• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement

Archives for August 2020

You are here: Home » Archives for August 2020

By Abhishek Ghosh August 31, 2020 9:22 am Updated on August 31, 2020

Influence of Digitalization on Marketing : Part VII (END)

The sixth part of the article on Influence of Digitalization on Marketing can be read here. Marketing controlling is a function to support the management in their decisions and to control all market-related functions and represents a sub-area of ​​the entire operational controlling. The necessity of IT systems in this area is undisputed. The general objective of marketing controlling is a … [Read more...]

By Abhishek Ghosh August 29, 2020 8:55 am Updated on August 29, 2020

Data Science Use Cases in Casino & Gambling Industry

The casino is an establishment with a mathematical edge whereas gambling is generalized betting which includes betting on horse racing. A casino typically allows certain types of gambling and may have some entertainment services, such as concerts, and sports. The states which allow casino has strict rules to maintain a uniform standard. Gambling is quite a generic phrase and usually betting on a … [Read more...]

By Abhishek Ghosh August 26, 2020 12:18 pm Updated on August 26, 2020

Windows Terminal With Solarized Dark Oh-my-ZSH Theme

This is kind of Microsoft Windows version of our 8 years old guide on iTerm2, Homebrew and ZSH Installation on OS X. Windows 10 can not be made looking as great as Mac OS X iTerm2 but getting something closer looking is visually pleasing. It will consume many hours and days to get the thing completed. For getting the total thing done, we pointing towards the guides which work. The first … [Read more...]

By Abhishek Ghosh August 25, 2020 9:29 am Updated on August 25, 2020

Every Thing is Collecting Your Data

Privacy becoming a big concern in today’s connected world. We store (and share) more and more of our details and other information in digital formats. Most of us rely on our smartphones and gadgets to do everything from grocery shopping to work planning. Recent studies have shown that the amount of data we produce and gather has been increasing exponentially. The data that we make available … [Read more...]

By Abhishek Ghosh August 24, 2020 10:32 am Updated on August 24, 2020

External Link Icon With Hover With Base64 Data URI and CSS

Many of the webmasters and bloggers want to add a Wikipedia style external link icon to some of the external links. It is obvious matter that using a transparent image for this kind of external link icon increases one HTTP request. We have an old guide on how to use a transparent image to add an icon beside the external links for the effect. In short, the method for it was using a CSS like below … [Read more...]

By Abhishek Ghosh August 21, 2020 11:16 am Updated on August 21, 2020

Send HTTP POST Request to a Secure Webpage with PHP

You can send HTTP Post Request to any secured URL with a simple PHP script. Often this kind of script is helpful to build various buttons. In our different tutorials on IoT projects with ESP32, like in the guide Controlling AC Powered Appliances With ESP32 and IBM Watson IoT, we need to send a pair of HTTP POST requests to turn a thing ON and OFF. That is easy from command line using cURL. We can … [Read more...]

By Abhishek Ghosh August 20, 2020 7:50 am Updated on August 20, 2020

Blockchain and B2B Processes

Blockchain is seen by many experts as a revolutionary technology because for the first time truly secure digital transactions on the net become possible involving blockchain. If people enter into a trade or contractual relationship via blockchain, the associated data and documents are no longer on the central server of an intermediary, but in a distributed database in a worldwide peer-to-peer … [Read more...]

By Abhishek Ghosh August 13, 2020 11:07 am Updated on August 13, 2020

DIY Power Bank With TP4056 and MT3608 (3.3V to 12V)

For any electronics project, we require a power source. In our previous article How to Run an ESP32 on Battery, we have discussed about the challenges with direct powering with battery. As most of the projects require 3.3V DC to 5V DC, we need some system which can be charged with a mobile charger and the output voltage can be adjusted for different configurations of the power supply plans. … [Read more...]

By Abhishek Ghosh August 8, 2020 8:07 pm Updated on August 8, 2020

The Best Cross Browser Testing Tools

A good and consistent user experience is considered a priority in most, if not all, web development projects. If you are creating a website or a web application that serves users, you want the website to be usable, fluid, and performing well, regardless of how it is open. This is why performing cross-browser testing is important. You want to make sure that the website you are developing can … [Read more...]

By Abhishek Ghosh August 6, 2020 9:47 pm Updated on August 7, 2020

Advantages and Disadvantages of Convertible Laptops

Traditional laptops are portable enough but many of us are now used with touch and pen interface because of the penetration of the smartphones. The tablets with an i7 processor are just too damn expensive. Within a budget of $2,000, convertible laptops with 2K to 4K displays are simply ludicrous. The convertible laptops are designed for the budget-conscious audience who do not need a graphics … [Read more...]

By Abhishek Ghosh August 3, 2020 7:56 pm Updated on August 3, 2020

Decentralized Identity and Blockchain

In our previous article, we discussed the basics on blockchain for Digital Identity. The outstanding features of blockchain technology are - Transparency, Immutability, Timestamp and Trust without the help of an intermediary. The blockchain protocol is good to use in two ways, first as a proof of authenticity and second for the backup mechanisms. In addition to public verifiable credentials such … [Read more...]

  • 1
  • 2
  • Next Page »

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (20K Followers)
  • Twitter (4.9k Followers)
  • Facebook (5.8k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.2k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Top 10 Anti Hacking Software for Microsoft Windows January 22, 2021
  • What is Software Modernization? January 21, 2021
  • Cloud Computing : Cybersecurity Tips for Small Business Owners January 20, 2021
  • Arduino : Independently Blink Multiple LED January 18, 2021
  • What is a Loosely Coupled System? January 17, 2021

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy