IBM Cloud IoT is free for ordinary usage. Here is a How To Getting Started With IBM Cloud IoT. We want to provide the basic idea of what Watson IoT Platform does and what to expect from it. On November 2018, IBM rolled out this newer version of "Watson IoT Platform" with much more features. Commonly we need these cloud-based IoT platforms for Arduino based devices (like, ESP32 we discussed this … [Read more...]
Difference Between Object Storage and Block Storage
Users commonly seek the difference between Object Storage and Block Storage. We have good number of publications on this website on object storage to point towards the differences, but often that process was as a part of answering some other question, such as Methods of Encryption in Cloud Object Storage. Object Storage is newer technology. Object storage has a flat structure where files are … [Read more...]
Methods of Encryption in Cloud Object Storage : OpenStack & IBM Cloud
Users can encrypt each object on cloud storage using the provider's way, such as using private and public keys. Throughout various articles on this site we discussed about cloud storage and security methods. We often talk around data encryption on cloud storage but avoid going in-depth. Object Storage is a data storage architecture which manages data as objects. Each object typically includes the … [Read more...]
Wearables and Internet of Things : Part I
Previously, we published detailed series on Internet of Things in the smart home. Wearable technology often also called fashionable technology or fashion electronics. Although today they are mostly electronic devices with micro-controllers which can be incorporated into clothing or worn on the body, wearable itself does not always have to be fitness tracker or smartwatches. Development of … [Read more...]
The Future of Cloud Computing in the Era of Artificial Intelligence
The rise of artificial intelligence already delivering impact around the globe and it is expected that in future, artificial intelligence will positively impact virtually all the industries. Even the regions where internet penetration is limited those regions also can not anymore ignore the substantial effect of artificial intelligence due to faster penetration of smartphones with an overall … [Read more...]
Latest Development in Cognitive Cyber Security & Solutions from IBM
Cybersecurity still a battle among a group of humans with firewalls, access controls, dynamic passwords, and more mechanism. Unfortunately, the methodologies going towards inadequate as the battlefield going towards human versus machine. With the increasing number of devices, security breaches are becoming more frequent. Smartphones, Cloud, IoT, BYOD are all newer endpoints which themselves can … [Read more...]
Machine Learning and Optimization : Relationship
These questions usually asked by the interested group to machine learning. Machine Learning is a numerical optimisation. Mathematical Optimisation includes analytic techniques which can be used to an answer the problem. The difference is very slim between machine learning (ML) and optimization theory. Optimization falls the domain of mathematics. Machine learning falls in the domain of … [Read more...]
How To Install Apache Phoenix (SQL on HBase)
We talked about Apache Phoenix in our previous guides and articles such as How To Install Apache HBase and List of Apache Projects For Big Data. Apache Phoenix is a massively parallel, relational database engine supporting OLTP for Hadoop using Apache HBase as store. Phoenix provides a JDBC driver that cleverly hides the noSQL store in front enabling the users to create, delete, and alter SQL … [Read more...]
Shared Responsibility in Cloud Security
When it comes to cloud computing, many companies first think of the benefits of technology. However, security still often falls by the wayside. The reasons are manifold - high complexity, unclear legal responsibilities and missing strategies mean that especially smaller companies see the security responsibility at the provider - a fallacy, which can have serious consequences in the worst case. If … [Read more...]
How To Configure Fail2ban To Send Daily Email Report
Fail2Ban is a robust tool. By default the system of Fail2Ban sends an email with each ban. There is an action there named mail-buffered. That action expects 5 ban (default) before sending you an email. But a summary report probably more practical. Here are the required steps on how to configure Fail2ban to send daily email report. This system needs to configure mail server on the server under … [Read more...]
How to Connect Arduino to IBM Cloud (To Send Sensor Data)
IBM Cloud's IoT platform for this kind of usage is free. This gives the capabillity of sending data from anywhere like from a car at zero cost. Here is How to Connect Arduino to IBM Cloud (IoT Platform). We are taking it granted that the reader will use Arduino UNO (not Yun, steps will be slightly different). For this project you need to get used with using ESP8266 with Arduino UNO. ESP8266 is a … [Read more...]