Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

The future of computer vision

Categories

Tags cloud miscellaneous cio big-data machine-learning data-science

Computer vision is a rapidly growing field in research and applications. Advances in computer vision research are now more directly and immediately applicable to the commercial world. By Richmond Alake.

AI developers are implementing computer vision solutions that identify and classify objects and even react to them in real time. Image classification, face detection, pose estimation, and optical flow are some of the typical tasks. Computer vision engineers are a subset of deep learning (DL) or machine learning (ML) engineers that program computer vision algorithms to accomplish these tasks.

The article further describes solutions related to:

  • Cloud computing
  • AutoML
  • Machine learning libraries and frameworks
  • Mobile devices

Computer vision technology continues to increase as AI becomes more integrated in our daily lives. Computer vision is also becoming more and more common in the latest news headlines. As this technology scales, the demand for specialists with knowledge in computer vision systems will also rise due to trends in cloud computing service, Auto ML pipelines, transformers, mobile-focused DL libraries, and computer vision mobile applications. Good read!

[Read More]

AIOps with Azure Metrics Advisor

Categories

Tags cloud devops azure database big-data

AIOps is a term introduced by Gartner in 2016, referring to AI for IT Operations. It combines big data and machine learning to automate IT operations processes, including event correlation, anomaly detection, and causality determination. By ODSC Community.

As more companies adopt digital transformation initiatives, we are seeing an explosion in digital systems and their associated data exhaust. By rationalizing digital signals in an intelligent way, AIOps plays a crucial role in helping companies reduce operation costs, improve engineering efficiency, and enhance customer experience. As a result, AIOps adoption has grown exponentially along with the uptick of digital transformation. Ponemon Institute© Research Report estimated that the cost-saving from AIOps systems is $17K/Outage min.

Further in the article we have:

  • How to get started with Azure Metrics Advisor
  • Data preparation: map your AIOps problem to the dataset
  • Data onboarding
  • Tuning the detection
  • Root cause analysis

In addition to the detected anomalies, Azure Metrics Advisor also offers insights into what might have been the cause of the issue to help you further troubleshoot. Stakeholders can get detection results via communication channels set up by the user, along with the anomaly detected and root cause analysis. You will also find reference architecture attached. Good read!

[Read More]

IAM policy types: How and when to use them

Categories

Tags infosec cio agile management

You manage access in AWS by creating policies and attaching them to AWS Identity and Access Management (IAM) principals (roles, users, or groups of users) or AWS resources. AWS evaluates these policies when an IAM principal makes a request, such as uploading an object to an Amazon Simple Storage Service (Amazon S3) bucket. Permissions in the policies determine whether the request is allowed or denied. By Matt Luttrell and Josh Joy.

In this blog post, we will walk you through a scenario and explain when you should use which policy type, and who should own and manage the policy. You will learn when to use the more common policy types: identity-based policies, resource-based policies, permissions boundaries, and AWS Organizations service control policies (SCPs).

The article explains the following:

  • Different policy types and when to use them
    • Service control policies overview
    • Permissions boundaries overview
    • Identity-based policies overview
  • Resource-based policies overview
    • How to implement different policy types
    • Service control policies
    • Permissions boundary policies
    • Identity-based policies
    • Resource-based policies
  • Putting it all together

In this blog post, you learned about four different policy types: identity-based policies, resource-based policies, service control policies (SCPs), and permissions boundary policies. You saw examples of situations where each policy type is commonly applied. Then, you walked through a real-life example that describes an implementation that uses these policy types. Excellent read!

[Read More]

Guidelines for choosing a Node.js framework

Categories

Tags javascript how-to app-development learning cio agile management

With lots of frameworks to choose from, and all those strong opinions, it’s easy to feel a little lost. Comparing frameworks based on the features they list can be a headache, and features are only part of the picture. It would be awesome if you had a clear checklist you could evaluate Node.js frameworks against. By Simon Plenderleith.

The article is split into the following sections:

  • What’s your use case?
  • Framework styles
  • Support for promises and async / await
  • Documentation
  • Practical examples
  • Community and ecosystem
  • Project health

Context is everything. Try and get clear on your requirements before you start looking at frameworks and their features. This will help you you figure out if a framework is designed to support your intended use case. Good read!

[Read More]

Web3: What is it and what it means for freelancers

Categories

Tags cloud fintech blockchain how-to management

It is being said that Web3 is the future of the internet which promises a decentralised, immutable version of the global web – free of intermediaries and equipped with the same cryptographic verifiability as cryptocurrencies and non-fungible tokens (NFTs). But what does that really mean? By Stefania Volpe.

The article then explains:

  • Web3, Blockchain and NFT: what do they mean?
    • What is blockchain?
    • What is an NFT?
  • Impact of Web3 on the future of work
  • Benefits of web3 for freelancers
  • How freelancers can use web3 to monetise their services
  • Becoming a Web3 developer
    • Job profiles for developers in the Web3

Web3 is currently a somewhat vague concept whose exact definition has not yet been determined. It is more of an ideal image of a future web than a usable technology stack that developers can build directly on top of. Web3, to put it simply, is the next version of the Internet. The core of Web3 is to make the Internet decentralised, meaning that: there is no one who owns the Internet, all the data on it converges, it’s independent. Nice one!

[Read More]

Stacks vs. Solana vs. Polygon: How do they compare from a developer perspective?

Categories

Tags blockchain cloud fintech how-to miscellaneous performance

What’s the best blockchain for building Web3 applications? It depends on what you want to prioritize across the blockchain trilemma. The trilemma argues that blockchains can only provide two of the three properties of decentralization, security, and scalability, and that no matter where you build, you’ll be making a tradeoff. By Joe Bender.

Developers today have a lot of options for where to build, and it’s hard to decide what blockchain is best. In this post, we break down some of the key features in Stacks, Polygon, and Solana to make it easier for you to figure out where you want to build.

The article then dives into:

  • Stacks vs. Solana vs. Polygon: An overview
  • Stacks vs. Solana vs. Polygon: Programming languages
  • Stacks vs. Solana vs. Polygon: Developer support
  • Stacks vs. Solana vs. Polygon: Which blockchain should you choose?

Different blockchains have different strengths and weaknesses. The blockchain that you choose will be dependent on what you want to build and how you want to build it. For example, if you want a secure foundation for your Web3 applications, or if you want to tap into the latent potential in Bitcoin, Stacks is your place. Good read!

[Read More]

Magic NAT: Everywhere, unbounded, and lower cost

Categories

Tags cloud devops performance management

Network Address Translation (NAT) is one of the most common and versatile network functions, used by everything from your home router to the largest ISPs. Today, we’re delighted to introduce a new approach to NAT that solves the problems of traditional hardware and virtual solutions. By Annika Garbers.

The article then paint the picture of:

  • What does NAT do?
  • Allowing traffic from private subnets to connect to the Internet
  • Enabling communication between private subnets with overlapping IP space
  • Conserving IP address space
  • Challenges with existing NAT solutions
  • Magic NAT: everywhere, unbounded, cross-platform, and predictably priced
  • Anycast: Magic NAT is everywhere, automatically

Cloudflare’s global capacity is at 141 Tbps and counting, and automated traffic management systems like Unimog allow us to take full advantage of that capacity to serve high volumes of traffic smoothly. Magic NAT, like our other network services, is priced based on the 95th percentile of clean bandwidth for your network: no installation, maintenance, or upgrades, and no surprise charges for data transfer spikes. Magic NAT is currently in beta, translating network addresses globally for a variety of workloads, large and small. Good read!

[Read More]

Visualizing the 5 pillars of cloud architecture

Categories

Tags cloud management cio performance

Getting the most value out of an organization’s cloud infrastructure can be a daunting task. But the key considerations can be winnowed down to an easy-to-remember acronym: CROPS, which stands for cost optimization, reliability, operational excellence, performance efficiency and security. By Dan Lawyer.

These five pillars are proven guidelines through which companies can design, evaluate and implement cloud architecture in a way that can most effectively scale, ensuring compliance with the relevant standards and saving money over time.

The article then explains the pillars:

  • Cost optimization
  • Reliability
  • Operational excellence
  • Performance efficiency
  • Security

Each cloud architecture must be able to protect the confidentiality and integrity of your information, systems and assets. A robust and proactive approach to security will also ensure that your organization maintains compliance with all government regulations and cloud security standards, such as General Data Protection Regulation, System and Organization Controls 2, Payment Card Industry Data Security Standard and Health Insurance Portability and Accountability Act. Good read!

[Read More]

Azure Synapse Link for SQL: From production to a data warehouse in a few clicks

Categories

Tags management big-data cio data-science analytics

The Link technology in Synapse is used to synchronize data from different data sources to Synapse Analytics. Synapse Link for CosmoDB and Synapse Link for Dataverse were already released. Now it’s time for a new and very important one: Azure Synapse Link for SQL. By Dennes Torres.

The Azure Synapse Link for SQL can be used with Azure SQL Database and SQL Server 2022 to synchronize tables using these databases as sources and a Synapse Dedicated Pool as a destination.

The article then describes in some detail:

  • Azure Synapse Link for SQL basic elements
  • Azure Synapse Link for SQL Scenarios
  • Azure Synapse Link for SQL Architecture
  • Provisioning the Azure Synapse Link for SQL
  • Additional Options

The Azure Synapse Link for SQL is not the entire way from production to a data warehouse, but it makes the ETL/ELT process way easier by synchronizing the data with the Synapse dedicated SQL Pool, relieving the production environment from further ETL workload, and allowing you to proceed from this point with the transformation of the data for the data warehouse. Nice one!

[Read More]

30 positive feedback examples that create positive outcomes

Categories

Tags management miscellaneous cio learning

Giving positive feedback to your employees is one of the most powerful things a leader can do. It encourages your direct reports to continue doing good work, but it also strengthens the relationships. By Lucy Georgiades.

However, many managers struggle to give positive feedback. They may feel like they don’t want to appear insincere, or they may be worried about appearing weak.

In this blog, you’ll learn:

  • Why giving positive feedback is important
  • Why do managers struggle to give positive feedback
  • How to give positive feedback
  • 30 examples of positive feedback
  • When is the best time to give positive feedback
  • 5 mistakes to avoid when giving positive feedback

The key here is to be authentic and specific in your positive feedback. If you’re not, your team will see right through you. And don’t worry, you’ll know the exact steps to give positive feedback the right way after reading this article. Good read!

[Read More]