The true story of the Taj Hotel terrorist attack in Mumbai. Hotel staff risk their lives to keep everyone safe as people make unthinkable sacrifices to protect themselves and their families.
Continue readingAuthor: Atul Sharma
चुनाव में नोटा (NOTA) को “हाँ” या “ना” ?
Our EVMs have NOTA (None of the above) option to NOT to vote for any listed candidates. Here is why it should be “No”, in simple Hindi.
Continue readingVisual Studio 2019: Limited Time Free Course on Pluralsight
Learn awesome new features of Visual Studio 2019 in free on Pluralsight
Continue readingनेटफ्लिक्स सीरीज “दिल्ली क्राइम”
निर्भया गैंगरेप पर बनी अनदेखे पहलुवों को दिखाती नई सीरीज का रिव्यु – Delhi Crime on Netflix
Continue readingSOUND – S for Secure Programming #2 | OWASP #2 | Broken Authentication
As a part of Secure Programming of SOUND Programming Methodology we will cover #2 Threat from OWASP Top 10 — Broken Authentication
Continue readingC# String Interning for Efficient String Comparison
String interning is very important concept when we need to do string comparison. This article has everything that a developer need to know about this
Continue readingAll About C# Immutable Classes
We often hear about immutable strings behavior. The same behavior is extended to classes and here is everything you need to know about them.
Continue readingPerformance Consideration for C# Conditional Statements
We normally overlook few important aspects of basic C# Conditional statements. Here we will find out what and how to use what?
Continue readingEggie Maggie Roll
A delicious shortcut to your hunger with maggie and eggs. It is healthy and named as Eggie Maggie Roll
Continue readingMantra to Crack Job Interviews
Job Interviews are gateway to dream. To make sure dream doesn’t get shattered with less preparedness, read this and be double confident…
Continue readingप्रियंका गाँधी के हमशक्ल टाइगर श्रॉफ ने वेस्ट यूपी का प्रभार माँगा
प्रियंका और इंदिरा गाँधी के चेहरे की समानता को प्रियंका की सबसे बड़े उपलब्धि बताने वाले कांग्रेसियों को झटका। इस व्यंग्य में देखें कि कैसे कई हमशक्लों ने क्या क्या दावा किया
Continue readingAll About IEnumerable and IQueryable
Most sought collection when using LINQ in C#. This comprehensive guide has everything – Working, Similarities and Differences and a lot more
Continue readingSOUND – S for Secure Programming #1 | OWASP #1 | Injection Attack
After introduction of SOUND, As part of Secure Programming, we will be covering SQL Injection attack in detail and other OWASP top 10 Threats.
Continue readingC# Collections: When to use what?
It always has been confusion among developers that which C# Collections and When to use them. Here is complete guide for that
Continue readingDynamics 365 : Many to Many (N:N) Relationship
Let us see how to implement N:N relationship between two entities with example.
Continue reading