CATEGORIES
Categorías
SageMath: A Quick Introduction to Cybersecurity
In the previous articles in this SageMath series, we delved into graph theory and explored its applications using SageMath. In this seventh article in the series, it is time to shift our focus to another crucial subfield of computer science: cybersecurity and cryptography.
Efficient Prompt Engineering: Getting the Right Answers
OpenAl's GPT-3 and GPT-4 are powerful tools that can generate human-like text, answer questions, and provide insights. However, the quality of these outputs depends heavily on how you frame the input, or prompt. Efficient prompt engineering ensures you get the right answers by designing inputs that guide the AI towards relevant, clear, and useful responses. Let's find out how to craft effective prompts with examples.
Analysing Linus Torvald's Critique of Docker
This article looks at Docker's security flaws, particularly its shared-kernel model, and contrasts it with traditional VMs for better isolation. It discusses Linus Torvalds' concerns, explores mitigation techniques, and proposes a roadmap for building a more secure containerisation platform using hardware-assisted virtualisation, true isolation, and a robust orchestration layer.
Managing a Hybrid Cloud: An Overview
The hybrid cloud market is on a high, with businesses discovering its many benefits. Let's explore what it entails to adopt such a cloud model and why an organisation should consider moving to it.
"Openness challenges the traditional closed nature of hardware IPs to create standardised solutions"
In an interview with EFY's Yashasvini Razdan, Alex P. James, Dean of Academics at Digital University Kerala, argues that an open AI hardware ecosystem could democratise access to hardware design tools and IPs, much like the Linux movement did for software.
Meeting Special Education Needs with Open Source Software
Children and adults with special needs require special education. Cboard is free and open source software for special children, but a lot of work is still needed in this domain, especially in India.
A Guide to SSL 2.0: Security Flaws and Evolution to SSL 3.0
The importance of cybersecurity cannot be overstated. The SSL 2.0 handshake protocol plays a great role in ensuring data remains secure and does not reach the wrong hands. But it does have some weaknesses, and hence the emergence of SSL 3.0.
Trusted Platform Modules: Locksmith in the Basement?
Tech giants are embedding special chips into their systems to ensure your data stays safe, even if you lose your device.
Understanding Cluster Analysis through Python Libraries
Discover how Python libraries simplify data clustering for better business insights...
A Beginner's Guide to Cloud Computing
Cloud computing has grown exponentially since the early 2010s and there are no signs of its popularity waning anytime soon. This is because it offers benefits to developers, organisations and customers alike.
A Guide to Optimising Costs in the Cloud
Keeping cloud costs optimal is essential for the financial health of any enterprise. However, organisations encounter quite a few challenges when they migrate from on-premises data centres to the cloud using a lift-and-shift strategy. The Google Cloud Platform (GCP) helps to mitigate these challenges and optimise costs.
Using Microservices for Digital Decoupling Architecture
Microservices enhance the digital journey of an organisation in so many ways. They optimise costs, make software agile and scalable, and are of immense help when designing digital decoupling architecture for IT migration.
A Complete Guide to DevOps
Modern enterprises are looking at faster delivery of quality software and quick feedback from customers, among other things. This demands the integration of development and operations teams so that they collaborate and communicate better, also known as DevOps.
"Using open source means you're hiring the whole world as your support system"
Suman Debnath, Principal Machine Learning Advocate at AWS has transitioned from having zero knowledge about open source to becoming an assertive community leader in this space. He has delivered over 100 international conference keynotes, driving engagement across tech communities, and attributes this success to his community members. This expansive conversation with OSFY’s Yashasvini Razdan on Suman’s journey in this domain is a testament to the power of open source.
Serverless Computing: What It Is and How It's Changing the Cloud Landscape
Let's delve into the intricacies of serverless architecture, explore its key benefits, and discuss how it's changing the cloud landscape.
Not Investing in a Cloud Security Program can be Expensive
A well-planned cloud security program serves as the primary barrier against security breaches, protecting both the company's assets and its reputation. It's a crucial component that supports an organisation's overall health and in a world with more advanced cyber threats, it helps meet the basic compliance standards that stakeholders expect.
Cutting Costs, Not Corners: Building Large Scale Applications with Open Source Software
Here are some strategies and best practices for leveraging open source to create enterprise-grade web and mobile applications without sacrificing quality or functionality.
FIDO2 and WebAuthn: Ensuring Secure User Authentication
In today's digital landscape, securing online identities is more crucial than ever. Traditional passwords are no longer sufficient to protect sensitive information, which is where advanced passwordless authentication mechanisms like FIDO2 and WebAuthn come into play. These technologies offer a powerful solution for secure user authentication in a browser-based environment.
Aspiring to be a DevOps Engineer? Here are a Few Tips
Organisations are embracing DevOps in software development to ensure quality products are delivered faster. This fast-growing domain offers a range of career opportunities for those willing to learn. You can enrol for one of the many industry-recognised certifications and then gain experience through internships and entry-level positions.
GitHub Actions: Accelerating DevOps Adoption
The integration of DevOps practices has become crucial for achieving rapid, reliable, and high-quality software delivery. GitHub Actions, an automation tool provided by GitHub, significantly contributes to this process by streamlining and automating various stages of the software development lifecycle. Let's find out how it can accelerate DevOps adoption.
DevOps in a Nutshell
This overview takes you down the path of DevOps development, its benefits and drawbacks as well as the resources you may need to become an expert in this field. It explains the roles of a DevOps professional and why they are in demand.
The DevOps Guide: Trends, Tools, Skills, and Career Opportunities
In today's fast-paced digital world, DevOps is crucial for software development and IT operations. By fostering collaboration and automating processes, it aims to deliver high-quality software quickly and reliably. Let's explore the latest trends in DevOps, essential tools, required skills, career opportunities, and the future of this transformative practice.
AlOps: Integrating AI with DevOps
By integrating AI with DevOps, we can harness the power of both technologies to quicken the development of quality software. Open source DevOps tools now come with AI integrated in them to automate the software development lifecycle and enhance security features.
Getting Started on Contributing to Free Software
Interested in contributing to free and open source software but wondering where and how to begin? Dive in to find out...it's quite simple.
AI Services in Microsoft Azure: Designed to Help
Microsoft's Azure AI services enable optimised operations in industries as varied as retail, healthcare, manufacturing, finance, education, and media.
A Few Tools to Help Manage Your Data
Managing data can be laborious and demanding. But the task is critical in the age of Al. Help is available in the form of data management tools that are both open source and proprietary.
"Falco is the de-facto standard for cloud-native threat detection.We are the founders of Falco"
Not many people know that cloud-native security application provider Sysdig is the founder of the open source threat detection platform - Falco. With their commercialised application based on the Falco core, Sysdig is expanding its operations by providing its cloud-native application protection platform via a localised AWS data centre in India. In a conversation with OSFY's Yashasvini Razdan, Sysdig's Gavin Selkirk, Vice President and General Manager of Asia-Pacific and Japan, and Simarpreet Singh, Regional Director, India, got candid about threat detection and what Sysdig brings to India...
Securing Workloads in the Cloud: Challenges and Best Practices
Is cloud security on your mind? Here are some insights into overcoming the complexity of securing cloud workloads by utilising advanced AWS cloud workload protection tools and methodologies, such as micro segmentation and zero trust network access (ZTNA).
The Linux System Call Execution Model: An Insight
This two-part series of articles focuses on the system call execution model in Linux based operating systems. This first part explains what system calls are, why they are required and the role of the glibc wrapper in system call execution. It then touches on the system call execution model from the Linux kernel perspective.
Evolution of Log Analysis Architectures
Going down memory lane, it's easy to see how changing needs have helped evolve log analysers since the mid-2000s. What worked then, will not work today. But the journey is to be cherished.