The Words And Terminologies

The Blog is intended for Resources who need to practice the trade of IT, IS and Cyber in a secure manner.

Quick-Fix-This-nextcloud-instance-is-currently-in-maintenance-mode - Cover Image
Featured · NextCloud
Quick-Fix-This-nextcloud-instance-is-currently-in-maintenance-mode

Next Cloud Instance is Not exiting Maintenance Mode.

AI - Deep Seek v/s Others
Artificial Intelligence
AI - Deep Seek v/s Others

What is Different about deep seek LLMs and how as compared to alike Ai LLMs DeepSeek is an innovative large language model (LLM) developed by a Chinese startup, distinguishing itself through several

AI - Perplexity and Deep Seek
Artificial Intelligence
AI - Perplexity and Deep Seek

Where and how does perplexity use Deep Seek? Perplexity AI has recently integrated the DeepSeek R1 reasoning model into its AI search engine, providing a new tool for users, particularly those at the

What is R1 in DeepSeek? - Cover Image
Artificial Intelligence
What is R1 in DeepSeek?

Beyond its technical prowess, r1 is notable for being an open-weight model. That means that the weights—the numbers that define the model's functionality—are available to anyone in the world to downlo

Differences Between Human Languages and Programming Languages
Languages of Humans and Languages for Software Writing
Differences Between Human Languages and Programming Languages

Human languages and programming languages serve distinct purposes and exhibit fundamental differences in structure, usage, and complexity.

Connecting the dots - Problem Solving and Complex Situations
HR
Connecting the dots - Problem Solving and Complex Situations

Connecting the dots in the workplace refers to the ability to synthesize information from various sources and contexts to understand complex situations and solve problems effectively. This concept is

Role, Responsibility, Approach, attitude, skill, learning, listening and capability
HR
Role, Responsibility, Approach, attitude, skill, learning, listening and capability

Role, Responsibility, Approach, attitude, skill, learning, listening and capability Relation at Workplace - Micro, Small enterprises

Cyber Security Framework - Banking
Banking-Security-User-Awareness
Cyber Security Framework - Banking

Cyber Security framework has been put in Place for Cyber Resilience by RBI (Regulator)

Performance - Productivity - Efficiency - Cover Image
HR
Performance - Productivity - Efficiency

Understanding the Differences Between Performance, Productivity, and Efficiency

Time Servers - India - Cover Image
IT And IT Enabled Services
Time Servers - India

- Time Servers - India NIC: NIC runs multiple servers located at different locations across the country. Actual number of servers cannot be revealed for security reasons. NPL: NPL runs 20 NTP Servers

Understanding M.2, SATA, PCIe and NVMe SSDs
Memory Storage
Understanding M.2, SATA, PCIe and NVMe SSDs

SSD Storage and Standards

Low Code and No Code Framework - Cover Image
Software Devlopment Framework
Low Code and No Code Framework

Low-code and no-code platforms are key tools in modern application development. No-code and low-code platforms help reduce app development time by 90 percent.

What Is Shadow IT?
IT And IT Enabled Services
What Is Shadow IT?

An application adopted by a department or an end user for business use without the IT department's involvement is termed as a shadow IT application.

What is Technical Debt? - Cover Image
Standardizations
What is Technical Debt?

Technical debt is a common concept in software development, where team leaders delay features and functionality, cut corners, or settle for suboptimal performance to push the project forward. It occur

Difference between Spoofing and Phishing
Cyber Security
Difference between Spoofing and Phishing

Spoofing and Phishing gets Differentiated and explained here.

Cross-site scripting - Impact
Cyber Security
Cross-site scripting - Impact

What is cross-site scripting?

Quick-Fix -Unauthorized-WOPI-host
NextCloud
Quick-Fix -Unauthorized-WOPI-host

The Nexcloud Collaboration unable to Open xlsx,docx files (Open Office XML).

Sonicwall - Hosted Email Security - Cover Image
SonicWall - HES
Sonicwall - Hosted Email Security

SonicWALL - Hosted Email Security Delivers Comprehensive Email Security for Inbound and Outbound Emails.

CPU , NPU , GPU
Microprocessor
CPU , NPU , GPU

Microprocessors and processing engines.

Policy, Process, Procedure, SOP,WorkFlow
Standardizations
Policy, Process, Procedure, SOP,WorkFlow

Why your business needs systems & processes The average human makes about 35,000 decisions every day. That is a lot of decisions for any one person. However, you probably have more than one person