How to secure sensitive personal data in any application– High Level architecture view

Recently, I read a few articles in the news that how millions of user accounts have been compromised and data breached. It is becoming the norm to be very honest. I am not so convinced with the enterprise’s architecture to store data

Clock is broken. Reveal answer.

Yesterday I asked a puzzle about broken clock. Today I am giving the answer and How did I solve it. My first and clear approach was identified a total sum of 1 to 10 which is 55. But if we need to