Posts

A Deep dive into Cybersecurity

Image
  Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. From a computing point of view, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity, and availability of data, is a subset of cybersecurity. The use of cyber security can help prevent cyber attacks, data breaches, and identity theft and can aid in risk management. So when talking about cybersecurity, one might wonder “ What are we trying to protect ourselves against? ” Well, there are three main aspects we are trying to control, name: Unauthorized Access Unauthorized Deletion Unauthorized Modification These three terms are synonymous with the very commonly known CIA triad which stands for Confidentiality, Integrity, and Availability....

AI a revolutionary invention

Image
  The concept of intelligent beings has been around for a long time. The ancient Greeks, in fact, had myths about robots as the Chinese and Egyptian engineers built automatons. However, the beginnings of modern AI has been traced back to the time where classical philosophers’ attempted to describe human thinking as a symbolic system. Between the 1940s and 50s, a handful of scientists from various fields discussed the possibility of creating an artificial brain. This led to the rise of the field of AI research — which was founded as an academic discipline in 1956 — at a conference at Dartmouth College, in Hanover, New Hampshire. The word was coined by John McCarthy, who is now considered as father of Artificial Intelligence. Despite a well-funded global effort over numerous decades, scientists found it extremely difficult to create intelligence in machines. Between the mid 1970s and 1990s, scientists had to deal with an acute shortage of funding for AI research. These years came to ...

Blockchain = Block + Chain = listOf(block)

Image
The concept of blockchain technology is set to revolutionize not just the finance or healthcare industry but many aspects of business, government and even our personal lives. The problem is that there is so much hype and misunderstanding out there, which made me take a step back and explain the basics of what blockchains are and how they work — in a very simple way, that hopefully, anyone can understand, even with no prior technical knowledge necessary. Blocks in the blockchain consist of digital pieces of information and specifically have three parts to them: They  store information about transactions  like the date, time, and the amount transferred They  store information about participants . For example, it will contain information for your purchase from Amazon on a record with your name along with Amazon.com. But instead of using your actual name, your purchase is recorded without any identifying information, it is referred to as “ digital signature ” and is sort of l...

How biotechnology revolves around the world

Image
Biotechnology is not a single thing if you think that. It’s a whole new sector. I am saying this is “new” because it is not as old as other sectors. Biotechnology is the broad area of biology involving living systems and organisms to develop or make products, or “any technological application that uses biological systems, living organisms, or derivatives thereof, to make or modify products or processes for specific use”. At its simplest, biotechnology is technology based on biology — biotechnology harnesses cellular and biomolecular processes to develop technologies and products that help improve humans lives and the health of the planet. People have used the biological processes of microorganisms for more than 6,000 years to make useful food products, such as bread and cheese, and to preserve dairy products. Modern biotechnology provides breakthrough products and technologies to combat debilitating and rare diseases, reduce our environmental footprint, feed the hungry, use less and cl...

Let's know about Cloud Computing

Image
To understand the cloud, let’s talk about the computer in your home. It is primarily composed of 3 things. A  storage system  for storing data. Some  chips  on the motherboards to perform tasks (tasks like moving data around or running some algorithms), and a  user interface device  to show the data to the user (computer monitor) through which the user can interact with the system (keyboard and mouse) The first thing that people started needing more is storage capacity. Back then, like 7 years back, you probably had more external hard drives than you had computers in your home. Cameras started to increase in megapixel count, and all those home videos of birthdays and family trips on digital video cameras needed a lot of space to store. Managing hard drives and worrying about backups in case they failed were a constant headache. If you ever bought Seagate hard drives, you already know. Then Dropbox came along where you could buy some storage space online and...

Advantage of learning Computer network

Image
It is the interconnection of multiple devices, generally termed as Hosts connected using multiple paths for the purpose of sending/receiving data or media. There are also multiple devices or mediums which help in the communication between two different devices which are known as  Network devices . Ex: Router, Switch, Hub, Bridge. OSI: OSI stands for   Open Systems Interconnection . It is a reference model that specifies standards for communications protocols and each layer's functionalities. Protocol: The protocol is the set of rules or algorithms which define the way how two entities can communicate across the network and there exists different protocol defined at each layer of the OSI model. Few of such protocols are TCP, IP, UDP, ARP, DHCP, FTP and so on. UNIQUE IDENTIFIERS OF NETWORK Host name: Each device in the network is associated with a unique device name known as Hostname. Type “hostname” in the command prompt and press ‘Enter’, this displays the hostname of your mac...