How security implications affect Internet of Things

As every player with a stake in IoT is aware, security is paramount for the safe and reliable operation of IoT connected devices. It is, in fact, the foundational enabler of IoT. Where there is less consensus is how best to implement security in IoT at the device, network, and system levels. Network firewalls, Intrusion

Revolutionizing Healthcare Through Internet of Things

An often-quoted figure of Gartner says that “6.4 Billion Connected “Things” Will Be in Use in 2016” and use cases are far too many to be outlined in any one document. The idea of devices connecting directly with each other is, as Kevin Ashton coined the term Internet of Things puts it as, “a big

Navyug Infosolutions Featured on Clutch!

Since day one, the team of software professionals at Navyug Infosolutions has been dedicated to our founding mission and vision. That is, providing value to customers and society as a whole through wisdom, integrity, and technology. We offer a diverse array of services to meet our customer’s needs, including web application development, mobile app development,

Cordova Android/IOS google login using google-plus cordova plugin

As everyone knows that the google authentication through web views is going to be deprecated, where the google developers are suggested to use google sign in api for native android developers. In cordova based applications we can implement cordova google plus plugin which wraps google sign in and makes it accessible to us in JavaScript. I

Automating Registration by OTP from SMS

One lesser hectic method to retrieve the OTP from SMS. There is an android app / website:, it gives us free SMS push service, where you can get your text messages directly on a website. Pre requisites to use this method: You should have an android phone Phone should be connected to Internet, when

How record save happens in Ember?

In Ember when you call destroyRecord on model. In the network layer Rest Api Method delete is invoked and your model’s id is passed in your params, I believe everyone knows this stuff. Let’s dig deeper, what happens after you call the object method destroy record or delete record. To understand more let me define

Strategies to Interact with Dynamic Web elements using Selenium

The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency. – Bill Gates Target Audience: Software Developers, Automation Engineers. Read Time ~ 7 Mins 34 secs. (don’t trust me?

Postgres Continuous Archiving & Point-in-Time Recovery

Why do we need a Backup/ Recovery Strategy ? Backup and Recovery Strategies are absolutely essential for uninterrupted operation of any live business unit. The strategy must plan for recovery in every catastrophe such as: Device Failure: Loss of Machine or Disk Failure during Maintenance: Hardware or software upgrades Site Failure: Failure at Datacenter or

CSS Sprite Images benefits

In almost all the web application, we use many icons to make our pages look elegant. This might be good for the UI/UX but it has a huge implication on the network performance. Consider a page which shows 45 various services provided by an organisation. There will be 45 network calls required to get all the