Previously, we talked about IBM Demo Cloud, which is a free server with SSH access to learn Hadoop, Pig, Hive etc without the need of running own installation. Unlike server log, healthcare data lacks universal format. Here is Basic Commends Showing How To Process Healthcare Data in Hadoop, Pig Using IBM Demo Cloud. As for server logs, we can easily distribute scripts which will work all over the … [Read more...]
How To Run Jupyter Notebook on Android (Termux CLI)
We discussed about custom repo setup on Termux. We will actually see that application here. In this Guide, We Will Discuss How To Run Jupyter Notebook on Android Using Termux CLI. It is no way closest to real stable way, you may need to modify, develop, contribute to make it smooth. The total method is time taking, may throw error demanding searching fix. It is recommended to use an USB mouse or … [Read more...]
How to Use Domain Name Instead of IP Address to SSH
Regular readers know that we have reverse proxy of IPv6 for this website. It is Probably Common to Ask How to Use Domain Name Instead of IP Address to SSH. It is Complicated When Your Domain Has Multiple Servers, Like For Reverse Proxy. It depends on your current computer's IP for setup like ours. For dedicated servers, possibly you have more IP v4 addresses to SSH and face traffic. Obviously, we … [Read more...]
Effectiveness of Flushing DNS Cache to Prevent DNS Cache Poisoning and Spoofing
Situation arises when one new developer self-host DNS and use own computer for temporary or permanent hosting DNS. It is mostly a misconception that flushing DNS of localhost provide good immunity. In This Article, We Will Clarify Whether Regular Flushing DNS Cache to Prevent DNS Cache Poisoning and Spoofing is Sufficient to Provide Them an Acceptable Level of Security. The DNS vulnerabilities … [Read more...]
Requirements of Platform as a Service (Pass) in DevOps
Platform as a Service (PaaS) is second level of cloud computing. These cloud services provide the users a complete development and operating environment, which are addressed via APIs of the respective provider. PaaS allows companies and software developers to focus on their core competencies without having to worry about maintaining infrastructure, scaling, operations, and middleware all this at … [Read more...]
Configure and Setup SSHFP : SSH Fingerprint in the DNS
SSHFP is SSH Fingerprint in the DNS. Before newer versions of Microsoft Windows, there was only PuTTY like applications to SSH from Microsoft Windows computers. Newer versions officially has Ubuntu Terminal, which needs to be configured. As from Android, there is Terminux application. It is obvious that Mac has iTerm2 and Terminal and GNU/Linux has Terminal. So, nobody should have trouble to use … [Read more...]
PaaS Versus Container (Docker, CaaS)
It is possibly a common question which arises in the mind of who are relatively new around Cloud Computing services or development. It is Practically Not Correct to Compare PaaS Versus Container Like Docker, CaaS. Both Are Different Approaches, PaaS is Quite Older Concept Compared to Container. PaaS is division of Cloud Computing Service Models. Platform as a Service (PaaS) is a service delivery … [Read more...]
Approaches of Deep Learning : Part 4 (Conclusion)
This article will end our series on Approaches of Deep Learning which has total four parts - PART 1, PART 2, PART 3 and this current one. After reading so many thousands of words, the reader possibly have some theoretical idea around how to independently learn Deep Learning. This particular article in essence will draw conclusion on the topic. Approaches of Deep Learning : … [Read more...]
Let’s Encrypt Effect : Huge Slash of Price of SSL/TLS DV and EV Certificates
It Was Probably Obvious When Let’s Encrypt Project Was Launched. In Reseller Market, There is Huge Slash of Price of SSL/TLS DV and EV Certificates, Which is Up to 70% of Official Price. Official Pricing However, Mostly Unchanged. Additionally, there has been services to deliver DV and EV certificates in Monthly plan like Software-as-a-Service. If you have 4+ old Geo Trust like SSL/TLS certificate … [Read more...]
Approaches of Deep Learning : Part 3
In our previous articles, namely Approaches of Deep Learning : Part 1 and Deep Learning : Part 2, we explained the most essetial basics of artificial intelligence, machine learning, deep learning. Those were among the fundamentals which are important for further understanding of the scientific work topic. In this Approaches of Deep Learning : Part 3, we will focus around Benefits and use cases, … [Read more...]
Fight Increasing Hacking Attempts on Cloud Telephony & VoIP
Current Internet system and Internet Protocols are not exactly tailored for current use-cases by mass. Biggest flaw is physical insecurities. Hackers continued to evolve to wreak havoc with a new playground because the Internet and IP-based technologies suffer from a big list of security vulnerabilities, enough for the hackers to invent variety of new attacks. IP telephony, fax system shares the … [Read more...]