Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

IBM completes successful field trials on Fully Homomorphic Encryption

Categories

Tags ibm performance infosec software-architecture linux

Fully Homomorphic Encryptio (FHE) allows computation of still-encrypted data, without sharing the secrets. We’re already accustomed to data being encrypted while at rest or in flight—FHE offers the possibility of doing computations on it as well, without ever actually decrypting it. By Jim Salter.

FHE is a type of encryption that allows direct mathematical operations on the encrypted data. Upon decryption, the results will be correct. For example, you might encrypt 2, 3, and 7 and send the three encrypted values to a third party. If you then ask the third party to add the first and second values, then multiply the result by the third value and return the result to you, you can then decrypt that result—and get 35.

Fully Homomorphic Encryption offers many possibilities that Secure Encrypted Virtualization does not, however. Since all mathematical and logical operations can be built from additive and multiplicative operations, this effectively means that any computation can be performed upon FHE encrypted data. This opens a dizzying array of possibilities: one might search a database without ever letting the database owner know what you searched for or what the result was. Two parties might discover the intersection set of their separately held datasets without either party revealing the actual contents of their data to the other.

Although Fully Homomorphic Encryption makes things possible that otherwise would not be, it comes at a steep cost. The additional compute power and memory resources required to operate on FHE-encrypted machine-learning models—roughly 40 to 50 times the compute and 10 to 20 times the RAM that would be required to do the same work on unencrypted models. How exciting!

[Read More]

How to scale and secure Django application with Docker, Nginx, and Let's Encrypt

Categories

Tags python web-development app-development infosec nginx ssl servers

In cloud-based environments, there are multiple ways to scale and secure a Django application. By scaling horizontally, and running several copies of your app, you can build a more fault-tolerant and highly-available system, while also increasing its throughput so that requests can be processed simultaneously. By Hanif Jetha.

In this tutorial, you’ll horizontally scale a containerized Django and Gunicorn Polls application by provisioning two application servers that will each run a copy of a Django and Gunicorn app container.

You’ll also enable HTTPS by provisioning and configuring a third proxy server that will run an Nginx reverse proxy container and a Certbot client container. Certbot will provision TLS certificates for Nginx from the Let’s Encrypt certificate authority. This will ensure that your site receives a high security rating from SSL Labs.

The article is split into:

  • Prerequisites
  • Configuring first Django application server
  • Configuring Second Django application server
  • Configuring Nginx Docker container
  • Configuring Certbot and Let’s Encrypt certificate renewal

When building a distributed system, there are often multiple design decisions you must face, and several architectures may satisfy your use case. The architecture described in this tutorial is meant as a flexible blueprint for designing scalable apps with Django and Docker. Nice one!

[Read More]

Data breaches could cost you hundreds of millions

Categories

Tags ibm infosec learning cio software app-development

Mega breaches that compromise 50m records or more cost businesses $392m on average. By Anthony Spadafora.

Falling victim to a data breach can be devastating for a company’s reputation as well as to its bottom line with each breach costing companies $3.86m per breach according to a new report from IBM.

To compile it’s new 2020 Cost of a Data Breach Report, IBM Security and the Ponemon Institute interviewed more than 3,200 security professionals from over 500 organizations worldwide that suffered a data breach over the past year.

The report found that businesses that had deployed security automation technologies, which leverage AI, analytics and automated orchestration to identify and respond to security events, experienced less than half the data breach costs than those who didn’t at $2.45m per breach as opposed to $6.03m on average.

  • They put together a list of the best disaster recovery services
  • Find missing data with the best data recovery software
  • They’ve also highlighted the best ransomware protection

While the average cost of a data breach decreased by 1.5 percent when compared to last year, mega breaches where over 50m records were compromised saw costs jump from $388m to $392m this year. Make sure to follow the link to the report on IBM site as you will get more information and various documents in pdf format. Great report!

[Read More]

From gut to plan: the thoughtful execution framework

Categories

Tags agile ux frameworks web-development learning

Gut is an important aid in a creative process. But it shouldn’t alone drive strategic decisions or prevent you from exploring multiple solutions to a single hypothesis. By Annina Koskinen.

Thoughtful Execution framework – the go-to resource for teams in Spotify’s Growth Opportunities mission to reach their goals and ship with impact. Thoughtful Execution invites you to leverage data and insights in a way that leads to identifying multiple problems or opportunities that could be solved, and advocates for going wide in hypothesis generation and design explorations before zooming into a single solution.

The Thoughtful Execution tree.

Source: @spotify https://spotify.design/article/from-gut-to-plan-the-thoughtful-execution-framework

The article then describes:

  • The Thoughtful Execution tree
  • It all starts with data and insights
  • From opportunities to multiple hypotheses and solutions
  • From solutions to learnings
  • The power of Thoughtful Execution

You will also get downloadable ‘The power of Thoughtful Execution’ framework and links to further reading. Great!

[Read More]

Introduction to crun, a fast and low-memory footprint container runtime

Categories

Tags containers open-source software-architecture devops linux

Check out crun, an OCI-compliant alternative to runc for Linux container runtime. By Dan Walsh (Red Hat), Valentin Rothberg (Red Hat), Giuseppe Scrivano (Red Hat).

runc is a Go language-based tool that reads a runtime specification and configures the Linux kernel. It eventually creates and starts container processes. As it turns out, Go might not have been the best programming language for this task. Go does not have good support for the fork/exec model of computing. Go’s threading model expects programs to fork a second process and then to exec immediately.

Unlike Go, C is not multi-threaded by default, and was built and designed around the fork/exec model. C is also a much lower level language and interacts very well with the Linux kernel. Depending on the container configuration, crun can be twice as fast as runc.

Some additional features of crun:

  • Sharing files by group for rootless containers
  • Controlling stdout and stderr of OCI hooks
  • Crun supports running older versions of systemd on cgroup v2
  • Crun as a library
  • Extensibility of crun
  • Crun is more portable

crun is an excellent alternative to runc for the OCI runtime. It proves the power of standards like the OCI runtime specification and the open source way. Follow the article for more information about memory consumption and simple benchmarks. Good read!

[Read More]

Progressive Web Apps: Caching strategies

Categories

Tags javascript web-development open-source nodejs

Write up about doing some brushing up on progressive web apps and effort to understand some concepts better especially caching strategies. Progressive Web Apps(PWAs) are normal web applications which can feel like native mobile applications to the user. By Sholley O.

The Cache only strategy returns a resource from the cache without ever going to the network. If it doesn’t exist in the cache, it fails and nothing happens because at no point are we trying to get that resource over the network. This strategy is useful for serving assets pre-cached during the installation of a service worker.

Building PWAs you’ll be doing some caching. It could be assets(css, js, icons, images), responses or even a fallback offline page. So choosing strategies that work best for your application is very important.

Tutorial then goes over common caching strategies:

  • Cache only
  • Network only
  • Cache first
  • Network first
  • Stale while revalidate

Very straightforward and hands on tutorial with all examples in JavaScript. Godo read!

[Read More]

Quantum computing: A key ally for meeting business objectives

Categories

Tags miscellaneous machine-learning software-architecture learning management

Quantum computing provides a new way of optimizing business processes with use cases spanning finance, logistics, telecommunications, and transport operations. An article by Reply, published on MIT technology review.

In the business world, the opportunities for applying quantum technology relate to optimization: solving difficult business problems, reconfiguring complex processes, and understanding correlations between seemingly disparate data sets. The main purpose of quantum computing is to carry out computationally costly operations in a very short period of time, while at the same time accelerating business performance.

Speed and computational power are key components when working with data. Quantum computing can optimize business processes for any number of solutions, for example maximizing cost/benefit ratios or optimizing financial assets, operations and logistics, and workforce management—usually delivering immediate financial gains.

The article then focuses on:

  • Quantum for finance optimization
  • Quantum for logistics: delivery and workforce optimization
  • Quantum for train platform optimization
  • Quantum for telecoms: network planning
  • Quantum computing: what’s next?

Quantum machine learning (QML) makes the most of the advantages of two current themes: quantum computing and machine learning. Although QML is still in its early stages, it nevertheless offers a whole new world of opportunities, combining the new knowledge provided by machine learning with the accelerated calculation potential and the enhanced accuracy of quantum calculations. Refreshing read!

[Read More]

Railway oriented programming in Scala

Categories

Tags scala software-architecture functional-programming code-refactoring software java

An article by Pierre Jambet about his discovery of Railway Oriented Programming (ROP).

If you new to the concept of ROP, here is the blurb:

Many examples in functional programming assume that you are always on the “happy path”. But to create a robust real world application you must deal with validation, logging, network and service errors, and other annoyances. ROP tries to address these in clean functional way.

The article then tries to implement ROP with use of Either type:

  • Translating F# to Scala
  • The ROP DSL
  • Validation
  • One-track functions
  • Dead end functions & exception handling
  • Adding log

The article contains plenty of code examples with links to further reading. Excellent read for any fan of functional programming!

[Read More]

Three tips for coding with Alexa SMAPI SDK

Categories

Tags aws cloud miscellaneous robotics app-development bots

The SMAPI SDK makes it easier than ever to build Alexa skill management and reporting functions into web, mobile, and desktop apps using one of the supported languages (Node.js, Python, and Java). By Greg Bulmash.

The Alexa Skill Management API (SMAPI) provides a REST-based API to do anything with your skills that you can do with the Alexa Skills Kit Command Line Interface (ASK CLI) or the Alexa developer console. In fact, a lot of the functionality of both utilize it.

Recently, Amazon released the Alexa SMAPI SDK to make incorporating the Skill Management API into your code easier. This blog post offers some tips for working with the SDK, by walking through the NodeJS example scripts in the Alexa Cookbook SMAPI SDK demo.

The article then deals with:

  • Setup (including the demo from the Alexa Cookbook on Github)
  • Integrate login with Amazon into your code
  • Running the listSkills.js sample
  • Running the getMetrics.js sample
  • Get started with the SMAPI SDK today

You will also get links to more resources and reading so you can really become Alexa skills ninja in a jiffy. Great read!

[Read More]

How to Build a chatbot for SAP Analytics Cloud with SAP Conversational AI

Categories

Tags cloud bots miscellaneous robotics app-development

In this straightforward tutorial, we’ll learn how to create an SAP Analytics Cloud chatbot with SAP Conversational AI, and SAP Analytics Cloud (SAC) Custom Widget. By Ferry Djaja.

The goal of this tutorial is to enable the users to interact and add the chatbot interface in SAP Analytics Cloud (SAC), Analytics Application. The bot will reply with the answer by updating the Analytics Application UI elements like a chart, widget, table, etc. For our case, we’ll design the bot to update the table based on the user’s question.

SAP Analytics chat bot flow diagram

Source: https://cai.tools.sap/blog/how-to-build-chatbot-for-sap-analytics-cloud-with-sap-conversational-ai/

The tutorial then gives detailed instructions on:

  • Flow Diagram
  • SAP Analytics Cloud Custom Widget
  • SAP Conversational AI Bot Development
  • Bot Server
  • SAP Analytics Cloud, Analytics Application
  • Usage

This step by step tutorial with loads of screen shots and explanations what yuo are doing during chat bot building process. You will also get video demo and links to further reading and resources. Great!

[Read More]