Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 79 of 94

10 Best Google Cloud Platform Courses in 2023

Satish Kumar
Satish Kumar
Updated on 26-Feb-2024 480 Views

Google Cloud Platform (GCP) is a cloud computing platform that offers a wide range of services to help businesses run their operations in the cloud. With its flexible and scalable infrastructure, GCP has become one of the most popular cloud platforms in recent years. If you're looking to learn how to use GCP to its fullest potential, taking a course is an excellent way to get started. In this article, we'll take a look at some of the best GCP courses available in 2023. Introduction to Google Cloud Platform If you're new to GCP, the Introduction to Google Cloud Platform ...

Read More

10 Best Computer Science Courses in 2023

Satish Kumar
Satish Kumar
Updated on 26-Feb-2024 1K+ Views

In the constantly evolving world of technology, it's imperative to stay updated with the latest developments in computer science. With numerous online courses available, it's challenging to determine which courses are worth taking. In this article, we'll discuss the best computer science courses to take in 2023. Artificial Intelligence (AI) Artificial Intelligence is one of the most in-demand fields in computer science. It is the science of creating intelligent machines that can perform tasks that usually require human intelligence. AI involves the use of algorithms and techniques such as machine learning, natural language processing, and robotics. The following courses are ...

Read More

Exception Handling in Distributed System

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 1K+ Views

Introduction In context of distributed systems, exception handling refers to process of detecting, diagnosing, and recovering from errors that occur in a distributed system. In such systems, errors can occur at any point in communication and coordination process, including network failures, hardware malfunctions, and software bugs. Thus, effective exception handling is crucial to ensure reliability and availability of a distributed system. In this article, we will explore various techniques and best practices for exception handling in distributed systems. Importance of Exception Handling in Distributed Systems In a distributed system, multiple processes run on different machines and communicate with each other ...

Read More

Evolution of Distributed Computing Systems

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 5K+ Views

Introduction Distributed computing systems refer to a network of interconnected devices that share resources and work together to achieve a common goal. evolution of distributed computing systems has been rapid, and it has transformed way we use technology in our daily lives. From simple file sharing systems to advanced cloud computing, distributed computing systems have come a long way. In this article, we will discuss evolution of distributed computing systems and explore some of examples. Early Days of Distributed Computing The early days of distributed computing can be traced back to 1960s, where researchers began experimenting with idea of sharing ...

Read More

Event Ordering in Distributed System

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 3K+ Views

Introduction Distributed systems have become an integral part of our modern-day technological infrastructure. They have made it possible to deliver services at scale, provide better resilience, and enable better fault tolerance. However, designing distributed systems is a challenging task, and one of most significant challenges is maintaining ordering of events in system. This article will discuss event ordering in distributed systems and provide examples of different techniques used to achieve it. Event Ordering Event ordering is essential in distributed systems because it determines order in which events occur. In a distributed system, events can happen concurrently on different nodes, and ...

Read More

Active and Passive attacks in Information Security

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 3K+ Views

Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used by hackers, and ways to protect against these types of threats. What is an Active Attack? An active attack occurs when a hacker attempts to alter or manipulate data in a system. This type of attack can be easily identified as it typically involves an attacker trying to perform some ...

Read More

Access Lists (ACL)

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 1K+ Views

In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore access control lists in greater detail, including their purpose, components, types, and examples. What are Access Control Lists (ACLs)? Access control lists (ACLs) are a set of rules that are used to control network traffic based on source or destination IP address, protocol, port number, or other criteria. ACLs are ...

Read More

A Cryptographic Introduction to Hashing and Hash Collisions

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 574 Views

Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. This article will provide a cryptographic introduction to hashing and hash collisions, explaining how hash functions work and why hash collisions can be a problem. What is Hashing? Hashing is a process that takes input data of any size and maps it to a fixed-size output, which is called a ...

Read More

Best Practices for Protecting Your Data and Customer SaaS Business

Satish Kumar
Satish Kumar
Updated on 31-Aug-2023 267 Views

As a SaaS (Software-as-a-Service) business owner, protecting your data and customers should be a top priority. With an increasing number of cyberattacks and data breaches, you cannot afford to be complacent about your security measures. In this article, we will discuss some of the best practices you can implement to protect your data and customers. What is Data Protection? Data protection refers to the process of safeguarding sensitive and confidential information from unauthorized access, use, disclosure, or destruction. It is a critical aspect of information security and privacy, and it is essential for ensuring the confidentiality, integrity, and availability ...

Read More

How to Change Root Password of MySQL or MariaDB in Linux?

Satish Kumar
Satish Kumar
Updated on 24-Aug-2023 881 Views

Introduction As with any password, the root user password for a MySQL or MariaDB database should be changed regularly for security reasons. The root user has complete access and control over all databases and tables within the system, making it a prime target for any potential attacks. Regularly changing the root password can help prevent unauthorized access to your data, as well as provide an added layer of security against potential server breaches. Checking Current Root Password A root user is a powerful administrator account that has full access to the MySQL or MariaDB server. It is important to regularly ...

Read More
Showing 781–790 of 937 articles
« Prev 1 77 78 79 80 81 94 Next »
Advertisements