Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
GBlog
Three 90 Challenge: Bigger and Better
As we transit into the new phase, it's essential to fuel our inner drive for success. On popular demand, GeeksforGeeks is happy to announce that we are back with the Thre...
Read More
Enabling Third-party App Login using Google Account
Sometimes you try to log in to your Gmail account in a third-party app, but your request is denied. You may be trying to use SMTP protocol to send Emails through python ID...
Read More
Articles
Google
GBlog
TechTips
How To
How to Create Superscript and Subscript Text using Jetpack Compose in Android?
In this article, we will explain how to create a Superscript and Subscript text using Jetpack Compose. Below is the sample picture to show what we are going to build. Note...
Read More
Kotlin
Android
Android-Jetpack
AWS DynamoDB - Working with Streams
DynamoDB Streams is a DynamoDB feature that allows users to keep track of any changes made to the data in DynamoDB. It is an "ordered flow of data" that contains informati...
Read More
Picked
AWS
DynamoDB
Amazon Web Services
Scaffold in Android using Jetpack Compose
There are a lot of apps that contain TopAppBar, Drawer, Floating Action Button, BottomAppBar (in the form of bottom navigation), Snackbar. While you can individually set u...
Read More
Kotlin
Android
Android-Jetpack
Web Scraping in Flutter
The process of extracting required data/information from a web page by accessing the HTML of the web page is called Web Scraping or Web Harvesting or Web Data Extraction.T...
Read More
android
Flutter
Web-scraping
Dart
Flutter
Flutter - Implementing Overlay
Overlays let independent child widgets float visual elements on top of other widgets by inserting them into the overlay's Stack.This article discusses the implementation o...
Read More
android
Dart
Flutter
Flutter UI-components
How to Format Chart Axis to Percentage in Excel?
By default, in Excel, the data points in the axis are in the form of integers or numeric representations. Sometimes we need to express these numeric data points in terms o...
Read More
Picked
Excel
How to Install Docker on Windows?
Pre-requisites: Windows OS, DockerBefore understanding the concept of Docker, let's first discuss the concept of Hypervisors. So in an IT Company, or any cooperate, there ...
Read More
Picked
docker
Docker
How to Calculate Weighted MAPE in Excel?
In statistics, we often use Forecasting Accuracy which denotes the closeness of a quantity to the actual value of that particular quantity. The actual value is also known ...
Read More
Picked
Excel
How to Check Internet Connection in Kotlin?
If the Android application is developing, which is internet-based, then there must be a feature that checks for internet connectivity and informs the user there is no inte...
Read More
Kotlin
Kotlin Android
Android
Kubernetes - Monolithic Architecture of Kubernetes
There is a new way of developing software apps using a microservices architecture. That's when all the buzz around containers and container orchestration has increased but...
Read More
google-cloud-kubernetes-engine
azure-kubernetes-services
Kubernetes
DevOps
ConstraintLayout in Android using Jetpack Compose
ConstraintLayout is the view system in a ViewGroup to place widgets relative to the position of other widgets on the screen. In jetpack compose, almost every layout can be...
Read More
Kotlin
Android
Android-Jetpack
Amazon VPC - Security in Amazon Virtual Private Cloud
This article revolves around all the security services available under Amazon VPC. Along with the basic security infrastructure of AWS cloud, VPC also comes with several a...
Read More
Amazon
Picked
Cloud-Computing
Amazon Web Services
DevOps
Forced Browsing - Ethical Hacking
A Forced browsing attack is a vulnerability in which an unauthorized user has access to the contents of an authorized user. Forced browsing is an attack when a Web applica...
Read More
Misc
Cyber-security
Data Mining and Recommender Systems
Data mining makes use of various methodologies in statistics and different algorithms, like classification models, clustering, and regression models to exploit the insight...
Read More
data mining
Picked
Data Mining
1
...
5633
5634
5635
...
11251