• A to Z Theme Reveal with Blogchatter!

    This year I will be participating in my first ever ‘A to Z BlogChatter Challenge’. The challenge here is to blog everyday for the 26 alphabets starting from 1st April. Sundays are rest days!(Thank God! :)) More details about this blog challenge can be found here

    A theme is thought to be a good way to approach the blogging challenge.  Keeping in tune with my blog, I will be choosing ‘technical blogs’ and ‘personal thoughts’ as my theme for this challenge!

    Wish me luck as I embark on a new blogging adventure! 🙂

  • Thinking of returning to India? Here is the best place to return to….

    It has been a couple(or is it several?) years that you have lived abroad… you have soaked in the customs and traditions of a foreign country. You left India as a single person but you are married now and have kids. You may have procured higher education , had a successful career, may have bought more

  • 2018 Cybersecurity Trends

    We are already far into the New year and with it are coming new developments in cybersecurity. 2017 was an exciting year for the cybersecurity industry, and as its growth is bound to continue into 2018, there are plenty of things you need to watch out for. Here, we are going to go over the major ones.

    1. AI Attacks

    Artificial intelligence has now entered the mainstream and there is an abundance of free and commercial AI solutions. It was only a matter of time until cybercriminals dived on to the AI trend.

    Well, now, they have. AI software can learn from past events in order to help predict and identify cybersecurity threats. AI is used by almost 87% of the US based cybersecurity professionals. However, it is a double-edged sword because hackers can easily use AI to launch sophisticated cyber attacks.

    It can, for example, be used to automate the collection of certain information which can be sourced from public domain support forums, code anks and social media platforms.

    1. Ransomware and IoT

    The Internet of Things ransomware is not making headlines yet, because IoT typically does not store valuable data. But we should still not underestimate the potential for IoT ransomware to damage devices. For example, critical systems relying on IoT, such as power grids, can fall victim to cybercriminals.

    If a cybercriminal was to gain hold of a grid and the ransom was not paid, they could shut down the grid. Other IoT risks include smart cars, smart home appliances and production lines.

    1. Multi-factor Authentication

    63% of data breaches involve leveraging weak, stolen or default passwords. This is because many organizations are still using a single-factor authentication, which only relies on the use of a password.

    Companies tend to shy away from implementing multi-factor authentication because they think it can damage the user experience. But there is a growing awareness of password theft and, as such, it is likely that we will see a number of companies and websites implementing multi factor authentication as standard.

    1. Adoption of Advanced Cybersecurity Tech

    There are many new cybersecurity technologies emerging which we will probably see a wider adoption of in 2018. For example, the use of remote browsers can be useful to isolate your user’s browsing session from the main network.

    Speaking of networks, deploying an encrypted VPN can be much more efficient deterrent than a single firewall and antivirus, keeping malware and sniffing well out of striking distance.

    Also, dispersion technologies which imitate a company’s most valuable assets act as a honeypot trap for attackers trying to steal the data.

    Plus, there will be developments in the use of technologies which can detect and respond to strange behaviour. Endpoint Detection Response systems can monitor endpoints and alert system security admins of suspicious behaviour. Also, network traffic analysis can be used to determine the type, size and origin of data packets, helping to prevent DDoS attacks which can bring down entire networks.

    Cybersecurity is a serious industry and is worth over $120 billion. We will only see it grow in the years to come. If you want to learn more about cybercrime and cybersecurity, check out our infographic below.

    Cyber crimes Infographic 2018

  • Overloading and Overriding Methods in Java

    Two terms commonly associated with methods in Java are overloading and overriding. These two concepts will be discussed in the following sections.

    Method Overloading

    Method overloading is the process of defining more than one method having the same name in the same class (or in the same inheritance tree).

    Rules to define overloaded methods:

    • The methods must have the same name.
    • The methods must have different argument lists.
    • They may have same or different return types.
    • Their access levels may be same or different.

    The correct method to be executed by the system is decided by the Java compiler at compile time, and this is called static polymorphism. The following example demonstrates method overloading:

    public class Test {

           public static int add(int a, int b){    //adds 2 numbers

            return a + b;


           public static String add(String a, String b){  //concatenates 2 Strings with a space in between

            return a + ” ” + b;


           public static void main(String[] args){

               System.out.println(“4 + 5 = ” + add(4, 5));

            //calls 1st method

               System.out.println(“Method + Overloading = ” + add(“Method”, “Overloading”));

            //calls 2nd method



    The output of the above program is:

    4 + 5 = 9

    Method + Overloading = Method Overloading

    Method Overriding

    Method overriding means giving a new definition to an existing method in a class, in one of its subclasses. This is done to redefine the behaviour of objects of the subclass.

    Rules to override a method:

    • The overriding method should be present in the subclass of the class in which the overridden method is present.
    • The overriding and overridden methods should have the same name and argument list.
    • The two methods should have the same return type. Or the return type of the overriding method should be a subclass of that of the overridden method.
    • The access modifier of the overriding method must be either the same as or less restrictive than that of the overridden method.

    The method to be executed is decided at runtime (not at compile time), and this is called dynamic polymorphism. The following example demonstrates method overriding:

    class A {

        public void display(){

            System.out.println(“Executing from class A”);



    class B extends A {

        public void display(){               //override the method display()

            System.out.println(“Executing from class B”);




    public class Test1 {

        public static void main(String[] args) {

            A objA = new A();

            A objB = new B();              //an A reference, but a B object







    The above code prints:

    Executing from class A

    Executing from class B

    We have seen the core concepts of ‘Overloading and Overriding’ in Java in this post… Join me as I uncover more Java concepts in subsequent posts…

  • Why I don’t have a cooking blog?

    It was just around 12:00 noon on a Sunday afternoon, and she was doing her homework in her room with full enthusiasm. She had Math, Physics worksheets to complete and she was constantly having doubts about how to solve the mysterious problems. She would run to her brother to solve all her problems. He was more

  • Future Trends in Automobiles

     Automobiles have evolved rapidly in the last 30-40 years. This article reviews future trends of Automobiles. As we survey the current landscape of the automotive industry, let us have a look at the future trends in automobiles.

    • Global push for reduction in emissions.
    • Autonomous Driving
    • Changing trends in ownership and move towards Transportation as a Service also known as Mobility as a Service.

    We will discuss them one by one.


  • Pinkathon 2018!

    What began as a gentle whisper in our community, soon reached dizzying heights as more and more ladies joined in to run the Pinkathon on February 18, 2018, in Bengaluru, India.  For the uninitiated, ‘Pinkathon’ is the run founded by Milind Soman and Reema Sanghavi specifically for women, primarily to give importance to women’s health more

  • Use cases of Blockchain

    Even as the concept of ‘Blockchain’ is bouncing off everyone’s radar and everyone is keen to know more about this trending topic – let us see more about this new and emerging technology. 


    ‘Blockchain’ is popularly associated with ‘Bitcoin’ cryptocurrency. The Blockchain system shot into prominence and more industry experts took notice of it only after Bitcoin’s surge and ultimately its downfall!

    ‘Blockchain’ as you might recollect from my earlier post is the shared ledger system. Each transaction is recorded and added to the shared ledger after being approved by the ‘miners’.  The beauty of ‘Blockchain’ is that each miner or node has a copy of the transaction. None of the transactions can be modified or deleted.It allows total transparency of the system with no central authority and promises complete anonymity and security.


  • Why does each state of India have a separate language?

    Well, almost, each state… And sometimes, I feel like I am answering questions on Quora… 🙂 but I love to find answers for questions like these. Now let us try to answer the question, first though some introduction. Each of the four(or is it five states, now?) southern states of India – Tamil Nadu, Kerala, more

  • Video or Text?

    I am sure this question might have appeared in other forums – but after writing innumerable blog posts, I am always curious as to what should be the apt medium of communication for creating blog posts. Should it be videos or should it be plain text to get the point across? I am not going to be using any marketing terminology 🙂 …but rather a layman content writer’s viewpoint…

    Let us see the pros and cons of each type.