Archi's Academy

BLACK FRIDAY

85% Discount for all November

whatsapp
Get in touch
İş Deneyimi Olmadan CV Hazırlamak: 7 Etkili Strateji

İş Deneyimi Olmadan CV Hazırlamak: 7 Etkili Strateji

link-icon
Software Development

avatarThoufeeque saheerSunday, 10 Aug 2025
BlogsBlogs

All Blogs

Explore Stories, Insights, and Ideas from Our Community

Discover insights, stories, and practical tips from industry experts and passionate creators to inspire your journey.
MERN STACK

MERN STACK

link-icon
Software DevelopmentComputer programmingCoding

# What is MERN Stack? MERN stands for MongoDB, Express, React, Node, after the four key technologies that create the stack. **MongoDB -** Document database. **Express(.js) -** Node.js web framework. **React(.js) -** A client-side JavaScript framework. **Node(.js) -** The premier JavaScript web server. **How does the MERN Stack work?** The MERN architecture allows you to easily construct a 3-tier architecture (frontend, backend, database) entirely using JavaScript and JSON.

avatarOlamide Jubril MuizTuesday, 4 Jan 2022
React Projects

React Projects

link-icon
Software DevelopmentComputer programmingCoding

## React Projects I will cover 3 different types of projects in this blog. Watching tutorial and learning knowledge is important but without making a project no one gain experience and understand how to build a product. If you are making your own projects you will: -> Gain experience -> Able to add your CV -> Really understand how to write code -> Struggle a lot Therefore finally you will get hands-on experience.

avatarBaris BabahanWednesday, 29 Dec 2021
Introduction to Linux

Introduction to Linux

link-icon
Computer ScienceLinux

# History of Linux In 1991, while studying computer science at the University of Helsinki, Linus Torvalds began a project that later became the Linux kernel. He wrote the program specifically for the hardware he was using and independent of an operating system because he wanted to use the functions of his new PC with an 80386 processor. Development was done on MINIX using the GNU C Compiler. In order to facilitate development, the files were uploaded to the [FTP server](https://ftp.funet.fi/) of FUNET in September 1991. Ari Lemmke at Helsinki University of Technology (HUT), who was one of the volunteer administrators for the FTP server at the time, named the project "Linux" on the server without consulting Torvalds.

avatarKeerthi ChandrikaThursday, 23 Dec 2021
Git & GitHub

Git & GitHub

link-icon
Management solution Open source Version Control

# What is Git? Git is the most popular open-source version control system in the world. What is **version control?** It is the way of the management of changes on documents, computer programs, large websites, and other collections of information. With version control systems we can; -> Track the history of our project -> Work together (collaborate with others effectively). # Why Git? -> Free -> Open-source -> Super fast -> Scalable

avatarFabrice NdabitezamasoSunday, 19 Dec 2021
what is the difference between sdlc and stlc

what is the difference between sdlc and stlc

link-icon
Software DevelopmentComputer ScienceTesting

The Software Development Life Cycle (SDLC) and the Software Testing Life Cycle (STLC), are two different and distinct methods for guaranteeing project success in software development. Before seeing the difference between SDLC and STLC, first, we will understand the SDLC and STLC in brief.

avatarKrishna PrabhaTuesday, 14 Dec 2021
Authentication & Authorization

Authentication & Authorization

link-icon
Computer ScienceCyber Security

# AUTHENTICATION A user authentication policy is a process in which you verify that someone who is attempting to access services and applications is who they claim to be. This can be accomplished through a variety of authentication methods, such as entering a password into your laptop or phone or a PIN number into the ATM. **What is the purpose of authentication?** Authentication is used to verify that you are who you say you are. After a user’s identity is confirmed, for instance with a username and password, that identity may be used in an authorization policy to determine the appropriate access privileges. Organizations today must ensure that the right users are given access to the right resources, whether it is physical or--increasingly--digital.

avatarRagha Vendra ChilakalaWednesday, 8 Dec 2021