• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement

Archives for August 2020

You are here: Home » Archives for August 2020

By Abhishek Ghosh August 31, 2020 9:22 am Updated on August 31, 2020

Influence of Digitalization on Marketing : Part VII (END)

The sixth part of the article on Influence of Digitalization on Marketing can be read here. Marketing controlling is a function to support the management in their decisions and to control all market-related functions and represents a sub-area of ​​the entire operational controlling. The necessity of IT systems in this area is undisputed. The general objective of marketing controlling is a … [Read more...]

By Abhishek Ghosh August 29, 2020 8:55 am Updated on May 22, 2022

Data Science Use Cases in Casino & Gambling Industry

The casino is an establishment with a mathematical edge whereas gambling is generalized betting which includes betting on horse racing. A casino typically allows certain types of gambling and may have some entertainment services, such as concerts, and sports. The states which allow casino has strict rules to maintain a uniform standard. Gambling is quite a generic phrase and usually betting on a … [Read more...]

By Abhishek Ghosh August 26, 2020 12:18 pm Updated on August 26, 2020

Windows Terminal With Solarized Dark Oh-my-ZSH Theme

This is kind of Microsoft Windows version of our 8 years old guide on iTerm2, Homebrew and ZSH Installation on OS X. Windows 10 can not be made looking as great as Mac OS X iTerm2 but getting something closer looking is visually pleasing. It will consume many hours and days to get the thing completed. For getting the total thing done, we pointing towards the guides which work. The first … [Read more...]

By Abhishek Ghosh August 25, 2020 9:29 am Updated on August 25, 2020

Every Thing is Collecting Your Data

Privacy becoming a big concern in today’s connected world. We store (and share) more and more of our details and other information in digital formats. Most of us rely on our smartphones and gadgets to do everything from grocery shopping to work planning. Recent studies have shown that the amount of data we produce and gather has been increasing exponentially. The data that we make available … [Read more...]

By Abhishek Ghosh August 24, 2020 10:32 am Updated on August 24, 2020

External Link Icon With Hover With Base64 Data URI and CSS

Many of the webmasters and bloggers want to add a Wikipedia style external link icon to some of the external links. It is obvious matter that using a transparent image for this kind of external link icon increases one HTTP request. We have an old guide on how to use a transparent image to add an icon beside the external links for the effect. In short, the method for it was using a CSS like below … [Read more...]

By Abhishek Ghosh August 21, 2020 11:16 am Updated on August 21, 2020

Send HTTP POST Request to a Secure Webpage with PHP

You can send HTTP Post Request to any secured URL with a simple PHP script. Often this kind of script is helpful to build various buttons. In our different tutorials on IoT projects with ESP32, like in the guide Controlling AC Powered Appliances With ESP32 and IBM Watson IoT, we need to send a pair of HTTP POST requests to turn a thing ON and OFF. That is easy from command line using cURL. We can … [Read more...]

By Abhishek Ghosh August 20, 2020 7:50 am Updated on August 20, 2020

Blockchain and B2B Processes

Blockchain is seen by many experts as a revolutionary technology because for the first time truly secure digital transactions on the net become possible involving blockchain. If people enter into a trade or contractual relationship via blockchain, the associated data and documents are no longer on the central server of an intermediary, but in a distributed database in a worldwide peer-to-peer … [Read more...]

By Abhishek Ghosh August 13, 2020 11:07 am Updated on August 13, 2020

DIY Power Bank With TP4056 and MT3608 (3.3V to 12V)

For any electronics project, we require a power source. In our previous article How to Run an ESP32 on Battery, we have discussed about the challenges with direct powering with battery. As most of the projects require 3.3V DC to 5V DC, we need some system which can be charged with a mobile charger and the output voltage can be adjusted for different configurations of the power supply plans. … [Read more...]

By Abhishek Ghosh August 8, 2020 8:07 pm Updated on March 7, 2023

The Best Cross Browser Testing Tools

A good and consistent user experience is considered a priority in most, if not all, web development projects. If you are creating a website or a web application that serves users, you want the website to be usable, fluid, and performing well, regardless of how it is open. This is why performing cross-browser testing is important. You want to make sure that the website you are developing can … [Read more...]

By Abhishek Ghosh August 6, 2020 9:47 pm Updated on August 7, 2020

Advantages and Disadvantages of Convertible Laptops

Traditional laptops are portable enough but many of us are now used with touch and pen interface because of the penetration of the smartphones. The tablets with an i7 processor are just too damn expensive. Within a budget of $2,000, convertible laptops with 2K to 4K displays are simply ludicrous. The convertible laptops are designed for the budget-conscious audience who do not need a graphics … [Read more...]

By Abhishek Ghosh August 3, 2020 7:56 pm Updated on August 3, 2020

Decentralized Identity and Blockchain

In our previous article, we discussed the basics on blockchain for Digital Identity. The outstanding features of blockchain technology are - Transparency, Immutability, Timestamp and Trust without the help of an intermediary. The blockchain protocol is good to use in two ways, first as a proof of authenticity and second for the backup mechanisms. In addition to public verifiable credentials such … [Read more...]

  • 1
  • 2
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Is it Good to Run Apache Web server and MySQL Database on Separate Cloud Servers? March 27, 2023
  • Advantages of Cloud Server Over Dedicated Server for Hosting WordPress March 26, 2023
  • Get Audiophile-Grade Music on Your Smartphone March 25, 2023
  • Simple Windows Security and Privacy Checklist for 2023 March 24, 2023
  • 7 Best Artificial Intelligence (AI) Software March 24, 2023

About This Article

Cite this article as: Abhishek Ghosh, "," in The Customize Windows, , March 28, 2023, .

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT