• Facebook App Icon
  • Twitter App Icon
  • Google+ App Icon
Featured Posts

May 30, 2018

This may seem provocative, but the intent is to do that! When I closely look at where RPA tools have been implemented; most common use cases are, to extract from different sources, process (transform) and then move or load into another destination. If my memory serves...

March 31, 2018

Understanding this concept begins in defining what is a sample/training data set. All statistical/machine learning models require a set of well documented/labelled data set and a hypothesis function to train and build a machine learning system. The sample data set is d...

February 26, 2018

Introduction

Today, significant amount of IT expenditure goes into detection including firewalls, anti-virus, SIEM, IDS/IPS (Intrusion detection/Prevention) systems. Yet, we have seen threats getting through these perimeter defenses without getting detected. There are s...

February 18, 2018

Introduction

The growth of Internet and emergence and explosion of new devices has led to increase in both data volume and security risks for the enterprise. Now, more devices are being connected and Internet ready, new avenues of attack, and potentially sabotage open u...

February 4, 2018

Many enterprises have begun to realize the potential and benefits of big data. Understanding a high level view of the reference architecture provides a good background in how Big Data complements existing analytics, storage systems, databases and other IT systems. The...

Please reload

I'm busy working on my blog posts. Watch this space!

Please reload

Recent Posts

February 26, 2018

Please reload

Archive
Please reload

Search By Tags

I'm busy working on my blog posts. Watch this space!

Please reload

Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square