Feature Image

How To Configure SSH Key-Based Authentication on a Linux Server

Introduction SSH, or secure shell, is an encrypted protocol used to administer and communicat ...

Read more


Feature Image

How to setup database cluster for high availability : Digital ocean with Maria DB

When dealing with applications on the cloud, it is often best to have replications and redundan ...

Read more


Feature Image

What if we can code humans. Comparing humans with machine !

Let me start by asking each one of you reading this blog a question. Do you live every moment of yo ...

Read more


Feature Image

Launching Startup! Read 'Step 1' To increase your success rate

Okay, First, This blog is not just for startups, Even if you are Starting new business or having ha ...

Read more


Feature Image

'The December' Effect, Business prediction thumb rule ;)

Well, first ' The December Effect ' is actually does not have anything with month  December, b ...

Read more


Categories

SUBSCRIBE FOR MORE UPDATES

Start Creating & MANAGING Beautiful Websites/Stores/Businesses

contact us | Terms and conditions | affiliates