> , Author at Vinova - Page 195
Pakistan got its first female Google Developer Expert in Machine Learning

Pakistan got its first female Google Developer Expert in Machine Learning

An engineering graduate from the National University of Sciences & Technology (NUST), Aqsa Kausar has become Pakistan’s first female Google Developer Expert in Machine Learning. Machine Learning is the application of Artificial Intelligence that helps the computer system to predict the outcome and take action accordingly without being explicitly programmed. Aqsa Kausar has done a lot of contribution in her field, she organized workshops in different events including Google DevFest 2018 and Google Cloud Next Extended 2019 held in Islamabad. She was also part of Google’s Machine Learning Train-the-Trainer session recently held in Singapore. Aqsa is currently working with a Software firm Red Buffer. While talking to TechJuice, she said, “Being a part of Red Buffer has helped me immensely in my journey to becoming a GDE. Red Buffer has some of the best talents in Machine Learning & AI including some amazing tech-savvy women. Our CEO Tayyab Tariq has always been highly supportive and encouraging in my GDE journey, often saying “it’s not about you, it’s about how you use what you have to help others.” In her free time, Aqsa also writes blogs on Medium (An online publishing platform) on topics related to Machine Learning. She wants people to learn about this field especially women as she sees a lot of potential in the country. Aqsa told us, “I believe more women should step forward and make use of this amazing opportunity offered by Google, not just for their personal growth and networking, but also to widen the culture of knowledge sharing in Pakistan and to build communities of value.” Google Developer Expert program is globally recognized...
Laravel 7 is now released! – Laravel News

Laravel 7 is now released! – Laravel News

Laravel 7 is now released and includes many new features including Laravel Airlock, better routing speed, custom Eloquent casts, Blade component tags, fluent string operations, a new HTTP client, CORS support, and many more features. Before we jump into the new features we’d like to point out that starting with version 6, Laravel now follows semver and will release a new major version every six months. You can see how the release process works here. Laravel Airlock Laravel Airlock provides a featherweight authentication system for SPAs (single page applications), mobile applications, and simple, token-based APIs. Airlock allows each user of your application to generate multiple API tokens for their account. These tokens may be granted abilities/scopes which specify which actions the tokens are allowed to perform. Custom Eloquent Casts Laravel has a variety of built-in, helpful cast types; however, you may occasionally need to define your own cast types. You may now accomplish this by defining a class that implements the CastsAttributes interface. Classes that implement this interface must define a get and set methods. The get method is responsible for transforming a raw value from the database into a cast value, while the set method should transform a cast value into a raw value that can be stored in the database Blade Component Tags & Improvements Blade components have been overhauled to allow tag-based rendering, attribute management, component classes, inline view components, and more. Since the overhaul of Blade components is so extensive, please consult the full Blade component documentation to learn about this feature. HTTP Client Laravel now provides an expressive, minimal API around the Guzzle HTTP...
8 ways to increase your productivity as a web developer

8 ways to increase your productivity as a web developer

Making websites takes time. There are a lot of parts you have to think about if you want to create a good, solid website and sometimes it might feel like there just isn’t a way to go through the work faster. Whether you work alone or with a team of designers and back-end developers, there are a lot of way to be more productive. A mistake many people and many companies make is that they set out to standardize their product. They only build based on a single WordPress theme, or all their sites have the same features. If you want to work with bigger clients they almost never want standard work though. They instead want something custom-fit to their needs and requirements. That’s more interesting work, more challenging and pays more. But it also means you you can’t standardize your product. You can’t (and don’t want to) standardize your product, but what you can do is standardize your process. As a lead front-end developer with over 15 years of experience, I spent a lot of time thinking about how to optimally configure this process. If you’re intentional about it you can get some impressive productivity gains in all areas of the process. Here’s 8 ways to do that, from the beginning of the project through to the end: Start from a solid base Agree on design shortcuts Use handoff tools Use a CSS framework Re-use your components Use Emmet Use Polypane Set up automated quality checking Start from a solid base If you start from scratch every single time, you can be sure you’re never going to be...
Persistence – COM Hijacking | Penetration Testing Lab

Persistence – COM Hijacking | Penetration Testing Lab

Microsoft introduced Component Object Model (COM) in Windows 3.11 as a method to implement objects that could be used by different frameworks (ActiveX, COM+, DCOM etc.) and in different Windows environments allowing interoperability, inter-process communication and code reuse. Abuse of COM objects enables red teams to execute arbitrary code on behalf of a trusted process. Administrator privileges are not required to perform COM Hijacking since classes in the HKCU registry hive are executed prior to the classes in HKLM. The only exception affects high integrity processes (elevated) which objects are loaded only from HKLM location to prevent elevation of privileges. There are multiple methods that execution of code can be achieved but there are several cases which COM has been used in red teaming scenarios for persistence, lateral movement and defense evasion. Depending on how the malicious code will executed various registry sub-keys are used during COM Hijacking. These are: The above sub-keys are under the following registry hives: Discover COM Keys – Hijack Identification of COM keys that could be used to conduct COM hijacking is trivial and requires the use of Process Monitor in order to discover COM servers which are missing CLSID’s and doesn’t require elevated privileges (HKCU). Process Monitor can be configured with the following filters: COM Hijacking – Process Monitor Filters Opening files and executing tasks like a standard user will produce a list with COM keys that could be hijacked in order to load an arbitrary library to a trusted process. COM Hijacking – Process Monitor Results The results could be used directly or exported in various formats like CSV and XML. Process...
Laravel 5.8 is Released – Laravel News

Laravel 5.8 is Released – Laravel News

February 26, 2019 / Paul Redmond Laravel 5.8 is now released and available to everyone. This release includes several new features along with the latest bug fixes and improvements to the framework’s core. Some of the new features include: PHP dotenv An integration with PHP dotenv 3.0 ships with Laravel 5.8 and includes the following new features through PHP dotenv 3.0: Check out our PHP dotenv 3.0 Released article for full details on the v3.0 updates. Carbon v2 Laravel 5.8 is capable of using either Carbon v1 or Carbon v2, including the ability to use CarbonImmutable, and even make CarbonImmutable the default. Localization has changed quite a bit in Carbon v2, with much better internationalization support offered than v1. You can learn more from our writeup Carbon Updates Coming to Laravel 5.8. Cache TTL Changes A significant change that might have a moderate to high impact is the Cache TTL Changes Coming to Laravel 5.8. Passing integers to cache methods represents seconds now instead of minutes. Check out my article if you want to change from integer values to a Carbon or \DateInterval instance during the migration process. Deprecated String and Array Helpers Don’t be too alarmed that String and Array helpers are deprecated in Laravel 5.8. They offer little value (asides from style) over using the class equivalents, and Laravel plans on releasing the helpers as an optional package if you want to keep using them. Automatic Policy Resolution Starting in Laravel 5.8, as long as policies and models are in conventional locations, you will not need to register them in the AuthServiceProvider class. If you prefer to...
Malcare WordPress Security

mobile application developer singapore,mobile app development singapore,website design singapore,mobile apps development singapore,app developer singapore,web development singapore,developers in singapore,mobile apps singapore,mobile developer singapore,ios app development singapore,singapore mobile app developer,web design singapore,design agency singapore,web application singapore,singapore website design,mobile application development singapore,web design services singapore,web designer singapore,website developer singapore,singapore web development,singapore web design,graphic designer in singapore,android developer singapore,web design company singapore,design firms in singapore,ruby on rails developer singapore,developer in singapore,singapore web design services,website development singapore,singapore mobile application developer,web development company singapore,mobile game developer singapore,mobile app developer singapore,website designer singapore,ios developer singapore,app development singapore,singapore app developer