Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 79 of 94

Exception Handling in Distributed System

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 1K+ Views

Introduction In context of distributed systems, exception handling refers to process of detecting, diagnosing, and recovering from errors that occur in a distributed system. In such systems, errors can occur at any point in communication and coordination process, including network failures, hardware malfunctions, and software bugs. Thus, effective exception handling is crucial to ensure reliability and availability of a distributed system. In this article, we will explore various techniques and best practices for exception handling in distributed systems. Importance of Exception Handling in Distributed Systems In a distributed system, multiple processes run on different machines and communicate with each other ...

Read More

Evolution of Distributed Computing Systems

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 5K+ Views

Introduction Distributed computing systems refer to a network of interconnected devices that share resources and work together to achieve a common goal. evolution of distributed computing systems has been rapid, and it has transformed way we use technology in our daily lives. From simple file sharing systems to advanced cloud computing, distributed computing systems have come a long way. In this article, we will discuss evolution of distributed computing systems and explore some of examples. Early Days of Distributed Computing The early days of distributed computing can be traced back to 1960s, where researchers began experimenting with idea of sharing ...

Read More

Event Ordering in Distributed System

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 3K+ Views

Introduction Distributed systems have become an integral part of our modern-day technological infrastructure. They have made it possible to deliver services at scale, provide better resilience, and enable better fault tolerance. However, designing distributed systems is a challenging task, and one of most significant challenges is maintaining ordering of events in system. This article will discuss event ordering in distributed systems and provide examples of different techniques used to achieve it. Event Ordering Event ordering is essential in distributed systems because it determines order in which events occur. In a distributed system, events can happen concurrently on different nodes, and ...

Read More

Active and Passive attacks in Information Security

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 3K+ Views

Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used by hackers, and ways to protect against these types of threats. What is an Active Attack? An active attack occurs when a hacker attempts to alter or manipulate data in a system. This type of attack can be easily identified as it typically involves an attacker trying to perform some ...

Read More

Access Lists (ACL)

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 1K+ Views

In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore access control lists in greater detail, including their purpose, components, types, and examples. What are Access Control Lists (ACLs)? Access control lists (ACLs) are a set of rules that are used to control network traffic based on source or destination IP address, protocol, port number, or other criteria. ACLs are ...

Read More

A Cryptographic Introduction to Hashing and Hash Collisions

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 559 Views

Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. This article will provide a cryptographic introduction to hashing and hash collisions, explaining how hash functions work and why hash collisions can be a problem. What is Hashing? Hashing is a process that takes input data of any size and maps it to a fixed-size output, which is called a ...

Read More

Best Practices for Protecting Your Data and Customer SaaS Business

Satish Kumar
Satish Kumar
Updated on 31-Aug-2023 254 Views

As a SaaS (Software-as-a-Service) business owner, protecting your data and customers should be a top priority. With an increasing number of cyberattacks and data breaches, you cannot afford to be complacent about your security measures. In this article, we will discuss some of the best practices you can implement to protect your data and customers. What is Data Protection? Data protection refers to the process of safeguarding sensitive and confidential information from unauthorized access, use, disclosure, or destruction. It is a critical aspect of information security and privacy, and it is essential for ensuring the confidentiality, integrity, and availability ...

Read More

How to Change Root Password of MySQL or MariaDB in Linux?

Satish Kumar
Satish Kumar
Updated on 24-Aug-2023 864 Views

Introduction As with any password, the root user password for a MySQL or MariaDB database should be changed regularly for security reasons. The root user has complete access and control over all databases and tables within the system, making it a prime target for any potential attacks. Regularly changing the root password can help prevent unauthorized access to your data, as well as provide an added layer of security against potential server breaches. Checking Current Root Password A root user is a powerful administrator account that has full access to the MySQL or MariaDB server. It is important to regularly ...

Read More

Helm vs Kustomize Head-to-Head Comparison

Satish Kumar
Satish Kumar
Updated on 23-Aug-2023 419 Views

Introduction Kubernetes has become the go-to container orchestration tool for enterprises across the world. The flexibility of Kubernetes is a result of its ability to automate deployment, scaling, and management of containerized applications. However, with great power comes great complexity. Deploying applications on Kubernetes requires managing YAML files that embody the application's configuration. These YAML files can easily get out of hand as applications grow in scale and complexity. To tackle this challenge, Kubernetes provides a set of tools to manage these configurations efficiently. Among these tools are Helm and Kustomize. Overview of Helm and Kustomize Kubernetes has become the ...

Read More

Handling Missing Data in Python Causes and Solutions

Satish Kumar
Satish Kumar
Updated on 23-Aug-2023 590 Views

Introduction Missing data is a common issue in data analysis and can occur due to various reasons. In Python, missing values are often represented as NaN (Not a Number) or None. Missing data can cause inaccurate analysis results and lead to biased conclusions if not handled properly. Therefore, handling missing data is an essential part of any successful data analysis project. Causes of Missing Data in Python Missing data is a common challenge that data analysts and scientists often encounter in their work. In Python, there are various reasons why data may be missing. Understanding these causes can help analysts ...

Read More
Showing 781–790 of 937 articles
« Prev 1 77 78 79 80 81 94 Next »
Advertisements