Learnitweb

Author: Editorial Team

  • OWASP – An Introduction

    1. What is OWASP? OWASP stands for Open Web Application Security Project. The Open Web Application Security Project (OWASP) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security. The OWASP provides free and open resources. It is led by…

  • Finding shortest path with topological ordering

    1. Introduction In this tutorial, we’ll discuss about finding the shortest path with topological ordering. Usually we use Dijkstra’s algorithm if we want to find the shortest path in an arbitrary graph G(V,E) graph. But if the graph is a directed acyclic graph, we can achieve linear running time to calculate the shortest path in…

  • Topological ordering

    1. Introduction Topological ordering is a fundamental concept in graph theory and is particularly applied to Directed Acyclic Graphs (DAGs). The algorithm for obtaining a topological order was introduced by Robert Tarjan in 1976. Topological ordering(topological sort) of a G(V,E) directed graph is a linear ordering of its vertices such that for every directed (u,v)…

  • Maze problem

    1. Problem description The problem is that we have to construct an algorithm that can find its way out of an NxN maze. We can represent this maze with an NxN matrix. The maze problem is a classic application of Depth First Search (DFS), where the objective is to find a path from a starting…

  • Depth First Search Algorithm

    1. Introduction In this tutorial, we will explore another graph traversal technique: Depth First Search (DFS). This algorithm is designed to visit each vertex exactly once. Consider a graph with vertices A, B, C, D, E, and F, connected by multiple directed edges. DFS navigates through the graph by exploring as far as possible along…

  • ‘this’ keyword in JavaScript

    1. Introduction The this keyword is one of the most perplexing concepts in JavaScript. The confusion arises from the fact that its value is determined differently depending on the context in which it is used. The this keyword can be used in different contexts: inside functions, global scope, inside modules, etc. 2. Function context The…

  • Eureka self-preservation mode

    1. Introduction Eureka’s self-preservation mode is a built-in feature that helps prevent instances from being prematurely removed from the Eureka registry during transient network issues. This mode is triggered when Eureka detects that it has lost connection with a significant portion of its registered instances or clients. 2. What is Self-Preservation Mode? 3. Enabling/Disabling Self-Preservation…

  • Spring Cloud OpenFeign

    1. Introduction In this tutorial, we’ll discuss Spring Cloud OpenFeign. This tutorial is a summary from documentation page of Spring Cloud OpenFeign. Spring Cloud OpenFeign project provides OpenFeign integrations for Spring Boot apps through autoconfiguration and binding to the Spring Environment and other Spring programming model idioms. 2. Declarative REST Client: Feign Feign is a…

  • Invoke other microservice using Feign client

    1. Introduction In this tutorial, we’ll create and use microservices – product and inventory. These microservices will be registered with a Eureka server. We’ll then call an endpoint of product microservice and this will call the inventory microservice. 2. Inventory microservice In our previous tutorials, we used product microservice. The inventory microservice is similar to…

  • What is a PEM file?

    1. Introduction Privacy-Enhanced Mail (PEM) is a widely used file format for storing and transmitting cryptographic keys, certificates, and related data. It originated from a set of 1993 IETF standards aimed at defining “privacy-enhanced mail” for secure email communication. While the original privacy-enhanced mail protocol is largely obsolete, the PEM file format has become a…