As more businesses are aware of the important role played by data in their business, the demand for qualified workers to perform different data management roles is increased. Companies, as well as small enterprises, are drawn to this technological trend without first being aware of how it can be used, but more importantly without resolving fundamental problems in “small” data pipelines. In the beginning everything is easy to fix but when business grows the systems that are worked alone need to be compatible to work together. …


Problem Statement:

Image for post
Image for post

Unless you have been living under a rock, you may most possibly have heard about “Blockchain”. It appears to become one of the buzzwords of the year. Yet, numerous individuals cease to recognize what blockchain is or how can works. Imagine you and a companion of yours are transacting/transferring money from one account to another. You go to your bank and ask the banker to transfer a certain amount from your account to that of your companion’s. The bank registers this in their internal servers. This record needs to be updated on both, receivers’ and senders’, accounts. The procedure may seems simple but a problem, which cannot be disregarded is that this data may get hacked. Records of transactions can be manipulated easily or changed. …


Image for post
Image for post

The world of software architecture brings us the most demanding topic which is serverless computing or more simply serverless. The emergence of serverless architecture is the next shift in cloud computing, which involves abstracting software and system engineers away from explicit infrastructures, servers, server deployments, installed software, etc. The three major providers of clouds — Amazon, Google and Microsoft — invest heavily in serverless. So, what is serverless computing and should it be considered (or not)? I hope to clarify a bit about these issues in this blog. …


Image for post
Image for post

“I don’t need a hard disk in my computer if I can get to the server faster. Carrying around these non-connected computers is byzantine by comparison.”

– Steve Jobs, Co-founder, CEO and Chairman, Apple Inc.

Imagine a system that can run happily on your hardware, AWS, Azure, or Google Cloud. An infrastructure that can be developed, tested, and demonstrated on a PC running Windows, a MacBook running OSX, or a Linux system. This solution is scalable, resilient, and secure. Interesting, isn’t it?

In the old days, businesses and enterprises required buying hardware to run the components of their applications. Even a simple website, suppose WordPress, had so many components, that it required a web server of some kind (such as Apache), a way to handle PHP code, and a database. …


Image for post
Image for post

“I have been online since 1989; I was SysOp on several CompuServe forums — Dave Debronkart”

IT world’s recent trends are DevOps and SysOps. If you are in the field of IT, you must have heard of these two. Only being familiar with these terms is not enough if you want to be a part of the ever-evolving technological world. You should know a lot about Ops especially if you are interested in Cloud Computing. In this blog, our focus will be on what is SysOps and how can you be a SysOps administrator on the most widely used cloud platform i.e. …


Image for post
Image for post

“Privacy is paramount to us; in everything we do” — Justin Schuh (Director, Chrome Engineering)

Advertising is fundamental to support many web businesses, but it is often observed that the technology implemented by advertisers to make advertisement more relevant to customers is being used beyond its original design intent — some data practices do not match up with the user expectations for privacy. While trying to increase and expand its business with cloud and hardware; Google is primarily supported by advertising . Tracking of users for ads is in direct conflict with privacy. …


Image for post
Image for post

“Libra’s mission is to enable a simple global currency and financial infrastructure that empowers billions of people

The advent of the internet and mobile broadband has enabled billions of individuals globally to have access the world’s knowledge and data, high-fidelity communications, and a wide scope of low-cost. Cooperating, innovation organizations and financial institutions have additionally discovered solutions to help increase economic empowerment around the world. In spite of this advancement, huge swaths of the total populace have still left behind 1.7 …


Risk Assessment

Risk assessments recognize all of the risks that have the potential to impact the organization’s operations. It calculates both the impact and the forward likelihood of potential events. A risk assessment is therefore greatly concerned with the possible causes of disruption, from which likelihood is then derived. It’s a valuable tool for recognizing threats and taking action to minimize risks to an acceptable level.

Image for post
Image for post

Difference between Risk Assessment and Business Impact Analysis

The key difference between the two business continuity tools is that Business Impact Analysis (BIA) does not directly focus on the likelihood of events, rather, it assumes worst-case scenarios.

Risk AssessmentBusiness Impact AnalysisExamining the assessment, focused on all potential risks and their likelihood, as well as inward-looking, focused on failure modes, the potential impact of events and the existing controls and strategies to mitigate the impact of risksExamining the analysis of the impacts that may arise when stakeholders are deprived of products and services, as well as an inward analysis of necessary recovery timeframes, tolerances and levelsCommonly gives rise to an ongoing treatment programme, systematically managing the risks you faceThe mirror of your organisation’s whole-environment situation and what it stands to lose in major disruptionsConcludes the same high-level information and techniques as BIA to determine the impact of events, but also looks much deeper, potentially at all areas of threat, causality, failure, error, omission and so onConcludes information from high-level sources, such as accounts, market data, company, human, environmental, plus legal, and other impact types, demonstrated as sources of loss. Analyses reliance to allow impact assessment at granular and deeper…


Image for post
Image for post

AWS is our ML platform of choice, unlocking new ways to deliver on our promise of being the world’s travel platform” — Matthew Fryer, Chief Data Science Officer, Expedia Group

Most of the businesses look at machine learning as if it is something unachievable because it is expensive and demands talent. Well, for some cases, it can be quite demanding but, with the trend of making everything-as-a-service, machine learning solutions are becoming easier to develop. Any business or even an individual can jump-start a machine learning initiative without much investment. …


Image for post
Image for post

Trojan refers to a malicious program misleading its true intentions. It is often disguised as a legitimate software or wrapped with a legitimate software. Traditionally, popular software that available on mirror sites are mostly wrapped with malwares. Hackers take advantage of their popularity and wrap their malicious program with it. Trojans are popular for remote access and backdoor. Remote Access Trojans (RATs) allow gaining unauthorized privileged access to a system. Once a Trojan program is executed on a system, it becomes difficult to trace however, Anti-Trojans and Rootkit Scanners help to detect them.

About

Bestselling author of ‘Security’, ‘Cloud’ & ‘Networking’ http://ipspecialist.net

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store