Geeksourcecodes

Employee Attendance System with Fingerprint Scanning

Employee Attendance System with Fingerprint Scanning

Employee Attendance System with Fingerprint Scanning is a capstone project that...

Python File Writing

Python File Writing

In this Tutorial you will learn: File Writing Modes, File Writing in Python, Deleting...

Python Simple POS (Invoice)

Python Simple POS (Invoice)

Python Simple POS (Invoice)

Tic Tac Toe HTML5 Game

Tic Tac Toe HTML5 Game

It is a classic ‘Tic Tac Toe’ game created with HTML5.

Simple Automated Voting System (AVS)

Simple Automated Voting System (AVS)

Simple Automated Voting System (AVS)

Bus Booking App - Android

Bus Booking App - Android

Bus Booking App - Android

Bio-metric (Finger Print) Based Attendance system

Bio-metric (Finger Print) Based Attendance system

Bio-metrics (Finger Print) Based Attendance system that mark an attendance according...

Resize & Optimize Images With JavaScript in Node.js

Resize & Optimize Images With JavaScript in Node.js

Lately, I have been working with a couple of image-intensive projects with Node.js,...

Responsive Awesome Chat Or Messenger using PHP/Javascript

Responsive Awesome Chat Or Messenger using PHP/Javascript

I decided to share this simple but powerful demo project of mine just to show how...

wifi network, advantages and disadvantages

wifi network, advantages and disadvantages

This is a wireless network that connects the router which supplies the network to...

email, advantages and disadvanatages

email, advantages and disadvanatages

This is the process by which people exchange messages from one network to another...

Applications of NOSQL database

Applications of NOSQL database

Technology has advanced, and as a result most of the activities that occur day to...

SQL, advantages and disadvantages

SQL, advantages and disadvantages

SQL is a programming language that is designed for the purpose of managing data...

SQL applications

SQL applications

SQL is used as a client server language which links front end to back end and as...

how to maintain data integrity

how to maintain data integrity

Data integrity is the process of ensuring that data is only accessed and that modification...

5 important augmented and virtual reality trends

5 important augmented and virtual reality trends

We are in 21 century whereby technological transformation in world is creating a...

Examples of Awesome Disruptive Technologies

Examples of Awesome Disruptive Technologies

Disruptive technology refers to any innovation that significantly alters the ways...

Industrial applications of robots

Industrial applications of robots

Due to evolvement of how processes are carried out in various industries we have...

wifi network, advantages and disadvantages

wifi network, advantages and disadvantages

This is a wireless network that connects the router which supplies the network to...

The advantages and disadvantages of Internet Of Things

The advantages and disadvantages of Internet Of Things

Internet of things is influencing  our day-to-day objects with machine-readable...

How banks are using internet of things

How banks are using internet of things

It is fair to say  that most of banks haven’t really got into the wave of the IoT...

10 Real world applications of internet of things

10 Real world applications of internet of things

Internet of things have started to evolve due to convergence of multiple technologies,...

Advantages and disadvantages of outsourcing IT

Advantages and disadvantages of outsourcing IT

Outsourcing refers to process whereby a company hires third party so that it can...

Features of customer relation management softwares

Features of customer relation management softwares

This are Softwares that are used to automate and manage lifestyle of customers in...

E-COMMERCE

E-COMMERCE

This is the process by which products are bought or sold through online process...

Most important cryptocurrencies other than bitcoin

Most important cryptocurrencies other than bitcoin

BItcoin has not been typesetter in the world of cryptocurrency but also a key pillar...

Social impact of blockchain technology

Social impact of blockchain technology

Blockchain refers to digital database or ledger that contains financial transcations...

Advantages and disadvantages of cryptocurrency

Advantages and disadvantages of cryptocurrency

Cryptocurrency reffers to digital coin which is not authorised by the government...

email, advantages and disadvanatages

email, advantages and disadvanatages

This is the process by which people exchange messages from one network to another...

SQL, advantages and disadvantages

SQL, advantages and disadvantages

SQL is a programming language that is designed for the purpose of managing data...

SQL applications

SQL applications

SQL is used as a client server language which links front end to back end and as...

how to maintain data integrity

how to maintain data integrity

Data integrity is the process of ensuring that data is only accessed and that modification...

Ways of preventing data security breach

Ways of preventing data security breach

The term breach of data security refers to the process by which data or information...

gateway, advantages and disadvantages

gateway, advantages and disadvantages

Two or more computers are able to communicate to each other through an established...

Challenges Facing E-commerce.

Challenges Facing E-commerce.

Shopping platforms have eliminated many barriers of entry.  Anybody  can launch...

Types of cyber-crime.

Types of cyber-crime.

Occurs when a cyber-criminals impersonate person  else identity to practice malfunction....

Example of online storage sites, their advantages and disadvantages

Example of online storage sites, their advantages and disadvantages

Online storage sites has enabled companies store data on cloud and avoid bleaches...

Most common cloud computing security issues

Most common cloud computing security issues

Efficiency, affordability and scalability are features which should be accompanied...

Types of cloud computing and cloud deployment models

Types of cloud computing and cloud deployment models

types of cloud computing and cloud deployment models

Major features of cloud computing

Major features of cloud computing

Cloud computing into days world is becoming popular, reason is due to gradual growth...

Types of Artificial intelligence

Types of Artificial intelligence

TYPES OF ARTIFICIAL INTELLIGENCE Based on the functionalities, AI can be grouped...

Advantages of Artificial Intelligence

Advantages of Artificial Intelligence

Advantages of AI 1. Limited errors These systems developed with the aid of AI are...

Artificial Intelligence(AI) 2020

Artificial Intelligence(AI) 2020

The term Artificial Intelligence (AI) refers to the process of developing systems...

[ Explained Simply ] AI, Machine Learning, Deep Learning

[ Explained Simply ] AI, Machine Learning, Deep Learning

As “Artificial Intelligence” become more intelligent and prevalent, there’s a natural...

Chatbot! How do they Help You Navigate into a Website and Restore Your Relationship?

Chatbot! How do they Help You Navigate into a Website and...

When we chat with customer service representatives online, we expect the first line...

Why Smart Cities need Smart Software Development

Why Smart Cities need Smart Software Development

City managers use Big Data in conjunction with systems powered by Artificial Intelligence...

Masquerade Attacks

Masquerade Attacks

This is a type of attack where intruders presents themselves as an authorized entity...

Ethical Challenges of Information Technology

Ethical Challenges of Information Technology

With tools like the internet access, hackers have found it easy to hack into any...

Characteristics and Effects of Virus on a Computer.

Characteristics and Effects of Virus on a Computer.

Computer virus share similar characteristics since they are designed by programmers...

Types of computer viruses

Types of computer viruses

Computer virus refers to a malicious software that reproduces itself and replicates...

Type of hackers and common tools they use

Type of hackers and common tools they use

Hacking is process of unauthorised intrusion to the computer system or a network,...

Security mechanisms in a  computer system

Security mechanisms in a computer system

Security mechanisms are strategies set by organisation to address issue of computer...

Mpesa API Integration: Step-by-Step Guide to Integrating Lipa na Mpesa Online

Mpesa API Integration: Step-by-Step Guide to Integrating...

Mpesa is a mobile payment service offered by Safaricom to its Subscribers in Kenya...

Task Reminder app with Free Sourcecode

Task Reminder app with Free Sourcecode

The system enables people to get reminder about their task due to the important...

Task Reminder app with Free Sourcecode

Task Reminder app with Free Sourcecode

The system enables people to get reminder about their task due to the important...

Learn

Mpesa API Integration: Step-by-Step Guide to Integrating...

Mpesa is a mobile payment service offered by Safaricom to its Subscribers in Kenya and Tanzania. It was launched in 2007 and has won...

PHP

Laravel Admin Template

Bootstrap Admin panel Dashboard Blade Laravel Framework HTML PHP template. This php html and laravel admin template Includes PHP Pages...

PHP

eCommerce CMS

A powerful platform to make you an eCommerce entrepreneur

PHP

Laravel PHP Admin Template and Front End and CRUD

Admin template is a bootstrap based admin template developer for Laravel and we made it for all laravel versions from 4.2 to latest.

PHP

Codeigniter PHP Admin Panel and User Management

Powerfull Codeigniter Admin Panel for starting a new project with Codeigniter Framework. It is developed for custom CodeIgniter projects....

PHP

Task Management System using PHP/MySQLi with Source Code

The Task Management System is a simple project that can help a certain company manage its project task progress. The system has 3...

This website uses cookies. By using this website you consent to our use of these cookies.