e-Zest members share technology ideas to foster digital transformation.
There are two types of cryptography – symmetric and asymmetric. In one of my previous blog posts, I had written about symmetric cryptography. In this blog ...
Kerberos is an authentication protocol used by client-server applications on unsecure networks. It was developed at MIT as a part of Project Athena. Version 5 ...
e-Zest is a leading digital innovation partner for enterprises and technology companies that utilizes emerging technologies for creating engaging customers experiences. Being a customer-focused and technology-driven company, it always helps clients in crafting holistic business value for their software development efforts. It offers software development and consulting services for cloud computing, enterprise mobility, big data and analytics, user experience and digital commerce.