OpenSource For You
Subscription Hotline 91-011-26810601/02/03  
   THE COMPLETE MAGAZINE ON OPEN SOURCE
    Home
    Magazine
    Current Issue
    Feature Archives
    Subscription
    Advertising
    Contacts
    About EFY Group


EZINE

October 2010 Issue



OUR MAGAZINES

Electronics For You

Electronics Bazaar



Editorial Guidelines

Editorial Guidelines



OUR NETWORK

Electronicsforu.com

Opensourceforu.com

Efymagonline.com

Kitsnspares

EFYMagonline.com

Eleb2b.com




OpenSource For You
May  2025   Issue Vol. 13  No. 7 

Focus
A Peek into Programming Platforms for Blockchain Development
Blockchains are no longer only about cryptocurrencies. Open source blockchain programming platforms offer security and privacy in the development of decentralised applications. Here’s a list of such platforms to choose from.

Focus
AI and Blockchain: A Match Made in Data Heaven
By combining the intelligence of AI with the security and transparency of blockchain, we’re building a future where digital systems are more intelligent, trustworthy, and accessible to all.
Focus
Decentralised Storage on Blockchain: IPFS, Filecoin, and Arweave
IPFS, Filecoin, and Arweave are three of the most popular decentralised storage solutions. Let’s explore how each one works, what makes them different, and when to use them.
 
Focus
Why Transparency in Blockchain Relies on Open Source Code
Without open source, blockchain risks becoming another black box—opaque, unaccountable, and susceptible to misuse.
Focus
The Rise of Forking in Blockchain: Innovation or Fragmentation?
Let’s examine the technical underpinnings of blockchain forks, explore their role in driving innovation, and evaluate the potential risks they pose to the cohesion and adoption of blockchain technology. Here’s a balanced view of how forking shapes the future of decentralised systems.
 
Focus
The Benefits of Blockchain Technology
Blockchain can enhance trust, security, and privacy in a range of digital transactions. Find out how…
Focus
Getting Started with Corda
Corda is a distributed ledger technology first developed with businesses in mind. This step-by-step guide will get you started on it.
 
Focus
A Peek into the Consensus Mechanisms of Open Source lockchains
Explore three different consensus algorithms, comparing their tenets, advantages, and disadvantages, while also going into how they have influenced the development of open source blockchain ecosystems.
Focus
Cybersecurity: How Blockchains can Help
Blockchains offer a great platform for organisations and governments to secure their digital assets in a tamper-proof way.
 
Focus
A Beginner’s Guide to Solidity, the Smart Contract Programming Language
Solidity is a smart contract programming language that allows you to program decentralisation directly into every contract, ensuring transparency and security. Discover the role it plays in the Web3 ecosystem and learn how to write your first Solidity contract.
Focus
An Introduction to Hyperledger Fabric
Explore the key features and use cases of Hyperledger Fabric, the open source blockchain framework for enterprises. Then learn how to get started with it.
 
For U & Me - InSight
Palm-Sized Quantum Chips Spark Boundless Dreams
Meet the newest entrants to the quantum computing race—Google’s Willow, Microsoft’s Majorana 1, and Amazon’s Ocelot, which take us closer to the possibility of a commerciallyviable large quantum computer.
For U & Me - Overview
What is Cloud Gaming?
What are cloud games? How are they different from online games? What are the pros and cons? And who are the major players in this space? Here are the basics everyone needs to know...
 
For U & Me - Overview
VM-Based Cloudlets: Giving a Boost to Mobile Computing
Our mobile phones are great at sharing and processing information but do have limitations in terms of storage capacity and processing power. VM-based cloudlets address these drawbacks, leading to seamless mobile computing.
For U & Me - Let's Try
Exploring GPT4All, the Local LLM Desktop App
Developed by Nomic AI, GPT4All is a free-to-use, locally running chatbot that offers offline access, privacy, customisation and cost savings. And it does not need a graphics processing unit or GPU to function.
 
Developers - How To
Build Your First AI Agent
Last month, we learnt what agentic AI is and how it works. In this second article on agentic AI, we will learn how to develop and design an AI-driven multi-agent service.
Developers - Let's Try
When Embeddings Miss the Point: The Quiet Crisis in Embedding Models
Text embeddings run modern natural language processing systems. However, they can misinterpret human language and lead to critical errors with terrible consequences. The good news is that there are ways out of this mess.
 
Developers - InSight
An Introduction to Topic Modelling in NLP
Topic modelling in natural language processing is used to categorise information, organise huge text data, obtain a summary of a large corpus, and improve recommendation systems by identifying commonalities within the corpus. Let’s explore the LDA technique to implement the topic modelling of a corpus.
Developers - Let's Try
Word Embeddings Made Easy with Word2Vec
This short tutorial will teach you how to create your own Word2Vec model from a small corpus using the Gensim library.
 
Admin - Overview
How AI and ML Enhance Intrusion Detection in Kubernetes
Discover how artificial intelligence and machine learning can power intrusion detection systems to provide zero trust security in complex Kubernetes environments.
Admin - InSight
Are You Using Open Source Tools to Build a Secure and Scalable IT Infrastructure?
As IT infrastructures become increasingly complex, ensuring they are secure and scalable is more critical than ever in today’s digital landscape. Open source tools offer cost-effective, flexible, and powerful solutions, enabling organisations to secure their networks, automate processes, and maintain compliance—all without the high costs associated with proprietary solutions.
 
Admin - InSight
An Introduction to Inodes
Understanding inodes can be invaluable for troubleshooting disk-space issues, optimising filesystem performance, and recovering deleted files.
Admin - Overview
AI and ML: Revolutionising Network Monitoring and Security
With the rise in cyber threats and the complexity of managing large-scale networks, traditional methods of network monitoring and security have become inadequate. Enter artificial intelligence and machine learning, which are revolutionising the way we monitor networks and counter cyber threats.
 














Previous Issue's
Check our Subscription Details
Check our Advertisement Details

May 2025
Issue Vol. 13 No. 7


Privacy Policy  |  Terms & Conditions  |  Corporate Information
© 2004 EFY Enterprises Pvt Ltd. All rights reserved.