); interest = avgBalance * 0.06; service = numTrans * 0.50; printf(&#8220;\nName: %s\n&#8221;, customer); printf(&#8220;Average balance: ... <a title="a program to read the data for the customer, calculate the interest and service charge, and print the customer’s name, average balance, interest, and service charge." class="read-more" href="https://blog.eduguru.in/tutorial/c-tutorial-tutorial/a-program-to-read-the-data-for-the-customer-calculate-the-interest-and-service-charge-and-print-the-customers-name-average-balance-interest-and-service-charge" aria-label="Read more about a program to read the data for the customer, calculate the interest and service charge, and print the customer’s name, average balance, interest, and service charge.">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>ICF Railway Trade Apprentice Online Form 2020</title>
		<link>https://blog.eduguru.in/info/icf-railway-trade-apprentice-online-form-2020</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 07:13:09 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Jobs]]></category>
		<category><![CDATA[exam form]]></category>
		<category><![CDATA[ICF online]]></category>
		<category><![CDATA[ICF Railway Trade Apprentice Online Form 2020]]></category>
		<category><![CDATA[indian railway]]></category>
		<category><![CDATA[railway online exam]]></category>
		<category><![CDATA[railway trade apprentice]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13274</guid>

					<description><![CDATA[Integrated Coach Factory (ICF) Chennai Apprentice Various Freshers and Ex Iti posts. All the eligible candidates who in filling the Railway Apprentice Recruitment 2020 online form, should apply for the first Railway Recruitment advertisement only after reading it completely. In the advertisement, you will get age information, eligibility details, selection procedure, trade wise commitment details, ... <a title="ICF Railway Trade Apprentice Online Form 2020" class="read-more" href="https://blog.eduguru.in/info/icf-railway-trade-apprentice-online-form-2020" aria-label="Read more about ICF Railway Trade Apprentice Online Form 2020">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>MP High Court Civil Judge PCS J Online Form 2020.</title>
		<link>https://blog.eduguru.in/info/mp-high-court-civil-judge-pcs-j-online-form-2020</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 07:06:08 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Jobs]]></category>
		<category><![CDATA[civil judges]]></category>
		<category><![CDATA[high court exam]]></category>
		<category><![CDATA[MP High Court Civil Judge PCS J Online Form 2020.]]></category>
		<category><![CDATA[MP high Court Judges exam]]></category>
		<category><![CDATA[online exam form]]></category>
		<category><![CDATA[PCS EXAM]]></category>
		<category><![CDATA[PCS J exam]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13272</guid>

					<description><![CDATA[Madhya Pradesh High Court MPHC, Jabalpur Are Invited to Online Application Form for the Recruitment Post of Civil Judge PCS J II Post Latest Vacancies 2020. Those Candidates Are Interested to the Following Vacancy Can Read the Full Notification Before Apply Online. Madhya Pradesh High Court, MPHC Civil Judge Phase II Recruitment 2019 Online Form ... <a title="MP High Court Civil Judge PCS J Online Form 2020." class="read-more" href="https://blog.eduguru.in/info/mp-high-court-civil-judge-pcs-j-online-form-2020" aria-label="Read more about MP High Court Civil Judge PCS J Online Form 2020.">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Punjab National Bank PNB SO Recruitment 2020 Online Form</title>
		<link>https://blog.eduguru.in/info/punjab-national-bank-pnb-so-recruitment-2020-online-form</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 06:58:58 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Jobs]]></category>
		<category><![CDATA[Bank exam]]></category>
		<category><![CDATA[bank exams]]></category>
		<category><![CDATA[exam]]></category>
		<category><![CDATA[online exam form]]></category>
		<category><![CDATA[PNB]]></category>
		<category><![CDATA[PNB bank]]></category>
		<category><![CDATA[Punjab National Bank PNB SO Recruitment 2020 Online Form]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13270</guid>

					<description><![CDATA[Punjab National Bank PNB Are Invited to Online Application Recruitment Form for the Post of Specialist Officer Manager and Senior Manager Latest Vacancies 2020. Those Candidate Are Interested and Eligible Can Read the Full Notification Before Apply Online. Important Dates Application Begin : 08/09/2020 Last Date for Apply Online : 29/09/2020 Last Date Pay Exam ... <a title="Punjab National Bank PNB SO Recruitment 2020 Online Form" class="read-more" href="https://blog.eduguru.in/info/punjab-national-bank-pnb-so-recruitment-2020-online-form" aria-label="Read more about Punjab National Bank PNB SO Recruitment 2020 Online Form">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UPPCL Assistant Review Officer ARO Online Form 2020</title>
		<link>https://blog.eduguru.in/info/uppcl-assistant-review-officer-aro-online-form-2020</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 04:41:50 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Jobs]]></category>
		<category><![CDATA[ARO]]></category>
		<category><![CDATA[Assistant Officer]]></category>
		<category><![CDATA[exam form]]></category>
		<category><![CDATA[online exam]]></category>
		<category><![CDATA[online exam form]]></category>
		<category><![CDATA[UPPCL]]></category>
		<category><![CDATA[UPPCL Assistant Review Officer ARO Online Form 2020]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13268</guid>

					<description><![CDATA[Uttar Pradesh Power Corporation Limited UPPCL Are Invited to Online Application Form for the Recruitment Post of Assistant Review Officer ARO Recruitment 2020. Those Candidates Are Interested to the Following UPPCL Latest Vacancies Can Read the Full Notification Before Apply Online. Uttar Pradesh Power Corporation Limited UPPCL Assistant Review Officer (Samiksha Adhikari) Recruitment 2020 Important ... <a title="UPPCL Assistant Review Officer ARO Online Form 2020" class="read-more" href="https://blog.eduguru.in/info/uppcl-assistant-review-officer-aro-online-form-2020" aria-label="Read more about UPPCL Assistant Review Officer ARO Online Form 2020">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Bihar Police Sergeant and BPSSC Sub Inspector SI Online Form 2020</title>
		<link>https://blog.eduguru.in/info/bihar-police-sergeant-and-bpssc-sub-inspector-si-online-form-2020</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 04:04:51 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Jobs]]></category>
		<category><![CDATA[Bihar polic]]></category>
		<category><![CDATA[Bihar Police Sergeant and BPSSC Sub Inspector SI Online Form 2020]]></category>
		<category><![CDATA[BPSSC]]></category>
		<category><![CDATA[online exam from]]></category>
		<category><![CDATA[police exam]]></category>
		<category><![CDATA[SI Online exam form]]></category>
		<category><![CDATA[Sub Instpector]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13263</guid>

					<description><![CDATA[Bihar Police Subordinate Service Commission has released new recruitment and in this recruitment, 2213 posts of Inspector and Attendant in which recruitment is done. Whichever qualified candidates want to apply in this recruitment of Bihar state and other states, in which recruitment on the post of Sub Inspector and Attendant. They can fill the online ... <a title="Bihar Police Sergeant and BPSSC Sub Inspector SI Online Form 2020" class="read-more" href="https://blog.eduguru.in/info/bihar-police-sergeant-and-bpssc-sub-inspector-si-online-form-2020" aria-label="Read more about Bihar Police Sergeant and BPSSC Sub Inspector SI Online Form 2020">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple sends invites for special event on September 15.. but it might not be the iPhone 12</title>
		<link>https://blog.eduguru.in/news/apple-sends-invites-for-special-event-on-september-15-but-it-might-not-be-the-iphone-12</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 09 Sep 2020 11:33:38 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple sends invites for special event on September 15.. but it might not be the iPhone 12]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[Iphone12]]></category>
		<category><![CDATA[new iphone]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[special events]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13259</guid>

					<description><![CDATA[Apple has confirmed that its next special event will take place on Tuesday, September 15. The event will take place at the Steve Jobs Theatre at Apple’s headquarters in Cupertino, California, kicking off at 10 am local time (10:30 pm IST). This would be the first fall event that will be held virtually. The tech ... <a title="Apple sends invites for special event on September 15.. but it might not be the iPhone 12" class="read-more" href="https://blog.eduguru.in/news/apple-sends-invites-for-special-event-on-september-15-but-it-might-not-be-the-iphone-12" aria-label="Read more about Apple sends invites for special event on September 15.. but it might not be the iPhone 12">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Autopia &#8211; The Future of Cars’ by Jon Bentley</title>
		<link>https://blog.eduguru.in/news/autopia-the-future-of-cars-by-jon-bentley</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 09 Sep 2020 11:25:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[automobile engineering]]></category>
		<category><![CDATA[Autopia - The Future of Cars’ by Jon Bentley]]></category>
		<category><![CDATA[cars]]></category>
		<category><![CDATA[future car]]></category>
		<category><![CDATA[future car technology]]></category>
		<category><![CDATA[future technology]]></category>
		<category><![CDATA[new cars technology]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13257</guid>

					<description><![CDATA[A former ‘Top Gear’ producer takes us on a road trip, delving into how the cars that already dominate our roads will change in the decades to come.  Cars are arguably one of the most significant inventions created by humankind. Without them, getting from A to B would have been – and still would be ... <a title="Autopia &#8211; The Future of Cars’ by Jon Bentley" class="read-more" href="https://blog.eduguru.in/news/autopia-the-future-of-cars-by-jon-bentley" aria-label="Read more about Autopia &#8211; The Future of Cars’ by Jon Bentley">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Silver lining for app developers</title>
		<link>https://blog.eduguru.in/news/silver-lining-for-app-developers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 10:55:21 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[app developpers]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Silver lining for app developers]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13254</guid>

					<description><![CDATA[The pandemic has compelled the business process management (BPM) industry to rethink. The outcome will be nothing short of a journey of disruption as robotic process automation unfolds over the coming decade.  The Covid environment has thrown open challenges and uncharted avenues for the technology industry. Business process management is no exception. Business houses have ... <a title="Silver lining for app developers" class="read-more" href="https://blog.eduguru.in/news/silver-lining-for-app-developers" aria-label="Read more about Silver lining for app developers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Google to invest $10bn in India</title>
		<link>https://blog.eduguru.in/news/google-to-invest-10bn-in-india</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 10:34:34 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[Google to invest $10bn in India]]></category>
		<category><![CDATA[googles news]]></category>
		<category><![CDATA[invest in india]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13251</guid>

					<description><![CDATA[Google CEO Sundar Pichai has announced during the annual ‘Google for India’ event that the company will invest approximately $10bn (£8bn) in India over the next five to seven years.  The announcement was preceded by a meeting between Pichai and Indian Prime Minister Narendra Modi to discuss “leveraging the power of technology to transform the ... <a title="Google to invest $10bn in India" class="read-more" href="https://blog.eduguru.in/news/google-to-invest-10bn-in-india" aria-label="Read more about Google to invest $10bn in India">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Sunshine moments for e-commerce industry</title>
		<link>https://blog.eduguru.in/news/sunshine-moments-for-e-commerce-industry</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 10:26:27 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[e-commerce industry]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[Sunshine moments]]></category>
		<category><![CDATA[Sunshine moments for e-commerce industry]]></category>
		<category><![CDATA[technology news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13249</guid>

					<description><![CDATA[Global giants like Google and Walmart are investing in the Indian tech landscape.  Alphabet Inc’s Google has strategically positioned itself in India through a phased-out investment. As per media announcements, the company intends to invest $10bn in India over the next five to seven years. The latest development is that the company will probably spend ... <a title="Sunshine moments for e-commerce industry" class="read-more" href="https://blog.eduguru.in/news/sunshine-moments-for-e-commerce-industry" aria-label="Read more about Sunshine moments for e-commerce industry">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Google misled users over data privacy issues. says Australian watchdog</title>
		<link>https://blog.eduguru.in/news/google-misled-users-over-data-privacy-issues-says-australian-watchdog</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 10:13:08 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Google misled users over data privacy]]></category>
		<category><![CDATA[Google misled users over data privacy issues. says Australian watchdog]]></category>
		<category><![CDATA[google news]]></category>
		<category><![CDATA[privacy issues]]></category>
		<category><![CDATA[Security Issues]]></category>
		<category><![CDATA[technical news]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13247</guid>

					<description><![CDATA[Australia’s competition regulator has accused Google of misleading consumers to get permission for use of their personal data for targeted advertising.  The move, which is seeking a fine “in the millions” and aims to establish a precedent, comes as scrutiny grows worldwide over data privacy, with US and European lawmakers currently investigating how tech companies treat user ... <a title="Google misled users over data privacy issues. says Australian watchdog" class="read-more" href="https://blog.eduguru.in/news/google-misled-users-over-data-privacy-issues-says-australian-watchdog" aria-label="Read more about Google misled users over data privacy issues. says Australian watchdog">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Waterproof sensor can detect dirty swimming pools</title>
		<link>https://blog.eduguru.in/news/waterproof-sensor-can-detect-dirty-swimming-pools</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 10:02:29 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[dirt detactor sensor]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[swimming pools sensor]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[water sensor]]></category>
		<category><![CDATA[Waterproof sensor]]></category>
		<category><![CDATA[Waterproof sensor can detect dirty swimming pools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13243</guid>

					<description><![CDATA[ Australian researchers have developed a new microchip capable of continuously monitoring pH and chlorine levels that they say should make swimming pools safer.  The device is the work of a team at the University of South Australia, who say their new ‘lab-on-a-chip’ technology makes monitoring swimming pools more affordable, more reliable, and is easy to ... <a title="Waterproof sensor can detect dirty swimming pools" class="read-more" href="https://blog.eduguru.in/news/waterproof-sensor-can-detect-dirty-swimming-pools" aria-label="Read more about Waterproof sensor can detect dirty swimming pools">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple facing revived Chinese patent lawsuit over Siri</title>
		<link>https://blog.eduguru.in/news/apple-facing-revived-chinese-patent-lawsuit-over-siri</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 09:52:36 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple facing]]></category>
		<category><![CDATA[Apple facing revived Chinese patent lawsuit over Siri]]></category>
		<category><![CDATA[Chinese patent]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13241</guid>

					<description><![CDATA[An AI company, Shanghai Zhizhen Network Technology, has filed a lawsuit against Apple in a Shanghai court, accusing Apple of infringing on its patent for a virtual assistant. This could potentially force Apple to temporarily halt the sale of products featuring Siri.  Shanghai Zhizhen is demanding ¥10bn (£1.1bn) in damages over Apple’s alleged use of ... <a title="Apple facing revived Chinese patent lawsuit over Siri" class="read-more" href="https://blog.eduguru.in/news/apple-facing-revived-chinese-patent-lawsuit-over-siri" aria-label="Read more about Apple facing revived Chinese patent lawsuit over Siri">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Xbox gamers will be able to stream games from the cloud in September</title>
		<link>https://blog.eduguru.in/news/xbox-gamers-will-be-able-to-stream-games-from-the-cloud-in-september</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 09:48:13 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Games]]></category>
		<category><![CDATA[games stream]]></category>
		<category><![CDATA[new game]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[xbox]]></category>
		<category><![CDATA[Xbox gamers will be able to stream games from the cloud in September]]></category>
		<category><![CDATA[Xbox games]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13239</guid>

					<description><![CDATA[Microsoft has said its game streaming service xCloud will arrive for Xbox users on 15 September. The xCloud service will be available to anyone who has purchased Xbox Game Pass Ultimate and will allow them to stream console quality games on their Android phone or tablet. Over 100 games will be playable directly from the ... <a title="Xbox gamers will be able to stream games from the cloud in September" class="read-more" href="https://blog.eduguru.in/news/xbox-gamers-will-be-able-to-stream-games-from-the-cloud-in-september" aria-label="Read more about Xbox gamers will be able to stream games from the cloud in September">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft pledges to eliminate all internal waste by 2030</title>
		<link>https://blog.eduguru.in/news/microsoft-pledges-to-eliminate-all-internal-waste-by-2030</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 09:23:43 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Microsoft news]]></category>
		<category><![CDATA[Microsoft pledges to eliminate all internal waste by 2030]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[technology news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13237</guid>

					<description><![CDATA[Microsoft has pledged to bring its direct waste footprint to zero within a decade, as part of a new resources strategy which will boost the recyclability of its devices and see plastic packaging phased out entirely.  The company said its goal of achieving zero waste by 2030 covers its direct operations, products and packaging. It added ... <a title="Microsoft pledges to eliminate all internal waste by 2030" class="read-more" href="https://blog.eduguru.in/news/microsoft-pledges-to-eliminate-all-internal-waste-by-2030" aria-label="Read more about Microsoft pledges to eliminate all internal waste by 2030">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Samsung wins bespoke chip orders from Google and Cisco</title>
		<link>https://blog.eduguru.in/news/samsung-wins-bespoke-chip-orders-from-google-and-cisco</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 09:19:32 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[bespoke chip]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Samsung wins]]></category>
		<category><![CDATA[Samsung wins bespoke chip orders from Google and Cisco]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13235</guid>

					<description><![CDATA[Samsung has reportedly landed orders from Google to make at least two types of bespoke chips, including a new body motion tracker. Google has ordered multiple chips from Samsung, although they may not be for existing device categories. The industry sources said that one of the devices would be a body motion sensor while another ... <a title="Samsung wins bespoke chip orders from Google and Cisco" class="read-more" href="https://blog.eduguru.in/news/samsung-wins-bespoke-chip-orders-from-google-and-cisco" aria-label="Read more about Samsung wins bespoke chip orders from Google and Cisco">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>FourFit Mini 2 children’s fitness tracker</title>
		<link>https://blog.eduguru.in/news/fourfit-mini-2-childrens-fitness-tracker</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 09:15:10 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[fitness tracker]]></category>
		<category><![CDATA[FourFit Mini]]></category>
		<category><![CDATA[FourFit Mini 2 children’s fitness tracker]]></category>
		<category><![CDATA[gadgets]]></category>
		<category><![CDATA[new gadgets]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[tracker]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13233</guid>

					<description><![CDATA[A cheap and cheerful device that wins on price but lacks some of the kid-friendly features that appeal to young users.  The Mini 2 fitness-tracking watch from FourFit is marketed at children aged 10+ and its strap does go down small enough for younger ones. But it’s also large enough for an adult to wear ... <a title="FourFit Mini 2 children’s fitness tracker" class="read-more" href="https://blog.eduguru.in/news/fourfit-mini-2-childrens-fitness-tracker" aria-label="Read more about FourFit Mini 2 children’s fitness tracker">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook accused of non-consensually mapping faces</title>
		<link>https://blog.eduguru.in/news/facebook-accused-of-non-consensually-mapping-faces</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 09:07:48 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[Facebook accused of non-consensually mapping faces]]></category>
		<category><![CDATA[facebook news]]></category>
		<category><![CDATA[instagram]]></category>
		<category><![CDATA[instagram news]]></category>
		<category><![CDATA[mapping faces]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13231</guid>

					<description><![CDATA[According to Bloomberg, a lawsuit has been filed in California accusing Facebook of “collecting, storing, and profiting” from the biometric data of more than 100 million users of its subsidiary Instagram. Facebook rejects the accusation. The complaint was filed this week in state court in Redwood City, in California’s Bay Area. The complaint claims that ... <a title="Facebook accused of non-consensually mapping faces" class="read-more" href="https://blog.eduguru.in/news/facebook-accused-of-non-consensually-mapping-faces" aria-label="Read more about Facebook accused of non-consensually mapping faces">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Driverless cars could be legal on British roads by early 2021</title>
		<link>https://blog.eduguru.in/news/driverless-cars-could-be-legal-on-british-roads-by-early-2021</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 08:49:44 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[automatic car concept]]></category>
		<category><![CDATA[British roads]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[Driverless car]]></category>
		<category><![CDATA[Driverless car concept]]></category>
		<category><![CDATA[Driverless cars could be legal on British roads by early 2021]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13229</guid>

					<description><![CDATA[The Government has launched a consultation that could pave the way to driverless cars being introduced on British roads as early as next year. The Department for Transport (DfT) has issued a call for evidence for the ‘Automated Lane Keeping System’ (ALKS) – an automated system that can take over control of a vehicle at ... <a title="Driverless cars could be legal on British roads by early 2021" class="read-more" href="https://blog.eduguru.in/news/driverless-cars-could-be-legal-on-british-roads-by-early-2021" aria-label="Read more about Driverless cars could be legal on British roads by early 2021">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Monetise data to enhance AI adoption</title>
		<link>https://blog.eduguru.in/news/monetise-data-to-enhance-ai-adoption</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 08:44:12 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence (AI)]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[Monetise data to enhance AI adoption]]></category>
		<category><![CDATA[view india]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13227</guid>

					<description><![CDATA[The mainstream acceptance of artificial intelligence (AI) could help unlock societal benefits in India. Seen from the Indian perspective, AI needs to be inclusive in nature. This is essential as India has a population of 1.3 billion and needs to use AI for mass scale services. For instance, tons of data comes out of agriculture ... <a title="Monetise data to enhance AI adoption" class="read-more" href="https://blog.eduguru.in/news/monetise-data-to-enhance-ai-adoption" aria-label="Read more about Monetise data to enhance AI adoption">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook Messenger Will Limit Forwarding Messages to Only Five People or Groups</title>
		<link>https://blog.eduguru.in/news/facebook-messenger-will-limit-forwarding-messages-to-only-five-people-or-groups</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 12:17:11 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[eeenger limits]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[facebook messenger]]></category>
		<category><![CDATA[Facebook Messenger Will Limit Forwarding Messages to Only Five People or Groups]]></category>
		<category><![CDATA[facebook news]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[technology news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13225</guid>

					<description><![CDATA[Facebook Messenger has added a forwarding limit to let users forward messages only to five people or groups at a time. The new development is aimed to reduce the spread of viral misinformation and curb the circulation of fake news through the messaging platform. In 2018, Facebook brought a similar forwarding limit to WhatsApp in ... <a title="Facebook Messenger Will Limit Forwarding Messages to Only Five People or Groups" class="read-more" href="https://blog.eduguru.in/news/facebook-messenger-will-limit-forwarding-messages-to-only-five-people-or-groups" aria-label="Read more about Facebook Messenger Will Limit Forwarding Messages to Only Five People or Groups">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>PUBG Mobile Maker Tencent Says Will Engage With Indian Authorities to Ensure Continued Availability of Apps</title>
		<link>https://blog.eduguru.in/news/pubg-mobile-maker-tencent-says-will-engage-with-indian-authorities-to-ensure-continued-availability-of-apps</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 11:52:08 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[`app`]]></category>
		<category><![CDATA[game]]></category>
		<category><![CDATA[india banned pubg]]></category>
		<category><![CDATA[mobile game]]></category>
		<category><![CDATA[mobile games]]></category>
		<category><![CDATA[pubg]]></category>
		<category><![CDATA[pubg banned in india]]></category>
		<category><![CDATA[PUBG Games]]></category>
		<category><![CDATA[PUBG Mobile Maker Tencent Says Will Engage With Indian Authorities to Ensure Continued Availability of Apps]]></category>
		<category><![CDATA[tencent game maker]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13223</guid>

					<description><![CDATA[Chinese gaming and social media group Tencent said on Thursday it takes the protection of user privacy and data seriously, in response to India&#8217;s banning of Chinese apps. The company said it would engage with Indian authorities to ensure the continued availability of its apps in India. India has banned another 118 mostly Chinese mobile ... <a title="PUBG Mobile Maker Tencent Says Will Engage With Indian Authorities to Ensure Continued Availability of Apps" class="read-more" href="https://blog.eduguru.in/news/pubg-mobile-maker-tencent-says-will-engage-with-indian-authorities-to-ensure-continued-availability-of-apps" aria-label="Read more about PUBG Mobile Maker Tencent Says Will Engage With Indian Authorities to Ensure Continued Availability of Apps">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facebook Adds Dropbox. Koofr Support to Photo Porting Tool</title>
		<link>https://blog.eduguru.in/news/facebook-adds-dropbox-koofr-support-to-photo-porting-tool</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 11:46:55 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[facebook adds]]></category>
		<category><![CDATA[Facebook Adds Dropbox. Koofr Support to Photo Porting Tool]]></category>
		<category><![CDATA[photo porting tool]]></category>
		<category><![CDATA[porting tools]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13221</guid>

					<description><![CDATA[Facebook will now let users export photos and videos from their accounts to Dropbox and EU startup Koofr. In June, the company had enabled people to download their photos and videos from Facebook using Google Photos, and it was now extending the data portability feature tool to two more services. The tool will make downloading ... <a title="Facebook Adds Dropbox. Koofr Support to Photo Porting Tool" class="read-more" href="https://blog.eduguru.in/news/facebook-adds-dropbox-koofr-support-to-photo-porting-tool" aria-label="Read more about Facebook Adds Dropbox. Koofr Support to Photo Porting Tool">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>WhatsApp Reports 6 Previously Undisclosed Vulnerabilities on New Security Site</title>
		<link>https://blog.eduguru.in/news/whatsapp-reports-6-previously-undisclosed-vulnerabilities-on-new-security-site</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 10:48:03 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[technology news]]></category>
		<category><![CDATA[technology updates]]></category>
		<category><![CDATA[Vunerabilities]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<category><![CDATA[Whatsapp news]]></category>
		<category><![CDATA[WhatsApp Reports 6 Previously Undisclosed Vulnerabilities on New Security Site]]></category>
		<category><![CDATA[Whatsapp Vulnerabilities]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13219</guid>

					<description><![CDATA[WhatsApp has revealed six new vulnerabilities that were previously undisclosed and have now been fixed. The Facebook-owned company reported the vulnerabilities on its newly created security advisory webpage that will serve as a single destination to highlight all the security issues spotted and fixed on WhatsApp and reveal associated Common Vulnerabilities and Exposures (CVE). The ... <a title="WhatsApp Reports 6 Previously Undisclosed Vulnerabilities on New Security Site" class="read-more" href="https://blog.eduguru.in/news/whatsapp-reports-6-previously-undisclosed-vulnerabilities-on-new-security-site" aria-label="Read more about WhatsApp Reports 6 Previously Undisclosed Vulnerabilities on New Security Site">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>WhatsApp to Bring New Tones for Call Terminate and Group Calls. Expiring Messages Still in The Works</title>
		<link>https://blog.eduguru.in/news/whatsapp-to-bring-new-tones-for-call-terminate-and-group-calls-expiring-messages-still-in-the-works</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 10:42:51 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[call terminate tones]]></category>
		<category><![CDATA[new tone]]></category>
		<category><![CDATA[whatsapp messages]]></category>
		<category><![CDATA[WhatsApp to Bring New Tones for Call Terminate and Group Calls. Expiring Messages Still in The Works]]></category>
		<category><![CDATA[whatsapp tones]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13216</guid>

					<description><![CDATA[WhatsApp&#8217;s latest iPhone beta release suggests that it is working on several improvements for iOS users. The social messaging giant is reportedly working on improving WhatsApp Payments for specific countries, and is also still working to improve Expiring Messages before the release. WhatsApp is also said to be looking to update its security notice once ... <a title="WhatsApp to Bring New Tones for Call Terminate and Group Calls. Expiring Messages Still in The Works" class="read-more" href="https://blog.eduguru.in/news/whatsapp-to-bring-new-tones-for-call-terminate-and-group-calls-expiring-messages-still-in-the-works" aria-label="Read more about WhatsApp to Bring New Tones for Call Terminate and Group Calls. Expiring Messages Still in The Works">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>MediaTek Dimensity 1000C Octa-Core SoC With 5G Support Announced. Will Power the T-Mobile LG Velvet</title>
		<link>https://blog.eduguru.in/news/mediatek-dimensity-1000c-octa-core-soc-with-5g-support-announced-will-power-the-t-mobile-lg-velvet</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 10:36:58 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[5G support technology]]></category>
		<category><![CDATA[media tek news]]></category>
		<category><![CDATA[MediaTek Dimensity 1000C Octa-Core SoC With 5G Support Announced. Will Power the T-Mobile LG Velvet]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[octa-core]]></category>
		<category><![CDATA[technology news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13214</guid>

					<description><![CDATA[MediaTek Dimensity 1000C mobile SoC has been unveiled as the newest entrant in the company&#8217;s 5G chipset portfolio. The company says it delivers advanced AI capabilities, enhanced display features, and premium 5G experiences. Additionally, MediaTek has also announced that the LG Velvet &#8211; the “first MediaTek powered 5G smartphone in the United States” &#8211; will ... <a title="MediaTek Dimensity 1000C Octa-Core SoC With 5G Support Announced. Will Power the T-Mobile LG Velvet" class="read-more" href="https://blog.eduguru.in/news/mediatek-dimensity-1000c-octa-core-soc-with-5g-support-announced-will-power-the-t-mobile-lg-velvet" aria-label="Read more about MediaTek Dimensity 1000C Octa-Core SoC With 5G Support Announced. Will Power the T-Mobile LG Velvet">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Instagram Adds Dedicated Tab for Reels in India. Shifts Explore Button</title>
		<link>https://blog.eduguru.in/news/instagram-adds-dedicated-tab-for-reels-in-india-shifts-explore-button</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 10:33:15 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[adds]]></category>
		<category><![CDATA[india banned tiktok]]></category>
		<category><![CDATA[instagram]]></category>
		<category><![CDATA[instagram adds]]></category>
		<category><![CDATA[Instagram Adds Dedicated Tab for Reels in India Shifts Explore Button]]></category>
		<category><![CDATA[instagram news]]></category>
		<category><![CDATA[new tab]]></category>
		<category><![CDATA[tiktok banned]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13212</guid>

					<description><![CDATA[Instagram has launched a dedicated Reels tab for users in India that will replace the Explore tab after testing it in August. The latest change will make it easier for people to discover new Reels creators and their videos in the app. India is the first market to get the dedicated tab, and according to ... <a title="Instagram Adds Dedicated Tab for Reels in India. Shifts Explore Button" class="read-more" href="https://blog.eduguru.in/news/instagram-adds-dedicated-tab-for-reels-in-india-shifts-explore-button" aria-label="Read more about Instagram Adds Dedicated Tab for Reels in India. Shifts Explore Button">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>FAU-G an Indian Alternative to PUBG</title>
		<link>https://blog.eduguru.in/news/fau-g-an-indian-alternative-to-pubg</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 08:34:14 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[FAU-G]]></category>
		<category><![CDATA[FAU-G an Indian Alternative to PUBG]]></category>
		<category><![CDATA[FAU-G an indian game]]></category>
		<category><![CDATA[FAU-G Game]]></category>
		<category><![CDATA[game]]></category>
		<category><![CDATA[indian game]]></category>
		<category><![CDATA[indian government ban pubg game in india]]></category>
		<category><![CDATA[inidan army virtual view of battel ground]]></category>
		<category><![CDATA[pubg ban in india]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13210</guid>

					<description><![CDATA[AU-G is a made-in-India PUBG Mobile alternative that is being published by Bengaluru-based nCore games, and Indian game industry veteran Vishal Gondal and actor Akshay Kumar have also taken to Twitter to promote FAU-G. FAU-G is short for Fearless and United-Guards, and tweets promoting the game say it will donate 20 percent of its revenue ... <a title="FAU-G an Indian Alternative to PUBG" class="read-more" href="https://blog.eduguru.in/news/fau-g-an-indian-alternative-to-pubg" aria-label="Read more about FAU-G an Indian Alternative to PUBG">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>PUBG Mobile Removed From App Store. Google Play in India,</title>
		<link>https://blog.eduguru.in/news/pubg-mobile-removed-from-app-store-google-play-in-india</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 08:28:15 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[app store]]></category>
		<category><![CDATA[game]]></category>
		<category><![CDATA[game ban in india]]></category>
		<category><![CDATA[google paly store]]></category>
		<category><![CDATA[mobile game]]></category>
		<category><![CDATA[play store]]></category>
		<category><![CDATA[pubg]]></category>
		<category><![CDATA[pubg ban in india]]></category>
		<category><![CDATA[PUBG Mobile Removed From App Store. Google Play in India]]></category>
		<category><![CDATA[technical news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13208</guid>

					<description><![CDATA[PUBG is no longer available on Google Play and App Store, days after it was banned alongside 117 Chinese-origin apps. At the time of writing, the game — be it PUBG Mobile or PUBG Mobile Lite — continue to work for those who already have it downloaded. Gadgets 360 has reached out to Tencent for ... <a title="PUBG Mobile Removed From App Store. Google Play in India," class="read-more" href="https://blog.eduguru.in/news/pubg-mobile-removed-from-app-store-google-play-in-india" aria-label="Read more about PUBG Mobile Removed From App Store. Google Play in India,">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Escape Sequences</title>
		<link>https://blog.eduguru.in/tutorial/c-tutorial-tutorial/escape-sequences</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 05 Sep 2020 18:07:09 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[c language]]></category>
		<category><![CDATA[Escape Sequences]]></category>
		<category><![CDATA[program]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13206</guid>

					<description><![CDATA[Within the string argument to printf, the backslash (\) signals that a special effect is needed at this point. The character following the backslash specifies what to do. This combination (\ followed by another character) is referred to as an escape sequence. The following are some escape sequences you can use in a string in ... <a title="Escape Sequences" class="read-more" href="https://blog.eduguru.in/tutorial/c-tutorial-tutorial/escape-sequences" aria-label="Read more about Escape Sequences">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Internet Society Foundation Announces New Research Grants Exploring Future of the Internet</title>
		<link>https://blog.eduguru.in/news/the-internet-society-foundation-announces-new-research-grants-exploring-future-of-the-internet</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 05 Sep 2020 06:45:59 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[announces]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[internet research]]></category>
		<category><![CDATA[internet society]]></category>
		<category><![CDATA[internet society foundation]]></category>
		<category><![CDATA[new Research]]></category>
		<category><![CDATA[The Internet Society Foundation Announces New Research Grants Exploring Future of the Internet]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13204</guid>

					<description><![CDATA[The Internet Society Foundation today announced a new grant programme supporting research on the future and sustainability of the Internet. Open to independent researchers and research institutions around the world, grants of up to US$200,000 will be awarded for research lasting up to two years and focused on: Greening the Internet and/or The Internet Economy. Future thematic ... <a title="The Internet Society Foundation Announces New Research Grants Exploring Future of the Internet" class="read-more" href="https://blog.eduguru.in/news/the-internet-society-foundation-announces-new-research-grants-exploring-future-of-the-internet" aria-label="Read more about The Internet Society Foundation Announces New Research Grants Exploring Future of the Internet">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Facial recognition for remote ID verification wins Africa Prize</title>
		<link>https://blog.eduguru.in/news/facial-recognition-for-remote-id-verification-wins-africa-prize</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 04 Sep 2020 16:53:31 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[Facial recognition for remote ID verification wins Africa Prize]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[prize win]]></category>
		<category><![CDATA[remote id]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13202</guid>

					<description><![CDATA[Charlette N’Guessan is the first woman to win the prestigious prize since it was established in 2014, and the first winner from Ghana. The prize was awarded for BACE API, which uses facial recognition to verify identities remotely. N’Guessan and her team decided to go ahead with the project in 2018, after they discovered that ... <a title="Facial recognition for remote ID verification wins Africa Prize" class="read-more" href="https://blog.eduguru.in/news/facial-recognition-for-remote-id-verification-wins-africa-prize" aria-label="Read more about Facial recognition for remote ID verification wins Africa Prize">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Better hearing through artificial intelligence</title>
		<link>https://blog.eduguru.in/news/better-hearing-through-artificial-intelligence</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 04 Sep 2020 16:49:15 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Better hearing through artificial intelligence]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13200</guid>

					<description><![CDATA[Hearing loss happens to many of us. The US National Institutes of Health, for example, estimates that one in eight Americans aged 12 years and older has hearing loss in both ears. Twenty-five per cent of adults aged between 65 and 75, and half of those aged 75 and older, experience disabling hearing loss. According ... <a title="Better hearing through artificial intelligence" class="read-more" href="https://blog.eduguru.in/news/better-hearing-through-artificial-intelligence" aria-label="Read more about Better hearing through artificial intelligence">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>‘Catastrophic’ consequences if Facebook collapses</title>
		<link>https://blog.eduguru.in/news/catastrophic-consequences-if-facebook-collapses</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 13:24:42 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[‘Catastrophic’ consequences if Facebook collapses]]></category>
		<category><![CDATA[catastrophic]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[facebook collapes]]></category>
		<category><![CDATA[facebook collapses]]></category>
		<category><![CDATA[technical news]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13198</guid>

					<description><![CDATA[A University of Oxford paper which explores the hypothetical collapse of Facebook has recommended a new regulatory framework for ‘systemically important technological institutions’, which draws on existing regulation for global financial institutions and public utilities. Facebook going the way of MySpace is unlikely, with the company sailing mostly unharmed through its largest-ever advertiser boycott, increasing ... <a title="‘Catastrophic’ consequences if Facebook collapses" class="read-more" href="https://blog.eduguru.in/news/catastrophic-consequences-if-facebook-collapses" aria-label="Read more about ‘Catastrophic’ consequences if Facebook collapses">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Engineers who designed Covid-19 technologies receive awards</title>
		<link>https://blog.eduguru.in/news/engineers-who-designed-covid-19-technologies-receive-awards</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 13:15:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[covid-19 news]]></category>
		<category><![CDATA[Covid-19 technology]]></category>
		<category><![CDATA[Engineers]]></category>
		<category><![CDATA[Engineers who designed Covid-19 technologies receive awards]]></category>
		<category><![CDATA[latest news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13196</guid>

					<description><![CDATA[Engineers who have designed Covid-19 applicable technologies including a high-performance ventilator, a personal respirator for healthcare workers and an environmentally friendly face shield have received awards from the Royal Academy of Engineering. The Academy recently launched a special set of awards for those who have created inventions designed to help with the pandemic. 19 individuals ... <a title="Engineers who designed Covid-19 technologies receive awards" class="read-more" href="https://blog.eduguru.in/news/engineers-who-designed-covid-19-technologies-receive-awards" aria-label="Read more about Engineers who designed Covid-19 technologies receive awards">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Oracle joins race to acquire TikTok</title>
		<link>https://blog.eduguru.in/news/oracle-joins-race-to-acquire-tiktok</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 13:04:59 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[new news]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[Oracle joins race to acquire TikTok]]></category>
		<category><![CDATA[technical news]]></category>
		<category><![CDATA[TicTok]]></category>
		<category><![CDATA[TikTok news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13194</guid>

					<description><![CDATA[According to the Financial Times, software giant Oracle has held preliminary discussions with ByteDance to discuss the potential acquisition of its subsidiary TikTok. Microsoft and Twitter are also involved in discussions. As trade tensions between the US and China escalate, US President Donald Trump is focusing his attacks on Chinese tech companies with a global ... <a title="Oracle joins race to acquire TikTok" class="read-more" href="https://blog.eduguru.in/news/oracle-joins-race-to-acquire-tiktok" aria-label="Read more about Oracle joins race to acquire TikTok">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Algorithm improves fairness of online search rankings</title>
		<link>https://blog.eduguru.in/news/algorithm-improves-fairness-of-online-search-rankings</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 12:59:48 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[Algorithm improves fairness of online search rankings]]></category>
		<category><![CDATA[google search ranking]]></category>
		<category><![CDATA[online search ranking]]></category>
		<category><![CDATA[rankings]]></category>
		<category><![CDATA[search ranking]]></category>
		<category><![CDATA[technical news]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13192</guid>

					<description><![CDATA[Cornell University computer scientists have developed a tool which can improve the fairness of online search rankings, without sacrificing relevance or usefulness. For much of the world, Google Search is the entrance to the rest of the internet (other search engines are available). With most users clicking the results towards the top of the first page of returned ... <a title="Algorithm improves fairness of online search rankings" class="read-more" href="https://blog.eduguru.in/news/algorithm-improves-fairness-of-online-search-rankings" aria-label="Read more about Algorithm improves fairness of online search rankings">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Urbanista ‘London’ ANC wireless earbuds</title>
		<link>https://blog.eduguru.in/news/urbanista-london-anc-wireless-earbuds</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 12:51:00 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ANC wireless earbuds]]></category>
		<category><![CDATA[earbuds]]></category>
		<category><![CDATA[london]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[technical news]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Urbanista ‘London’ ANC wireless earbuds]]></category>
		<category><![CDATA[wirless earbuds]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13189</guid>

					<description><![CDATA[First, true wireless earbuds were the high-water mark for new Bluetooth audio gadgets. Now, it’s true wireless earbuds with active noise cancellation &#8211; the ANC often seen in product names, such as with these ‘London’ buds from hip Swedish audio brand Urbanista. ‘London’ follows previous Urbanista city-linked releases, such as Stockholm, Paris, Athens, Chicago, Boston, ... <a title="Urbanista ‘London’ ANC wireless earbuds" class="read-more" href="https://blog.eduguru.in/news/urbanista-london-anc-wireless-earbuds" aria-label="Read more about Urbanista ‘London’ ANC wireless earbuds">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple and Google bring app-less contact tracing to smartphones</title>
		<link>https://blog.eduguru.in/news/apple-and-google-bring-app-less-contact-tracing-to-smartphones</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 12:44:48 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple and Google bring app-less contact tracing to smartphones]]></category>
		<category><![CDATA[apple news]]></category>
		<category><![CDATA[google bring app]]></category>
		<category><![CDATA[new smart phone]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[smatphone]]></category>
		<category><![CDATA[technical news]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13187</guid>

					<description><![CDATA[Apple and Google have announced a new contact-tracing system designed to help public authorities track potential coronavirus transmission between individuals without having to build their own app. Apple and Google have announced a new contact-tracing system designed to help public authorities track potential coronavirus transmission between individuals without having to build their own app. The ... <a title="Apple and Google bring app-less contact tracing to smartphones" class="read-more" href="https://blog.eduguru.in/news/apple-and-google-bring-app-less-contact-tracing-to-smartphones" aria-label="Read more about Apple and Google bring app-less contact tracing to smartphones">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>$1bn plan for quantum and AI research announced by the White House</title>
		<link>https://blog.eduguru.in/news/1bn-plan-for-quantum-and-ai-research-announced-by-the-white-house</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 13:38:01 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[$1bn plan for quantum and AI research announced by the White House]]></category>
		<category><![CDATA[new tech]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[white house news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13184</guid>

					<description><![CDATA[IBM, Microsoft and others have committed $300m to a joint initiative with the US Government to set up 12 research institutes that are looking into AI and quantum information sciences. The Wall Street Journal (WSJ) reports that the effort is designed to ensure the US continues to excel at the new technologies amid hot competition ... <a title="$1bn plan for quantum and AI research announced by the White House" class="read-more" href="https://blog.eduguru.in/news/1bn-plan-for-quantum-and-ai-research-announced-by-the-white-house" aria-label="Read more about $1bn plan for quantum and AI research announced by the White House">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>AI system better assesses bridge structural health with existing sensors</title>
		<link>https://blog.eduguru.in/news/ai-system-better-assesses-bridge-structural-health-with-existing-sensors</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 12:07:47 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI system]]></category>
		<category><![CDATA[AI system better assesses bridge structural health with existing sensors]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[birdge]]></category>
		<category><![CDATA[sensors]]></category>
		<category><![CDATA[technology bridge]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13181</guid>

					<description><![CDATA[A new system to assess the structural health of bridges using AI and an array of sensors is being developed by a team at the University of Texas at Arlington. Modern bridges are typically built with weight-in-motion systems including sensors that measure vibrations, strain and deflection. By measuring the bridge’s response to these elements, they ... <a title="AI system better assesses bridge structural health with existing sensors" class="read-more" href="https://blog.eduguru.in/news/ai-system-better-assesses-bridge-structural-health-with-existing-sensors" aria-label="Read more about AI system better assesses bridge structural health with existing sensors">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apple breaks up with Intel to switch to custom Arm chips for Macs</title>
		<link>https://blog.eduguru.in/news/apple-breaks-up-with-intel-to-switch-to-custom-arm-chips-for-macs</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 11:35:07 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple breaks up with intel]]></category>
		<category><![CDATA[Apple breaks up with Intel to switch to custom Arm chips for Macs]]></category>
		<category><![CDATA[Apple switch to custom Arm chips]]></category>
		<category><![CDATA[Arm chips for Apple]]></category>
		<category><![CDATA[intel chip. Arm chip]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13178</guid>

					<description><![CDATA[Apple has confirmed that it will replace Intel processors in its Mac computers with custom Arm-based processors, which it is already using in iPhones and iPads. The announcement was made at Apple’s Worldwide Developers Conference (WWDC), which was for the first time an entirely virtual event with no in-person attendance. “From the beginning, the Mac ... <a title="Apple breaks up with Intel to switch to custom Arm chips for Macs" class="read-more" href="https://blog.eduguru.in/news/apple-breaks-up-with-intel-to-switch-to-custom-arm-chips-for-macs" aria-label="Read more about Apple breaks up with Intel to switch to custom Arm chips for Macs">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Software needs a rethink for future chips, Intel says</title>
		<link>https://blog.eduguru.in/news/software-needs-a-rethink-for-future-chips-intel-says</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 11:31:50 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[future chips]]></category>
		<category><![CDATA[intel]]></category>
		<category><![CDATA[intel future chips]]></category>
		<category><![CDATA[new software]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[rethink for future]]></category>
		<category><![CDATA[software needs]]></category>
		<category><![CDATA[Software needs a rethink for future chips. Intel says]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13176</guid>

					<description><![CDATA[Chip giant says Moore’s Law is alive and well but you are going to have to change the way software runs to take advantage of it. In his keynote at the HotChips conference held online this week, Raja Koduri, Intel’s chief architect and head of the graphics division, showed off the company’s snappy slogan for ... <a title="Software needs a rethink for future chips, Intel says" class="read-more" href="https://blog.eduguru.in/news/software-needs-a-rethink-for-future-chips-intel-says" aria-label="Read more about Software needs a rethink for future chips, Intel says">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>White House to close Huawei loopholes</title>
		<link>https://blog.eduguru.in/news/white-house-to-close-huawei-loopholes</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 11:22:26 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[close huawei loopholes]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[loopholes]]></category>
		<category><![CDATA[white house]]></category>
		<category><![CDATA[white house news]]></category>
		<category><![CDATA[White House to close Huawei loopholes]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13174</guid>

					<description><![CDATA[According to a Reuters report, the White House is due to announce a tightening of restrictions on its bête noire, Shenzhen-based Huawei Technologies. These restrictions will expand current restrictions which aim to prevent Huawei obtaining electronics with US origins. As trade tensions continue to escalate between the US and China, US President Donald Trump has ... <a title="White House to close Huawei loopholes" class="read-more" href="https://blog.eduguru.in/news/white-house-to-close-huawei-loopholes" aria-label="Read more about White House to close Huawei loopholes">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Evolution or revolution? The all-ethernet in-vehicle network</title>
		<link>https://blog.eduguru.in/news/evolution-or-revolution-the-all-ethernet-in-vehicle-network</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 11:16:56 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[ethernet in vehicle]]></category>
		<category><![CDATA[evolution]]></category>
		<category><![CDATA[Evolution or revolution? The all-ethernet in-vehicle network]]></category>
		<category><![CDATA[INTERNET]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[revolution]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[trandling technology]]></category>
		<category><![CDATA[vehical network]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13172</guid>

					<description><![CDATA[Current in-vehicle Electrical and Electronic network architectures are complex, costly, and totally inadequate to address the needs of tomorrow. The question is not if they will change but when and how? EE architectures need to be more intelligent, flexible and connected; in-vehicle and vehicle-to-vehicle, vehicle-to-infrastructure, vehicle-to-cloud (often referred as V2X). Networking across all industries, whether ... <a title="Evolution or revolution? The all-ethernet in-vehicle network" class="read-more" href="https://blog.eduguru.in/news/evolution-or-revolution-the-all-ethernet-in-vehicle-network" aria-label="Read more about Evolution or revolution? The all-ethernet in-vehicle network">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Artificial skin developed that feels pain</title>
		<link>https://blog.eduguru.in/news/artificial-skin-developed-that-feels-pain</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 10:51:04 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI technology]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Artificial skin developed that feels pain]]></category>
		<category><![CDATA[development]]></category>
		<category><![CDATA[feels pain]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13170</guid>

					<description><![CDATA[A team at RMIT University in Melbourne, Australia developed the prototype which they say can electronically replicate the way human skin senses pain. The device mimics the body’s near-instant feedback response and can react to painful sensations with the same lighting speed that nerve signals travel to the brain. Lead researcher Professor Madhu Bhaskaran said ... <a title="Artificial skin developed that feels pain" class="read-more" href="https://blog.eduguru.in/news/artificial-skin-developed-that-feels-pain" aria-label="Read more about Artificial skin developed that feels pain">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Variable`s in java</title>
		<link>https://blog.eduguru.in/tutorial/java/variables-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 10:27:41 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Java Variables]]></category>
		<category><![CDATA[Variable`s in java]]></category>
		<category><![CDATA[variables]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13165</guid>

					<description><![CDATA[Before you use a variable in java, you must declare it, specifying its data type. The int  types is only one kind of simple variable you can use. mentioned here are the various possibilities. Integer &#8211; these types are byte, short, int and long, which hold signed, whole-value numbers. Floating-point numbers &#8211; these types are ... <a title="Variable`s in java" class="read-more" href="https://blog.eduguru.in/tutorial/java/variables-in-java" aria-label="Read more about Variable`s in java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java`s Reserved Words</title>
		<link>https://blog.eduguru.in/tutorial/java/javas-reserved-words</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 09:46:29 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[java words]]></category>
		<category><![CDATA[Java`s Reserved Words]]></category>
		<category><![CDATA[reserved words]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13162</guid>

					<description><![CDATA[when you are writing java code, you should know that java reserves certain words for itself as part of the java language. There aren`t too many of them, though. Here they are; abstract &#8211; It specifies that the class or method will be implemented later, in a subclass. boolean &#8211; A data type that can ... <a title="Java`s Reserved Words" class="read-more" href="https://blog.eduguru.in/tutorial/java/javas-reserved-words" aria-label="Read more about Java`s Reserved Words">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Commenting in your java code</title>
		<link>https://blog.eduguru.in/tutorial/java/commenting-in-your-java-code</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 11:34:32 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[commenting]]></category>
		<category><![CDATA[Commenting in your java code]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[Comments in Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13158</guid>

					<description><![CDATA[Java supports three types of comments, two of which are taken from C++. you can surround a comment of any length with the characters &#8220;/*&#8217; and &#8220;*/&#8221;, like this: /* This application prints out "Linux" */ public class abc { public static void main(string[] args) { system.out.println("Linux"); } } The java compiler will ignore all ... <a title="Commenting in your java code" class="read-more" href="https://blog.eduguru.in/tutorial/java/commenting-in-your-java-code" aria-label="Read more about Commenting in your java code">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>System.out.println(&#8220;&#8230;&#8230;&#8230;..&#8221;)</title>
		<link>https://blog.eduguru.in/tutorial/java/system-out-println</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 10:56:40 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[javatutorials]]></category>
		<category><![CDATA[System.out.println("...........")]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13156</guid>

					<description><![CDATA[The main method has one line of code in it: public class name { public static void main(String[] args) System.out.println("linux");} } This is the actual line of code that does all the work. In this case, we are using some of the code that the programmers at sun have already created to display the text ... <a title="System.out.println(&#8220;&#8230;&#8230;&#8230;..&#8221;)" class="read-more" href="https://blog.eduguru.in/tutorial/java/system-out-println" aria-label="Read more about System.out.println(&#8220;&#8230;&#8230;&#8230;..&#8221;)">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>public static void main(String[] args)</title>
		<link>https://blog.eduguru.in/tutorial/java/public-static-void-mainstring-args</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 10:30:49 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[public static void main(String[] args)]]></category>
		<category><![CDATA[void main]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13153</guid>

					<description><![CDATA[Here`s the next line of code. public class abc { public static void main(String[] args) {......}} Whats happening here is that we are creating a method in the app class. A method in Object-Oriented Programming is like a function or subroutine in standard programming- it`s a block of code that you can pass control to ... <a title="public static void main(String[] args)" class="read-more" href="https://blog.eduguru.in/tutorial/java/public-static-void-mainstring-args" aria-label="Read more about public static void main(String[] args)">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java Program First Line.</title>
		<link>https://blog.eduguru.in/tutorial/java/java-program-first-line</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 09:57:52 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[Java Program First Line.]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Programs]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13150</guid>

					<description><![CDATA[public class abc {......} This line indicates that we are creating a new java class named abc. After we translate this class into bytes codes, the java virtual machine will be able to create objects of this class and run them. this code is just to get us started with java programming. Note that keyword ... <a title="Java Program First Line." class="read-more" href="https://blog.eduguru.in/tutorial/java/java-program-first-line" aria-label="Read more about Java Program First Line.">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Writing Java code: Creating an application</title>
		<link>https://blog.eduguru.in/tutorial/java/writing-java-code-creating-an-application</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 04:56:28 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[creating an application]]></category>
		<category><![CDATA[creating application]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[Java code]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[writing code]]></category>
		<category><![CDATA[writing java code]]></category>
		<category><![CDATA[Writing Java code: Creating an application]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13147</guid>

					<description><![CDATA[public class app { public static void main(String[] args) { System.out.println("Hello world"); } } If you are new to Java, this might look strange to you. The idea here is that this application will print out the text &#8220;Hello world&#8221; when you compile and run it. for example, here`s how it looks in a DOS ... <a title="Writing Java code: Creating an application" class="read-more" href="https://blog.eduguru.in/tutorial/java/writing-java-code-creating-an-application" aria-label="Read more about Writing Java code: Creating an application">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is Struts?</title>
		<link>https://blog.eduguru.in/tutorial/java/what-is-struts</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 04:26:29 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basic concepts]]></category>
		<category><![CDATA[java point]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[programming]]></category>
		<category><![CDATA[Struts java basics]]></category>
		<category><![CDATA[What is Struts?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13144</guid>

					<description><![CDATA[Struts is a framework that provides the use of the Model-View-Controller architecture for designing large-scale applications. it is a project of the Apache software foundation with its official home page is at http://struts.apache.org/. The Struts Framework includes a set of custom tag libraries and their associated java classes, along with various utility classes. The most ... <a title="What is Struts?" class="read-more" href="https://blog.eduguru.in/tutorial/java/what-is-struts" aria-label="Read more about What is Struts?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is J2EE?</title>
		<link>https://blog.eduguru.in/tutorial/java/what-is-j2ee</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 14:34:21 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[J2EE]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[What is J2EE?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13141</guid>

					<description><![CDATA[J2EE (Java 2 Platform, Enterprise Edition) is a platform-independent, java-centric environment from sun for developing, building and online deployment of web-based enterprise applications. The J2EE platform consists of a set of service- APIs, and protocol- that provide the functionality for developing multi-tiered, web-based applications. J2EE is a java-based, runtime platform created by sun microsystems used ... <a title="What is J2EE?" class="read-more" href="https://blog.eduguru.in/tutorial/java/what-is-j2ee" aria-label="Read more about What is J2EE?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is JSP?</title>
		<link>https://blog.eduguru.in/tutorial/java/what-is-jsp</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 12:59:27 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[What is JSP?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13138</guid>

					<description><![CDATA[JSP Java Server Page (JSP) technology allow web developers and designers to rapidly develop and easily maintain, information-rich, dynamic web pages that leverage existing business system. As part of the java technology family, JSP technology enables rapid development of web-based applications that are platform-independent. JSP technology separates the user interface from content generation, enabling designers ... <a title="What is JSP?" class="read-more" href="https://blog.eduguru.in/tutorial/java/what-is-jsp" aria-label="Read more about What is JSP?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is J2ME?</title>
		<link>https://blog.eduguru.in/tutorial/java/what-is-j2me</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 12:37:00 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java 2 mobile edition]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[What is J2ME?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13135</guid>

					<description><![CDATA[J2ME J2ME (java 2 mobile edition), a java-based runtime platform created by sun microsystems, allows java application to run on embedded device, such as cellular telephones and personal digital assistants (PDAs). J2ME also is a competitor to the microsoft .NET Compact framework. The J2ME provides a robust, flexible environment for applications running on consumer devices, ... <a title="What is J2ME?" class="read-more" href="https://blog.eduguru.in/tutorial/java/what-is-j2me" aria-label="Read more about What is J2ME?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is JSF?</title>
		<link>https://blog.eduguru.in/tutorial/java/what-is-jsf</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 12:10:26 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java server faces]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[What is JSF?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13133</guid>

					<description><![CDATA[JSF The java Server Faces (JSF) is a new framework for building Web application by using Java. Java Server Faces consist of the following features: Easily configuration page navigation Standard extensible user interfaces widgets (like hyperlinks, buttons) for: User input validation Easy error handling java bean management Event-handling internationaliation support &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>what`s new in java SE6 ?</title>
		<link>https://blog.eduguru.in/tutorial/java/whats-new-in-java-se6</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 11:59:56 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java SE6]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[what`s new in java SE6 ?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13131</guid>

					<description><![CDATA[java SE6 The new java SE 6 comes with lots of improvements ti the existing packages with number of new methods and interfaces added to it. The new version of API supports various new features. Enhanced collection framework dynamic compilation Support for Internationalization Database Security web services Desktop Improvement System Tray Splash Screen Swing Updates ... <a title="what`s new in java SE6 ?" class="read-more" href="https://blog.eduguru.in/tutorial/java/whats-new-in-java-se6" aria-label="Read more about what`s new in java SE6 ?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>how to run C Program in ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-run-c-program-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 29 Aug 2020 19:39:29 +0000</pubDate>
				<category><![CDATA[C Tutorial]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[c program]]></category>
		<category><![CDATA[c programming]]></category>
		<category><![CDATA[compiler]]></category>
		<category><![CDATA[how to run C Program in ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13127</guid>

					<description><![CDATA[Step 1. Open text editor. Step 2. Write a Program. Step 3. Save the program with the extension .C . Step 4. Open the terminal. Step 5. Go to the file location. where your program save. Step 6. Types gcc program name.c . Example : gcc helloworld.c If program compile with out error. it means ... <a title="how to run C Program in ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-run-c-program-in-ubuntu" aria-label="Read more about how to run C Program in ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>how to find network card number in ubuntu??</title>
		<link>https://blog.eduguru.in/linux-2/how-to-find-network-card-number-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 29 Aug 2020 06:53:51 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[COMMANDS]]></category>
		<category><![CDATA[how to find network]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux commandscard number in ubuntu??]]></category>
		<category><![CDATA[network card finder]]></category>
		<category><![CDATA[network card number]]></category>
		<category><![CDATA[OPERATING SYSTEM]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13124</guid>

					<description><![CDATA[Step 1. Open a Terminal Step 2. type lspci and press Enter Step 3. find any that are marked Network controller or Ethernet controller. &#8230; EXAMPLE : &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>View from India: Electronics sector seizes opportunity for economic growth</title>
		<link>https://blog.eduguru.in/news/view-from-india-electronics-sector-seizes-opportunity-for-economic-growth</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 18:38:10 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[electronic sector]]></category>
		<category><![CDATA[seizes]]></category>
		<category><![CDATA[tranding]]></category>
		<category><![CDATA[View from India: Electronics sector seizes opportunity for economic growth]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13119</guid>

					<description><![CDATA[The Covid-19 pandemic has triggered an acceleration of India’s digital ambitions. Covid-19 has put India’s digital journey on a fast track. “On the positive side, the pandemic has given better visibility to contactless payments and mobile commerce. Companies have cut down on work-related travel. Remote working is encouraged. Consequently, India has registered 30 per cent ... <a title="View from India: Electronics sector seizes opportunity for economic growth" class="read-more" href="https://blog.eduguru.in/news/view-from-india-electronics-sector-seizes-opportunity-for-economic-growth" aria-label="Read more about View from India: Electronics sector seizes opportunity for economic growth">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Amazon to analyse emotions with new Halo fitness band</title>
		<link>https://blog.eduguru.in/news/amazon-to-analyse-emotions-with-new-halo-fitness-band</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 18:28:07 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Amazon to analyse emotions with new Halo fitness band]]></category>
		<category><![CDATA[emotions analyse]]></category>
		<category><![CDATA[fitness band]]></category>
		<category><![CDATA[new tech]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13117</guid>

					<description><![CDATA[Amazon is preparing to enter the health wearable business with the launch of a fitness band that listens to a person’s voice in order to analyse their emotions.   The forthcoming device will be part of a subscription service called Halo. The band reportedly won’t have a screen or deliver any notifications like other fitness ... <a title="Amazon to analyse emotions with new Halo fitness band" class="read-more" href="https://blog.eduguru.in/news/amazon-to-analyse-emotions-with-new-halo-fitness-band" aria-label="Read more about Amazon to analyse emotions with new Halo fitness band">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Train operator displays social distancing capacity by measuring carriage weight</title>
		<link>https://blog.eduguru.in/news/train-operator-displays-social-distancing-capacity-by-measuring-carriage-weight</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 18:22:41 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[social distance]]></category>
		<category><![CDATA[Train operator displays social distancing capacity by measuring carriage weight]]></category>
		<category><![CDATA[train operator social diatancing]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13115</guid>

					<description><![CDATA[English train operator Southeastern has begun providing data on how busy its services are based on the weight of passengers in the carriage.   The loading data is being shown on its website next to each service, letting people make a decision about whether to board crowded carriages or wait for the next train. The SeatFinder ... <a title="Train operator displays social distancing capacity by measuring carriage weight" class="read-more" href="https://blog.eduguru.in/news/train-operator-displays-social-distancing-capacity-by-measuring-carriage-weight" aria-label="Read more about Train operator displays social distancing capacity by measuring carriage weight">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>UK’s new contact-tracing app heads to Isle of Wight for fresh trials</title>
		<link>https://blog.eduguru.in/news/uks-new-contact-tracing-app-heads-to-isle-of-wight-for-fresh-trials</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 18:16:49 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[contact-tracing app]]></category>
		<category><![CDATA[new application]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[UK’s new contact-tracing app heads to Isle of Wight for fresh trials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13113</guid>

					<description><![CDATA[The Government had previously developed another app with the same purpose that was ditched due to technical problems encountered when it was installed on iPhones. Development then switched to the new app that uses a Bluetooth-based system, developed collaboratively by Google and Apple. At the end of July, Northern Ireland launched its own contact-tracing app &#8211; ... <a title="UK’s new contact-tracing app heads to Isle of Wight for fresh trials" class="read-more" href="https://blog.eduguru.in/news/uks-new-contact-tracing-app-heads-to-isle-of-wight-for-fresh-trials" aria-label="Read more about UK’s new contact-tracing app heads to Isle of Wight for fresh trials">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Routing app traffic data used for real-time emissions insights</title>
		<link>https://blog.eduguru.in/news/routing-app-traffic-data-used-for-real-time-emissions-insights</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 18:11:52 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[new update]]></category>
		<category><![CDATA[real-time emission]]></category>
		<category><![CDATA[routing app]]></category>
		<category><![CDATA[Routing app traffic data used for real-time emissions insights]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13111</guid>

					<description><![CDATA[Apps such as Google Maps or Nokia’s Here platform routinely capture detailed information as motorists use the GPS technology to plan and navigate routes. And according to new research, this data could be invaluable for researchers and planners who need to better understand traffic flows on busy roads. Current emissions data from road transport is collated from ... <a title="Routing app traffic data used for real-time emissions insights" class="read-more" href="https://blog.eduguru.in/news/routing-app-traffic-data-used-for-real-time-emissions-insights" aria-label="Read more about Routing app traffic data used for real-time emissions insights">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Night-time cough recording app predicts asthma deterioration</title>
		<link>https://blog.eduguru.in/news/night-time-cough-recording-app-predicts-asthma-deterioration</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 18:04:20 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[cough recording app]]></category>
		<category><![CDATA[new inventions]]></category>
		<category><![CDATA[new tech]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[Night-time cough recording app predicts asthma deterioration]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13109</guid>

					<description><![CDATA[The app is the first of its kind to measure patients’ coughing over a series of nights and shows that it is a sign of their asthma deteriorating. The team, led by Dr Frank Rassouli, from the Cantonal Hospital St Gallen, Switzerland, believe it could become a new way to help patients and their doctors ... <a title="Night-time cough recording app predicts asthma deterioration" class="read-more" href="https://blog.eduguru.in/news/night-time-cough-recording-app-predicts-asthma-deterioration" aria-label="Read more about Night-time cough recording app predicts asthma deterioration">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Battery-powered face mask with fans unveiled by LG</title>
		<link>https://blog.eduguru.in/news/battery-powered-face-mask-with-fans-unveiled-by-lg</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 17:57:39 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[battery powered mask]]></category>
		<category><![CDATA[Battery-powered face mask with fans unveiled by LG]]></category>
		<category><![CDATA[face mask]]></category>
		<category><![CDATA[LATEST TECHNOLOGY]]></category>
		<category><![CDATA[mask]]></category>
		<category><![CDATA[tecchnology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13107</guid>

					<description><![CDATA[The LG PuriCare Wearable Air Purifier employs two H13 HEPA filters, the same as those used in the South Korean firm’s air filtration devices. More significantly, the mask comes with an 820mAh battery that is used to power the inbuilt fans, supposedly making it easier for users to breath through the mask whilst wearing. The ... <a title="Battery-powered face mask with fans unveiled by LG" class="read-more" href="https://blog.eduguru.in/news/battery-powered-face-mask-with-fans-unveiled-by-lg" aria-label="Read more about Battery-powered face mask with fans unveiled by LG">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>China warns Norway</title>
		<link>https://blog.eduguru.in/news/china-warns-norway</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 17:36:29 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[china news]]></category>
		<category><![CDATA[China warns Norway]]></category>
		<category><![CDATA[news update]]></category>
		<category><![CDATA[Norway]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13105</guid>

					<description><![CDATA[China warns Norway against granting Nobel Peace Prize to Hong Kong democracy activists Chinese Foreign Minister Wang Yi, on a rare visit to Norway, warned Oslo against granting the Nobel Peace Prize to Hong Kong pro-democracy activists much on the lines of awarding the prize to China&#8217;s human rights activist Liu Xiaobo and Tibetan spiritual ... <a title="China warns Norway" class="read-more" href="https://blog.eduguru.in/news/china-warns-norway" aria-label="Read more about China warns Norway">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Applet Class in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-applet-class-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 17:47:24 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Applet class]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java programs]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The Applet Class in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13090</guid>

					<description><![CDATA[Each applet is an augmentation of the java.applet.applet class. The base Applet class gives techniques that a determined Applet class may call to get data and administrations from the program connection. These incorporate techniques that do the accompanying: Get parameters of the applet Get the system area of the HTML record that contains the applet ... <a title="The Applet Class in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-applet-class-in-java" aria-label="Read more about The Applet Class in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Life Cycle of an Applet IN JAVA</title>
		<link>https://blog.eduguru.in/tutorial/java/life-cycle-of-an-applet-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 17:21:20 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java progrramming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Life Cycle of an Applet IN JAVA]]></category>
		<category><![CDATA[Programs]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13088</guid>

					<description><![CDATA[The creation of any applet requires the implementation of four methods of the Applet class. These methods have been discussed in the below. init: This method is planned for whatever introduction is required for your applet. It is called after the param labels inside the applet tag have been transformed. start: This method is naturally ... <a title="Life Cycle of an Applet IN JAVA" class="read-more" href="https://blog.eduguru.in/tutorial/java/life-cycle-of-an-applet-in-java" aria-label="Read more about Life Cycle of an Applet IN JAVA">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java Applets</title>
		<link>https://blog.eduguru.in/tutorial/java/java-applets</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 13:35:25 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Applets]]></category>
		<category><![CDATA[Applets list]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[Java applets]]></category>
		<category><![CDATA[java bsics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[programming]]></category>
		<category><![CDATA[Programs]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13086</guid>

					<description><![CDATA[In order to run an applet, you must have a web browser. An applet can be a completely utilitarian Java application on the grounds that it has the whole Java API’s available to it. There are some essential contrasts between an applet and a standalone Java application, including the accompanying: A main() function is not ... <a title="Java Applets" class="read-more" href="https://blog.eduguru.in/tutorial/java/java-applets" aria-label="Read more about Java Applets">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Packages in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/packages-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 07:15:03 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java programs]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Packages]]></category>
		<category><![CDATA[packages in java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13083</guid>

					<description><![CDATA[Packages are utilized as a part of Java so as to avert naming clashes, to control access, to make seeking/placing and utilization of classes, interfaces, identifications and annotations less demanding, in addition to several others. A Package can be described as a collection of related types (classes, interfaces, counts and annotations) giving access security and ... <a title="Packages in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/packages-in-java" aria-label="Read more about Packages in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Declaring Interfaces in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/declaring-interfaces-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 07:11:43 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java programs]]></category>
		<category><![CDATA[Decaring interfaces]]></category>
		<category><![CDATA[Declaring Interfaces in Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13081</guid>

					<description><![CDATA[In order to declare an interface, you must use the interface keyword. Here is a straightforward illustration that can be used for declaring an interface. The standard structure and order of statements that can be used for this purpose are as follows: import java.lang.*; public interface Interfacename { //Statements} Interfaces have the accompanying properties: An ... <a title="Declaring Interfaces in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/declaring-interfaces-in-java" aria-label="Read more about Declaring Interfaces in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Interfaces and Packages in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/interfaces-and-packages-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 07:02:07 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Interfaces and Packages in Java]]></category>
		<category><![CDATA[Interfaces in java]]></category>
		<category><![CDATA[java interfaces]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[packages in java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13079</guid>

					<description><![CDATA[Abstract methods when brought together form a package. A class actualizes an interface, consequently inheriting the interface’s abstract methods. An interface is not a class. Composing an interface is like composing a class. However, they are two separate ideas. A class portrays the properties and behaviours of an object. On the other hand, An interface ... <a title="Interfaces and Packages in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/interfaces-and-packages-in-java" aria-label="Read more about Interfaces and Packages in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Common Exceptions in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/common-exceptions-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 06:50:20 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[Common Exceptions]]></category>
		<category><![CDATA[Common Exceptions in Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13077</guid>

					<description><![CDATA[In Java, it is conceivable to characterize two categories of Exceptions and Errors. Programmatic exceptions: &#8211; These special cases are tossed unequivocally by the application or the API software engineers Examples: Illegalargumentexception, IllegalStateException. JVM Exceptions: &#8211; These are exemptions/mistakes that are solely or consistently thrown by the JVM. Some exceptions of this class are ArrayIndexOutOfBoundsException, ... <a title="Common Exceptions in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/common-exceptions-in-java" aria-label="Read more about Common Exceptions in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Creating An Exception in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/creating-an-exception-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 06:43:04 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[Creating An Exception]]></category>
		<category><![CDATA[Creating An Exception in Java]]></category>
		<category><![CDATA[Exception in java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13075</guid>

					<description><![CDATA[You can make your own exemptions in Java. Remember the accompanying focuses when composing your classes for exceptions: All exemptions must be an offspring of Throwable. If you need to compose a checked exemption that is naturally authorized by the Handle or Declare Rule, you have to create an extension of the Exception class. If ... <a title="Creating An Exception in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/creating-an-exception-in-java" aria-label="Read more about Creating An Exception in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exception Methods in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/exception-methods-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 06:34:51 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[Exception methods]]></category>
		<category><![CDATA[Exception Methods in Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13073</guid>

					<description><![CDATA[Here is a list of methods that are available as part of the Throwable class. public Throwable getcause() This method gives back the cause of the exemption as mentioned by a Throwable item. public String getmessage() This method gives back the exception’s complete message and details. This message is usually included in the Throwable constructor. ... <a title="Exception Methods in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/exception-methods-in-java" aria-label="Read more about Exception Methods in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hierarchy of Exceptions in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/hierarchy-of-exceptions-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 06:30:45 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[Hierarchy of Exceptions]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13071</guid>

					<description><![CDATA[All classes of exceptions are subtypes of the java.lang.exception class. This class is a subclass of the Throwable class. Other than the exception class, there is an alternate subclass called Error which is gotten from the Throwable class. These special case scenarios are not ordinarily caught by the Java programs. These conditions ordinarily happen if ... <a title="Hierarchy of Exceptions in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/hierarchy-of-exceptions-in-java" aria-label="Read more about Hierarchy of Exceptions in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exception Handling in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/exception-handling-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 05:54:37 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Exception Handling in Java]]></category>
		<category><![CDATA[HANDLING]]></category>
		<category><![CDATA[JAVA EXCEPTION HANDLING]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13068</guid>

					<description><![CDATA[During the execution of your program, it may experience abnormal or exceptional conditions. As a result of these, the system may crash. An exception may occur due to a number of reasons. Some of these include: A file that needs to be opened can’t be found. A client has entered invalid information. A system association ... <a title="Exception Handling in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/exception-handling-in-java" aria-label="Read more about Exception Handling in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>File Handling in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/file-handling-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 10:27:25 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[file handling]]></category>
		<category><![CDATA[File Handling in Java]]></category>
		<category><![CDATA[files]]></category>
		<category><![CDATA[handling in java]]></category>
		<category><![CDATA[java bsics programming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13066</guid>

					<description><![CDATA[All the classes that you may require on a day to day I/O programming basis are contained in the package java.io. The streams present in this package broadly represent output and input locations. Moreover, the streams supported in Java include object, primitives and localized characters. A stream can simply be described as data, arranged in ... <a title="File Handling in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/file-handling-in-java" aria-label="Read more about File Handling in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Arrays Class in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-arrays-class-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 10:06:16 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[programming basics]]></category>
		<category><![CDATA[The Arrays Class in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13064</guid>

					<description><![CDATA[The java.util.arrays class contains different functions for sorting and seeking values from array, looking at arrays, and filling components into arrays. These functions are available for all primitive data types. public static boolean equals(long[] a, long[] a2) &#8211; returns true if the two indicated arrays are equivalent to each other. Two arrays are viewed as ... <a title="The Arrays Class in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-arrays-class-in-java" aria-label="Read more about The Arrays Class in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The foreach Loops in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-foreach-loops-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 08:53:06 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[foreach loops]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The foreach Loops in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13062</guid>

					<description><![CDATA[JDK 1.5 presented another for construct, which is known as foreach loop or extended for loop. This construct empowers you to cross the complete array successively without utilizing an extra variable. Sample Implementation: public class Mytestarray { public static void main(string[] args) { double[] myarray = {0.5, 1.2, 2.2, 3.4, 4.7}; for (double i: myarray) ... <a title="The foreach Loops in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-foreach-loops-in-java" aria-label="Read more about The foreach Loops in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Handling Arrays in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/handling-arrays-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 08:47:23 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Arrays]]></category>
		<category><![CDATA[Arrays in Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of programming]]></category>
		<category><![CDATA[Handling Arrays]]></category>
		<category><![CDATA[Handling Arrays in Java]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[programming]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13060</guid>

					<description><![CDATA[At the point when handling components of an array, we frequently utilize either for or foreach in light of the fact that the majority of the components in an array are of the same sort and the extent of the exhibit is known. Example: public class Mytestarray { public static void main(string[] args) { double[] ... <a title="Handling Arrays in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/handling-arrays-in-java" aria-label="Read more about Handling Arrays in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Making Arrays in java</title>
		<link>https://blog.eduguru.in/tutorial/java/making-arrays-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 08:39:13 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[making Arrays]]></category>
		<category><![CDATA[Making Arrays in java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13058</guid>

					<description><![CDATA[You can make an exhibit by utilizing the new operator with the accompanying statement: myarray = new datatype[sizeofarray]; The above declaration does two things: It makes an exhibit with the help of the new operator in the following manner: new datatype[arraysize]; It relegates the reference of the recently made array to the variable myarray. Proclaiming ... <a title="Making Arrays in java" class="read-more" href="https://blog.eduguru.in/tutorial/java/making-arrays-in-java" aria-label="Read more about Making Arrays in java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How To Declare array Variables in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/how-to-declare-array-variables-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 08:32:49 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[array variable in java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[how to declare array variable]]></category>
		<category><![CDATA[How To Declare array Variables in Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Java Variables]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13056</guid>

					<description><![CDATA[To utilize an array as a part of a system, you must declare a variable to reference the array. Besides this, you must determine the sort of array the variable can reference. Here is the syntax for declaring a variable of the type array: datatype[] myarray; Sample Implementation: The accompanying code bits are illustrations of ... <a title="How To Declare array Variables in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/how-to-declare-array-variables-in-java" aria-label="Read more about How To Declare array Variables in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Arrays in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/arrays-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 08:18:30 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Arrays]]></category>
		<category><![CDATA[Arrays in Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[Java Arrays]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13054</guid>

					<description><![CDATA[Java supports an information structure, which is similar to a cluster. This information structure is called an array. It is capable of storing an altered size successive accumulation of components of the same data type. An array is utilized to store an accumulation of information, yet it is frequently more valuable to think about it ... <a title="Arrays in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/arrays-in-java" aria-label="Read more about Arrays in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Strings in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/strings-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 16:31:06 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java Strings]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Strings]]></category>
		<category><![CDATA[Strings in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13050</guid>

					<description><![CDATA[Strings, which are generally utilized as a part of Java, for writing computer programs, are a grouping of characters. In the Java programming language, strings are like everything else, objects. The Java platform provides the String class to make and control strings. Instantiating Strings The most appropriate approach to make a string is to use ... <a title="Strings in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/strings-in-java" aria-label="Read more about Strings in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Continue Keyword in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-continue-keyword-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:57:52 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[continue keywords]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[keywords]]></category>
		<category><![CDATA[The Continue Keyword in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13048</guid>

					<description><![CDATA[The proceed with decisive word can be utilized as a part of any of the loop control structures. It causes the loop to quickly bounce to the following emphasis of the loop. In a for circle, the continue keyword reasons stream of control to quickly bounce to the overhaul articulation. In a while or do/while ... <a title="The Continue Keyword in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-continue-keyword-in-java" aria-label="Read more about The Continue Keyword in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The break Keyword in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-break-keyword-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:53:21 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[break keywords]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[keywords in java]]></category>
		<category><![CDATA[The break Keyword in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13046</guid>

					<description><![CDATA[The break keyword is utilized to stop the whole loop execution. The break word must be utilized inside any loop or a switch construct. The break keyword will stop the execution of the deepest circle and begin executing the following line of code after the ending curly bracket. The syntax for using this keyword is ... <a title="The break Keyword in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-break-keyword-in-java" aria-label="Read more about The break Keyword in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Extended Version of for Loop in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/extended-version-of-for-loop-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:50:29 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Extended Version of for Loop in Java]]></category>
		<category><![CDATA[extended version of for loops]]></category>
		<category><![CDATA[for loop in java]]></category>
		<category><![CDATA[for loops]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[looping in java]]></category>
		<category><![CDATA[loops]]></category>
		<category><![CDATA[Loops in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13044</guid>

					<description><![CDATA[As of Java 5, the upgraded for loop was presented. This is basically utilized for Arrays. The syntax for this loop is as follows: for(declaration : statement) { //Statements } Declaration: The recently declared variable, which is of a sort perfect with the components of the show you are getting to. The variable will be ... <a title="Extended Version of for Loop in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/extended-version-of-for-loop-in-java" aria-label="Read more about Extended Version of for Loop in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The for Loop in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-for-loop-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:38:26 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[for loop]]></category>
		<category><![CDATA[for loop in java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[looping in java]]></category>
		<category><![CDATA[Loops in Java]]></category>
		<category><![CDATA[The for Loop in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13042</guid>

					<description><![CDATA[A for circle is a reiteration control structure that permits you to effectively compose a loop that needs to execute a particular number of times. A for looping construct is helpful when you know how often an errand is to be rehashed. The syntax for the looping construct is as follows: The punctuation of a ... <a title="The for Loop in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-for-loop-in-java" aria-label="Read more about The for Loop in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The do&#8230;while Loop in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-do-while-loop-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:33:32 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The do...while Loop in Java]]></category>
		<category><![CDATA[while loop]]></category>
		<category><![CDATA[while loop in java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13040</guid>

					<description><![CDATA[A do&#8230;while loop is similar to the while looping construct aside from that a do&#8230;while circle is ensured to execute no less than one time. The syntax for this looping construct is as follows: do { /Statements }while(&#60;booleanexpression&#62;); Perceive that the Boolean declaration shows up toward the end of the circle, so the code execute ... <a title="The do&#8230;while Loop in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-do-while-loop-in-java" aria-label="Read more about The do&#8230;while Loop in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The while Loop in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-while-loop-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:28:29 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java bsics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The while Loop in Java]]></category>
		<category><![CDATA[while loop]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13038</guid>

					<description><![CDATA[A while loop is a control structure that permits you to rehash an errand a specific number of times. The syntax for this construct is as follows: while(boolean_expression) { /Statements } At the point when executing, if the boolean_expression result is genuine, then the activities inside the circle will be executed. This will proceed till ... <a title="The while Loop in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-while-loop-in-java" aria-label="Read more about The while Loop in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Loops in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/loops-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:20:12 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java loops]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[looping]]></category>
		<category><![CDATA[looping in java]]></category>
		<category><![CDATA[loops]]></category>
		<category><![CDATA[Loops in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13036</guid>

					<description><![CDATA[Looping is a common programming situation that you can expect to encounter rather regularly. Loop can simply be described as a situation in which you may need to execute the same block of code over and over. Java supports three looping constructs, which are as follows: for Loop do&#8230;while Loop while Loop &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Misc Operators in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/misc-operators-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 05:09:12 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[mics operators]]></category>
		<category><![CDATA[Misc Operators in Java]]></category>
		<category><![CDATA[tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13034</guid>

					<description><![CDATA[In addition to the above mentioned, there are several other operators, which are supported by Java. Conditional Operator ( ? : ): he conditional operator is a ternary operator that contains three operands. Essentially, this operator is used for the evaluation of boolean expressions. The operator tests the first operand or condition and if the ... <a title="Misc Operators in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/misc-operators-in-java" aria-label="Read more about Misc Operators in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Assignment Operators in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-assignment-operators-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 04:59:19 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[java Assignment]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java operators]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The Assignment Operators in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13031</guid>

					<description><![CDATA[There are following assignment operators supported by Java language:]]></description>
		
		
		
			</item>
		<item>
		<title>The Logical Operators in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-logical-operators-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 04:54:32 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The Logical Operators in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13028</guid>

					<description><![CDATA[Logical operators are an integral part of any operator set. The logical operators supported by Java are listed in the table below.]]></description>
		
		
		
			</item>
		<item>
		<title>The Bitwise Operators in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-bitwise-operators-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 04:51:17 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[Bitwise Operators]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The Bitwise Operators in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13025</guid>

					<description><![CDATA[The bitwise operators available in Java can be easily applied to a number of data types. These data types include byte, short, long, int and char. Typically, any bitwise operator performs the concerned operation bit-wise. For instance, if you consider the example of an integer x, which has the value 60. Therefore, the binary equivalent ... <a title="The Bitwise Operators in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/the-bitwise-operators-in-java" aria-label="Read more about The Bitwise Operators in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Relational Operators in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-relational-operators-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 04:45:23 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The Relational Operators in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13022</guid>

					<description><![CDATA[Java also supports several relational operators. The list of relational operators that are supported by Java are given below.]]></description>
		
		
		
			</item>
		<item>
		<title>The Arithmetic Operators in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/the-arithmetic-operators-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 04:39:20 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Arithmetic Operators]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[The Arithmetic Operators in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13019</guid>

					<description><![CDATA[Operations in Java are used in essentially the same manner as in algebra. They are used with variables for performing arithmetic operations. Here is a list of arithmetic operators available in Java.]]></description>
		
		
		
			</item>
		<item>
		<title>Operators in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/operators-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 04:35:44 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java operators]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[operators]]></category>
		<category><![CDATA[Operators in Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13017</guid>

					<description><![CDATA[The operator set in Java is extremely rich. Broadly, the operators available in Java are divided in the following categories. Relational Operators Arithmetic Operators Logical Operators Bitwise Operators Misc Operators Assignment Operators &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>India Rejects Reference To Jammu And Kashmir In China-Pak Statement</title>
		<link>https://blog.eduguru.in/news/india-rejects-reference-to-jammu-and-kashmir-in-china-pak-statement</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 06:00:07 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[india news]]></category>
		<category><![CDATA[India Rejects Reference To Jammu And Kashmir In China-Pak Statement]]></category>
		<category><![CDATA[jammu and kashmir issue news]]></category>
		<category><![CDATA[latest news]]></category>
		<category><![CDATA[today update]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13012</guid>

					<description><![CDATA[&#8220;India has repeatedly conveyed its concerns to both China and Pakistan on the projects in so-called China Pakistan Economic Corridor, which are in the territory of India that has been illegally occupied by Pakistan,&#8221; Spokesperson in the Ministry of External Affairs Anurag Srivastava said. India on Saturday categorically rejected the reference made to Jammu and ... <a title="India Rejects Reference To Jammu And Kashmir In China-Pak Statement" class="read-more" href="https://blog.eduguru.in/news/india-rejects-reference-to-jammu-and-kashmir-in-china-pak-statement" aria-label="Read more about India Rejects Reference To Jammu And Kashmir In China-Pak Statement">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>COVID-19 Vaccine Will Be Developed By End Of The Year</title>
		<link>https://blog.eduguru.in/news/covid-19-vaccine-will-be-developed-by-end-of-the-year</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 05:51:59 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[corona vaccine update]]></category>
		<category><![CDATA[Covid-19 India]]></category>
		<category><![CDATA[Covid-19 Vaccine]]></category>
		<category><![CDATA[Covid-19 Vaccine update]]></category>
		<category><![CDATA[COVID-19 Vaccine Will Be Developed By End Of The Year]]></category>
		<category><![CDATA[india news]]></category>
		<category><![CDATA[news feed]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13010</guid>

					<description><![CDATA[A total of 2.2 million patients have recovered and gone home and another seven lakh are going to be cured very soon, says Union Health Minister Dr Harsh Vardhan. Union Health Minister Dr Harsh Vardhan on Saturday said that India&#8217;s first vaccine against the novel coronavirus could be available by end of this year. &#8220;One ... <a title="COVID-19 Vaccine Will Be Developed By End Of The Year" class="read-more" href="https://blog.eduguru.in/news/covid-19-vaccine-will-be-developed-by-end-of-the-year" aria-label="Read more about COVID-19 Vaccine Will Be Developed By End Of The Year">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Coronavirus Outbreak Updates</title>
		<link>https://blog.eduguru.in/news/coronavirus-outbreak-updates</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 05:00:43 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[corona outbreak]]></category>
		<category><![CDATA[corona updates]]></category>
		<category><![CDATA[Coronavirus Outbreak Updates. india news]]></category>
		<category><![CDATA[coronavirus update]]></category>
		<category><![CDATA[latest update news]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13008</guid>

					<description><![CDATA[Coronavirus Outbreak Updates: 69,239 New Cases In Last 24 Hours Push India&#8217;s Covid Tally To 30.44 Lakh (India COVID-19 Cases: About 22 lakh COVID-19 patients have recovered so far; the recovery rate stood at 74.89 per cent this morning.) India&#8217;s coronavirus tally passed 30.44 Lakh lakh today with a single-day jump of 69,239 fresh infections ... <a title="Coronavirus Outbreak Updates" class="read-more" href="https://blog.eduguru.in/news/coronavirus-outbreak-updates" aria-label="Read more about Coronavirus Outbreak Updates">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>We Don&#8217;t Have To Do Business With China, Says Donald Trump</title>
		<link>https://blog.eduguru.in/news/we-dont-have-to-do-business-with-china-says-donald-trump</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 04:54:30 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[american update]]></category>
		<category><![CDATA[americans don`t have to do business with china]]></category>
		<category><![CDATA[china business]]></category>
		<category><![CDATA[india news]]></category>
		<category><![CDATA[We Don't Have To Do Business With China. Says Donald Trump]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13004</guid>

					<description><![CDATA[Trump entered into a high-stakes trade war with China before reaching a partial Phase 1 trade deal in January. Trump has since shut the door on Phase 2 negotiations, saying he was unhappy with Beijing&#8217;s handling of the pandemic. U.S. President Donald Trump, in a Fox News interview airing Sunday, raised the possibility of decoupling ... <a title="We Don&#8217;t Have To Do Business With China, Says Donald Trump" class="read-more" href="https://blog.eduguru.in/news/we-dont-have-to-do-business-with-china-says-donald-trump" aria-label="Read more about We Don&#8217;t Have To Do Business With China, Says Donald Trump">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Children Of 12 Years And Over Should Wear Masks Like Adults, Says WHO</title>
		<link>https://blog.eduguru.in/news/children-of-12-years-and-over-should-wear-masks-like-adults-says-who</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 04:32:54 +0000</pubDate>
				<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Children Of 12 Years And Over Should Wear Masks Like Adults. Says WHO]]></category>
		<category><![CDATA[Corona News india]]></category>
		<category><![CDATA[Corona Virus]]></category>
		<category><![CDATA[Covid]]></category>
		<category><![CDATA[Covid India]]></category>
		<category><![CDATA[WHO]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=13002</guid>

					<description><![CDATA[Children aged five years and under should not be required to wear masks based on the safety and overall interest of the child, the WHO and UNICEF said. The World Health Organization (WHO) said children aged 12 and over should wear masks to help tackle the COVID-19 pandemic under the same conditions as adults, while ... <a title="Children Of 12 Years And Over Should Wear Masks Like Adults, Says WHO" class="read-more" href="https://blog.eduguru.in/news/children-of-12-years-and-over-should-wear-masks-like-adults-says-who" aria-label="Read more about Children Of 12 Years And Over Should Wear Masks Like Adults, Says WHO">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Modifier Types</title>
		<link>https://blog.eduguru.in/tutorial/java/modifier-types</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 03:50:12 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Modifier Types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12998</guid>

					<description><![CDATA[Modifiers are catchphrases that you add to definitions to change their implications. The Java programming language has a wide and mixed bag of modifiers, including the accompanying: Non-Access Modifiers Java Access Modifiers In order to utilize a modifier, you incorporate its catchphrase in the meaning of a class, variable or method. The modifier goes before ... <a title="Modifier Types" class="read-more" href="https://blog.eduguru.in/tutorial/java/modifier-types" aria-label="Read more about Modifier Types">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Class/Static Variables</title>
		<link>https://blog.eduguru.in/tutorial/java/classstatic-variables</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 03:42:47 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java program]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[Class/Static Variables]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[variables]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12996</guid>

					<description><![CDATA[Class variables otherwise called static variables are declared with the static keyword in a class, yet outside a constructor, method or scope. There would just be one duplicate of each class variable for every class, paying little mind to what number of objects are made from it. Static variables are seldom utilized other than being ... <a title="Class/Static Variables" class="read-more" href="https://blog.eduguru.in/tutorial/java/classstatic-variables" aria-label="Read more about Class/Static Variables">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Instance Variables</title>
		<link>https://blog.eduguru.in/tutorial/java/instance-variables</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 03:37:16 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basic of java program]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[basics of java programming]]></category>
		<category><![CDATA[Instance Variables]]></category>
		<category><![CDATA[Java Instance Variables]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12994</guid>

					<description><![CDATA[The declaration of an instance variable is made inside the class. However, it is made outside the system, constructor or any scope. Instance variables are made when an object is made with the utilization of the keyword “new” and obliterated when the item is destroyed. When a space is dispensed for an item in the ... <a title="Instance Variables" class="read-more" href="https://blog.eduguru.in/tutorial/java/instance-variables" aria-label="Read more about Instance Variables">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Local Variables</title>
		<link>https://blog.eduguru.in/tutorial/java/local-variables</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 03:24:57 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Basic Program]]></category>
		<category><![CDATA[basic programming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Local Variables]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programming]]></category>
		<category><![CDATA[variables]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12992</guid>

					<description><![CDATA[Local variables are announced in systems, constructors, or scopes. Local variables are made when the constructor or method is entered and the variable will be decimated once it retreats the system, constructor or scope. Access modifiers can’t be utilized for neighborhood variables. Local variables are noticeable just inside the announced method, constructor or scope. Local ... <a title="Local Variables" class="read-more" href="https://blog.eduguru.in/tutorial/java/local-variables" aria-label="Read more about Local Variables">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java Variable Types</title>
		<link>https://blog.eduguru.in/tutorial/java/java-variable-types</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 03:11:38 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basic java program]]></category>
		<category><![CDATA[Basic Program]]></category>
		<category><![CDATA[basic programming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[programming]]></category>
		<category><![CDATA[tutorials]]></category>
		<category><![CDATA[Variable]]></category>
		<category><![CDATA[Variable Types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12989</guid>

					<description><![CDATA[A variable gives us named capacity that our code can control. Every variable in Java has a particular sort, which decides the size and format of the variable’s memory; the scope of values that can be put away inside that memory; and the set of operations that can be connected to the variable. You must ... <a title="Java Variable Types" class="read-more" href="https://blog.eduguru.in/tutorial/java/java-variable-types" aria-label="Read more about Java Variable Types">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java Literals</title>
		<link>https://blog.eduguru.in/tutorial/java/java-literals</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 03:05:25 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Java Literals]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[literals]]></category>
		<category><![CDATA[literals in java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12986</guid>

					<description><![CDATA[A literal in Java is a source code representation of a settled worth. They are spoken to specifically in the code without any calculation. Literals can be appointed to any primitive sort variable. Case in point: byte x = 86; char x = “a” int, byte, short and long can be communicated in hexadecimal(base 16), ... <a title="Java Literals" class="read-more" href="https://blog.eduguru.in/tutorial/java/java-literals" aria-label="Read more about Java Literals">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Reference Data Types</title>
		<link>https://blog.eduguru.in/tutorial/java/reference-data-types</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 22 Aug 2020 07:24:32 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basic data types]]></category>
		<category><![CDATA[Data Types]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[reference data]]></category>
		<category><![CDATA[Reference Data Types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12982</guid>

					<description><![CDATA[Reference variables are made utilizing characterized constructors of the classes. They are utilized to get to objects. These variables are proclaimed to be of a particular data type that can’t be changed. A few examples of such data types are Employee and Dog. Class objects, and different kind of variables go under reference data type. ... <a title="Reference Data Types" class="read-more" href="https://blog.eduguru.in/tutorial/java/reference-data-types" aria-label="Read more about Reference Data Types">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Primitive Data Types</title>
		<link>https://blog.eduguru.in/tutorial/java/primitive-data-types</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 22 Aug 2020 07:17:22 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basic data types]]></category>
		<category><![CDATA[Data Types]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Primitive Data Types]]></category>
		<category><![CDATA[primitive types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12980</guid>

					<description><![CDATA[There are eight primitive information types, which are supported by Java. Primitive data types are predefined by the dialect and named by a catchphrase. This section discusses these data types in detail. byte: byte information sort is a 8-bit marked two’s supplement whole number Maximum worth is 2^7 -1, which is equal to 127. This ... <a title="Primitive Data Types" class="read-more" href="https://blog.eduguru.in/tutorial/java/primitive-data-types" aria-label="Read more about Primitive Data Types">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Basic Data Types in java</title>
		<link>https://blog.eduguru.in/tutorial/java/basic-data-types-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sat, 22 Aug 2020 06:51:26 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Basic Data Types in java]]></category>
		<category><![CDATA[basic data types in java java data types]]></category>
		<category><![CDATA[data types in java]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Primitive Data Types]]></category>
		<category><![CDATA[Reference/Object Data Types]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12977</guid>

					<description><![CDATA[Variables are only saved memory areas to store values. This implies that when you make a variable, you save some space in memory. In light of the data type of a variable, the working framework distributes memory and chooses what can be put in the held memory. Consequently, by appointing diverse data types to variables, ... <a title="Basic Data Types in java" class="read-more" href="https://blog.eduguru.in/tutorial/java/basic-data-types-in-java" aria-label="Read more about Basic Data Types in java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Web security</title>
		<link>https://blog.eduguru.in/it-security/web-security</link>
		
		<dc:creator><![CDATA[eduguru]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 17:33:45 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[and government locations. An effective approach to web security threats must]]></category>
		<category><![CDATA[be proactive and defensive. Difference between Authentication and Authorization When speaking with other programmers and IT professionals]]></category>
		<category><![CDATA[by definition]]></category>
		<category><![CDATA[I often encounter confusion regarding the distinction between authorization and authentication. And of course]]></category>
		<category><![CDATA[preventing and responding to cyber threats. Websites and web applications are just as prone to security breaches as physical homes]]></category>
		<category><![CDATA[stores]]></category>
		<category><![CDATA[Web security is also known as “Cybersecurity”. It basically means protecting a website or web application by detecting]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12973</guid>

					<description><![CDATA[Web security is also known as “Cybersecurity”. It basically means protecting a website or web application by detecting, preventing and responding to cyber threats. Websites and web applications are just as prone to security breaches as physical homes, stores, and government locations. An effective approach to web security threats must, by definition, be proactive and defensive. &#160; Difference between Authentication and Authorization When speaking ... <a title="Web security" class="read-more" href="https://blog.eduguru.in/it-security/web-security" aria-label="Read more about Web security">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Classes in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/classes-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 10:39:31 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12970</guid>

					<description><![CDATA[A class is a blue print from which individual objects are made. A specimen of a class is given underneath: open class Dogs {String breed; String shade; int age; void eating (){ } void barking (){ } } A class can contain any of the accompanying variable sorts. Local variables Variables that are declared and ... <a title="Classes in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/classes-in-java" aria-label="Read more about Classes in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Objects in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/objects-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 05:21:47 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[java objects]]></category>
		<category><![CDATA[java point]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[javac]]></category>
		<category><![CDATA[objects]]></category>
		<category><![CDATA[objects in java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12967</guid>

					<description><![CDATA[Let us now look profoundly into what are objects. In the event that we consider this present reality, we can discover numerous entities around us, Cars, Humans, Dogs and several other. N fact, any real world entity can be modelled as an object. The one common thing between all these entities is the fact that ... <a title="Objects in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/objects-in-java" aria-label="Read more about Objects in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Objects and Classes in java</title>
		<link>https://blog.eduguru.in/tutorial/java/objects-and-classes-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 05:16:13 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Classes in java]]></category>
		<category><![CDATA[java classes and objects]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Objects and Classes in java]]></category>
		<category><![CDATA[objects in java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12964</guid>

					<description><![CDATA[Java is an Object-Oriented programming language. As an issue that has the Object Oriented peculiarity, Java underpins the accompanying essential ideas: Inheritance Polymorphism Abstraction Encapsulation Objects Message Parsing Classes Method Instance In this post, we will investigate the concepts of Classes and Objects. Class &#8211; A class can be described as an blueprint that declares ... <a title="Objects and Classes in java" class="read-more" href="https://blog.eduguru.in/tutorial/java/objects-and-classes-in-java" aria-label="Read more about Objects and Classes in java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Interfaces in java</title>
		<link>https://blog.eduguru.in/tutorial/java/interfaces-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 05:08:43 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Interfaces in java]]></category>
		<category><![CDATA[java interfaces]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12962</guid>

					<description><![CDATA[Java is all about interaction between objects. The manner in which different objects communicate with each other is defined in what is called an ‘interface.’ Moreover, interfaces are also an important aspect of the inheritance feature of java. As part of an interface, the methods that can be used by a derived or sub-class are ... <a title="Interfaces in java" class="read-more" href="https://blog.eduguru.in/tutorial/java/interfaces-in-java" aria-label="Read more about Interfaces in java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Inheritance in java</title>
		<link>https://blog.eduguru.in/tutorial/java/inheritance-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 11:47:10 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[Inheritance]]></category>
		<category><![CDATA[Inheritance in java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12957</guid>

					<description><![CDATA[Java supports inheritance. In other words, it is possible to derive one class from another class in this programming language. For instance, if you need to create a new class, which is an extension of an existing class, then you can simply derive this new class from an existing class. This allows the new class ... <a title="Inheritance in java" class="read-more" href="https://blog.eduguru.in/tutorial/java/inheritance-in-java" aria-label="Read more about Inheritance in java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Comments in Java</title>
		<link>https://blog.eduguru.in/tutorial/java/comments-in-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 11:43:33 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[Comments in Java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java Comments]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[javac]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12955</guid>

					<description><![CDATA[Just as in the case of C++ and C, Java supports two types of comments namely, single line comments and multi-line comments. The syntax for these types of comments are as follows: Single line comment: //&#60;comment&#62; Multiple line comment: /*&#60;comment&#62;*/ All characters that exist in the comments region are simply ignored by the Java compiler. ... <a title="Comments in Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/comments-in-java" aria-label="Read more about Comments in Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java Keywords</title>
		<link>https://blog.eduguru.in/tutorial/java/java-keywords</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 11:38:00 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[Java Keywords]]></category>
		<category><![CDATA[java progam]]></category>
		<category><![CDATA[java progamming]]></category>
		<category><![CDATA[javac]]></category>
		<category><![CDATA[key words]]></category>
		<category><![CDATA[key words of java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12953</guid>

					<description><![CDATA[Keywords or reserved words in Java are shown in the table below. As a rule, these words cannot be used as names for variables or constants. assert abstract break boolean case byte char catch const class default continue double do enum else final extends float finally goto for implements if instanceof import int long interface ... <a title="Java Keywords" class="read-more" href="https://blog.eduguru.in/tutorial/java/java-keywords" aria-label="Read more about Java Keywords">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java Enums</title>
		<link>https://blog.eduguru.in/tutorial/java/java-enums</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 11:29:04 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[Java Enums]]></category>
		<category><![CDATA[java progamming]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[of java]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12951</guid>

					<description><![CDATA[Enums were introduced as part of the Java package in java 5.0. Enums limit a variable to have one of just a couple of predefined qualities. The qualities in this identified list are called enums. With the utilization of enums it is conceivable to diminish the quantity of bugs in your code. Case in point, ... <a title="Java Enums" class="read-more" href="https://blog.eduguru.in/tutorial/java/java-enums" aria-label="Read more about Java Enums">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java Arrays</title>
		<link>https://blog.eduguru.in/tutorial/java/java-arrays</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 11:22:39 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Java Arrays]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[javac]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12948</guid>

					<description><![CDATA[Arrays are contiguous memory locations that store different variables of the same sort. On the other hand, an array itself is an article on the memory. An array is a container object that holds a fixed number of values of a single type. The length of an array is established when the array is created. After creation, its length is fixed.]]></description>
		
		
		
			</item>
		<item>
		<title>Java Variables</title>
		<link>https://blog.eduguru.in/tutorial/java/java-variables</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 11:14:50 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Java Variables]]></category>
		<category><![CDATA[javac]]></category>
		<category><![CDATA[program]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12946</guid>

					<description><![CDATA[Several types of variables are supported by Java. These types of variables include: Instance Variables (Non-static variables) Class Variables (Static Variables) Local Variables &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Java Modifiers</title>
		<link>https://blog.eduguru.in/tutorial/java/java-modifiers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 11:07:31 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Access Modifiers]]></category>
		<category><![CDATA[bsics of java]]></category>
		<category><![CDATA[java bsics]]></category>
		<category><![CDATA[Java Modifiers]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[Non-access Modifiers]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12944</guid>

					<description><![CDATA[Like is the case with any programming language, it is conceivable to alter classes and systems by utilizing modifiers. There are two classifications of modifiers: Access Modifiers: public, default, protected and private Non-access Modifiers: strictfp, final and abstrac &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Java Identifiers</title>
		<link>https://blog.eduguru.in/tutorial/java/java-identifiers</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 10:59:07 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[Java Identifiers]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[Java programs]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[javac]]></category>
		<category><![CDATA[program]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12941</guid>

					<description><![CDATA[All Java components require names. Names utilized for classes, variables and strategies are called identifiers. In Java, there are a few focuses to recall about identifiers. They are as per the following standard: All identifiers ought to start with a letter (beginning to end or a to z), underscore (_) or special character ($). After ... <a title="Java Identifiers" class="read-more" href="https://blog.eduguru.in/tutorial/java/java-identifiers" aria-label="Read more about Java Identifiers">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Basic Syntax of java</title>
		<link>https://blog.eduguru.in/tutorial/java/basic-syntax-of-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 10:54:27 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Basic Syntax of java]]></category>
		<category><![CDATA[basics of java]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java program]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[javac]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12938</guid>

					<description><![CDATA[About Java programs, it is paramount to remember the accompanying points. Class Names – For all class names, the first letter ought to be in Upper Case. On the off chance that few words are utilized to structure a name of the class, every internal word’s first letter ought to be in Upper Case. For ... <a title="Basic Syntax of java" class="read-more" href="https://blog.eduguru.in/tutorial/java/basic-syntax-of-java" aria-label="Read more about Basic Syntax of java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Java &#8211; Basic Syntax</title>
		<link>https://blog.eduguru.in/tutorial/java/java-basic-syntax</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 06:55:13 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Java - Basic Syntax]]></category>
		<category><![CDATA[java basics]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java programming basics]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[javac]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12935</guid>

					<description><![CDATA[A basic Java program can be broken down into several constructs and elements. Typically, it can be characterized as a collection of objects, which communicate with each other by calling each other’s routines. The basic definitions of objects and classes are given below: Class A class can be described as a blueprint that portrays the ... <a title="Java &#8211; Basic Syntax" class="read-more" href="https://blog.eduguru.in/tutorial/java/java-basic-syntax" aria-label="Read more about Java &#8211; Basic Syntax">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>History of Java</title>
		<link>https://blog.eduguru.in/tutorial/java/history-of-java</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 06:44:52 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[History of Java]]></category>
		<category><![CDATA[java language]]></category>
		<category><![CDATA[java programming]]></category>
		<category><![CDATA[java tutorials]]></category>
		<category><![CDATA[javac]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12932</guid>

					<description><![CDATA[James Gosling started working on the Java programming language in June 1991 for utilization in one of his numerous set-top box ventures. The programming language, at first, was called Oak. This name was kept after an oak tree that remained outside Gosling’s office. This name was changed to the name Green and later renamed as ... <a title="History of Java" class="read-more" href="https://blog.eduguru.in/tutorial/java/history-of-java" aria-label="Read more about History of Java">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Linux desktop environment</title>
		<link>https://blog.eduguru.in/linux-2/the-linux-desktop-environment</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 17 Aug 2020 07:28:21 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[desktop environment]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[The Linux desktop environment]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[unix desktop environment]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12925</guid>

					<description><![CDATA[In the early days of Linux (the early 1990s) all that was available was a simple text interface to the Linux operating system. This text interface allowed administrators to start programs, control program operations, and move files around on the system. With the popularity of Microsoft Windows, computer users expected more than the old text ... <a title="The Linux desktop environment" class="read-more" href="https://blog.eduguru.in/linux-2/the-linux-desktop-environment" aria-label="Read more about The Linux desktop environment">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>GNU utilities</title>
		<link>https://blog.eduguru.in/linux-2/gnu-utilities</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 17 Aug 2020 06:59:06 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Bourne shell]]></category>
		<category><![CDATA[Command Prompt]]></category>
		<category><![CDATA[core GNU utilities]]></category>
		<category><![CDATA[GNU]]></category>
		<category><![CDATA[GNU utilities]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Shell]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[utilities]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12921</guid>

					<description><![CDATA[The GNU organization (GNU stands for GNU’s Not Unix) developed a complete set of Unix utilities, but had no kernel system to run them on. These utilities were developed under a software philosophy called open source software (OSS). The concept of OSS allows programmers to develop software and then release it to the world with ... <a title="GNU utilities" class="read-more" href="https://blog.eduguru.in/linux-2/gnu-utilities" aria-label="Read more about GNU utilities">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Internet of Things (IOT)</title>
		<link>https://blog.eduguru.in/info/internet-of-things-iot</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 17:26:51 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Internet of Things (IOT)]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[new tech]]></category>
		<category><![CDATA[new techno]]></category>
		<category><![CDATA[new trending technology]]></category>
		<category><![CDATA[trending tech]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12916</guid>

					<description><![CDATA[One of the biggest tech trends to emerge in recent years is the Internet of Things. Simply put, the Internet of Things (abbreviated IOT) is the idea that all technological devices can be connected to the internet and to each other in an attempt to create the perfect marriage between the physical and digital worlds. ... <a title="Internet of Things (IOT)" class="read-more" href="https://blog.eduguru.in/info/internet-of-things-iot" aria-label="Read more about Internet of Things (IOT)">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Machine learning</title>
		<link>https://blog.eduguru.in/info/machine-learning</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 17:19:55 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[ML]]></category>
		<category><![CDATA[new tech]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[tranding technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12913</guid>

					<description><![CDATA[Another exciting emerging technology is machine learning, which is essentially a computer’s ability to learn on its own by analyzing data and tracking repeating patterns. For example, social media platforms use machine learning to get a better understanding of how you’re connected with those in your social network. They do this by analyzing your likes, ... <a title="Machine learning" class="read-more" href="https://blog.eduguru.in/info/machine-learning" aria-label="Read more about Machine learning">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Virtual reality (VR)</title>
		<link>https://blog.eduguru.in/info/virtual-reality-vr</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 17:14:58 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[IT-SECTOR]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[tranding techno. new trands technology]]></category>
		<category><![CDATA[Virtual reality]]></category>
		<category><![CDATA[Virtual reality (VR)]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12910</guid>

					<description><![CDATA[Remember watching movies about virtual reality and thinking how cool it would be if it was actually like that in real life? Well, it’s about to be. Although VR has been around since the 1950s, until recently the technology wasn’t able to deliver the fully immersive digital experience users have been craving. That’s about to ... <a title="Virtual reality (VR)" class="read-more" href="https://blog.eduguru.in/info/virtual-reality-vr" aria-label="Read more about Virtual reality (VR)">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Cognitive Technology</title>
		<link>https://blog.eduguru.in/info/cognitive-technology</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 17:10:51 +0000</pubDate>
				<category><![CDATA[info]]></category>
		<category><![CDATA[Cognitive Technology]]></category>
		<category><![CDATA[IT-SECTOR]]></category>
		<category><![CDATA[NEW TECHNOLOGY]]></category>
		<category><![CDATA[new trend techno]]></category>
		<category><![CDATA[tranding new technology]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12908</guid>

					<description><![CDATA[Cognitive technology is in the same vein as machine learning and virtual reality except that it’s a broader concept. For example, the cognitive technology umbrella includes things like natural language processing (NLP) and speech recognition. Combined, these different technologies are able to automate and optimize a lot of tasks that were previously done by people, ... <a title="Cognitive Technology" class="read-more" href="https://blog.eduguru.in/info/cognitive-technology" aria-label="Read more about Cognitive Technology">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Basic Linux Navigation</title>
		<link>https://blog.eduguru.in/linux-2/basic-linux-navigation</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 16:45:48 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[basic linux]]></category>
		<category><![CDATA[Basic Linux Navigation]]></category>
		<category><![CDATA[Basic unix]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux Navigation]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[unix Navigation]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12900</guid>

					<description><![CDATA[Now    we    need    to    talk    about    basic    folder    navigation    in    the    Linux    operating    system.  This    is    slightly   different    from    Microsoft    Windows.    However,    the    funny    thing    is    it   looks    close    enough    to    Windows    that   when    things    do    not    work    right,    people    have  the    urge    to    want    to    pick    up    their    computer    and    throw   it    out    the   ... <a title="Basic Linux Navigation" class="read-more" href="https://blog.eduguru.in/linux-2/basic-linux-navigation" aria-label="Read more about Basic Linux Navigation">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apt-get Command</title>
		<link>https://blog.eduguru.in/linux-2/apt-get-command</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 16:32:40 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Apt-get Command]]></category>
		<category><![CDATA[basic Commands]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LINUX COMMANDS]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[UNIX COMMANDS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12897</guid>

					<description><![CDATA[Now    we    are    going    to    talk    about    how    you    can    install    individual    programs.    The    thing  that    you    have   to    remember    with    Linux    is    that    this    is    an    open    source    world.    Most    of  the     software     is     free,     or     you     pay     for     it     in     weird     ways   ... <a title="Apt-get Command" class="read-more" href="https://blog.eduguru.in/linux-2/apt-get-command" aria-label="Read more about Apt-get Command">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Tasksel Commands</title>
		<link>https://blog.eduguru.in/linux-2/tasksel-commands</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 15:52:21 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[COMMANDS LIST]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[tasksel]]></category>
		<category><![CDATA[Tasksel Commands]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12892</guid>

					<description><![CDATA[The    command    that    we    are    going    to    talk    about    is    tasksel.    This    stands    for    “task   select.”     Now,     Ubuntu     is     trying     to     become     the     premier     provider     of     Linux   distributions.     They     have     really     done     a     lot     of     work   ... <a title="Tasksel Commands" class="read-more" href="https://blog.eduguru.in/linux-2/tasksel-commands" aria-label="Read more about Tasksel Commands">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Man Pages Command</title>
		<link>https://blog.eduguru.in/linux-2/man-pages-command</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 14:33:44 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[basic commands list]]></category>
		<category><![CDATA[Basic Unix Commands]]></category>
		<category><![CDATA[Basix Linux Commands]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux command]]></category>
		<category><![CDATA[Man Pages Command]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[UNIX COMMANDS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12888</guid>

					<description><![CDATA[we     need     to     talk     about     are     “man”     pages.     Man     pages     stand     for  manual    pages.    What    you    have    to    remember    with    man    pages    is    that    if    you    do    not   understand     how     a     command     is     supposed     to     work     ... <a title="Man Pages Command" class="read-more" href="https://blog.eduguru.in/linux-2/man-pages-command" aria-label="Read more about Man Pages Command">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>sudo Command</title>
		<link>https://blog.eduguru.in/linux-2/sudo-command</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 14:23:03 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[Linux Command]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Basic Linux Tasks/Commands]]></category>
		<category><![CDATA[Basic task]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LINUX COMMANDS]]></category>
		<category><![CDATA[linux Task]]></category>
		<category><![CDATA[sudo Commands]]></category>
		<category><![CDATA[task list]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[UNIX COMMANDS]]></category>
		<category><![CDATA[Unix Task]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12885</guid>

					<description><![CDATA[The     first     command     that     we     need     to     talk     about     before     you     start     doing     any     of     the  other    commands    is    “sudo.”    Sudo    basically    means    “super    user    do.”    In    the    previous  post,     we     discussed     how     different     distributions   ... <a title="sudo Command" class="read-more" href="https://blog.eduguru.in/linux-2/sudo-command" aria-label="Read more about sudo Command">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Open Source</title>
		<link>https://blog.eduguru.in/linux-2/open-source-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 13:07:22 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA['SCRIPT']]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LINUX DISTRIBUTION]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12882</guid>

					<description><![CDATA[Open     source     software     is     not     free     software.     And     if     you     treat     all     open     source  software     as     if     it     is     free,     you     are     jeopardizing     not     only     your     career,     but     ... <a title="Open Source" class="read-more" href="https://blog.eduguru.in/linux-2/open-source-2" aria-label="Read more about Open Source">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Server vs. Desktop</title>
		<link>https://blog.eduguru.in/linux-2/server-vs-desktop</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 12:56:53 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[Server vs. Desktop]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12879</guid>

					<description><![CDATA[There     are     generally     two     versions     of     Linux     that     everybody     is     going     to     provide.   Whether     you     get     Red     Hat     Linux,     Ubuntu     Linux,     Fedora     Linux,     or     whatever  distribution    that    may    be,    they    will    normally   ... <a title="Server vs. Desktop" class="read-more" href="https://blog.eduguru.in/linux-2/server-vs-desktop" aria-label="Read more about Server vs. Desktop">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Root</title>
		<link>https://blog.eduguru.in/linux-2/root</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 12:52:42 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12876</guid>

					<description><![CDATA[The   big    concept    that    you    have    to    understand    when    you    are    going    to    be    using   Linux     is     the     concept     of     Root.     In     Linux,     root     pertains     to     the     highest     level     of  anything.    When    you    hear    about    the    root    user,    it    is    referring   ... <a title="Root" class="read-more" href="https://blog.eduguru.in/linux-2/root" aria-label="Read more about Root">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The	Linux Shell</title>
		<link>https://blog.eduguru.in/linux-2/thelinux-shell</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 12:45:08 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LINUX OPERATING SYSTEM]]></category>
		<category><![CDATA[SHELL]]></category>
		<category><![CDATA[The Linux Shell]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12873</guid>

					<description><![CDATA[Now    that    we    have    the    legalities    out    of    the    way,    let    us    now    talk    about    the    shell    of the    Linux    operating    system.    So    what    is    a    shell?    The    shell    of    an    operating    system    is the     screen     that     you     use     to     interact     with     the     operating     system.   ... <a title="The	Linux Shell" class="read-more" href="https://blog.eduguru.in/linux-2/thelinux-shell" aria-label="Read more about The	Linux Shell">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Linux Distributions</title>
		<link>https://blog.eduguru.in/linux-2/linux-distributions-2</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 12:39:53 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Distributions]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12870</guid>

					<description><![CDATA[After    Linus    Torvalds    created    Linux    back    in    the    1990s,    he    wanted    to    stop    working for    a    little    bit.    So,    what    he    did    was    he    made    the    source    code    for    his    new    operating system     completely     available     to     the     public.     This     allowed     everybody     in     the     world, especially   ... <a title="Linux Distributions" class="read-more" href="https://blog.eduguru.in/linux-2/linux-distributions-2" aria-label="Read more about Linux Distributions">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Why Use Linux?</title>
		<link>https://blog.eduguru.in/linux-2/why-use-linux</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 12:32:43 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[use linux]]></category>
		<category><![CDATA[Why Use Linux?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12867</guid>

					<description><![CDATA[The     reason     that     you     should     learn     Linux     and     start     deploying     Linux     is     for     server  functionality.    Linux    is    incredibly    rock-solid.    Once    you    install    Linux,    and    once    you get    through    all    the    quirks    and    you    set    up    all    the    configurations,    a    Linux    server    will ... <a title="Why Use Linux?" class="read-more" href="https://blog.eduguru.in/linux-2/why-use-linux" aria-label="Read more about Why Use Linux?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Heuristic in Query optimization</title>
		<link>https://blog.eduguru.in/rdbms/dbms/heuristic-in-query-optimization</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 12 Aug 2020 15:55:09 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[Heuristic]]></category>
		<category><![CDATA[Heuristic in Query optimization]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Query Optimization]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12855</guid>

					<description><![CDATA[Heuristic optimization often includes making transformations to the query tree by moving operators up and down the tree so that the transformed tree is equivalent to the tree before the transformations. Before we discuss these heuristics, it is necessary to discuss the following rules governing the manipulation of relational algebraic expressions: 1. Joins and Products ... <a title="Heuristic in Query optimization" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/heuristic-in-query-optimization" aria-label="Read more about Heuristic in Query optimization">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Query Optimization</title>
		<link>https://blog.eduguru.in/rdbms/dbms/query-optimization</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 12 Aug 2020 13:46:41 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Query language]]></category>
		<category><![CDATA[Query Optimization]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12852</guid>

					<description><![CDATA[Before query optimization is carried out, one would of course need to decide what needs to be optimized. The goal of achieving efficiency itself may be different in different situations. For example, one may wish to minimize the processing time but in many situations one would wish to minimize the response time. In other situations, ... <a title="Query Optimization" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/query-optimization" aria-label="Read more about Query Optimization">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Query Processing</title>
		<link>https://blog.eduguru.in/rdbms/dbms/query-processing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 12 Aug 2020 13:36:48 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Query Processing]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12849</guid>

					<description><![CDATA[In most database systems, queries are posed in a non-procedural language like SQL and as we have noted earlier such queries do not involve any reference to access paths or the order of evaluation of operations. The query processing of such queries by a DBMS usually involves the following four phases: 1. Parsing 2. Optimization ... <a title="Query Processing" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/query-processing" aria-label="Read more about Query Processing">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How To Format USB Drive in Linux Command Line</title>
		<link>https://blog.eduguru.in/linux-2/how-to-format-usb-drive-in-linux-command-line</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 15:57:17 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How To Format USB Drive in Linux Command Line]]></category>
		<category><![CDATA[USB]]></category>
		<category><![CDATA[usb format]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12847</guid>

					<description><![CDATA[Step 1 – Insert USB and Identify Volume $ df -h Filesystem Size Used Avail Use% Mounted on /dev/sda1 28G 24G 2.3G 92% / udev 1.4G 12K 1.4G 1% /dev tmpfs 277M 1.2M 276M 1% /run none 5.0M 0 5.0M 0% /run/lock none 1.4G 34M 1.4G 3% /run/shm /dev/sdc1 14.8G 1.4G 13.4G 10% /media/admin Now, ... <a title="How To Format USB Drive in Linux Command Line" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-format-usb-drive-in-linux-command-line" aria-label="Read more about How To Format USB Drive in Linux Command Line">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Manipulation Language in SQL (DML)</title>
		<link>https://blog.eduguru.in/mysql-2/data-manipulation-language-in-sql-dml</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 15:50:33 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[Data Manipulation]]></category>
		<category><![CDATA[Data Manipulation Language in SQL (DML)]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12843</guid>

					<description><![CDATA[SQL language also includes syntax to update, insert, and delete records. These query and update commands together form the Data Manipulation Language (DML) part of SQL: • INSERT INTO &#8211; inserts new data into a database table • UPDATE &#8211; updates data in a database table • DELETE &#8211; deletes data from a database table ... <a title="Data Manipulation Language in SQL (DML)" class="read-more" href="https://blog.eduguru.in/mysql-2/data-manipulation-language-in-sql-dml" aria-label="Read more about Data Manipulation Language in SQL (DML)">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Definition Language (DDL) in SQL</title>
		<link>https://blog.eduguru.in/mysql-2/data-definition-language-ddl-in-sql</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 15:28:33 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[Data Definition language]]></category>
		<category><![CDATA[Data Definition Language (DDL) in SQL]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12840</guid>

					<description><![CDATA[The Data Definition Language (DDL) part of SQL permits database tables to be created or deleted. We can also define indexes (keys), specify links between tables, and impose constraints between database tables. The most important DDL statements in SQL are: • CREATE TABLE &#8211; creates a new database table • ALTER TABLE &#8211; alters (changes) ... <a title="Data Definition Language (DDL) in SQL" class="read-more" href="https://blog.eduguru.in/mysql-2/data-definition-language-ddl-in-sql" aria-label="Read more about Data Definition Language (DDL) in SQL">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Characteristics of SQL Commands</title>
		<link>https://blog.eduguru.in/mysql-2/characteristics-of-sql-commands</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 15:19:18 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[Characteristics of SQL]]></category>
		<category><![CDATA[Characteristics of SQL Commands]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Commands]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12837</guid>

					<description><![CDATA[Here you can see that SQL commands follow a number of basic rules: • SQL keywords are not normally case sensitive, though this in this tutorial all commands (SELECT, UPDATE etc) are upper-cased. • Variable and parameter names are displayed here as lower-case. • New-line characters are ignored in SQL, so a command may be ... <a title="Characteristics of SQL Commands" class="read-more" href="https://blog.eduguru.in/mysql-2/characteristics-of-sql-commands" aria-label="Read more about Characteristics of SQL Commands">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>SQL Commands</title>
		<link>https://blog.eduguru.in/mysql-2/sql-commands</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 15:15:51 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[COMMANDS]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Commands]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12834</guid>

					<description><![CDATA[There are three groups of commands in SQL: 1. Data Definition 2. Data Manipulation and 3. Transaction Control &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>What is SQL?</title>
		<link>https://blog.eduguru.in/mysql-2/what-is-sql</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 15:12:42 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL injection]]></category>
		<category><![CDATA[What is SQL?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12831</guid>

					<description><![CDATA[Structured Query Language, commonly abbreviated to SQL and pronounced as “sequel”, is not a conventional computer programming language in the normal sense of the phrase. It allows users to access data in relational database management systems. SQL is about data and results, each SQL statement returns a result, whether that result be a query, an ... <a title="What is SQL?" class="read-more" href="https://blog.eduguru.in/mysql-2/what-is-sql" aria-label="Read more about What is SQL?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Developing the Basic Schema</title>
		<link>https://blog.eduguru.in/rdbms/dbms/developing-the-basic-schema</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 10:13:36 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[database function developing basic schema]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[Developing the Basic Schema]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12826</guid>

					<description><![CDATA[Once entities and relationships have been identified and defined, the first draft of the entity relationship diagram can be created. This post introduces the ER diagram by demonstrating how to diagram binary relationships. Recursive relationships are also shown. Binary Relationships Figure 1 shows examples of how to diagram one-to-one, one-to-many, and many-to- many relationships. Figure ... <a title="Developing the Basic Schema" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/developing-the-basic-schema" aria-label="Read more about Developing the Basic Schema">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Modeling As Part of Database Design</title>
		<link>https://blog.eduguru.in/rdbms/dbms/data-modeling-as-part-of-database-design</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 10:03:48 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[Data Modeling As Part of Database Design]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Database Design]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[function model]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12823</guid>

					<description><![CDATA[The data model is one part of the conceptual design process. The other is the function model. The data model focuses on what data should be stored in the database while the function model deals with how the data is processed. To put this in the context of the relational database, the data model is ... <a title="Data Modeling As Part of Database Design" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/data-modeling-as-part-of-database-design" aria-label="Read more about Data Modeling As Part of Database Design">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>The Entity-Relationship Model</title>
		<link>https://blog.eduguru.in/rdbms/dbms/the-entity-relationship-model</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 09:49:39 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[attributes]]></category>
		<category><![CDATA[Classifying Relationships]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[Degree of a Relationship]]></category>
		<category><![CDATA[Direction]]></category>
		<category><![CDATA[entity-relationl model]]></category>
		<category><![CDATA[ER Model]]></category>
		<category><![CDATA[ER Notation]]></category>
		<category><![CDATA[Generalization Hierarchies]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Relationships]]></category>
		<category><![CDATA[Special Entity Types]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[The Entity-Relationship Model]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12820</guid>

					<description><![CDATA[The Entity-Relationship (ER) model was originally proposed by Peter in 1976 as a way to unify the network and relational database views. Simply stated the ER model is a conceptual data model that views the real world as entities and relationships. A basic component of the model is the Entity-Relationship diagram which is used to ... <a title="The Entity-Relationship Model" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/the-entity-relationship-model" aria-label="Read more about The Entity-Relationship Model">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Modeling In the Context of Database Design</title>
		<link>https://blog.eduguru.in/rdbms/dbms/data-modeling-in-the-context-of-database-design</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 09:30:52 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[Data Modeling]]></category>
		<category><![CDATA[Data Modeling In the Context of Database Design]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Database Design]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[ER Model]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12817</guid>

					<description><![CDATA[Database design is defined as: &#8220;design the logical and physical structure of one or more databases to accommodate the information needs of the users in an organization for a defined set of applications&#8221;. The design process roughly follows five steps: 1. Planning and analysis 2. Conceptual design 3. Logical design 4. Physical design 5. Implementation ... <a title="Data Modeling In the Context of Database Design" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/data-modeling-in-the-context-of-database-design" aria-label="Read more about Data Modeling In the Context of Database Design">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Modeling</title>
		<link>https://blog.eduguru.in/rdbms/dbms/data-modeling</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 09:24:37 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[attributes]]></category>
		<category><![CDATA[Cardinality]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[Data Model]]></category>
		<category><![CDATA[Data Modeling]]></category>
		<category><![CDATA[Database Design]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[Entities]]></category>
		<category><![CDATA[ER Model]]></category>
		<category><![CDATA[Relationship]]></category>
		<category><![CDATA[Schema]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12814</guid>

					<description><![CDATA[A data model is a conceptual representation of the data structures that are required by a database. The data structures include the data objects, the associations between data objects, and the rules which govern operations on the objects. As the name implies, the data model focuses on what data is required and how it should ... <a title="Data Modeling" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/data-modeling" aria-label="Read more about Data Modeling">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Types of Database System</title>
		<link>https://blog.eduguru.in/rdbms/dbms/types-of-database-system</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 09:17:22 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[Database System]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[types of Database]]></category>
		<category><![CDATA[Types of Database System]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12811</guid>

					<description><![CDATA[Several criteria are normally used to classify DBMSs. The first is the data model on which the DBMS is based. The main data model used in many current commercial DBMSs is the relational data model. The object data model was implemented in some commercial systems but has not had widespread use. Many legacy (older) applications ... <a title="Types of Database System" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/types-of-database-system" aria-label="Read more about Types of Database System">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>DBMS Architecture and Data Independence</title>
		<link>https://blog.eduguru.in/rdbms/dbms/dbms-architecture-and-data-independence</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 09:13:18 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[data architecture]]></category>
		<category><![CDATA[data independence]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[DBMS Architecture]]></category>
		<category><![CDATA[DBMS Architecture and Data Independence]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12807</guid>

					<description><![CDATA[Three important characteristics of the database approach are (1) insulation of programs and data (program-data and program-operation independence); (2) support of multiple user views; and (3) use of a catalog to store the database description (schema). In this post we specify an architecture for database systems, called the three-schema architecture, which was proposed to help ... <a title="DBMS Architecture and Data Independence" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/dbms-architecture-and-data-independence" aria-label="Read more about DBMS Architecture and Data Independence">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Database Administrators and Database Users</title>
		<link>https://blog.eduguru.in/rdbms/dbms/database-administrators-and-database-users</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 08:58:55 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[database administrators]]></category>
		<category><![CDATA[Database Administrators and Database Users]]></category>
		<category><![CDATA[database users]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[RDBMS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12804</guid>

					<description><![CDATA[A primary goal of a database system is to retrieve information from and store new information in the database. People who work with a database can be categorized as database users or database administrators. Database Users and User Interfaces There are four different types of database-system users, differentiated by the way they expect to interact ... <a title="Database Administrators and Database Users" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/database-administrators-and-database-users" aria-label="Read more about Database Administrators and Database Users">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Dictionary</title>
		<link>https://blog.eduguru.in/rdbms/dbms/data-dictionary</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 08:46:28 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[Data Dictionary]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12801</guid>

					<description><![CDATA[We can define a data dictionary as a DBMS component that stores the definition of data characteristics and relationships. You may recall that such “data about data” were labeled metadata. The DBMS data dictionary provides the DBMS with its self describing characteristic. In effect, the data dictionary resembles and X-ray of the company’s entire data ... <a title="Data Dictionary" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/data-dictionary" aria-label="Read more about Data Dictionary">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Database Languages</title>
		<link>https://blog.eduguru.in/rdbms/dbms/database-languages</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 13:32:06 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Database Languages]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12798</guid>

					<description><![CDATA[A database system provides a data definition language to specify the database schema and a data manipulation language to express database queries and updates. In practice, the data definition and data manipulation languages are not two separate languages; instead they simply form parts of a single database language, such as the widely used SQL language. ... <a title="Database Languages" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/database-languages" aria-label="Read more about Database Languages">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Models</title>
		<link>https://blog.eduguru.in/rdbms/dbms/data-models</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 13:19:39 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[DATA]]></category>
		<category><![CDATA[Data Models]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12795</guid>

					<description><![CDATA[Underlying the structure of a database is the data model: a collection of conceptual tools for describing data, data relationships, data semantics, and consistency constraints. To illustrate the concept of a data model, we outline two data models in this post: the entity-relationship model and the relational model. Both provide a way to describe the ... <a title="Data Models" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/data-models" aria-label="Read more about Data Models">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Instances and Schemas</title>
		<link>https://blog.eduguru.in/rdbms/dbms/instances-and-schemas</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 13:11:22 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[database management system]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[Instances and Schemas]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12792</guid>

					<description><![CDATA[Databases change over time as information is inserted and deleted. The collection of information stored in the database at a particular moment is called an instance of the database. The overall design of the database is called the database schema. Schemas are changed infrequently, if at all. The concept of database schemas and instances can ... <a title="Instances and Schemas" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/instances-and-schemas" aria-label="Read more about Instances and Schemas">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Disadvantages of a DBMS</title>
		<link>https://blog.eduguru.in/rdbms/dbms/disadvantages-of-a-dbms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 13:06:14 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[Disadvantages of a DBMS]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12789</guid>

					<description><![CDATA[Danger of a Overkill: For small and simple applications for single users a database system is often not advisable. Complexity: A database system creates additional complexity and requirements. The supply and operation of a database management system with several users and databases is quite costly and demanding. Qualified Personnel: The professional operation of a database ... <a title="Disadvantages of a DBMS" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/disadvantages-of-a-dbms" aria-label="Read more about Disadvantages of a DBMS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Advantages and of a DBMS</title>
		<link>https://blog.eduguru.in/rdbms/dbms/advantages-and-of-a-dbms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 13:02:28 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[Advantages of a DBMS]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12785</guid>

					<description><![CDATA[Using a DBMS to manage data has many advantages: Data independence: Application programs should be as independent as possible from details of data representation and storage. The DBMS can provide an abstract view of the data to insulate application code from such details. Efficient data access: A DBMS utilizes a variety of sophisticated techniques to ... <a title="Advantages and of a DBMS" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/advantages-and-of-a-dbms" aria-label="Read more about Advantages and of a DBMS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Characteristics of Database</title>
		<link>https://blog.eduguru.in/rdbms/dbms/characteristics-of-database</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:55:07 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[Characteristics of Database]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12781</guid>

					<description><![CDATA[The database approach has some very characteristic features which are discussed in detail below: Concurrent Use A database system allows several users to access the database concurrently. Answering different questions from different users with the same (base) data is a central aspect of an information system. Such concurrent use of data increases the economy of ... <a title="Characteristics of Database" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/characteristics-of-database" aria-label="Read more about Characteristics of Database">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Database Oriented Approach to Data Management</title>
		<link>https://blog.eduguru.in/rdbms/dbms/database-oriented-approach-to-data-management</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:47:52 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[Database Oriented Approach to Data Management]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12778</guid>

					<description><![CDATA[Consider part of a savings-bank enterprise that keeps information about all customers and savings accounts. One way to keep the information on a computer is to store it in operating system files. To allow users to manipulate the information, the system has a number of application programs that manipulate the files, including A program to ... <a title="Database Oriented Approach to Data Management" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/database-oriented-approach-to-data-management" aria-label="Read more about Database Oriented Approach to Data Management">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>File Oriented Approach</title>
		<link>https://blog.eduguru.in/rdbms/dbms/file-oriented-approach</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:39:10 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[File Oriented Approach]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12775</guid>

					<description><![CDATA[The earliest business computer systems were used to process business records and produce information. They were generally faster and more accurate than equivalent manual systems. These systems stored groups of records in separate files, and so they were called file processing systems. In a typical file processing systems, each department has its own files, designed ... <a title="File Oriented Approach" class="read-more" href="https://blog.eduguru.in/rdbms/dbms/file-oriented-approach" aria-label="Read more about File Oriented Approach">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Data Processing Vs. Data Management Systems</title>
		<link>https://blog.eduguru.in/rdbms/data-processing-vs-data-management-systems</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:37:06 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[RDBMS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12771</guid>

					<description><![CDATA[Although Data Processing and Data Management Systems both refer to functions that take raw data and transform it into usable information, the usage of the terms is very different. Data Processing is the term generally used to describe what was done by large mainframe computers from the late 1940&#8217;s until the early 1980&#8217;s (and which ... <a title="Data Processing Vs. Data Management Systems" class="read-more" href="https://blog.eduguru.in/rdbms/data-processing-vs-data-management-systems" aria-label="Read more about Data Processing Vs. Data Management Systems">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>database-management system</title>
		<link>https://blog.eduguru.in/rdbms/database-management-system</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:20:00 +0000</pubDate>
				<category><![CDATA[DBMS]]></category>
		<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[database management system]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12769</guid>

					<description><![CDATA[A database-management system (DBMS) is a collection of interrelated data and a set of programs to access those data. This is a collection of related data with an implicit meaning and hence is a database. The collection of data, usually referred to as the database, contains information relevant to an enterprise. The primary goal of ... <a title="database-management system" class="read-more" href="https://blog.eduguru.in/rdbms/database-management-system" aria-label="Read more about database-management system">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>DIFFERENCE BETWEEN DBMS &#038; RDBMS</title>
		<link>https://blog.eduguru.in/rdbms/difference-between-dbms-rdbms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:15:34 +0000</pubDate>
				<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[database management system]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[DIFFERENCE BETWEEN DBMS & RDBMS]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[SQL]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12767</guid>

					<description><![CDATA[A DBMS has to be persistent, that is it should be accessible when the program created the data ceases to exist or even the application that created the data restarted. A DBMS also has to provide some uniform methods independent of a specific application for accessing the information that is stored. RDBMS is a Relational ... <a title="DIFFERENCE BETWEEN DBMS &#038; RDBMS" class="read-more" href="https://blog.eduguru.in/rdbms/difference-between-dbms-rdbms" aria-label="Read more about DIFFERENCE BETWEEN DBMS &#038; RDBMS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>WHAT IS RDBMS?</title>
		<link>https://blog.eduguru.in/rdbms/what-is-rdbms</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 11:48:50 +0000</pubDate>
				<category><![CDATA[RDBMS]]></category>
		<category><![CDATA[data base management system]]></category>
		<category><![CDATA[dbms]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[WHAT IS RDBMS?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12764</guid>

					<description><![CDATA[RDBMS stands for Relational Database Management System. RDBMS data is structured in database tables, fields and records. Each RDBMS table consists of database table rows. Each database table row consists of one or more database table fields. RDBMS store the data into collection of tables, which might be related by common fields (database table columns). ... <a title="WHAT IS RDBMS?" class="read-more" href="https://blog.eduguru.in/rdbms/what-is-rdbms" aria-label="Read more about WHAT IS RDBMS?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Install DDrescue Data Recovery Tool On Ubuntu 16.04</title>
		<link>https://blog.eduguru.in/linux-2/install-ddrescue-data-recovery-tool-on-ubuntu-16-04</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 16:45:42 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[data recovery tool]]></category>
		<category><![CDATA[data recovery tool in linux]]></category>
		<category><![CDATA[data recovery tool in ubuntu]]></category>
		<category><![CDATA[data tools]]></category>
		<category><![CDATA[Install DDrescue Data Recovery Tool On Ubuntu 16.04]]></category>
		<category><![CDATA[linux ubuntu]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12761</guid>

					<description><![CDATA[DDrescue Data Recovery Tool for Ubuntu 16.04. Install DDrescue (CLI Data Recovery Tool) on Ubuntu 16.04 DDRescue-GUI is a powerful tool (with graphical user interface) to recover data from corrupted hard drives and flash memories (USB drives) on Linux Ubuntu. To be more specific, DDRescue-GUI uses the dump (dd) tool. DDRescue-GUI  application is implemented in ... <a title="Install DDrescue Data Recovery Tool On Ubuntu 16.04" class="read-more" href="https://blog.eduguru.in/linux-2/install-ddrescue-data-recovery-tool-on-ubuntu-16-04" aria-label="Read more about Install DDrescue Data Recovery Tool On Ubuntu 16.04">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install Kodi Media Center in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-kodi-media-center-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 16:36:44 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[application installation]]></category>
		<category><![CDATA[How to Install Kodi Media Center in Ubuntu]]></category>
		<category><![CDATA[kodi media center]]></category>
		<category><![CDATA[kodi media center in ubuntu]]></category>
		<category><![CDATA[kodomedia center in linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux instllation]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12759</guid>

					<description><![CDATA[1. Open terminal either from application menu or by pressing Ctrl+Alt+T on keyboard. When it opens, run command to add the PPA: sudo add-apt-repository ppa:team-xbmc/ppa Type user password (no asterisk feedback) when it prompts and hit Enter to continue. &#160;  install Kodi 18.5 via commands: sudo apt update sudo apt install kodi]]></description>
		
		
		
			</item>
		<item>
		<title>overGrive &#8211; Ubuntu Installation Instruction</title>
		<link>https://blog.eduguru.in/linux-2/overgrive-ubuntu-installation-instruction</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 16:17:38 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux overGrive]]></category>
		<category><![CDATA[overGrive]]></category>
		<category><![CDATA[overGrive - Ubuntu Installation Instruction]]></category>
		<category><![CDATA[ubuntu installation instruction]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12757</guid>

					<description><![CDATA[Requirements Ubuntu 16.04 &#8211; 20.04 / Mint 18 &#8211; 20 (32bit / 64bit) or later installed. The software should work on most Debian based systems if they support Gtk3. Python 3.5.3 or later installed. Ubuntu 16.04 / Mint 18 users must update to at least Python 3.5.3 or use the AppImage version. Users updating to Ubuntu 20.04 should ... <a title="overGrive &#8211; Ubuntu Installation Instruction" class="read-more" href="https://blog.eduguru.in/linux-2/overgrive-ubuntu-installation-instruction" aria-label="Read more about overGrive &#8211; Ubuntu Installation Instruction">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to install Sophos Antivirus for Linux in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-sophos-antivirus-for-linux-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 15:49:52 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[How to install Sophos Antivirus for Linux in Ubuntu]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux antivirus]]></category>
		<category><![CDATA[sophos anti virus]]></category>
		<category><![CDATA[ubuntu anti virus]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12753</guid>

					<description><![CDATA[Step 1) Go to the Sophos website and download the latest copy of the Sophos Antivirus for Windows. You may have to accept their terms and provide an email ID during free registration. Download Sophos Antivirus for Linux Step 2) The downloaded package is a compressed archive file. It should look like sav-linux-free-9.tgz. The version ... <a title="How to install Sophos Antivirus for Linux in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-sophos-antivirus-for-linux-in-ubuntu" aria-label="Read more about How to install Sophos Antivirus for Linux in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to install FileZilla FTP client in Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-filezilla-ftp-client-in-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 15:32:09 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[filezilla]]></category>
		<category><![CDATA[fileZilla in ubbuntu]]></category>
		<category><![CDATA[FTP client]]></category>
		<category><![CDATA[How to install FileZilla FTP client in Ubuntu]]></category>
		<category><![CDATA[installation]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12751</guid>

					<description><![CDATA[A brief intro of FileZilla FileZilla is the open source FTP client program. It uses FTP/SFTP protocol to transfer the files. It allows us to securely transfer files from the local computer to the remote computer. It is mostly used by the web developers in the uploading, downloading and editing web pages. Webpages are stored ... <a title="How to install FileZilla FTP client in Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-filezilla-ftp-client-in-ubuntu" aria-label="Read more about How to install FileZilla FTP client in Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How to Install Visual Studio Code on Ubuntu</title>
		<link>https://blog.eduguru.in/linux-2/how-to-install-visual-studio-code-on-ubuntu</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 02 Aug 2020 11:20:43 +0000</pubDate>
				<category><![CDATA[linux]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[How to Install Visual Studio Code on Ubuntu]]></category>
		<category><![CDATA[install in ubuntu]]></category>
		<category><![CDATA[install visual studio in linux]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[visual studio code]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12749</guid>

					<description><![CDATA[Visual Studio Code is an open-source cross-platform code editor developed by Microsoft. It has a built-in debugging support, embedded Git control, syntax highlighting, code completion, integrated terminal, code refactoring and snippets. The easiest and recommended way to install Visual Studio Code on Ubuntu machines is to enable the VS Code repository and install the VS ... <a title="How to Install Visual Studio Code on Ubuntu" class="read-more" href="https://blog.eduguru.in/linux-2/how-to-install-visual-studio-code-on-ubuntu" aria-label="Read more about How to Install Visual Studio Code on Ubuntu">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>Google Hacking Database</title>
		<link>https://blog.eduguru.in/it-security/google-hacking-database</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 02 Aug 2020 09:07:18 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[GHDB]]></category>
		<category><![CDATA[GOOGLE]]></category>
		<category><![CDATA[google hacking]]></category>
		<category><![CDATA[Google Hacking Database]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12747</guid>

					<description><![CDATA[The Google Hacking Database (GHDB) is a compendium of Google hacking search terms that have been found to reveal sensitive data exposed by vulnerable servers and web applications. The GHDB was launched in 2000 by Johnny Long to serve penetration testers. In 2010, Long turned the database over to Offensive Security and it became part ... <a title="Google Hacking Database" class="read-more" href="https://blog.eduguru.in/it-security/google-hacking-database" aria-label="Read more about Google Hacking Database">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>what is google dork?</title>
		<link>https://blog.eduguru.in/it-security/what-is-google-dork</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Sun, 02 Aug 2020 08:26:21 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[dork]]></category>
		<category><![CDATA[dork list]]></category>
		<category><![CDATA[google dork]]></category>
		<category><![CDATA[google dork list]]></category>
		<category><![CDATA[google search]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[what is google dork?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12744</guid>

					<description><![CDATA[A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that ... <a title="what is google dork?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-google-dork" aria-label="Read more about what is google dork?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>How would a potential hacker get hold of password anyway?</title>
		<link>https://blog.eduguru.in/it-security/how-would-a-potential-hacker-get-hold-of-password-anyway</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 09:48:01 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[brute force attacks]]></category>
		<category><![CDATA[cyber hackers]]></category>
		<category><![CDATA[HACKERS]]></category>
		<category><![CDATA[How would a potential hacker get hold of password anyway?]]></category>
		<category><![CDATA[password attack]]></category>
		<category><![CDATA[Password Attacks]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12741</guid>

					<description><![CDATA[There are four main techniques hackers can use to get hold of your password: 1. Steal it. That means looking over your should when you type it, or finding the paper where you wrote it down. This is probably the most common way passwords are compromised, thus it&#8217;s very important that if you do write ... <a title="How would a potential hacker get hold of password anyway?" class="read-more" href="https://blog.eduguru.in/it-security/how-would-a-potential-hacker-get-hold-of-password-anyway" aria-label="Read more about How would a potential hacker get hold of password anyway?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>What is a password manager?</title>
		<link>https://blog.eduguru.in/it-security/what-is-a-password-manager</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 09:43:54 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[manager]]></category>
		<category><![CDATA[PASSWORD]]></category>
		<category><![CDATA[password list]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[What is a password manager?]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12739</guid>

					<description><![CDATA[A password manager is software that helps a user to manage passwords and important information so that it can be accessed any time and anywhere. An excellent password manager helps to store information securely without compromising safety. All the passwords are saved using some kind of encryption so that they become difficult for others to ... <a title="What is a password manager?" class="read-more" href="https://blog.eduguru.in/it-security/what-is-a-password-manager" aria-label="Read more about What is a password manager?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT</title>
		<link>https://blog.eduguru.in/it-security/finding-the-best-browser-according-to-the-users-requirement</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 09:41:10 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[best browser]]></category>
		<category><![CDATA[best browsers]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[browsers]]></category>
		<category><![CDATA[finding best browsers]]></category>
		<category><![CDATA[FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12728</guid>

					<description><![CDATA[Browsers are the key to the Internet these days, at least for most tasks. There are many, many browsers for every platform and operating system, so the choice can be tough. However, this should help narrow the search. Step 1: Determine the age of your computer. How old is your computer? Is it a mobile ... <a title="FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT" class="read-more" href="https://blog.eduguru.in/it-security/finding-the-best-browser-according-to-the-users-requirement" aria-label="Read more about FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>SAFE BROWSING</title>
		<link>https://blog.eduguru.in/it-security/safe-browsing</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 09:18:25 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber space]]></category>
		<category><![CDATA[cynet attacks]]></category>
		<category><![CDATA[SAFE BROWSING]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security issue]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12725</guid>

					<description><![CDATA[Internet security is a matter of great concern for internet users. It is important to know if a website is secure or not while surfing the internet 19 . A secure website creates a safe connection between the website and the web browser so that entered data, such as personal information, credit card details, banking ... <a title="SAFE BROWSING" class="read-more" href="https://blog.eduguru.in/it-security/safe-browsing" aria-label="Read more about SAFE BROWSING">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>EMAIL SECURITY TIPS</title>
		<link>https://blog.eduguru.in/it-security/email-security-tips</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 09:02:51 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[e-mail]]></category>
		<category><![CDATA[e-mail security]]></category>
		<category><![CDATA[e-mail security tips]]></category>
		<category><![CDATA[EMAIL SECURITY TIPS]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12722</guid>

					<description><![CDATA[1. Don&#8217;t open email attachments that you are not expecting, or which have come from someone you do not know. When you open such an email, make sure that your anti-virus software is up-to-date and pay close attention to any warnings from your browser or email program. 2. You can use anonymity software which can ... <a title="EMAIL SECURITY TIPS" class="read-more" href="https://blog.eduguru.in/it-security/email-security-tips" aria-label="Read more about EMAIL SECURITY TIPS">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>MAJOR ISSUES WITH WLAN</title>
		<link>https://blog.eduguru.in/it-security/major-issues-with-wlan</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 03:08:39 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[issue in lan. major issues wlan]]></category>
		<category><![CDATA[MAJOR ISSUES WITH WLAN]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WLAN]]></category>
		<category><![CDATA[Wlan security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12718</guid>

					<description><![CDATA[Having said that, WLAN are also as prone to various attacks as their counterpart wired LNAs are. Actually WLANs are easier to hack as compared to wired LANs, if not properly configured, due to its easy accessibility around the installation. No need to be in contact of physical wires to hack can be done from ... <a title="MAJOR ISSUES WITH WLAN" class="read-more" href="https://blog.eduguru.in/it-security/major-issues-with-wlan" aria-label="Read more about MAJOR ISSUES WITH WLAN">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>WHAT IS WIRELESS LAN?</title>
		<link>https://blog.eduguru.in/uncategorized/what-is-wireless-lan</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 03:05:05 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHAT IS WIRELESS LAN?]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[wireless lan security. cyber security]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12715</guid>

					<description><![CDATA[The Wireless LAN or WLAN is becoming a popular way to connect devices such as computers these days. In offices and homes, WLAN has become an alternative way of communication compared to wired LAN. The convenience to connect different devices is both cost effective and easily maintainable. The Wikipedia says: “Wireless LANs have become popular ... <a title="WHAT IS WIRELESS LAN?" class="read-more" href="https://blog.eduguru.in/uncategorized/what-is-wireless-lan" aria-label="Read more about WHAT IS WIRELESS LAN?">Read more</a>]]></description>
		
		
		
			</item>
		<item>
		<title>SECURING COMPUTER USING FREE ANTIVIRUS</title>
		<link>https://blog.eduguru.in/it-security/securing-computer-using-free-antivirus</link>
		
		<dc:creator><![CDATA[Krishna]]></dc:creator>
		<pubDate>Thu, 30 Jul 2020 07:38:48 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[secureing computer]]></category>
		<category><![CDATA[SECURING COMPUTER USING FREE ANTIVIRUS]]></category>
		<guid isPermaLink="false">https://blog.eduguru.in/?p=12711</guid>

					<description><![CDATA[As computers become more and more integrated in to our lives, we end up leaving many sensitive data on our computer-from passwords, official email id, bank account to personal notes, business plans and other confidential information. So, good security software is a must for everyone. Here is a list of 11 free anti-virus software and ... <a title="SECURING COMPUTER USING FREE ANTIVIRUS" class="read-more" href="https://blog.eduguru.in/it-security/securing-computer-using-free-antivirus" aria-label="Read more about SECURING COMPUTER USING FREE ANTIVIRUS">Read more</a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
