Approaches for Binary protocol (Bytestream protocol) for sensors
Simple Approach : Initially, positions of each packet are provided to the server for parsing. Format of each packet in string representation : header; imei; value_1; value_2.......value_N; checksum Example of packet received on server is as follows : Input packet...
Defect Prevention using POKA-YOKE technique
"A stitch in time saves Nine", after reading below article you will get to know in what context I am using this proverb. Most organizations develop software with a mindset that QA will be testing the product and detecting all bugs present in the system. Since our...
What is bootloader? Develop custom bootloader for STM32F072RB
Need for Custom Bootloader Like every software, embedded firmware written can have bugs, especially in cases where we are doing rapid development. The extra challenge in the field of IoT is that the devices on which firmware is installed can be anywhere in the world,...
Incremental backup for MongoDB
I am adding the complete process on how to use oplogs as an incremental backup for MongoDB. Although it is a little hacky way as there is no direct solution to this issue (like we have bin logs in PostgreSQL). Oplogs vs Journal Journals are low-level logs that are...
Solution to Push Notifications problems in iOS
Notifications in iOS are two types: 1) Remote Notifications 2) Local Notifications Local Notifications are scheduled by an app and delivered on the same device. When you create a local notification, you must specify when the system should deliver the notification. No...
Whom to blame? Designer or Developer? I wish they could tune in some harmony!
If this ache sounds familiar read on, we at Navyug have overcome this barrier. Our clients often ask us how do you manage the give and take between design and development team. We all have witnessed or even spoken these very lines; To a developer: make this design and...
Creating rogue WiFi AP using WiFi-pumpkin & Bettercap and performing SSL Man in the middle attack (MITM)
In my laptop, I have two wifi interfaces wlan0 and wlan1. I am using wlan1 to create rogue AP and wlan0 is connected to the internet which will be ultimately used to provide internet connectivity to rogue AP. You can also use ethernet interface to provide internet...
Axis Bank Mobile Application’s SSL validation flaw case study
In this case study, we tested several applications and libraries against different Man in The Middle Attack (MITM). One interesting finding is about Axis Bank Mobile Application. We found out that its SSL Certificate Validation is completely broken. Lab Setup We...
Stylesheet limit in Internet Explorer 9
SYMPTOMS:- Styles on a webpage are missing or look incorrect when the page loads in Microsoft Internet Explorer version 6 to 9. Note This problem can occur whether the webpage uses an inline style sheet or points to a cascading style sheet. You may also receive the...
Squid proxy setup, Blank Screen Issue with Youtube videos
Lately, we were setting up a youtube video caching and proxy server using squid in our project. By the time we were done with configuration, everything worked like charm and a lightweight proxy was set up in no time. Rules were written in the config to allow youtube...
Code Climate – Automated Checks for quality of Code
As per Wikipedia Static program analysis is the analysis of computer software that is performed without actually executing programs. In most cases, the analysis is performed on some version of the source code. WHY USE STATIC CODE ANALYSIS? Not every software developer...
How to use Picasso image loader library
In this post, I am going to discuss how to efficiently work with images in android without impacting performance/speed of application. I will be using a popular image loading library called Picasso. What I will discuss/Implement: 1) How to load many images (from web...
Cycling to a ‘Slower’ Life
A month ago, I decided to start cycling to office and back – my office is quite close to my home in Noida, a suburb of New Delhi, India. I announced my decision to my wife. “Are you crazy? Who cycles in this traffic, that too in summer, at 43 degrees C! What if you...
How not to run a business
In the beginning, there was darkness… Three years ago, I a brand new, first generation entrepreneur, was 46, broke, in debt and in the middle of a really messy corporate break-up – perhaps the lowest point in my career. Being down and out, I found two great companions...
Future Scope of OpenERP
OpenERP is an open source business application aimed at leveraging the power of open source community to develop a powerful ERP system. OpenERP has simplified ERP implementations across industries by making available basic functionalities. Business Analyst has to...
Web Development Solutions
Meaning of Web development has changed drastically since the outsourcing concept phenomenon has started. Web development can include web designing, content creation, content management, framework designing, page layout/masthead creation. The list should not be taken...
Cordova Android/IOS google login using Google-plus cordova plugin
As everyone knows that the google authentication through web views is going to be deprecated, where the Google developers are suggested to use google sign in API for native Android developers. In Cordova based applications we can implement Cordova google plus...
How record save happens in Ember?
In Ember when you call destroyRecord on the model. In the network layer, Rest Api Method delete is invoked and your model's id is passed in your params, I believe everyone knows this stuff. Let's dig deeper, what happens after you call the object method destroy a...
Strategies to Interact with Dynamic Web elements using Selenium
The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency. - Bill Gates Target Audience:...
“Maybe” Monad for Ruby
Let's start with a problem every Ruby on Rails developer faces, handling ‘nil’ value - a tedious task. NoMethodError: undefined method `[]' for nil:NilClassy 4 spaces But there is a well-known design pattern to handle ‘nil’ value for Ruby in the more robust way. Like...
Postgres Continuous Archiving & Point-in-Time Recovery
Why do we need a Backup/ Recovery Strategy? Backup and Recovery Strategies are absolutely essential for the uninterrupted operation of any live business unit. The strategy must plan for recovery in every catastrophe such as: Device Failure: Loss of Machine or Disk...