Our Blog

hackathon competitions

A hackathon, also known as a codefest, is a social coding event that brings computer programmers and other interested people together to improve upon or build a new software program.
The word hackathon is a portmanteau of the words hacker, which means clever programmer, and marathon, an event marked by endurance. The concept of the hackathon, also called a hack day or hack fest, was born out of the open source community. The first event labeled a hackathon was the OpenBSD Hackathon in Calgary, Canada, on June 4, 1999.
Today, engineering departments, especially those at web-based companies, adopt the practice to introduce intrapreneurship into the enterprise. Hackathons are sometimes undertaken to achieve a specific goal, but often they are a chance for businesses to pursue employee-driven, out-of-the-box ideas in a low-risk environment. Employees are given the freedom and support to collaborate with colleagues in other departments within a given timeframe, and without the pressure of having to produce a viable product.
Participants in modern hackathons not only concentrate on creating products and ideas, but also engage with sponsors, go to workshops, give presentations and speak with recruiters.

About Us
Networking discount @ 30%

Routers and firewalls are network connectivity devices that handle data packets on the network. The router will direct these data packets to their addressed destination on an internal as well as external scale. This is within or without the local area network (LAN). The firewall, on the other hand, is a hardware or software that secures a network against external threats. On their own, firewalls have no inbuilt intelligence as far as identifying or recognizing intrusions is concerned. These must therefore be used in conjunction with an intrusion detection system (IDS). It is therefore desirable that a competent network administrator should include all of these in their network management policy.
Routing involves choosing a path to use in sending packets over a network. Routing takes place at an IP router or host when it transmits IP packets. A routing table stored within the memory of the host or router is consulted during the routing process. If it is remote, the IP then verifies the routing table for a path to the remote network or host. The IP may use an IP address for the router to transfer a packet over the network. The routing table is referenced continuously for the addresses of the remote network or host. If the path is unavailable, an error message is send back to the source.

About Us
Internship Training

Ongoing technology education is a valuable resource to the University community. From instructor-led classes to downloadable reference materials and interactive online courseware, training is provided in a variety of convenient formats. Topics cover areas that help make you more effective and efficient when working with today’s technology.
Available To: Information Technology Students, Computer Science Students, Engineering Students. Training sessions are led by instructors with many years of experience in a variety of software offerings; they provide you the opportunity to ask questions of a real person in real time. Online training materials offer convenience, because you don’t have to register or travel to a classroom. Web-based learning is also cost-effective, saving time, money, and paper – it’s available 24/7 from any computer with a network connection.
Most training and internship opportunities are on a first-come, first-served basis. We offer opportunities to diploma students, graduates, and post graduates [ vacationists too ]

About Us