As more businesses are aware of the important role played by data in their business, the demand for qualified workers to perform different data management roles is increased. Companies, as well as small enterprises, are drawn to this technological trend without first being aware of how it can be used…


Problem Statement:

Unless you have been living under a rock, you may most possibly have heard about “Blockchain”. It appears to become one of the buzzwords of the year. Yet, numerous individuals cease to recognize what blockchain is or how can works. Imagine you and a companion of yours are transacting/transferring money…


The world of software architecture brings us the most demanding topic which is serverless computing or more simply serverless. The emergence of serverless architecture is the next shift in cloud computing, which involves abstracting software and system engineers away from explicit infrastructures, servers, server deployments, installed software, etc. The three…


“I don’t need a hard disk in my computer if I can get to the server faster. Carrying around these non-connected computers is byzantine by comparison.”

– Steve Jobs, Co-founder, CEO and Chairman, Apple Inc.

Imagine a system that can run happily on your hardware, AWS, Azure, or Google Cloud…


“I have been online since 1989; I was SysOp on several CompuServe forums — Dave Debronkart”

IT world’s recent trends are DevOps and SysOps. If you are in the field of IT, you must have heard of these two. Only being familiar with these terms is not enough if you…


“Privacy is paramount to us; in everything we do” — Justin Schuh (Director, Chrome Engineering)

Advertising is fundamental to support many web businesses, but it is often observed that the technology implemented by advertisers to make advertisement more relevant to customers is being used beyond its original design intent —…


“Libra’s mission is to enable a simple global currency and financial infrastructure that empowers billions of people

Problem Statement

The advent of the internet and mobile broadband has enabled billions of individuals globally to have access the world’s knowledge and data, high-fidelity communications, and a wide scope of low-cost. Cooperating, innovation organizations…


Risk Assessment

Risk assessments recognize all of the risks that have the potential to impact the organization’s operations. It calculates both the impact and the forward likelihood of potential events. A risk assessment is therefore greatly concerned with the possible causes of disruption, from which likelihood is then derived. …


AWS is our ML platform of choice, unlocking new ways to deliver on our promise of being the world’s travel platform” — Matthew Fryer, Chief Data Science Officer, Expedia Group

Most of the businesses look at machine learning as if it is something unachievable because it is expensive and demands…


Trojan refers to a malicious program misleading its true intentions. It is often disguised as a legitimate software or wrapped with a legitimate software. Traditionally, popular software that available on mirror sites are mostly wrapped with malwares. Hackers take advantage of their popularity and wrap their malicious program with it…

IP Specialist

Bestselling author of ‘Security’, ‘Cloud’ & ‘Networking’ http://ipspecialist.net

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store