Previously, we talked about IBM Demo Cloud, which is a free server with SSH access to learn Hadoop, Pig, Hive etc without the need of running own installation. Unlike server log, healthcare data lacks universal format. Here is Basic Commends Showing How To Process Healthcare Data in Hadoop, Pig Using IBM Demo Cloud. As for server logs, we can easily distribute scripts which will work all over the … [Read more...]
Effectiveness of Flushing DNS Cache to Prevent DNS Cache Poisoning and Spoofing
Situation arises when one new developer self-host DNS and use own computer for temporary or permanent hosting DNS. It is mostly a misconception that flushing DNS of localhost provide good immunity. In This Article, We Will Clarify Whether Regular Flushing DNS Cache to Prevent DNS Cache Poisoning and Spoofing is Sufficient to Provide Them an Acceptable Level of Security. The DNS vulnerabilities … [Read more...]
Requirements of Platform as a Service (Pass) in DevOps
Platform as a Service (PaaS) is second level of cloud computing. These cloud services provide the users a complete development and operating environment, which are addressed via APIs of the respective provider. PaaS allows companies and software developers to focus on their core competencies without having to worry about maintaining infrastructure, scaling, operations, and middleware all this at … [Read more...]
Configure and Setup SSHFP : SSH Fingerprint in the DNS
SSHFP is SSH Fingerprint in the DNS. Before newer versions of Microsoft Windows, there was only PuTTY like applications to SSH from Microsoft Windows computers. Newer versions officially has Ubuntu Terminal, which needs to be configured. As from Android, there is Terminux application. It is obvious that Mac has iTerm2 and Terminal and GNU/Linux has Terminal. So, nobody should have trouble to use … [Read more...]
PaaS Versus Container (Docker, CaaS)
It is possibly a common question which arises in the mind of who are relatively new around Cloud Computing services or development. It is Practically Not Correct to Compare PaaS Versus Container Like Docker, CaaS. Both Are Different Approaches, PaaS is Quite Older Concept Compared to Container. PaaS is division of Cloud Computing Service Models. Platform as a Service (PaaS) is a service delivery … [Read more...]
Approaches of Deep Learning : Part 4 (Conclusion)
This article will end our series on Approaches of Deep Learning which has total four parts - PART 1, PART 2, PART 3 and this current one. After reading so many thousands of words, the reader possibly have some theoretical idea around how to independently learn Deep Learning. This particular article in essence will draw conclusion on the topic. Approaches of Deep Learning : … [Read more...]
Let’s Encrypt Effect : Huge Slash of Price of SSL/TLS DV and EV Certificates
It Was Probably Obvious When Let’s Encrypt Project Was Launched. In Reseller Market, There is Huge Slash of Price of SSL/TLS DV and EV Certificates, Which is Up to 70% of Official Price. Official Pricing However, Mostly Unchanged. Additionally, there has been services to deliver DV and EV certificates in Monthly plan like Software-as-a-Service. If you have 4+ old Geo Trust like SSL/TLS certificate … [Read more...]
Approaches of Deep Learning : Part 3
In our previous articles, namely Approaches of Deep Learning : Part 1 and Deep Learning : Part 2, we explained the most essetial basics of artificial intelligence, machine learning, deep learning. Those were among the fundamentals which are important for further understanding of the scientific work topic. In this Approaches of Deep Learning : Part 3, we will focus around Benefits and use cases, … [Read more...]
Fight Increasing Hacking Attempts on Cloud Telephony & VoIP
Current Internet system and Internet Protocols are not exactly tailored for current use-cases by mass. Biggest flaw is physical insecurities. Hackers continued to evolve to wreak havoc with a new playground because the Internet and IP-based technologies suffer from a big list of security vulnerabilities, enough for the hackers to invent variety of new attacks. IP telephony, fax system shares the … [Read more...]
Approaches of Deep Learning : Part 2
In our previously published article namely Approaches of Deep Learning : Part 1, we explained the most important basics of artificial intelligence, machine learning, deep learning. Those were among the fundamentals which are important for further understanding of the scientific work topic. In this Approaches of Deep Learning : Part 2, we will focus around Benefits and use cases, Artificial … [Read more...]
Approaches of Deep Learning : Part 1
By now, the regular readers of this website already know something around Big Data. In our one practical article, we have shown how IBM Watson can be used to analyze texts on Google Docs. From This Series on Approaches of Deep Learning We Will Learn Minimum Theories Around AI, Machine Learning, Natural Language Processing and Of Course, Deep Learning Itself. In today's age of technology, people … [Read more...]