hackwithharsha Profile Banner
Harsha Vardhan ๐Ÿš€ Profile
Harsha Vardhan ๐Ÿš€

@hackwithharsha

Followers
21
Following
5K
Media
31
Statuses
163

Passionate about crafting with React.js โš›๏ธ | Navigating the AWS cloud โ˜๏ธ | Pythonic coder ๐Ÿ | Java enthusiast โ˜• | Spring Boot believer ๐ŸŒฑ | DevOps advocate ๐Ÿ› 

India
Joined August 2022
Don't wanna be here? Send us removal request.
@hackwithharsha
Harsha Vardhan ๐Ÿš€
4 months
Why we should pay an extra 4% for health and education when we already pay income tax ? #incometax #itr @nsitharaman @nsitharamanoffc #itrfliing
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
6 months
Your brain is the original large language model ( LLM ). Feed it right data, and it will rewrite your present and future !!
0
0
1
@hackwithharsha
Harsha Vardhan ๐Ÿš€
7 months
A weak design today is a performance bottleneck tomorrow.
0
0
0
@SomanathSpeak
Dr. S Somanath
7 months
Dear Colleagues, We encountered a setback today during the #PSLVC61 mission. Yet, true to its indomitable spirit, @ISRO will swiftly assemble its finest minds to dissect the anomaly and chart a meticulous course forward. I am aware of the formidable challenges we faced during
850
3K
26K
@hackwithharsha
Harsha Vardhan ๐Ÿš€
10 months
I haven't seen a better definition than this, ๐ฐ๐ก๐ž๐ง ๐š๐ง๐ ๐ฐ๐ก๐ฒ ๐š๐ซ๐œ๐ก๐ข๐ญ๐ž๐œ๐ญ๐ฎ๐ซ๐ž ๐ฆ๐š๐ญ๐ญ๐ž๐ซ๐ฌ ? #systemdesign #architecture #software #softwareengineering #hackwithharsha
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
SMS related security attacks #cybersecurity #sms #android
0
0
1
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
Updates with "Row Value Syntax"
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
This one is even special..
1
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
Row value syntax in #postgres #database #sql
1
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
You cannot completely prevent DDoS Attacks. But, you can mitigate them using following approaches. - IP Whitelisting / Blacklisting - Rate Limiting - Upstream filtering ( AWS Shield & CloudFare ) #DDoS #Cyber #CyberSecurity #Hacking #Java #Security
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
Three topics that you should understand for better commit messages. - Conventional commits - Imperative commit messages - Atomic commits #devops #git #github #python #java #database #MachineLearning
0
0
2
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
This article will help you in understanding how long database transactions affect performance with better examples ? #sql #database #dbms #postgres #hibernate #mysql https://t.co/FcCTwD9JrU
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
Here is the reference link for the same. https://t.co/qhzFp06oBi.
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
Tip about database transactions.. #postgres #sql #database #mysql #oracle #sqlserver #hibernate
1
0
1
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
Here is the reference, If you are interested in reading further. https://t.co/dhIZMPr73o
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
1 year
Good explanation on how to achieve reliability with UDP Protocol... Examples would be tftp ( trivial file transfer protocol ) and dhcpcd ( DHCP client ) #Network #Socket #Programming #NetworkProgramming
1
0
1
@specialcornel
Cornelius Adejoro
1 year
In this short video, I explain the concept of RAG (Retrieval-Augmented Generation) in a simple and easy-to-understand way. I hope it helps! Let me know your thoughts. The material is based on Prof. @ProfTomYeh's 'AI by Hand' resources.
0
50
292
@hackwithharsha
Harsha Vardhan ๐Ÿš€
2 years
๐Ÿš€ ๐๐ซ๐จ๐Ÿ๐ข๐ฅ๐ข๐ง๐  ๐ช๐ฎ๐ž๐ซ๐ฒ ๐ž๐ฑ๐ž๐œ๐ฎ๐ญ๐ข๐จ๐ง ๐ข๐ง ๐„๐ฅ๐š๐ฌ๐ญ๐ข๐œ ๐’๐ž๐š๐ซ๐œ๐ก - By adding "๐ฉ๐ซ๐จ๐Ÿ๐ข๐ฅ๐ž": ๐ญ๐ซ๐ฎ๐ž in your search request. Elasticsearch includes a ๐ฉ๐ซ๐จ๐Ÿ๐ข๐ฅ๐ž field in the response, which contains detailed information about the query execution. This
0
0
1
@hackwithharsha
Harsha Vardhan ๐Ÿš€
2 years
The transformation can be undertaken manually by the programmer or by an optimizing compiler. On modern processors, loop unrolling is often counterproductive, as the increased code size can cause more cache misses. -- copy from Wikipedia
0
0
0
@hackwithharsha
Harsha Vardhan ๐Ÿš€
2 years
It optimizes a program's execution speed at the expense of its binary size ( binary size increases due to an increase of instructions unrolling), which is an approach known as spaceโ€“time tradeoff.
1
0
0