IT Managed Services Provider Resource Recommendation Update on July 26, 2021

Knowledge of terms to know, lists, tips, podcasts, cheat sheets, free tools, and Featured Q&A recommended during July 2021.

Content Summary

What is Narrow Artificial Intelligence (Narrow AI)?
What is Dynamic Host Configuration Protocol (DHCP)?
What is Cybersquatting?
What is Risk analysis?
What is Data Lake?
What is Social Media Analytics?
What is Nonfungible token (NFT)?
What is Robotic process automation (RPA)?
What is Deep Learning?
What is Natural language generation (NLG)?
What is Data Preprocessing?
What is Critical Path Method (CPM)?
What is Hacktivism?
What is Text File?
What is Nanocomputer?
What is Fixed wireless access (FWA)?
What is Hacking as a service (HaaS)?
What is Geotagging?
What is Object-oriented programming (OOP)?
What is Computer Forensics (Cyber Forensics)?
Why are companies paying so much for AI professionals?
What is Flash Storage?
What is Recurrent Neural Networks (RNN)?
What is Software as a Service (SaaS)?
What is RAID 10 (RAID 1+0)?
What is Ransomware?
What is Commodore?
What is Cisco Certified Network Associate (CCNA)?
What is Logarithm (LN)?
What is Cloud Backup?
What is Cloud Security Control?
What is NVMe over Fabrics (NVMe-oF)?
What is Continuous Integration (CI)?
What is Cloud Services?
What is Oracle Public Cloud?
What is Oracle Database (Oracle DB)?
What is Punchdown Block?
What is DevOps as a Service?
What is General Availability (GA)?
What is Narrow AI (Weak AI)?
What is Public Cloud Storage?
What is Ethical Hacker?
What is Private Cloud Storage?
List
Tip
Podcast
Cheatsheet
Blog
Free Tool
Course
Tutorial
Training Resource

What is Narrow Artificial Intelligence (Narrow AI)?

Narrow artificial intelligence (narrow AI) is a specific type of artificial intelligence in which a learning algorithm is designed to perform a single task, and any knowledge gained from performing that task will not automatically be applied to other tasks.

Unlike general artificial intelligence, which seeks to mimic complex thought processes, narrow AI is designed to successfully complete a single task without human assistance. Popular applications for narrow AI include language translation and image recognition.

Most AI applications in use today can be categorized as being narrow AI. Narrow AI may also be referred to as weak AI.

Narrow AI supports many commercial applications, including recommendation engines. As learning algorithms become deeper, the applications of narrow AI are also becoming more layered.

There is still a lot of debate over how well computers will ever be able to achieve general artificial intelligence, given the complexity of the human brain and the current difficulty that data scientists and ML engineers have creating self-supervised machine learning algorithms.

Narrow AIGeneral AI
Application specific / task limitedPerform general (human) intelligent action
Fixed domain models provided by programmersSelf-learns and reasons with its operating environment
Learns from thousands of labeled examplesLearns from few examples and/or from unstructured data
Reflexive tasks with no understandingFull range of human cognitive abilities
Knowledge does not transfer to other domains or tasksLeverages knowledge transfer to new domains and tasks
Today’s AIFuture AI?

What is Dynamic Host Configuration Protocol (DHCP)?

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign an IP address to any new node entering the network. DHCP permits a node to be configured automatically, thereby avoiding the necessity of involvement by a network administrator.

DHCP does the following:

  1. Manages the provision of all the nodes added or dropped from the network
  2. Maintains the unique IP address of the host using a DHCP server
  3. Sends a request to the DHCP server whenever a client/node, which is configured to work with DHCP, connects
    to a network. The server acknowledges by providing an IP address to the client/node.

Dynamic Host Configuration Protocol is also known as RFC 2131.

DHCP is an automated method by which any newly added or transferred node in a network can be assigned or reassigned an IP address instantly. Without DHCP, the network administrators would be forced to assign IP address manually for every node in a network.

A DHCP server has many duties:

  1. A DHCP server is configured to manage the provision of IP addresses and is an essential requirement to run DHCP protocol. The server manages the record of all the IP addresses it allocates to the nodes. If the node rejoins or is relocated in the network, the server identifies the node using its MAC address. This helps to prevent the accidental configuration of same IP address to two different nodes.
  2. For DHCP to operate, the clients need to be configured with it. When a DHCP-aware client connects to the network, the client broadcasts a request to the DHCP server for the network settings.
  3. The server responds to the client’s request by providing the necessary IP configuration information.
  4. The DHCP server is ideally suited in scenarios where there is a regular inclusion and exclusion of network nodes like wireless hotspots. In these cases, the DHCP server also assigns a lease time to each client, after which the assigned IP address in invalid.

What is Cybersquatting?

Cybersquatting refers to illegal domain name registration or use. Cybersquatting can have a few different variations, but its primary purpose is to steal or misspell a domain name in order to profit from an increase in website visits, which otherwise would not be possible. Trademark or copyright holders may neglect to reregister their domain names, and by forgetting this important update, cybersquatters can easily steal domain names. Cybersquatting also includes advertisers who mimic domain names that are similar to popular, highly trafficked websites. Cybersquatting is one of several types of cybercrimes.

Cybersquatting is also known as domain squatting.

The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit organization charged with overseeing domain name registration. As cybersquatting complaints throttle up worldwide, ICANN has implemented thorough standards of acceptance such that domain name assigning is done with much more scrutiny. ICANN has also put solid requirements for domain name recovery in place for instances of trademark registration lapses by trademark owners. ICANN urges trademark owners to renew their registrations yearly and to report misuse to the agency as soon they become aware that they’ve neglected to reregister a domain.

What is Risk analysis?

Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.

Performing a risk analysis includes considering the possibility of adverse events caused by either natural processes, like severe storms, earthquakes or floods, or adverse events caused by malicious or inadvertent human activities. An important part of risk analysis is identifying the potential for harm from these events, as well as the likelihood that they will occur.

Why is risk analysis important?

Enterprises and other organizations use risk analysis to:

  • Anticipate and reduce the effect of harmful results from adverse events.
  • Evaluate whether the potential risks of a project are balanced by its benefits to aid in the decision process when evaluating whether to move forward with the project.
  • Plan responses for technology or equipment failure or loss from adverse events, both natural and human-caused.
  • Identify the impact of and prepare for changes in the enterprise environment, including the likelihood of new competitors entering the market or changes to government regulatory policy.

What are the benefits of risk analysis?

Organizations must understand the risks associated with the use of their information systems to effectively and efficiently protect their information assets.

Risk analysis can help an organization improve its security in a number of ways. Depending on the type and extent of the risk analysis, organizations can use the results to help:

  • Identify, rate and compare the overall impact of risks to the organization, in terms of both financial and organizational impacts.
  • Identify gaps in security and determine the next steps to eliminate the weaknesses and strengthen security.
  • Enhance communication and decision-making processes as they relate to information security.
  • Improve security policies and procedures and develop cost-effective methods for implementing these information security policies and procedures.
  • Put security controls in place to mitigate the most important risks.
  • Increase employee awareness about security measures and risks by highlighting best practices during the risk analysis process.
  • Understand the financial impacts of potential security risks.

Done well, risk analysis is an important tool for managing costs associated with risks, as well as for aiding an organization’s decision-making process.

Steps in risk analysis process

The risk analysis process usually follows these basic steps:

  1. Conduct a risk assessment survey: This first step, getting input from management and department heads, is critical to the risk assessment process. The risk assessment survey is a way to begin documenting specific risks or threats within each department.
  2. Identify the risks: The reason for performing risk assessment is to evaluate an IT system or other aspect of the organization and then ask: What are the risks to the software, hardware, data and IT employees? What are the possible adverse events that could occur, such as human error, fire, flooding or earthquakes? What is the potential that the integrity of the system will be compromised or that it won’t be available?
  3. Analyze the risks: Once the risks are identified, the risk analysis process should determine the likelihood that each risk will occur, as well as the consequences linked to each risk and how they might affect the objectives of a project.
  4. Develop a risk management plan: Based on an analysis of which assets are valuable and which threats will probably affect those assets negatively, the risk analysis should produce control recommendations that can be used to mitigate, transfer, accept or avoid the risk.
  5. Implement the risk management plan: The ultimate goal of risk assessment is to implement measures to remove or reduce the risks. Starting with the highest-priority risk, resolve or at least mitigate each risk so it’s no longer a threat.
  6. Monitor the risks: The ongoing process of identifying, treating and managing risks should be an important part of any risk analysis process.

The focus of the analysis, as well as the format of the results, will vary depending on the type of risk analysis being carried out.

Qualitative vs. quantitative risk analysis

The two main approaches to risk analysis are qualitative and quantitative. Qualitative risk analysis typically means assessing the likelihood that a risk will occur based on subjective qualities and the impact it could have on an organization using predefined ranking scales. The impact of risks is often categorized into three levels: low, medium or high. The probability that a risk will occur can also be expressed the same way or categorized as the likelihood it will occur, ranging from 0% to 100%.

Quantitative risk analysis, on the other hand, attempts to assign a specific financial amount to adverse events, representing the potential cost to an organization if that event actually occurs, as well as the likelihood that the event will occur in a given year. In other words, if the anticipated cost of a significant cyberattack is $10 million and the likelihood of the attack occurring during the current year is 10%, the cost of that risk would be $1 million for the current year.

A qualitative risk analysis produces subjective results because it gathers data from participants in the risk analysis process based on their perceptions of the probability of a risk and the risk’s likely consequences. Categorizing risks in this way helps organizations and/or project teams decide which risks can be considered low priority and which have to be actively managed to reduce the effect on the enterprise or the project.

A quantitative risk analysis, in contrast, examines the overall risk of a project and generally is conducted after a qualitative risk analysis. The quantitative risk analysis numerically analyzes the probability of each risk and its consequences.

The goal of a quantitative risk analysis is to associate a specific financial amount to each risk that has been identified, representing the potential cost to an organization if that risk actually occurs. So, an organization that has done a quantitative risk analysis and is then hit with a data breach should be able to easily determine the financial impact of the incident on its operations.

A quantitative risk analysis provides an organization with more objective information and data than the qualitative analysis process, thus aiding in its value to the decision-making process.

What is Data Lake?

A data lake is an easily accessible, centralized storage repository for large volumes of structured and unstructured data. A data lake has a flat architecture and uses object storage to store data.

Data lakes play an important role in helping data scientists visualize and analyze data from disparate data in their native formats. In data science, this is an especially important consideration when the scope of the data — and its uses — may not yet be fully known.

Although data lakes offer strong data access benefits, they require a management component to help users find the most relevant data, understand relationships and integrate heterogeneous data sources. Popular data lake platforms include:

  • CoreLAKE: a commercial, off-the-shelf (COTS) data lake platform for healthcare organizations.
  • Qubole: an open source data lake platform for machine learning and ad hoc analytics.
  • Azure Data Lake: built on Hadoop YARN and optimized for the cloud.
  • AWS Lake Formation: allows users to access a centralized data catalog that describes available data sets and their appropriate usage.

A data lake may also be referred to as a schema-agnostic or schema-less data repository.

The data lake architecture is a store-everything approach to big data. Data is not classified when it is stored in the repository and the value of the data is not clear at the outset. When the data is accessed, only then will it be classified and organized for analysis.

Data lakes were developed to promote the accessibility and reuse of data. Hadoop, an open-source framework for processing and analyzing big data, can be used to sift through the data in the repository.

What is Social Media Analytics?

Social media analytics is the process of collecting and analyzing audience data shared on social networks to improve an organization’s strategic business decisions.

Social media can benefit businesses by enabling marketers to spot trends in consumer behavior that are relevant to a business’s industry and can influence the success of marketing efforts.

Another important example of how social media analytics supports marketing campaigns is by providing the data to quantify the return on investment (ROI) of a campaign based on the traffic gained from various social media channels.

Furthermore, marketers can analyze performance of different social platforms — such as Facebook, LinkedIn and Twitter — and of specific social media posts to determine which messaging and topics resonate best with a target audience.

What are the use cases of social media analytics?

Social media analysis platforms can track and analyze a range of data and interactions used in a variety of social media marketing use cases.

Measure the ROI of social media marketing efforts

The main goal for any social media post, like, retweet or share is ROI.

To determine social media ROI, marketers must first determine an initial benchmark and then have a way to measure key performance indicators (KPIs) against that benchmark over time. When efforts aren’t working well, analysis of those metrics will reveal tweaks marketers can make to improve the performance of the campaign and overall ROI.

In fact, a recent study from Hootsuite, a vendor offering a social media management platform, found that 85% of organizations that began measuring social media data within their analytics tools were able to accurately show ROI for those efforts.

To begin tracking social media campaign performance, a tracking pixel or Google Analytics UTM parameter can be added to any links used in social media posts or ads. That will show any conversions that came from social media marketing and can help with planning retargeting campaigns for visitors who didn’t convert.

Improve strategic decision-making

Social media analytics can improve a marketing team’s ability to understand what social media strategies are working and which ones aren’t as effective.

However, the analytical results can also provide insight that can be useful for making business decisions about other important aspects of the business not necessarily directly related to the marketing campaigns.

For example, with social listening tools, audience and competition can be analyzed by extracting useful insight from social media data being posted on various social media networks like LinkedIn and Facebook. It can also provide demographic information about the audience that will enable enhanced marketing efforts targeting that sector and more effectively create brand awareness.

By using real-time data, emerging trends may be detected that can give a business a jump on the competition by posting social media content sooner.

Track the efficiency of marketing teams

Most organizations strive to streamline workflows and enable team members to be more productive. A lesser known, but still important, feature of social media analytics is its ability to improve efficiency with your marketing team.

In addition to the KPIs for your social media content, you can also measure aspects like response time and customer sentiment.

Showing the chief marketing officer areas where workflows can be automated and resources can be redirected to strategic activities that directly impact revenue are key to obtaining marketing budget and approvals for future campaigns.

What metrics should be tracked with social media analytics?

There are six general types of social media metrics that should be tracked.

Performance metrics

Measuring the performance of social media marketing efforts is critical to understanding where strategic efforts are working and where improvement is needed.

Key performance metrics to track include the following:

  • interactions across platforms and over time to determine if the posted content is properly engaging the audience;
  • whether the number of followers is increasing over time to verify consistent progress across platforms; and
  • click-through rate for link clicks on posts to see if they’re properly driving traffic from social media channels.

Audience analytics

It’s important to clearly understand and define the target audience, as it is the most important element of a social media strategy. Understanding the audience will help create a favorable customer experience with content targeted at what customers want and what they’re looking for.

In the past, audience data was difficult to measure as it was scattered across multiple social media platforms. But with analytics tools, marketers can analyze data across platforms to better understand audience demographics, interests and behaviors. AI-enabled tools can even help predict customer behavior. They can also study how an audience changes over time.

The better targeted the content is, the less advertising will cost and the cost-per-click of ads can be optimized.

Competitor analytics

To obtain a full understanding of performance metrics, it’s necessary to look at the metrics through a competitive lens. In other words, how do they stack up to competitors’ performance?

With social media analytics tools, social media performance can be compared to competitors’ performance with a head-to-head analysis to gauge relative effectiveness and to determine what can be improved.

Most modern tools that include AI capabilities can benchmark competitor performance by industry to determine a good starting point for social media efforts.

Paid social analytics

Ad spending is serious business. If targeting and content isn’t right, it can end up an expensive proposition for unsuccessful content. More advanced analytics tools can often predict which content is most likely to perform well and be a less risky investment for a marketing budget.

For best results, an all-in-one platform is the preferred choice to track performance across all social media accounts such as Twitter analytics, paid Facebook posts or LinkedIn ads. Important metrics to track include the following:

  • Total number of active ads
  • Total ad spend
  • Total clicks
  • Click-through rate
  • Cost per click
  • Cost per engagement
  • Cost per action
  • Cost per purchase

These metrics will indicate exactly where each dollar spent is going and how much return is being generated for social media efforts. They can also be compared against competitor spending to ensure that spending is at an appropriate level and to reveal strategic opportunities where an increased share of voice may be attainable.

Influencer analytics

To gain a leg up on competition in a competitive space, many social media marketers will collaborate with social influencers as part of their marketing campaigns. To make the most of partnerships, it’s necessary to measure key metrics to ensure that the influencer marketing is achieving desired goals.

Social media analytics can provide insights into the right metrics to ensure that influencer campaigns are successful. Some influencer metrics that should be tracked include the following:

  • total interactions per 1,000 followers to understand if they’re properly generating engagement;
  • audience size and most frequently used hashtags, to help determine the maximum reach of your campaign;
  • the number of posts influencers create on a regular basis, to help determine how active they are and how powerful engagement can be; and
  • past collaborations, which can be a great indicator of the potential for success with an influencer.

Sentiment analysis

Sentiment analysis is an important metric to measure as it can indicate whether a campaign is gaining favorability with an audience or losing it. And for customer service oriented businesses, sentiment analysis can reveal potential customer care issues.

To ensure that a campaign is in sync with the target audience and maintains a strong rate of growth, interactions and engagement rate should be tracked over time. A decline could indicate that a change of course is needed.

Gathering and analyzing customer sentiment can help avoid guesswork in developing a marketing strategy and deciding which content will resonate best with the audience. This type of analysis can also indicate the type of content that’s likely to have a positive impact on customer sentiment If your social media analytics tool detects a spike in negative sentiment, action should be taken immediately to address and correct it before it becomes a PR nightmare.

Social media analytics tools

While many businesses use some sort of social media management tool, most of these baseline scheduling tools don’t go far enough to provide the in-depth metrics and data points that social media analytics tools can deliver.

Not only can this deeper level of insight go a long way to inform a successful campaign, it can also be shared with stakeholders to show high-level ROI across disparate social media channels.

An effective analytics tool will have an intuitive, easy-to-use interface that enables transparency in a campaign; it should also streamline the social media marketing processes and workflows.

Examples of social media analytics tools include Sprout Social, Google Analytics, Hootsuite and Buffer Analyze.

What is Nonfungible token (NFT)?

A nonfungible token (NFT) is a type of cryptographic asset that is unique and used to create and authenticate ownership of digital assets. These include cartoons, music, film and video clips, JPEGs, postcards, sports trading cards, and virtual real estate or pets. NFTs provide a secure record that is stamped with unique identifying code stored on blockchain.

In contrast to stocks, bonds and other traditional investments, NFTs are considered an alternative investment that is not fungible, or replaceable, with a similar item. Demand for NFTs, which are like rare collectibles, picked up steam in 2020 and increased dramatically in 2021. This drove up the price of digital artworks, with celebrities, content creators, auction houses and others participating in the market.

How do NFTs work?

The one-of-a-kind qualities of NFTs make them “nonfungible.” This contrasts with “fungible” assets, such as Bitcoin and other cryptocurrencies, dollar bills, gold bars or stock, that are worth a specific amount and are interchangeable. Although one dollar bill can be exchanged for another dollar bill, or one bitcoin can easily be swapped for another, that is not the case with NFTs.

NFTs are also nondivisible. The basic unit of the NFT is the token, which cannot be divided into smaller denominations, as a dollar might be divided into 10 dimes. However, NFTs may be divisible in the future.

Additionally, NFTs are immutable. NFTs cannot be altered once they have been encoded using blockchain technology. The originality and legitimacy of the item is validated through the blockchain in which it is stored.

Blockchain technology establishes ownership of the NFT. Blockchain acts as a decentralized ledger, enabling NFTs to be authenticated publicly to provide a digital signature to prove who owns it and that it is an original work. An NFT buyer would not own a piece of art to hang on a wall but rather a digital image of that artwork and digital certificate of authentication.

The NFT buyer does not own the copyright or trademark of the item. Although there may also be numerous versions it on the internet, NFT buyers have an original in the virtual world.

Furthermore, royalties can be programmed into the token, enabling artists to collect a portion of sales in the future. Other possible technical features include fractional ownership, in which individual investors own a percentage of the NFT and its benefits.

Why are NFTs important?

The surge in popularity of NFTs is a result of their “improved ease of onboarding, speculative nature as both a collectible and investment and grassroots communities developed around the products,” explained Justin Herzig, co-founder of Own the Moment, which provides content, tools and analytics on NFTs.

NFTs enable individuals to buy and sell digital assets in new ways. They help artists and other content creators display their skills digitally and provide the ability to securely value, buy and exchange digital art using a digital ledger. Using NFTs, new and previously decentralized actors can develop innovative value exchanges to build new market structures.

NFTs are a significant form of alternative investment that appeals to buyers’ “personal interests and passions,” explained Herzig, pointing to figures from Preqin projecting a $14 trillion alternative investment industry by 2023. With NFTs, retail investors will be able to have a more personal connection to an interest while investing in areas of financial and utility value.

The NFT buyer hopes the value of the token will increase with time, similar to all investments. Just like their fungible cousins, NFTs are subject to shifts in supply and demand.

According to the NFT Yearly Report 2020, published by NFT market analysis firm Nonfungible.com, the total value of NFT transactions is estimated to have surged from to $62.9 million in 2019 to $250.8 million in 2020. In the first quarter of 2021, more than $2 billion was invested in NFTs, compared with $93 million in the fourth quarter of 2020.

What are uses and examples of NFTs?

An early use of NFTs was a game launched in 2017 called CryptoKitties, in which users could trade and sell virtual kittens. In 2021, NFTs that sparked attention included Twitter CEO Jack Dorsey’s first-ever tweet and work by Beeple, the professional name used by artist Mike Winkelmann, who sold his piece “Everydays: The First 5000 Days” for $69 million.

NFTs are currently being used to sell a range of virtual collectibles, including the following:

  • NBA virtual trading cards
  • Digital sneakers from Nike
  • Trading cards featuring personal memorabilia from actor William Shatner
  • A full studio album by rock band Kings of Leon
  • The original “nyan cat” meme
  • Collectible virtual characters called CryptoPunks
  • A variety of GIFs and images commissioned by Taco Bell, with proceeds going towards the restaurant chain’s charity organization
  • Virtual real estate in Decentraland, a 3D virtual reality platform

Today, the primary owners and collectors of NFTs are enthusiasts with a strong interest in a domain or project. However, NFTs are expected to become mainstream and attract retail investors eventually as the products and technology improve.

How are NFTs created?

NFTs are created using smart contracts. Smart contract code is incorporated into the token when it is created or minted. Stored on blockchain, the smart contract determines the NFT’s qualities, such as ownership and transferability.

The smart contract is autonomous, containing the terms and conditions of an agreement directly within the lines of code. Each NFT is linked to a single token that is stored in a smart contract, which runs on top of the distributed ledger to provide proof of ownership and verifiable originality. Even though there are other copies of the same content, only one person can own the particular token that authenticates ownership of the NFT.

Smart contracts are a crucial feature of blockchain technology. While most NFTs reside on the Ethereum blockchain, some are based on other blockchain technologies, such as TRON and NEO. Blockchain also helps ensure that NFTs remain secure.

While NFTs gain popularity, market participants and observers are becoming increasingly aware of the impact that NFTs will have on the environment. The use of blockchain generates greenhouse gases, which have a significant effect on the world’s carbon footprint.

How are NFTs bought and sold?

As demand for NFTs grows, new marketplaces continue to surface. Popular marketplaces for creators to sell NFTs include:

  • OpenSea
  • Rarible
  • Myth Market
  • BakerySwap
  • SuperRare
  • Foundation
  • AtomicMarket
  • KnownOrigin
  • Enjin Marketplace
  • Portion

The typical process to buy or sell an NFT as follows:

  1. Set up a digital wallet and purchase cryptocurrency, such as ether, using an app, such as Coinbase, Robinhood or MetaMask.
  2. Connect the digital wallet to an NFT marketplace
  3. Mint or list the NFT for sale, or start bidding on or purchasing pieces of content.

Users can auction bids or purchase outright, depending on the seller and marketplace.

The future of NFTs

As with all market assets, principles of supply and demand apply to the NFT marketplace. Buyers should be cautious, as they should be with any type of investment, and keep their eyes open as the market evolves.

“An NFT is only as valuable as what others are willing to pay for it,” Herzig said. “NFTs that can build a deep connection with collectors and investors have shown an increased likelihood of having long-term staying power.”

Collectors and investors can understand the current value for NFTs better by viewing previous and similar sales on established marketplaces. The long-term viability of NFTs will depend on the distinction of their utility value, not just theoretical. Like with other collectables, this will happen once owners view NFTs as uniquely valuable experiences or features. NFT communities will develop and grow, helping to maintain prices and markets and strengthen the trust in their long-term survival.

What is Robotic process automation (RPA)?

Robotic process automation (RPA) is the practice of automating routine business practices with software agents (bots) that perform tasks automatically. RPA programming plays an important role in data preprocessing and can be thought of as a more sophisticated version of macros.

In the past, if an electronic form was missing a price, traditional automation software would flag the form as having an exception and issue an alert. An employee on the receiving end of the alert would then handle the exception by looking up the correct price and entering it manually on the form. With RPA technology, however, the software is able to look up the missing information and complete the form without human assistance.

Today, RPA technology is one of the fastest growing categories of enterprise application automation and sophisticated RPA bots can be taught a workflow that encompasses multiple steps, including:

  • Receiving forms.
  • Issuing a receipt for the form.
  • Checking the form for completeness.
  • Filling in missing information.
  • Forwarding a completed, validated form to its next destination.

Robotic process automation uses artificial intelligence to build software robots that automate tasks that once required human intervention. While mechanical robots have long been used to automate factory floors, advances in artificial intelligence (AI) have made it possible for clerical tasks to be automated as well.

The key difference between RPA bots and traditional mechanical robots is that RPA bots are trained instead of programmed. This type of software robot uses machine learning algorithms to free up human workers and allow them to concentrate on more complicated tasks rather than routine work. Benefits include the following:

  • Cost-savings.
  • Increased accuracy.
  • Increased productivity.
  • Improved scalability.
  • Relatively low-cost implementation.
  • Ability to shift human focus to higher-level work.

What is Deep Learning?

Deep learning is an iterative approach to artificial intelligence (AI) that stacks machine learning algorithms in a hierarchy of increasing complexity and abstraction. Each deep learning level is created with knowledge gained from the preceding layer of the hierarchy.

The first layer of a deep image recognition algorithm, for example, might focus on learning about color patterns in training data, while the next layer focuses on shapes. Eventually, the hierarchy will have layers that focuses on various combinations of colors and shapes, with the top layer focusing on the actual object being recognized.

Deep learning is currently the most sophisticated AI architecture in use today. Popular deep learning algorithms include:

  • Convolutional neural network: the algorithm can assign weights and biases to different objects in an image and differentiate one object in the image from another. Used for object detection and image classification.
  • Recurrent neural networks: the algorithm is able to remember sequential data. Used for speech recognition, voice recognition, time series prediction and natural language processing.
  • Long short-term memory networks: the algorithm can learn order dependence in sequence prediction problems. Used in machine translation and language modeling.
  • Generative adversarial networks: two algorithms compete against each other and use each other’s mistakes as new training data. Used in digital photo restoration and deepfake video.
  • Deep belief networks: an unsupervised deep learning algorithm in which each layer has two purposes: it functions as a hidden layer for what came before and a visible layer for what comes next. Used in healthcare sectors for cancer and other disease detection.

Deep learning is a specific approach used for building and training neural networks and decision-making network nodes.

Deep learning removes the manual identification of features in data and, instead, relies on whatever training process it has in order to discover the useful patterns in the input examples. This makes training the neural network easier and faster, and it can yield a better result that advances the field of artificial intelligence.

An algorithm is considered to be deep if the input data is passed through a series of nonlinearities or nonlinear transformations before it becomes output. Today, most business applications use shallow machine learning algorithms.

Shallow AI, also referred to as narrow AI, does not build a hierarchy of subroutine calls. Instead, this type of learning algorithm is designed to perform a single, discrete task.

What is Natural language generation (NLG)?

Natural language generation (NLG) is the use of artificial intelligence (AI) programming to produce written or spoken narratives from a data set. NLG is related to human-to-machine and machine-to-human interaction, including computational linguistics, natural language processing (NLP) and natural language understanding (NLU).

Research about NLG often focuses on building computer programs that provide data points with context. Sophisticated NLG software can mine large quantities of numerical data, identify patterns and share that information in a way that is easy for humans to understand. The speed of NLG software is especially useful for producing news and other time-sensitive stories on the internet. At its best, NLG output can be published verbatim as web content.

How NLG works?

NLG is a multi-stage process, with each step further refining the data being used to produce content with natural-sounding language. The six stages of NLG are as follows:

  • Content analysis: Data is filtered to determine what should be included in the content produced at the end of the process. This stage includes identifying the main topics in the source document and the relationships between them.
  • Data understanding: The data is interpreted, patterns are identified and it’s put into context. Machine learning is often used at this stage.
  • Document structuring: A document plan is created and a narrative structure chosen based on the type of data being interpreted.Sentence aggregation. Relevant sentences or parts of sentences are combined in ways that accurately summarize the topic.
  • Grammatical structuring: Grammatical rules are applied to generate natural-sounding text. The program deduces the syntactical structure of the sentence. It then uses this information to rewrite the sentence in a grammatically correct manner.
  • Language presentation: The final output is generated based on a template or format the user or programmer has selected.

How is NLG used?

Natural language generation is being used in an array of ways. Some of the many uses include the following:

  • generating the responses of chatbots and voice assistants such as Google’s Alexa and Apple’s Siri;
  • converting financial reports and other types of business data into easily understood content for employees and customers;
  • automating lead nurturing email, messaging and chat responses;
  • personalizing responses to customer emails and messages;
  • generating and personalizing scripts used by customer service representatives;
  • aggregating and summarizing news reports;
  • reporting on the status of internet of things devices; and
  • creating product descriptions for e-commerce webpages and customer messaging.

What’s different between NLG, NLU, and NLP?

NLP is an umbrella term that refers to the use of computers to understand human language in both written and verbal forms. NLP is built on a framework of rules and components, and it converts unstructured data into a structured data format.

NLP encompasses both NLG and NLU, which have the following distinct, but related capabilities:

  • NLU refers to the ability of a computer to use syntactic and semantic analysis to determine the meaning of text or speech.
  • NLG enables computing devices to generate text and speech from data input.

Chatbots and “suggested text” features in email clients, such as Gmail’s Smart Compose, are examples of applications that use both NLU and NLG. Natural language understanding lets a computer understand the meaning of the user’s input, and natural language generation provides the text or speech response in a way the user can understand.

NLG is connected to both NLU and information retrieval. It is also related to text summarization, speech generation and machine translation. Much of the basic research in NLG also overlaps with computational linguistics and the areas concerned with human-to-machine and machine-to-human interaction.

NLG models and methodologies

NLG relies on machine learning algorithms and other approaches to create machine-generated text in response to user inputs. Some of the methodologies used include the following:

Markov chain: The Markov model is a mathematical method used in statistics and machine learning to model and analyze systems that are able to make random choices, such as language generation. Markov chains start with an initial state and then randomly generate subsequent states based on the prior one. The model learns about the current state and the previous state and then calculates the probability of moving to the next state based on the previous two. In a machine learning context, the algorithm creates phrases and sentences by choosing words that are statistically likely to appear together.

Recurrent neural network (RNN): These AI systems are used to process sequential data in different ways. RNNs can be used to transfer information from one system to another, such as translating sentences written in one language to another. RNNs are also used to identify patterns in data which can help in identifying images. An RNN can be trained to recognize different objects in an image or to identify the various parts of speech in a sentence.

Long short-term memory (LSTM): This type of RNN is used in deep learning where a system needs to learn from experience. LSTM networks are commonly used in NLP tasks because they can learn the context required for processing sequences of data. To learn long-term dependencies, LSTM networks use a gating mechanism to limit the number of previous steps that can affect the current step.

Transformer: This neural network architecture is able to learn long-range dependencies in language and can create sentences from the meanings of words. Transformer is related to AI. It was developed by OpenAI, a nonprofit AI research company in San Francisco. Transformer includes two encoders: one for processing inputs of any length and another to output the generated sentences.

The three main Transformer models are as follows:

  • Generative Pre-trained Transformer (GPT) is a type of NLG technology used with business intelligence (BI) software. When GPT is implemented with a BI system, it uses NLG technology or machine learning algorithms to write reports, presentations and other content. The system generates content based on information it is fed, which could be a combination of data, metadata and procedural rules.
  • Bidirectional Encoder Representations from Transformers (BERT) is the successor to the Transformer system that Google originally created for its speech recognition service. BERT is a language model that learns human language by learning the syntactic information, which is the relationships between words, and the semantic information, which is the meaning of the words.
  • XLNet is an artificial neural network that is trained on a set of data. It identifies patterns that it uses to make a logical conclusion. An NLP engine can extract information from a simple natural language query. XLNet aims to teach itself to be able to read and interpret text and use this knowledge to write new text. XLNet has two parts: an encoder and a decoder. The encoder uses the syntactic rules of language to convert sentences into vector-based representation; the decoder uses these rules to convert the vector-based representation back into a meaningful sentence.

What is Data Preprocessing?

Data preprocessing involves transforming raw data to well-formed data sets so that data mining analytics can be applied. Raw data is often incomplete and has inconsistent formatting. The adequacy or inadequacy of data preparation has a direct correlation with the success of any project that involve data analyics.

Preprocessing involves both data validation and data imputation. The goal of data validation is to assess whether the data in question is both complete and accurate. The goal of data imputation is to correct errors and input missing values — either manually or automatically through business process automation (BPA) programming.

Data preprocessing is used in both database-driven and rules-based applications. In machine learning (ML) processes, data preprocessing is critical for ensuring large datasets are formatted in such a way that the data they contain can be interpreted and parsed by learning algorithms.

Data goes through a series of steps during preprocessing:

Data Cleaning: Data is cleansed through processes such as filling in missing values or deleting rows with missing data, smoothing the noisy data, or resolving the inconsistencies in the data.

Smoothing noisy data is particularly important for ML datasets, since machines cannot make use of data they cannot interpret. Data can be cleaned by dividing it into equal size segments that are thus smoothed (binning), by fitting it to a linear or multiple regression function (regression), or by grouping it into clusters of similar data (clustering).

Data inconsistencies can occur due to human errors (the information was stored in a wrong field). Duplicated values should be removed through deduplication to avoid giving that data object an advantage (bias).

Data Integration: Data with different representations are put together and conflicts within the data are resolved.

Data Transformation: Data is normalized and generalized. Normalization is a process that ensures that no data is redundant, it is all stored in a single place, and all the dependencies are logical.

Data Reduction: When the volume of data is huge, databases can become slower, costly to access, and challenging to properly store. Data reduction aims to present a reduced representation of the data in a data warehouse.

There are various methods to reduce data. For example, once a subset of relevant attributes is chosen for its significance, anything below a given level is discarded.

Encoding mechanisms can be used to reduce the size of data as well. If all original data can be recovered after compression, the operation is labeled as lossless. If some data is lost, then it’s called a lossy reduction. Aggregation can also be used to condense countless transactions into a single weekly or monthly value, significantly reducing the number of data objects.

Data Discretization: Data could also be discretized to replace raw values with interval levels. This step involves the reduction of a number of values of a continuous attribute by dividing the range of attribute intervals.

Data Sampling: Sometimes, due to time, storage or memory constraints, a dataset is too big or too complex to be worked with. Sampling techniques can be used to select and work with just a subset of the dataset, provided that it has approximately the same properties of the original one.

What is Critical Path Method (CPM)?

The critical path method (CPM) is a step-by-step methodology, technique or algorithm for planning projects that have complex, interdependent interactions. Technically, the critical path will have the least amount of float. In project management, float is defined as the amount of time a task can be delayed without causing a delay to subsequent tasks.

An important goal of CPM is to help stakeholders understand which tasks should be carried out in which order. In supply chain planning, CPM software features are often used to identify potential bottlenecks and predict their corresponding work-arounds. In computer networking, CPM software can be used to optimize network performance and improve quality of service (QoS).

CPM is an important tool for project management because it helps project managers and stakeholders separate critical tasks from non-critical tasks.

It plays an important role in helping project managers understand which missed milestones could prevent the entire project from being successfully completed on time — as well as where extra resources could help.

How Do you Find A Project’s Critical Path?

The basic steps employed in CPM are:

  • Determine required tasks.
  • List required tasks in sequence.
  • Create a flowchart including each required task.
  • Identify all critical and non-critical relationships (paths) among required tasks.
  • Assign an expected completion/execution time for each required task.
  • Study all critical relationships to determine possible alternatives for as many as possible.

CPM Use Cases

CPM is commonly employed in many diverse types of projects, including product development, engineering, construction, aerospace and defense, software development and research projects.

Often a major objective in CPM is to figure out how to complete a project in the shortest time possible. When the critical path depicts the longest path through a project, this information can be used to determine the shortest possible time it would take to complete a project.

One way to optimize completion time is called fast tracking, which involves performing activities in parallel (simultaneously) and adding resources to shorten critical path durations (called crashing the critical path). Left unchecked, this may also result in expansion and inadvertently lead to increasing project complexity, duration or both.

Several CPM software solutions are available for tracking critical paths and most project planning software vendors include CPM features in their products.

What is Hacktivism?

Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Hacktivism is meant to call the public’s attention to something the hacktivist believes is an important issue or cause, such as freedom of information, human rights or a religious point of view. Hacktivists express their support of a social cause or opposition to an organization by displaying messages or images on the website of the organization they believe is doing something wrong or whose message or activities they oppose.

Hacktivists are typically individuals, but there are hacktivist groups as well that operate in coordinated efforts. Anonymous and Lulz Security, also known as LulzSec, are examples. Most hacktivists work anonymously.

What motivates hacktivists?

Hacktivists usually have altruistic or ideological motives, such as social justice or free speech. Their goal is to disrupt services and bring attention to a political or social cause. For example, hacktivists might leave a visible message on the homepage of a website that gets a lot of traffic or embodies a point of view that the individual or group opposes. Hacktivists often use denial-of-service or distributed DoS (DDoS) attacks where they overwhelm a website and disrupt traffic.

Hacktivists want others to notice their work to inspire action or change. They often focus on social change but also target government, business and other groups that they don’t agree with for their attacks. Sending a message and eliciting change trump profit motives for hacktivists.

What is the difference between a hacker and a hacktivist?

Hackers and hacktivists generally use the same tools and techniques to achieve their goals. Unlike hacktivists, hackers are not defined solely by social causes. The answer to the question, “Is hacktivism good or bad?” is a point of debate. The legality of hacktivist acts is less contentious.

DoS and DDoS attacks are federal crimes in the United States under the Computer Fraud and Abuse Act. Those types of attacks are illegal in many other places as well, including the European Union, United Kingdom and Australia. Website defacement, where attackers access a website and change its contents, is considered cyber vandalism and is a crime. Corporate data theft is also illegal.

Opponents of hacktivism argue that these acts cause damage in a forum where there is already ample opportunity for nondisruptive free speech. Others insist that such acts are the equivalent of peaceful protest and, therefore, are protected as a form of free speech. Hacktivists often consider their activities a form of civil disobedience, meaning they are willfully breaking a law to further their protest.

Types of hacktivism

Hacktivists use a variety of techniques to get their message across. Their tactics include the following:

  • Anonymous blogging: Activists, whistleblowers and journalists use this tactic. It protects the blogger, while providing a platform for them to speak out about an issue, such as human rights violations or oppressive government regimes.
  • DoS and DDoS attacks: Hacktivists use these attacks to prevent users from accessing targeted computer systems, devices or networks. DoS and DDoS attacks flood systems with traffic, overwhelm resources and make them difficult to access.
  • Doxing: This involves the gathering of information — through hacking or social engineering — about a person or organization and making it public. The information is typically sensitive and is sometimes used in extortion schemes.
  • Geobombing: This technique enables internet users to add a geotag to YouTube videos to display the location of the video on Google Earth and Google Maps. Hacktivists use geobombing to display the location of videos posted by political prisoners and human rights activists.
  • Leaking information: This is a popular activist tactic. Typically, an insider source will access sensitive or classified information — which implicates an individual, organization or government agency in an activity that reflects negatively on them — and make it public. WikiLeaks is known for publishing leaked data.
  • RECAP: This software lets users search for free copies of documents that are otherwise only accessible by paying a fee to the United States federal court database known as Public Access to Court Electronic Records (PACER). RECAP is PACER spelled backwards.
  • Website defacement: Hacktivists change a website’s code or software so visitors see errors or messages expressing the attacker’s point of view. The message may be threatening or embarrassing, or the attack may disable a key function of the site or software to get the hacktivist’s message across.
  • Website mirroring: Here, hacktivists replicate a legitimate website’s content but with a slightly different URL. This technique is often used to get around censorship that blocks a site. If a website has been censored, the hacktivist will duplicate the content and attach it to a different URL on a mirror site so the content is still accessible.

Examples of hacktivist groups

Many hacktivist groups keep a low profile. The following are among the more well-known organizations.

Cult of the Dead Cow
This group, also known as cDc Communications, was founded in 1984 as a hacking collective and media organization. Its original stated goal was “global domination through media saturation,” but it eventually evolved a more political focus on human rights and the free flow of information. In the mid to late 1990s, the group focused on combating human rights abuses in China. During this initiative, a member of the group who went by the name Omega coined the term hacktivism when communicating with Chinese hacktivists via a group email.

CDc spun off two other hacktivist groups: Ninja Strike Force, founded in 1996, and Hacktivismo, formed in 1999. Hacktivismo focused on creating anti-censorship technology. It took a unique stand against using DoS attacks, saying it viewed disabling websites as counter to the principle of free speech online. Hacktivismo also published a code of conduct for civil disobedience online, entitled the “Hacktivismo Declaration,” in which it said it would challenge state-sponsored censorship of the internet. CDc and Hacktivismo are credited with putting a positive spin on the term hacker.

Anonymous
This decentralized, international group has become one of the most well-known hacktivist groups because of several high-profile attacks. Anonymous first appeared in 2003 on the 4chan forums and came into the spotlight in 2008 when it attacked the Church of Scientology. The group has adopted the Guy Fawkes mask from the graphic novel by Alan Moore and film V for Vendetta as its symbol. The group often uses the tagline: “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”

Anonymous’ members do not identify themselves. Nevertheless, several individuals associated with the group have been arrested for illegal activities. The group is known to use controversial techniques, such as doxing, and it has declared war on politicians, including Donald Trump and Hillary Clinton, and has supported the Occupy Wall Street movement.

WikiLeaks
Julian Assange launched the WikiLeaks website in 2006 to host leaked documents, describing itself as an independent, nonprofit online media organization. The first notable documents published on the site were the nearly 80,000 documents about the U.S. war in Afghanistan leaked in 2010, followed by nearly 400,000 documents about the war in Iraq. WikiLeaks is also known for revealing over 20,000 emails and 8,000 email attachments from the Democratic National Committee that were sent during the 2016 U.S. presidential campaign.

LulzSec
Five members of Anonymous started LulzSec in 2011 and use handles but not any other identifying information. The most significant LulzSec attack was when it took down the Federal Bureau of Investigation’s website in 2011. The attack precipitated the arrest of several members.

Syrian Electronic Army
This group of Syrian hacktivists also surfaced in 2011 and claims to support Syrian president Bashar al-Assad. The group was hosted on Syria’s national public networks and aims to defend the Syrian government’s reputation and to attack computer systems deemed a threat to Syria. The group gained attention in April 2013 when it performed several DDoS and defacement attacks against U.S. government agencies and companies, including a fake tweet about an explosion at the White House that injured the president.

Longstanding, influential hacktivist groups, like Anonymous and WikiLeaks, continue to make themselves heard. Investigative journalist Nicky Hager described the impact of WikiLeaks publishing the Iraq War Logs and a video of a U.S. helicopter firing on civilians.

What is Text File?

A text file is a type of digital, non-executable file that contains letters, numbers, symbols and/or a combination. It enables the creation and storage of text without any special formatting.

Text files are also known as flat files or ASCII files.

A text file is used to store standard and structured textual data or information that is human readable. It is defined in several different formats, including the most popular ASCII for cross-platform usage, and ANSI for Windows-based operating platforms. It lacks text formatting abilities, such as text alignment, bold text and font styles.

In a Windows operating system (OS), a text file is created using a text editor, such as Notepad or Word. It has a file extension of .txt.

Besides simply text, a text file is used to write and store source code for virtually all programming languages, such as Java or PHP. The created file can be converted to the respective programming language by changing the file extension from .txt to .php or .cpp.

What is Nanocomputer?

A nanocomputer is a computer that’s very small compared to microcomputers and mini-computers. This term refers to any computer or computing device with microscopic or very small dimensions, although these machines are typically the size of a standard credit card. The term “nanocomputer” was first coined for the S1 MP3 chipset manufactured by The Flying Electron Inc.

A nanocomputer can also be called a quantum computer.

A nanocomputer can be defined as a computer that is designed and created using parts and components measured in nanometers. Most modern computers have various components, specifically the microprocessor, consisting of nanoscale components. Nanocomputers process and perform computations similar to standard computers, but are sized in nanometers. However, with fast-moving nanotechnology, nanocomputers will eventually scale down to the atomic level and will be measured in nanometers. Nanorobot, or nanobots, will be controlled and managed by nanocomputers.

What is Fixed wireless access (FWA)?

Fixed wireless access (FWA) is an alternative way for an Internet Service Provider (ISP) to provide small businesses and homes with last mile connectivity.

Fixed Wireless Access uses radio waves to create a connection between a Point-of-Presence cell tower and an external antenna located on the customer’s home or business. When the antenna picks up a radio signal, it forwards the signal wirelessly to a special type of modem that converts the radio waves into WiFi signals.

As 5G coverage expands, FWA is expected to provide ISPs with a cost-effective alternative to DSL, fiber optics and cable, especially in geographical locations where it has been cost-prohibitive for ISPs to lay cable or fiber. Because FWA can provide high speeds with low latency, it’s expected to compete with satellite connections in many parts of the world and help reduce the digital divide now that 97% of the world’s population lives within reach of a mobile cellular signal.

Fixed wireless access can be used to help two fixed wired locations to connect. Traditionally, enterprises used leased lines or cables to connect two different locations. FWA can be a simpler alternative because it uses radio waves to connect the two locations.

Usually, fixed wireless antennas are located on building roofs to ensure line-of-site obstruction-free data transmission. Besides connecting one-to-one locations, FWA can be implemented in point-to-multipoint and multipoint-to-multipoint transmission modes.

What is Hacking as a service (HaaS)?

Hacking as a service (HaaS) is the commercialization of hacking skills, in which the hacker serves as a contractor. HaaS makes advanced code-breaking skills available to anyone with a web browser and a credit card. In addition to exploits, HaaS can also be contracted for ethical hacking purposes, such as penetration testing.

While there have been grey markets for HaaS for a long time, there are now purpose-driven websites to hire for the skill. One such site, Hackers List, offers a money back guarantee, formalized reviews, complaint processes and a list of hackers with specified skills. Additionally, there are HaaS tools and platforms like Alienspy that simplify hacking to let a person with no skills carry out an attack themselves.

Some of the services offered in HaaS include:

  • Gaining access to the social networking accounts of another person.
  • DoS (denial of service) and DDoS (distributed denial of service) attacks on websites
  • Telephone DoS.
  • Telephone number hijacking and call blocking.
  • Network infrastructure attacks to bring down communications.
  • Command and control (C&C) of a own huge botnet army (for around $20K).

It should be noted that hiring HaaS to perform illegal act is in itself illegal since inducement to commit a crime is itself a crime under United States law.

What is Geotagging?

Geotagging is the process of adding metadata that contains geographical information about a location to a digital map. The data usually consists of latitude and longitude coordinates, but may also include a timestamp, as well as links to additional information. Geotag metadata can be added manually or programmatically.

In Google Maps and similar GPS services, geotagging may also be referred to as dropping a pin. Pins can be tagged with contextual information to share information about a specific physical location. Popular types of contextual info include photos, videos, website URLs and QR codes.

Geotag Pin

The red icon above is called a pin and its use on a digital map indicates that a location that has been geotagged. End users can view a pin’s additional metadata by hovering their finger or mouse over the icon.

Location identification has become a fundamental feature of many social media sites and can be a useful tool when added to business applications and medicolegal applications. For example, some social networking sites and services give out the location of their users, which allows users to know exactly where their friends are as they are logged on to that website (or check in to the service). Since devices and tracking are now ubiquitous, that social media tracking becomes a more powerful and valuable tool for users.

Contrast that with the ways that geo-tagging first developed, as mainly a way to tag digital assets like photos with metadata. Using the principle of geospatial contextual information, users were able to read labeling data from an archive, but not typically use insights in real time. That came later, as geo-tagging kept developing into what it represents today.

How Does Geotagging Work?

Methodologies for geotagging very quite a bit. Some of them work with geospatial location and “toponym” information only in an archival context, where others stream content continually, or aggregate content for machine learning models.

Regardless of how they are set up and what they do, geotagging systems all represent the same fundamental idea: that digital tracking of location provides value-added services in a given application context.

What are the advantages and disadvantages of Geotags?

Security professionals urge everyday users to beware adding too much locational data to their profiles or other means of input, because criminals could use that data to conduct cyberattacks or track their whereabouts physically.

On the other hand, geotagging has also been a great boon to law enforcement in general – from nationwide license plate tracking databases to forensic digital work, law enforcement uses all of that geotagging to better understand suspected criminal activity and fine-tune the ability of the legal system to produce accurate results.

What is Object-oriented programming (OOP)?

Object-oriented programming (OOP) is a computer programming model that organizes software design around data, or objects, rather than functions and logic. An object can be defined as a data field that has unique attributes and behavior.

OOP focuses on the objects that developers want to manipulate rather than the logic required to manipulate them. This approach to programming is well-suited for programs that are large, complex and actively updated or maintained. This includes programs for manufacturing and design, as well as mobile applications; for example, OOP can be used for manufacturing system simulation software.

The organization of an object-oriented program also makes the method beneficial to collaborative development, where projects are divided into groups. Additional benefits of OOP include code reusability, scalability and efficiency.

The first step in OOP is to collect all of the objects a programmer wants to manipulate and identify how they relate to each other — an exercise known as data modeling.

Examples of an object can range from physical entities, such as a human being who is described by properties like name and address, to small computer programs, such as widgets.

Once an object is known, it is labeled with a class of objects that defines the kind of data it contains and any logic sequences that can manipulate it. Each distinct logic sequence is known as a method. Objects can communicate with well-defined interfaces called messages.

What is the structure of object-oriented programming?

The structure, or building blocks, of object-oriented programming include the following:

  • Classes are user-defined data types that act as the blueprint for individual objects, attributes and methods.
  • Objects are instances of a class created with specifically defined data. Objects can correspond to real-world objects or an abstract entity. When class is defined initially, the description is the only object that is defined.
  • Methods are functions that are defined inside a class that describe the behaviors of an object. Each method contained in class definitions starts with a reference to an instance object. Additionally, the subroutines contained in an object are called instance methods. Programmers use methods for reusability or keeping functionality encapsulated inside one object at a time.
  • Attributes are defined in the class template and represent the state of an object. Objects will have data stored in the attributes field. Class attributes belong to the class itself.

What are the main principles of OOP?

Object-oriented programming is based on the following principles:

  • Encapsulation: This principle states that all important information is contained inside an object and only select information is exposed. The implementation and state of each object are privately held inside a defined class. Other objects do not have access to this class or the authority to make changes. They are only able to call a list of public functions or methods. This characteristic of data hiding provides greater program security and avoids unintended data corruption.
  • Abstraction: Objects only reveal internal mechanisms that are relevant for the use of other objects, hiding any unnecessary implementation code. The derived class can have its functionality extended. This concept can help developers more easily make additional changes or additions over time.
  • Inheritance: Classes can reuse code from other classes. Relationships and subclasses between objects can be assigned, enabling developers to reuse common logic while still maintaining a unique hierarchy. This property of OOP forces a more thorough data analysis, reduces development time and ensures a higher level of accuracy.
  • Polymorphism: Objects are designed to share behaviors and they can take on more than one form. The program will determine which meaning or usage is necessary for each execution of that object from a parent class, reducing the need to duplicate code. A child class is then created, which extends the functionality of the parent class. Polymorphism allows different types of objects to pass through the same interface.

What are examples of object-oriented programming languages?

While Simula is credited as being the first object-oriented programming language, many other programming languages are used with OOP today. But some programming languages pair with OOP better than others. For example, programming languages considered pure OOP languages treat everything as objects. Other programming languages are designed primarily for OOP, but with some procedural processes included.

For example, popular pure OOP languages include:

  • Ruby
  • Scala
  • JADE
  • Emerald

Programming languages designed primarily for OOP include:

  • Java
  • Python
  • C++

Other programming languages that pair with OOP include:

  • Visual Basic .NET
  • PHP
  • JavaScript

What are the benefits of OOP?

Benefits of OOP include:

  • Modularity: Encapsulation enables objects to be self-contained, making troubleshooting and collaborative development easier.
  • Reusability: Code can be reused through inheritance, meaning a team does not have to write the same code multiple times.
  • Productivity: Programmers can construct new programs quicker through the use of multiple libraries and reusable code.
  • Easily upgradable and scalable: Programmers can implement system functionalities independently.
  • Interface descriptions: Descriptions of external systems are simple, due to message passing techniques that are used for objects communication.
  • Security: Using encapsulation and abstraction, complex code is hidden, software maintenance is easier and internet protocols are protected.
  • Flexibility: Polymorphism enables a single function to adapt to the class it is placed in. Different objects can also pass through the same interface.

Criticism of OOP

The object-oriented programming model has been criticized by developers for multiple reasons. The largest concern is that OOP overemphasizes the data component of software development and does not focus enough on computation or algorithms. Additionally, OOP code may be more complicated to write and take longer to compile.

Alternative methods to OOP include:

  • Functional programming: This includes languages such as Erlang and Scala, which are used for telecommunications and fault tolerant systems.
  • Structured or modular programming: This includes languages such as PHP and C#.
  • Imperative programming: This alternative to OOP focuses on function rather than models and includes C++ and Java.
  • Declarative programming: This programming method involves statements on what the task or desired outcome is but not how to achieve it. Languages include Prolog and Lisp.
  • Logical programming: This method, which is based mostly in formal logic and uses languages such as Prolog, contains a set of sentences that express facts or rules about a problem domain. It focuses on tasks that can benefit from rule-based logical queries.

Most advanced programming languages enable developers to combine models, because they can be used for different programming methods. For example, JavaScript can be used for OOP and functional programming.

What is Computer Forensics (Cyber Forensics)?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Computer forensics — which is sometimes referred to as computer forensic science — essentially is data recovery with legal compliance guidelines to make the information admissible in legal proceedings. The terms digital forensics and cyber forensics are often used as synonyms for computer forensics.

Digital forensics starts with the collection of information in a way that maintains its integrity. Investigators then analyze the data or system to determine if it was changed, how it was changed and who made the changes. The use of computer forensics isn’t always tied to a crime. The forensic process is also used as part of data recovery processes to gather data from a crashed server, failed drive, reformatted operating system (OS) or other situation where a system has unexpectedly stopped working.

Why is computer forensics important?

In the civil and criminal justice system, computer forensics helps ensure the integrity of digital evidence presented in court cases. As computers and other data-collecting devices are used more frequently in every aspect of life, digital evidence — and the forensic process used to collect, preserve and investigate it — has become more important in solving crimes and other legal issues.

The average person never sees much of the information modern devices collect. For instance, the computers in cars continually collect information on when a driver brakes, shifts and changes speed without the driver being aware. However, this information can prove critical in solving a legal matter or a crime, and computer forensics often plays a role in identifying and preserving that information.

Digital evidence isn’t just useful in solving digital-world crimes, such as data theft, network breaches and illicit online transactions. It’s also used to solve physical-world crimes, such as burglary, assault, hit-and-run accidents and murder.

Businesses often use a multilayered data management, data governance and network security strategy to keep proprietary information secure. Having data that’s well managed and safe can help streamline the forensic process should that data ever come under investigation.

Businesses also use computer forensics to track information related to a system or network compromise, which can be used to identify and prosecute cyber attackers. Businesses can also use digital forensic experts and processes to help them with data recovery in the event of a system or network failure caused by a natural or other disaster.

As the world becomes more reliant on digital technology for the core functions of life, cybercrime is rising. As such, computer forensic specialists no longer have a monopoly on the field.

Six foundations of strong infosec:

  1. Recongnize that information security is not just the CIO’s job.
  2. Treat-and protect-data and information as business assets.
  3. Protect important data on removable media and mobile devices
  4. Know where your organization’s important digital assets are located.
  5. Recognize that not every dat breach occurs because of an external attack. Employees can also cause data breaches intentionally or inadvertently.
  6. Reliaze that meeting legislative and regulatory standards is just the starting point for an infosec strategy.

Types of computer forensics

There are various types of computer forensic examinations. Each deals with a specific aspect of information technology. Some of the main types include the following:

  • Database forensics: The examination of information contained in databases, both data and related metadata.
  • Email forensics: The recovery and analysis of emails and other information contained in email platforms, such as schedules and contacts.
  • Malware forensics: Sifting through code to identify possible malicious programs and analyzing their payload. Such programs may include Trojan horses, ransomware or various viruses.
  • Memory forensics: Collecting information stored in a computer’s random access memory (RAM) and cache.
  • Mobile forensics: The examination of mobile devices to retrieve and analyze the information they contain, including contacts, incoming and outgoing text messages, pictures and video files.
  • Network forensics: Looking for evidence by monitoring network traffic, using tools such as a firewall or intrusion detection system.

How does computer forensics work?

Forensic investigators typically follow standard procedures, which vary depending on the context of the forensic investigation, the device being investigated or the information investigators are looking for. In general, these procedures include the following three steps:

  1. Data collection: Electronically stored information must be collected in a way that maintains its integrity. This often involves physically isolating the device under investigation to ensure it cannot be accidentally contaminated or tampered with. Examiners make a digital copy, also called a forensic image, of the device’s storage media, and then they lock the original device in a safe or other secure facility to maintain its pristine condition. The investigation is conducted on the digital copy. In other cases, publicly available information may be used for forensic purposes, such as Facebook posts or public Venmo charges for purchasing illegal products or services displayed on the Vicemo website.
  2. Analysis: Investigators analyze digital copies of storage media in a sterile environment to gather the information for a case. Various tools are used to assist in this process, including Basis Technology’s Autopsy for hard drive investigations and the Wireshark network protocol analyzer. A mouse jiggler is useful when examining a computer to keep it from falling asleep and losing volatile memory data that is lost when the computer goes to sleep or loses power.
  3. Presentation: The forensic investigators present their findings in a legal proceeding, where a judge or jury uses them to help determine the result of a lawsuit. In a data recovery situation, forensic investigators present what they were able to recover from a compromised system.

Often, multiple tools are used in computer forensic investigations to validate the results they produce.

Techniques forensic investigators use

Investigators use a variety of techniques and proprietary forensic applications to examine the copy they’ve made of a compromised device. They search hidden folders and unallocated disk space for copies of deleted, encrypted or damaged files. Any evidence found on the digital copy is carefully documented in a finding report and verified with the original device in preparation for legal proceedings that involve discovery, depositions or actual litigation.

Computer forensic investigations use a combination of techniques and expert knowledge. Some common techniques include the following:

  • Reverse steganography: Steganography is a common tactic used to hide data inside any type of digital file, message or data stream. Computer forensic experts reverse a steganography attempt by analyzing the data hashing that the file in question contains. If a cybercriminal hides important information inside an image or other digital file, it may look the same before and after to the untrained eye, but the underlying hash or string of data that represents the image will change.
  • Stochastic forensics: Here, investigators analyze and reconstruct digital activity without the use of digital artifacts. Artifacts are unintended alterations of data that occur from digital processes. Artifacts include clues related to a digital crime, such as changes to file attributes during data theft. Stochastic forensics is frequently used in data breach investigations where the attacker is thought to be an insider, who might not leave behind digital artifacts.
  • Cross-drive analysis: This technique correlates and cross-references information found on multiple computer drives to search for, analyze and preserve information relevant to an investigation. Events that raise suspicion are compared with information on other drives to look for similarities and provide context. This is also known as anomaly detection.
  • Live analysis: With this technique, a computer is analyzed from within the OS while the computer or device is running, using system tools on the computer. The analysis looks at volatile data, which is often stored in cache or RAM. Many tools used to extract volatile data require the computer in to be in a forensic lab to maintain the legitimacy of a chain of evidence.
  • Deleted file recovery: This technique involves searching a computer system and memory for fragments of files that were partially deleted in one place but leave traces elsewhere on the machine. This is sometimes known as file carving or data carving.

How is computer forensics used as evidence?

Computer forensics has been used as evidence by law enforcement agencies and in criminal and civil law since the 1980s. Some notable cases include the following:

  • Apple trade secret theft: An engineer named Xiaolang Zhang at Apple’s autonomous car division announced his retirement and said he would be moving back to China to take care of his elderly mother. He told his manager he planned to work at an electronic car manufacturer in China, raising suspicion. According to a Federal Bureau of Investigation (FBI) affidavit, Apple’s security team reviewed Zhang’s activity on the company network and found, in the days prior to his resignation, he downloaded trade secrets from confidential company databases to which he had access. He was indicted by the FBI in 2018.
  • Enron: In one of the most commonly cited accounting fraud scandals, Enron, a U.S. energy, commodities and services company, falsely reported billions of dollars in revenue before going bankrupt in 2001, causing financial harm to many employees and other people who had invested in the company. Computer forensic analysts examined terabytes of data to understand the complex fraud scheme. The scandal was a significant factor in the passing of the Sarbanes-Oxley Act of 2002, which set new accounting compliance requirements for public companies. The company declared bankruptcy in 2001.
  • Google trade secret theft: Anthony Scott Levandowski, a former executive of both Uber and Google, was charged with 33 counts of trade secret theft in 2019. From 2009 to 2016, Levandowski worked in Google’s self-driving car program, where he downloaded thousands of files related to the program from a password-protected corporate server. He departed from Google and created Otto, a self-driving truck company, which Uber bought in 2016, according to The New York Times. Levandowski plead guilty to one count of trade secrets theft and was sentenced to 18 months in prison and $851,499 in fines and restitution. Levandowski received a presidential pardon in January 2021.
  • Larry Thomas: Thomas shot and killed Rito Llamas-Juarez in 2016 Thomas was later convicted with the help of hundreds of Facebook posts he made under the fake name of Slaughtaboi Larro. One of the posts included a picture of him wearing a bracelet that was found at the crime scene.
  • Michael Jackson: Investigators used metadata and medical documents from Michael Jackson’s doctor’s iPhone that showed the doctor, Conrad Murray, prescribed lethal amounts of medication to Jackson, who died in 2009.
  • Mikayla Munn: Munn drowned her newborn baby in the bathtub of her Manchester University dorm room in 2016. Investigators found Google searches on her computer containing the phrase “at home abortion,” which were used to convict her.

Computer forensics careers and certifications

Computer forensics has become its own area of scientific expertise, with accompanying coursework and certification. The average annual salary for an entry-level computer forensic analyst is about $65,000, according to Salary.com. Some examples of cyber forensic career paths include the following:

  • Forensic engineer: These professionals deal with the collection stage of the computer forensic process, gathering data and preparing it for analysis. They help determine how a device failed.
  • Forensic accountant: This position deals with crimes involving money laundering and other transactions made to cover up illegal activity.
  • Cybersecurity analyst: This position deals with analyzing data once it has been collected and drawing insights that can later be used to improve an organization’s cybersecurity strategy.

A bachelor’s degree — and, sometimes, a master’s degree — in computer science, cybersecurity or a related field are required of computer forensic professionals. There are several certifications available in this field, including the following:

  • CyberSecurity Institute’s CyberSecurity Forensic Analyst: This credential is designed for security professionals with at least two years of experience. Testing scenarios are based on actual cases.
  • International Association of Computer Investigative Specialists’ Certified Forensic Computer Examiner: This program focuses primarily on validating the skills necessary to ensure business follows established computer forensic guidelines.
  • EC-Council’s Computer Hacking Forensic Investigator: This certification assesses an applicant’s ability to identify intruders and collect evidence that can be used in court. It covers search and seizure of information systems, working with digital proof and other cyber forensics skills.
  • International Society of Forensic Computer Examiners’ (ISFCE) Certified Computer Examiner: This forensic examiner program requires training at an authorized bootcamp training center, and applicants must sign the ISFCE Code of Ethics and Professional Responsibility.

“While the work of all information security professionals is important, those working in the field of cybersecurity forensics play an especially pivotal role in the attribution of cyberattacks and the apprehension of perpetrators.” – Ed Tittel

Related Terms: Trojan horse, intrusion detection system, steganography, forensic image, cybercrime

Why are companies paying so much for AI professionals?

Professionals involved in working on artificial intelligence (AI) technologies have been making a lot of money for a while. The reasons for the current explosion in the salaries of these tech-savvy employees have to do with some trends and developments that have been happening for at least a decade, and some others that are more recent.

One of the biggest reasons for large AI salaries is simply the equation around supply and demand. Since the talent pool is relatively small, it has created what some call a “pay-to-play hiring environment.” Although recent reports show AI salaries in line with some other kinds of technology positions, experts suggest that may not be the real picture, because companies have to pay a premium to get good people on board for specialized AI projects.

There’s also the general need for digital transformation which is driving AI demand. Even before the remote and virtual boom of the pandemic, digital sea changes were pushing up the salaries of people who could boast skills and experience related to digitizing and distributing workflows or services. However, with the new demand for remote work models in recent years, that demand for digitized environments has only increased in a big way.

Another factor pointed out by some experts in the industry is that the transparency of remote systems shows AI professionals how highly they are valued, and leads to more universal salary increases. That’s one reason why recent surveys have found increases in AI salaries in every region of the country, and in various types of industries where people are applying AI solutions.

Finally, there’s the evident reality that AI work requires specific specializations and skills. This is the opposite of unskilled labor that is freely transmittable to different pools of people. The unique nature of an AI professional who can effectively move the ball forward is another pillar of the purchasing power and labor value that these individuals have in the market.

Some of the skills and experience needed are significantly abstract to the point that it can be difficult to really value what an individual offers. The idea of the “10x programmer” or rare unicorn IT wizard is relevant here. What’s less debatable is that an individual with significant coding skills, knowledge of machine learning algorithms and the mathematical background to handle progress in this field is worth significant amounts of money compared to any other kind of skilled labor in a modern economy.

What is Flash Storage?

Flash storage describes any type of long-term storage repository supported by flash memory. Flash storage may also be referred to as solid state storage.

Unlike traditional hard disk drive storage, flash storage has no mechanical parts which makes it a good choice for storage in mobile technology. Flash storage comes in a variety of formats and prices, ranging from inexpensive consumer-grade USB drives to enterprise-level all flash arrays.

Flash storage makes use of flash memory, which stores data in an array of memory cells. The cells can range from traditional single cell to multi-level cells.

Compared to hard drives, flash storage drives provides many advantages, including faster read and write times. Flash memory’s quick access to stored data and fast processing capabilities makes it more business-friendly than traditional storage options.

Because Flash can handle large workloads more efficiently than traditional mechanical storage, it’s a good choice for working with complex data sets and multi-step, distributed operations in the cloud. When compared to hard drive use, flash storage does not require as much power and does not generate as much heat, which can result in reduced energy costs.

Although flash storage for enterprise use has come down in price in recent years, it is still more more expensive than traditional hard drive storage. Another limitation to consider is that flash memory has a limited number of write/erase cycles (PE cycles) before wearing out, so depending on its use, a flash drive’s lifespan may not be as long as a mechanical hard drive.

What is Recurrent Neural Networks (RNN)?

A recurrent neural network is a type of artificial neural network commonly used in speech recognition and natural language processing. Recurrent neural networks recognize data’s sequential characteristics and use patterns to predict the next likely scenario.

RNNs are used in deep learning and in the development of models that simulate neuron activity in the human brain. They are especially powerful in use cases where context is critical to predicting an outcome, and are also distinct from other types of artificial neural networks because they use feedback loops to process a sequence of data that informs the final output. These feedback loops allow information to persist. This effect often is described as memory.

RNN use cases tend to be connected to language models in which knowing the next letter in a word or the next word in a sentence is predicated on the data that comes before it. A compelling experiment involves an RNN trained with the works of Shakespeare to produce Shakespeare-like prose successfully. Writing by RNNs is a form of computational creativity. This simulation of human creativity is made possible by the AI’s understanding of grammar and semantics learned from its training set.

The deep learning process:

  1. Understand problems and whether deep learning is a good fit.
  2. Identifies relevant data sets and prepares them for analysis.
  3. Choosees the type of deep learning algorithm to use.
  4. Trains algorithm on large amount of labeled data.
  5. Tests the model’s performance against unlabeled data.

How recurrent neural networks learn?

Artificial neural networks are created with interconnected data processing components that are loosely designed to function like the human brain. They are composed of layers of artificial neurons — network nodes — that have the ability to process input and forward output to other nodes in the network. The nodes are connected by edges or weights that influence a signal’s strength and the network’s ultimate output.

In some cases, artificial neural networks process information in a single direction from input to output. These “feed-forward” neural networks include convolutional neural networks that underpin image recognition systems. RNNs, on the other hand, can be layered to process information in two directions.

Like feed-forward neural networks, RNNs can process data from initial input to final output. Unlike feed-forward neural networks, RNNs use feedback loops, such as backpropagation through time, throughout the computational process to loop information back into the network. This connects inputs and is what enables RNNs to process sequential and temporal data.

A truncated backpropagation through time neural network is an RNN in which the number of time steps in the input sequence is limited by a truncation of the input sequence. This is useful for recurrent neural networks that are used as sequence-to-sequence models, where the number of steps in the input sequence (or the number of time steps in the input sequence) is greater than the number of steps in the output sequence.

Bidirectional recurrent neural networks (BRNNs)

Bidirectional recurrent neural networks (BRNNs) are another type of RNN that simultaneously learn the forward and backward directions of information flow. This is different from standard RNNs, which only learn information in one direction. The process of both directions being learned simultaneously is known as bidirectional information flow.

In a typical artificial neural network, the forward projections are used to predict the future, and the backward projections are used to evaluate the past. They are not used together, however, as in a BRNN.

Recurrent neural network

RNN challenges and how to solve them?

The most common issues with RNNS are gradient vanishing and exploding problems. The gradients refer to the errors made as the neural network trains. If the gradients start to explode, the neural network will become unstable and unable to learn from training data.

Long short-term memory units

One drawback to standard RNNs is the vanishing gradient problem, in which the performance of the neural network suffers because it can’t be trained properly. This happens with deeply layered neural networks, which are used to process complex data.

Standard RNNs that use a gradient-based learning method degrade as they grow bigger and more complex. Tuning the parameters effectively at the earliest layers becomes too time-consuming and computationally expensive.

One solution to the problem is called long short-term memory (LSTM) networks, which computer scientists Sepp Hochreiter and Jurgen Schmidhuber invented in 1997. RNNs built with LSTM units categorize data into short-term and long-term memory cells. Doing so enables RNNs to figure out which data is important and should be remembered and looped back into the network. It also enables RNNs to figure out what data can be forgotten.

Gated recurrent units (GRUs)

Gated recurrent units (GRUs) are a form of recurrent neural network unit that can be used to model sequential data. While LSTM networks can also be used to model sequential data, they are weaker than standard feed-forward networks. By using an LSTM and a GRU together, networks can take advantage of the strengths of both units — the ability to learn long-term associations for the LSTM and the ability to learn from short-term patterns for the GRU.

Multilayer perceptrons (MLPs) and convolutional neural networks

The other two types of classes of artificial neural networks include multilayer perceptrons (MLPs) and convolutional neural networks.

MLPs consist of several neurons arranged in layers and are often used for classification and regression. A perceptron is an algorithm that can learn to perform a binary classification task. A single perceptron cannot modify its own structure, so they are often stacked together in layers, where one layer learns to recognize smaller and more specific features of the data set.

The neurons in different layers are connected to each other. For example, the output of the first neuron is connected to the input of the second neuron, which acts as a filter. MLPs are used to supervise learning and for applications such as optical character recognition, speech recognition and machine translation.

Convolutional neural networks, also known as CNNs, are a family of neural networks used in computer vision. The term “convolutional” refers to the convolution — the process of combining the result of a function with the process of computing/calculating it — of the input image with the filters in the network. The idea is to extract properties or features from the image. These properties can then be used for applications such as object recognition or detection.

Convolutional neural network (CNN)Recurrent neural network (RNN)
ArchitectureFeed-forward neural networks using filters and poolingRecurring network that feeds the results back into the network
Input/OutputThe size of the input and the resulting output is fixed (i.e., receives images of fixed size and outputs them to the appropriate category along with the confidence level of its prediction)The size of the input and the resulting output may vary (i.e., receives the different text and output translations – the resulting sentences can have more or fewer words)
Ideal usage scenarioSpatial data (such as images)Temporal/sequential data (such as text or video)
Use casesImage recognition and classification, face detection, medical analysis, drug discovery, and image analysisText translation, natural language processing, language translation, entity extraction, conversational intelligence, sentiment analysis, speech analysis
CNN vs. RNN: What are they and how do they differ?

CNNs are created through a process of training, which is the key difference between CNNs and other neural network types. A CNN is made up of multiple layers of neurons, and each layer of neurons is responsible for one specific task. The first layer of neurons might be responsible for identifying general features of an image, such as its contents (e.g., a dog). The next layer of neurons might identify more specific features (e.g., the dog’s breed).

What is Software as a Service (SaaS)?

Software as a service (SaaS) is a software distribution model that delivers application programs over the Internet. End users can access SaaS cloud apps with a web browser. The SaaS provider is responsible for hosting and maintaining the application throughout its lifecycle.

Advantages to using the SaaS delivery model include:

  • Clients can easily access the software from multiple computing devices.
  • Updates and patches can be applied automatically without client assistance.
  • Application access, as well as storage to support application use, can be sold on a subscription basis.

SaaS is also known as hosted software or on-demand software.

SaaS is a natural evolution of software. The old model of physically installing software on data center servers and end user’s computing devices was the only realistic solution for many years.

In recent years, a number of developments have allowed SaaS to become mainstream. One factor is bandwidth; the internet is simply faster than it was a decade ago and access is more widely available. Another major factor has been the growing acceptance of cloud computing for business use.

Today, SaaS is used in a number of core business areas, including customer relationship experience management, human resource (HR) management and document management. There are literally thousands of SaaS vendors, but Salesforce.com is perhaps the best known example, as it was one of the independent software vendors to significantly disrupt a traditional software vertical by changing the delivery model.

What is RAID 10 (RAID 1+0)?

RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data. It requires a minimum of four disks and stripes data across mirrored pairs. As long as one disk in each mirrored pair is functional, data can be retrieved. If two disks in the same mirrored pair fail, all data will be lost because there is no parity in the striped sets.

RAID, which stands for redundant array of independent disks, comes in several different configurations. A RAID 1 configuration copies data from one drive to another, mirroring and duplicating data to provide improved fault tolerance and data protection. Data is fully protected as the mirror copy is available if the originating drive is disabled or unavailable. Because it makes a full duplicate of the data, RAID 1 requires twice as much storage capacity as the original data.

RAID 0 doesn’t provide any data protection; its sole purpose is to enhance drive access performance. It does that by spreading the data out across two or more drives. That way multiple read/write heads on the drives can write or access portions of data simultaneously, thus speeding up overall processing.

RAID 10 provides data redundancy and improves performance. It is the a good option for I/O-intensive applications — including email, web servers, databases and operations that require high disk performance. It’s also good for organizations that require little to no downtime.

The high performance of RAID 10, and its ability to speed up both write and read activities, makes it suited to frequently used, mission-critical database servers. However, the four-disk minimum requirement makes RAID 10 a costly choice for smaller computing environments. That 100% storage capacity overhead may be overkill for small businesses and consumer use.

What is RAID 10 (RAID 1+0)?

How it differs from other forms of RAID?

The two-number format of RAID 10/1+0 is known as a nested RAID configuration because it combines two RAID levels to enhance performance. Other nested RAID levels are:

  • 01/0+1
  • 03/0+3
  • 50/5+0
  • 60/6+0
  • 100/10+0

While RAID 1+0 is similar to RAID 0+1, the reversed order of the numbers indicates the two RAID levels are layered in the opposite order. RAID 1+0 mirrors two drives together and then creates a striped set with the pair. RAID 0+1 creates two stripe sets and then mirrors them. While both RAID levels use the same number of drives, they are not synonymous.

LevelDescription
RAID 01 (RAID 0 + RAID 1)Same capacity as RAID 1
RAID 0 mirrored
Can replicate and share data between disks
Requires a minimum of four disks
RAID 03 (RAID 0 + RAID 3)Similar to RAID 01
Uses striping with dedicated parity instead of mirroring
Sometimes called RAID 53
Requires a minimum of six disks
RAID 10 (RAID 1 + RAID 0)RAID 1 striped
Generally implemented by RAID controllers
Improves write performance
Requires a minimum of four disks
RAID 50 (RAID 5 + RAID 0)Block-level striping of RAID 0 with distributed parity of RAID 5
Provides better fault tolerance
Improves write performance of RAID 5
Requires a minimum of six disks
RAID 60 (RAID 6 + RAID 0)Block-level striping of RAID 0 with distributed double parity of RAID 6
RAID 0 striped across RAID 6 elements
Requires a minimum of eight disks
RAID 100 (RAID 10 + RAID 0)Striped of RAID 10s
Generally implemented with software RAID 0
Also called plaid RAID because it is striped two ways
Requires a minimum of six disks
Nested RAID Levels

What are the advantages of Disk mirroring’s data protection?

Mirroring is the simplest way to ensure data protection. It creates a full, intact copy of all active data. When an original drive or set of drives fails, the user simply switches to the mirrored devices to regain full access to the data. The switch to the mirrored drives is nearly instantaneous, so any disruptions to normal operations will be limited.

Other RAID levels use a parity-based scheme to protect the data. With parity, a failed drive is rebuilt using the data from the surviving drives in the set along with the parity information. If there is a lot of data on the drive array supporting parity RAID, the rebuild can take hours — or even days. During the rebuild process, data in the RAID system will not be available.

According to manufacturer specifications and independent benchmarks, RAID 10 provides lower latency and superior throughput compared with all other RAID levels, except for RAID 0.

The 100% storage capacity overhead that disk mirroring requires means if 20 TB is installed in a RAID 10 environment, only 10 TB of disk space is available for live data, with the other 10 TB reserved for the mirror copy. This drive capacity penalty is much higher than RAID levels that don’t use mirroring.

Because of this capacity penalty, levels such as RAID 5, 50 (5+0) and 6 may be considered as alternatives. However, when rebuilding with RAID 10, only the surviving mirror of all the drives is read, while non-mirroring levels require all remaining drives to be read. The heavier lifting required by RAID 5, 50 and 6 could therefore result in a higher risk of failure and data loss.

RAID 6 stripes data and calculates parity two times, storing these results in different areas of the disk. This can help protect against two simultaneous disk failures, but the compute power needed to make two parity calculations for every write operation slows RAID 6 significantly.

JBOD, or just a bunch of disks, may also be considered as an alternative to RAID 10. JBOD does not use striping or parity, but it can treat multiple disks as one entity and combine their capacity. While JBOD can be less expensive than RAID, it has few other advantages. The lack of redundancy with a JBOD arrangement uses all available drive capacity but puts data at higher risk of corruption.

Generally, read/write operations on RAID arrays are faster, and data streams can be divided and stored concurrently. JBOD data can only be stored on one disk at a time.

Advanced data mirroring

Disk mirroring duplicates data to multiple hard drives connected to a single controller. It is a form of backup used in some RAID arrays and can be hardware- or software-based.

Unlike RAID 0 and RAID 1, RAID 1+0 combines striping and mirroring to create redundancy. As long as an array has an even number of hard disk drives, these two actions can be used together. While mirroring can reduce the amount of available capacity in a RAID 1+0 array, it creates another layer of protection against data loss.

With data mirroring, RAID 10 arrays can maintain multiple copies of data, allowing for a quicker recovery in the event of a failure. By striping mirrored data, RAID 10 combines the speed boost of striping with the added redundancy of mirroring.

Comparing between Hardware RAID and software RAID

RAID 10, like all other RAID levels, can be deployed using hardware or software. Hardware RAID requires a RAID controller inside a motherboard slot that connects the drives. Software RAID uses a utility application to manage the RAID configuration.

Hardware RAID often costs more than a software option, but it can have superior performance. This approach can sometimes replace disks without shutting down the server, a practice known as hot swapping. With hardware RAID, higher write throughput speeds are supported, as well as faster recovery of lost data. Because of this, hardware RAID is the preferred option when dealing with essential servers.

Software RAID is less expensive and less complex to deploy. Most operating systems include software RAID support. However, while hardware RAID is likely to provide a battery backup in case of power failure, software RAID does not. Small businesses prefer software RAID because it offers higher performance in standard RAID levels. Software RAID does not offer nested levels like RAID 10.

RAID 10 with SSD

While RAID was created for hard disk drives, there are some RAID levels — such as RAID 5, 6 and 10 — that can be used on solid-state drives (SSDs). For example, RAID 10’s method of striping mirrored sets can be beneficial in a flash system. However, the majority of traditional RAID levels are not optimized for flash environments.

Write-heavy RAID levels like 5 and 6 may cause latency and performance problems when used with SSDs. Because each write on a flash drive requires an erase and erase cycles are limited on SSDs, the additional writes created by RAID 5 and 6 can seriously affect flash performance.

The higher cost of requiring 100% drive capacity overhead applies when using solid-state storage versus magnetic media, and it is exacerbated given the higher cost of solid-state storage. Already more expensive than other forms of RAID, the cost of using SSDs with RAID 10 may deter consumers. However, the cost of flash has been declining, so a RAID 10 scheme using solid-state storage may become a more attractive option over time.

What are the advantages of RAID 10?

The advantages of RAID 10 include the following:

  • Cost-effective: RAID 10 is an economical and technically simple approach to data protection paired with a boost in performance.
  • Full redundancy: Data is fully redundant in a RAID 10 environment.
  • Fast recovery: Because it does not rely on parity to rebuild any data elements lost during a drive failure or disk fails, recovering data in a RAID 10 array is fast, resulting in little downtime.
  • Performance boost for some applications: RAID 10’s basic data striping is an effective way to improve performance for applications that don’t require large amounts of data.

What are the drawbacks of RAID 10?

Some of the disadvantages of RAID 10 include these:

  • Large capacity penalty: Because RAID 10 requires 100% capacity overhead, it is not an ideal RAID implementation for large amounts of data. The capacity penalty for other forms of RAID — notably those that are parity based — is much smaller.
  • Limited scalability: RAID 10 is an effective alternative for smaller applications, but it doesn’t scale well.
  • Time-consuming recovery: If a disk array has to switch over to the mirror drives, a new mirror must be created as soon as possible to ensure continuous data protection. Copying all the original data to a new drive or set of drives can be time-consuming and may hinder ongoing operations that rely on the data.

Considerations for using RAID 10

While RAID 10 writes to two disks at once, it should not be considered a replacement for traditional data backup. If the operating system is corrupted, the data on both disks is at risk of corruption. Given that possibility, RAID should not be considered the last line of defense against data loss. RAID 10 can protect against single drive (or drive set) failures, but a secure data backup plan should also be in place.

The faster rebuild times and features like hot swapping disks make RAID 10 an appealing option. However, its reduced capacity will likely make it a feasible alternative only for smaller applications or environments.

To decide whether to use RAID 10, consider the following four questions:

  • What is my budget?
  • How much storage capacity do I need?
  • What are my read/write performance requirements?
  • How much rebuild and recovery time can I afford?

What is Ransomware?

Ransomware is a type of malware programming that infects, locks or takes control of a system. The attacker then requests a financial payment to undo the malicious action.

Ransomware attackers typically encrypt files and demand digital currency in exchange for the correct decryption key. The attacker may threaten to leak exfiltrated data to the public or post it for sale on the dark web if the ransom is not paid.

Ransomware is distributed through malicious email attachments, infected downloads and compromised websites. The attacker will typically demand payment in a specific cryptocurrency, such as Bitcoin, to avoid detection through conventional follow-the-money tracing methods used by law enforcement.

Ransomware may also be referred to as a crypto-virus, crypto-Trojan or crypto-worm.

Ransomware attacks can severely impact businesses and leave hospitals and municipalities without the data they need to operate and deliver mission-critical services. According to the FBI, ransomware incidents continue to rise in 2021, but their financial impact is still dwarfed by cyberattacks that focus on business email compromise (BEC) and email account attacks.

Ransomware as a Service

A ransomware variant from the DarkSide cybercrime group is one of more than 100 ransomware variants that the FBI is currently investigating. DarkSide has been in the news for offering ransomware as a service (RaaS) partnerships to non-technical criminal affiliates who are willing to share a percentage of the paid ransom with the developers.

How to prevent Ransomware?

To prevent the negative consequences of a ransomware attack, the Cybersecurity and Infrastructure Security Agency (CISA) recommends the following best practices:

  • Maintain offline, encrypted backups of data and continually test recovery point objectives.
  • Regularly patch and update all software and firmware.
  • Conduct vulnerability scans on a regular basis to limit potential attack surfaces.
  • Ensure computing devices are configured properly and that security features are enabled.
  • Follow best practices for remote desktop and print services.
  • Take advantage of intrusion detection system (IDS) that can detect command and control (C&C) signals and other malicious network activity that often occurs prior to an attack.
  • Proactively create an incident response plan that includes notification procedures.

What is Commodore?

Commodore was a collection of companies that provided many of the first high-tech products to the American market as personal and home computers and devices became more sophisticated throughout the 1970s and 1980s. Founded by entrepreneur and Holocaust survivor Jack Tramiel in 1955, Commodore sold successive generations of home computers as well as video game consoles.

After pioneering the PET microcomputer in the late 1970s, Commodore continued to innovate with a series of VIC-branded computers offering color graphics, competitive RAM, and modem capabilities. The Commodore 64, named for its 64 KB of RAM, was also a best-selling computer, followed by the Commodore Amiga in 1985. A subsidiary called Commodore Business Machines also produced a line of computers specifically for commercial use.

In addition to developing computers, Commodore also developed video game systems, notably, the Commodore 64 video game console. These were also prominent Commodore-branded products. Eventually, the video game industry weakened, and Commodore lost ground to IBM and Apple in the personal and business computer markets.

What is Cisco Certified Network Associate (CCNA)?

Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals. It covers the following topics:

  • network fundamentals
  • network access
  • Internet Protocol (IP) connectivity
  • IP services
  • security fundamentals
  • automation and programmability

Cisco made significant changes to its exam structure on Feb. 24, 2020, putting a focus on simplifying it and making it more flexible. It also attempted to align the exam more closely with modern industry needs. Previously, Cisco offered several CCNAs for different networking specialties. The latest update consolidated those offerings into one CCNA certification, which is now the foundational certification for all Cisco-based career paths.

The 4 levels of Cisco certifications

Cisco offers one entry-level certification type, Cisco Certified Technician, which is available in three technology tracks: Collaboration, Data Center, and Routing and Switching. It is geared toward tech support roles and is not a prerequisite for CCNA or other higher-level certifications.

There are four levels in Cisco’s certification hierarchy:

  • This level is a person who has been in a field for one or two years and is part of a team but not leading one.
  • Information technology (IT) professionals at this level have more experience; they may be a senior member of a team or a team leader.
  • At this level, a person has been in the networking field for several years and has developed skills in a specialized area.
  • This level of certification validates an even higher level of experience, focusing on end-to-end IT skills from planning and designing to operating and optimizing network systems.

Exams are given at all four levels in three different areas of expertise: Engineering, Software and CyberOps.

Prior to the 2020 changes Cisco made to its certification program, CCNA was a prerequisite to all higher-level exams, like Cisco Certified Network Professional and Cisco Certified Internetwork Expert. This is no longer the case. Now, there are no specific prerequisites, and individuals can take exams when they feel ready. Cisco does provide recommendations on the level of expertise needed to pass specific exams, however.

CCNA continues to be a foundational certification that serves as a springboard to other certifications. It is a useful certification to have, no matter what a recipient chooses to focus on in the future.

What are the benefits of being CCNA-certified?

The main benefits of passing the CCNA exam include the following:

  • Knowledge: Those passing the exam show they have a base level of knowledge about how to run a network.
  • Skills: A person passing the CCNA exam gets in-depth practice in a range of tasks and skills.
  • Credibility: With the CCNA certification on a resume, potential employers see that a candidate has validation from Cisco and is familiar with a breadth of Cisco networking products.
  • Updating skills: Taking and passing the CCNA is valuable even for seasoned IT professionals, as it keeps them up to date on developments in networking.
  • Pay: Attaining a new IT certification, on average, leads to a nearly $13,000 salary increase, according to Global Knowledge’s “2020 IT Skills and Salary Report.”
  • Versatility: The U.S. Bureau of Labor Statistics projected that the demand for IT professionals is increasing. This makes CCNA a valuable certification to get, as it is adaptable to various IT career paths.

What are the prerequisites for CCNA certification?

According to Cisco, there are no formal prerequisites for the CCNA exam. However, Cisco recommends that CCNA candidates have the following:

  • at least one year of using Cisco networking products
  • basic IP addressing knowledge
  • a solid understanding of the networking fundamentals

With the 2020 changes to Cisco’s exam program, CCNA and other exams were redesigned to mirror a natural career progression of a networking professional. Candidates can take an exam when they feel they are qualified.

How do you prepare for CCNA certification?

There are several online courses, free practice tests and books certification candidates can use to prepare for the CCNA exam.

Cisco offers a preparation course. The “Implementing and Administering Cisco Solutions (CCNA) v1.0” course provides experience with the skills needed to pass the exam and has lab scenarios for students to practice using Cisco networking technology.

Cisco also offers other resources through its Learning Network, including the following:

  • access to a community of experts
  • practice assessments and exams
  • self-study and guided group study packages

One useful resource for the new CCNA is the CCNA 200-301 Official Cert Guide. This two-volume set provides a deep dive into all things CCNA, complete with practice questions. Author Wendell Odom provided his insider perspective on the new exam in this interview and explained why he thinks Cisco “did this particular exam right.”

How do you become CCNA-certified?

CCNA candidates must pass the Cisco 200-301 CCNA exam to be certified. The exam covers networking fundamentals, including the latest technologies, software development skills and professional roles. Passing it demonstrates that the test taker knows the basics of running a network.

Cisco administers exams through the Pearson VUE service. Prospective exam candidates should follow these four steps:

  1. Take advantage of Cisco’s and other organizations’ test prep courses and study materials.
  2. Log in at the Pearson VUE website.
  3. Register for the Cisco 200-301 exam, picking a time and location.
  4. Take the exam at a Pearson VUE test center or online.

Test takers learn if they passed the exam while at the testing center. If they pass the exam, they are CCNA-certified.

What types of questions does CCNA certification ask?

CCNA exams are proctored and timed, and they consist of written questions and answers, not labs. The exams include the following types of questions:

  • multiple choice, single answer
  • multiple choice, multiple answer
  • drag and drop
  • lablets, where tasks are performed on virtual machines

Below is an example of a single-answer, multiple-choice question about security fundamentals. It is not from an actual exam but rather is part of the CCNA curriculum and is in the style of the exam questions.

Question: Which command verifies whether any IPv6 access control lists are configured on a router?

  • Show IPv6 access-list
  • Show IPv6 interface
  • Show access-list
  • Show IPv6 route

Answer: Show IPv6 access-list

What is the recertification process for CCNA certification?

Cisco certification holders must recertify every three years, either by completing continuing education requirements or retaking the exam.

Passing the “Implementing and Administrating Cisco Solutions (CCNA) v1.0” course mentioned above earns course takers 30 continuing education credits and recertifies them for CCNA.

CCNA certifications earned before the 2020 changes remain valid until their expiration date.

What is Logarithm (LN)?

A logarithm (LN) is a concept in mathematics that denotes the number of times a number has to be multiplied by itself in order to arrive at a specified value. In mathematical terms, a logarithm of a number is the exponent that is used to raise another number, the base, in order to arrive at that number.

Logarithm is the reverse of the operation of exponentiation, which is raising a number according to a power. In exponentiation, a final value is determined after raising a base value with its exponent, while in logarithm, the final value and base are already known and the exponent is the value in question.

Logarithm is denoted as “logb (x) = r” or said as “the logarithm of x with respect to base b” or “the base-b logarithm of x,” where b is the base, x is the value and r is the logarithmic value or the exponent.

So for example, if 23 = 8 is expressed in exponentiation because 2 × 2 × 2 = 8, the inverse of that, which is the logarithm of 8 with respect to 2 is equal to 3, expressed as log2 8 = 3. They essentially have the same meaning but are expressed in a different manner and order.

Logarithm is used in scientific and mathematical calculations in order to depict perceived levels of measurable quantities such as electromagnetic field strength, visible light and sound energy.

What is Cloud Backup?

Cloud backup is a type of service through which cloud computing resources and infrastructure are used to create, edit, manage and restore data, services or application backup. This is done remotely over the internet.

Cloud backup may also be called online backup or remote backup.

Cloud backup is primarily used on an individual’s or organization’s data via an offsite and remote cloud storage platform. Cloud backup works when a cloud backup provider allocates cloud storage that is accessible globally over the Internet or backup software via a purpose-built user interface or vendor API. Cloud backup storage can be used to virtually store and back up all types of data or applications. Unlike traditional backup techniques, cloud backup is highly flexible and scalable in scaling up and down on run time.

Cloud backup is a managed service where the entire infrastructure and supporting services are managed completely by the vendor. Besides data backup, cloud backup is combined with disaster recovery solutions and may also provide an exact instance of a server, desktop or entire system.

What is Cloud Security Control?

Cloud security control is a set of controls that enables cloud architecture to provide protection against any vulnerability and mitigate or reduce the effect of a malicious attack. It is a broad term that consists of the all measures, practices and guidelines that must be implemented to protect a cloud computing environment.

Cloud security control primarily helps in addressing, evaluating and implementing security in the cloud. The Cloud Security Alliance (CSA) has created a Cloud Control Matrix (CCM), which is designed to help prospective cloud buyers evaluate a cloud solution’s overall security. Although there are limitless cloud security controls, they are similar to the standard information security controls and can be categorized in different domains including:

  • Deterrent Controls: Don’t protect the cloud architecture/infrastructure/environment but serve as warning to a potential perpetrator of an attack.
  • Preventative Controls: Used for managing, strengthening and protecting the vulnerabilities within a cloud.
  • Corrective Controls: Help reduce the after-effects of an attack.
  • Detective Controls: Used to identify or detect an attack.

What is NVMe over Fabrics (NVMe-oF)?

NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to connect hosts to storage across a network fabric using the NVMe protocol.

The protocol is designed to enable data transfers between a host computer and a target solid-state storage device or system over a network — accomplished through a NVMe message-based command. Data transfers can be transferred through methods such as Ethernet, Fibre Channel (FC) or InfiniBand.

NVM Express Inc. is the nonprofit organization that published version 1.0 of the NVMe specification on March 1, 2011. Later, on June 5, 2016, the same organization published version 1.0 of the NVMe-oF specification. NVMe version 1.3 was then released in May 2017. This update added features to enhance security, resource sharing and solid-state drive (SSD) endurance.

The NVM Express organization estimated that 90% of the NVMe-oF protocol is the same as the NVMe protocol, which is designed for local use over a computer’s Peripheral Component Interconnect Express (PCIe) bus.

Vendors are working on developing a mature enterprise ecosystem that supports end-to-end NVMe over Fabrics, including the server operating system, server hypervisor, network adapter cards, storage OS and storage drives. In addition, storage area network (SAN) switch vendors — not limited to Cisco Systems Inc. and Mellanox Technologies — are trying to position 32 gigabits per second (Gbps) FC as the logical fabric for NVMe flash.

Since the initial development of NVMe-oF, there have been multiple implementations of the protocol, such as NVMe-oF using remote direct memory access (RDMA), FC or Transmission Control Protocol/Internet Protocol (TCP/IP).

Uses of NVMe over Fabrics

Although it is still a relatively young technology, NVMe-oF has been widely incorporated into network architectures. Using NVMe-oF can help provide a state-of-the-art storage protocol that can take full advantage of today’s SSDs. The protocol can also help in bridging the gaps between direct-attached storage (DAS) and SANs, enabling organizations to support workloads that require high throughputs and low latencies.

Initial deployments of NVMe were DAS in servers, with NVMe flash cards replacing traditional SSDs as the storage media. This arrangement offers promising high-performance gains when compared with existing all-flash storage, but it also has its drawbacks. NVMe requires the addition of third-party software tools to optimize write endurance and data services. Bottlenecks persist in NVMe arrays at the level of the storage controller.

NVMe Transport Options

Other use cases for NVMe-oF include optimizing real-time analytics, as well as playing roles in artificial intelligence (AI) and machine learning.

The use of NVMe-oF is a relatively new phase in the evolution of the technology, paving the way for the arrival of rack-scale flash systems that integrate native, end-to-end data management. The pace of mainstream adoption will depend on how quickly across-the-stack development of the NVMe ecosystem occurs.

What are the benefits of NVMe over Fabrics?

Benefits of NVMe-based storage drives include the following:

  • low latency
  • additional parallel requests
  • increased overall performance
  • reduction of the length of the OS storage stacks on the server side
  • improvements pertaining to storage array performance
  • faster end solution with a move from Serial-Attached SCSI (SAS)/Serial Advanced Technology Attachment (SATA) drives to NVMe SSDs
  • variety of implementation types for different scenarios

Technical characteristics of NVMe over Fabrics

Some technical characteristics of NVMe-oF include the following:

  • high speed
  • low latency over networks
  • credit-based flow control
  • ability to scale out up to thousands of other devices
  • multipath support of the fabric to enable multiple paths between the NVMe host initiator and storage target simultaneously
  • multihost support of the fabric to enable sending and receiving of commands from multiple hosts and storage subsystems simultaneously

What are the key differences between NVMe over Fabrics and NVMe?

NVMe is an alternative to the Small Computer System Interface (SCSI) standard for connecting and transferring data between a host and a peripheral target storage device or system. NVMe is designed for use with faster media, such as SSDs and post-flash memory-based technologies. The NVMe standard speeds access times by several orders of magnitude compared to the SCSI and SATA protocols developed for rotating media.

NVMe supports 64,000 queues, each with a queue depth of up to 64,000 commands. All input/output (I/O) commands, along with the subsequent responses, operate on the same processor core, parlaying multicore processors into a high level of parallelism. I/O locking is not required, since each application thread gets a dedicated queue.

NVMe-oF uses a message-based model for communication between a host and a target storage device.

NVMe-based devices transfer data using a PCIe serial expansion slot, meaning there is no need for a dedicated hardware controller to route network storage traffic. Using NVMe, a host-based PCIe SSD is able to transfer data more efficiently to a storage target or subsystem.

One of the main distinctions between NVMe and NVMe over Fabrics is the transport-mapping mechanism for sending and receiving commands or responses. NVMe-oF uses a message-based model for communication between a host and a target storage device. Local NVMe will map commands and responses to shared memory in the host over the PCIe interface protocol.

While it mirrors the performance characteristics of PCIe Gen 3, NVMe lacks a native messaging layer to direct traffic between remote hosts and NVMe SSDs in an array. NVMe-oF is the industry’s response to developing a messaging layer.

NVME over Fabrics using RDMA

NVMe-oF use of RDMA is defined by a technical subgroup of the NVM Express organization. Mappings available include RDMA over Converged Ethernet (RoCE) and Internet Wide Area RDMA Protocol (iWARP) for Ethernet and InfiniBand.

RDMA is a memory-to-memory transport mechanism between two computers. Data is sent from one memory address space to another, without invoking the OS or the processor. Lower overhead and faster access and response time to queries are the result, with latency usually in microseconds (μs).

NVMe serves as the protocol to move storage traffic across RDMA over Fabrics. The protocol provides a common language for compute servers and storage to communicate regarding the transfer of data.

NVMe over Fabrics using RDMA essentially requires implementing a new storage network that bumps up performance. The trade-off is reduced scalability compared to the FC protocol.

NVMe over Fabrics using Fibre Channel

NVMe over Fabrics using Fibre Channel (FC-NVMe) was developed by the T11 committee of the International Committee for Information Technology Standards (INCITS). FC enables the mapping of other protocols on top of it, such as NVMe, SCSI and IBM’s proprietary Fibre Connection (Ficon), to send data and commands between host and target storage devices.

FC-NVMe and Gen 6 FC can coexist in the same infrastructure, enabling data centers to avoid a forklift upgrade.

Customers use firmware to upgrade existing FC network switches, provided the host bus adapters (HBAs) support 16 Gbps or 32 Gbps FC and NVMe-oF-capable storage targets.

The FC protocol supports access to shared NVMe flash, but there is a performance hit imposed to interpret and translate encapsulated SCSI commands to NVMe commands. The Fibre Channel Industry Association (FCIA) is helping to drive standards for backward-compatible FC-NVMe implementations, enabling a single FC-NVMe adapter to support SCSI-based disks, traditional SSDs and PCIe-connected NVMe flash cards.

NVMe over Fabrics using TCP/IP

One of the newer developments regarding NVMe-oF includes the development of NVMe-oF using TCP/IP. NVMe-oF can now support TCP transport binding. NVMe over TCP makes it possible to use NVMe-oF across a standard Ethernet network. There is also no need to make configuration changes or implement any special equipment with the use of NVMe-oF TCP/IP. Because the transport binding can be used over any Ethernet network or the internet, the challenges commonly involved in implementing any additional equipment and configurations are eliminated.

TCP is a widely accepted standard for establishing and maintaining network communications when exchanging data across a network. TCP will work in conjunction with IP, as both protocols used together facilitate communications across the internet and private networks. The TCP transport binding in NVMe-oF defines how the data between a host and a non-volatile memory subsystem are encapsulated and delivered.

The TCP binding will also define how queues, capsules and data are mapped, which supports TCP communications between NVMe-oF hosts and controllers through IP networks.

NVMe-oF using TCP/IP is a good choice for organizations that wish to utilize their Ethernet infrastructure. This will also give developers the ability to migrate NVMe technology away from Internet SCSI (iSCSI). As an example, an organization that doesn’t want to deal with any potential hassles included in implementing NVMe over Fabrics using RDMA can instead take advantage of NVMe-oF using TCP/IP on a Linux kernel.

Storage industry support for NVMe and NVMe-oF

Established storage vendors and startups alike are competing for a position within the market. All-flash NVMe and NVMe-oF storage products include the following:

  • DataDirect Networks (DDN) Flashscale
  • Datrium DVX hybrid system
  • Kaminario K2.N
  • NetApp Fabric-Attached Storage (FAS) arrays, including Flash Cache with NVMe SSD connectivity
  • Pure Storage FlashArray//X
  • Tegile IntelliFlash (acquired by Western Digital Corp. in 2017 and then sold to DDN in 2019)

In December 2017, IBM previewed an NVMe-oF InfiniBand configuration integrating its Power9 Systems and FlashSystem V9000, a product that is geared for cognitive workloads that ingest massive quantities of data.

In 2017, Hewlett Packard Enterprise introduced its HPE Persistent Memory server-side flash storage using ProLiant Gen9 servers and NVMe-compliant Persistent Memory PCIe SSDs.

Dell EMC was one of the first storage vendors to bring an all-flash NVMe product to market. The DSSD D5 array was built with Dell PowerEdge servers and a proprietary NVMe over PCIe network mesh. The product was shelved in 2017 due to poor sales.

A handful of startups have also launched NVMe all-flash arrays:

  • Apeiron Data Systems uses NVMe drives for media and houses data services in field-programmable gate arrays (FPGAs) instead of servers attached to storage arrays.
  • E8 Storage (bought by Amazon in 2019) uses its software to replicate snapshots from the E8-D24 NVMe flash array to attached branded compute servers, a design that aims to reduce management overhead on the array.
  • Excelero software-defined storage runs on any standard servers.
  • Mangstor MX6300 NVMe-oF arrays are based on Dell EMC PowerEdge outfitted with branded NVMe PCIe cards.
  • Pavilion Data Systems has a branded Pavilion Memory Array built with commodity network interface cards (NICs), PCIe switches and processors. Pavilion’s 4U appliance contains 20 storage controllers and 40 Ethernet ports, which connect to 72 NVMe SSDs using the internal PCIe switch network.
  • Vexata Inc. offers its VX-100 and Vexata Active Data Fabric distributed software. The vendor’s Ethernet-connected NVMe array includes a front-end controller, a cut-through router based on FPGAs and data nodes that manage I/O schedules and metadata.

Chipmakers, network vendors prep the market

Computer hardware vendors broke new ground on NVMe over Fabrics technologies in 2017. Networking vendors are waiting for storage vendors to catch up and start selling NVMe-oF-based arrays.

FC switch rivals Brocade and Cisco each rolled out 32 Gbps Gen 6 FC gear that supports NVMe flash traffic, including FC-NVMe fabric capabilities. Also entering the fray was Cavium, refreshing the QLogic Gen 6 FC and FastLinQ Ethernet adapters for NVMe-oF.

Marvell introduced its 88SS1093 NVMe SSD controllers, featuring an advanced design that places its low-density parity check technology for triple-level cell (TLC) NAND flash devices running on top of multi-level cell (MLC) NAND.

Mellanox Technologies has developed an NVMe-oF storage reference architecture based on its BlueField system-on-a-chip (SoC) programmable processors. Similar to hyper-converged infrastructure (HCI), BlueField integrates compute, networking, security, storage and virtualization tools in a single device.

Microsemi Corp. teamed with American Megatrends (AMI) to develop an NVMe-oF reference architecture. The system incorporates Microsemi Switchtec PCIe switches in Intel Rack Scale Design (RSD) disaggregated composable infrastructure hardware running AMI’s Fabric Management Firmware.

Among drive-makers, Intel Corp. led the way with dual-ported 3D NAND-based NVMe SSDs and Intel Optane NVMe drives, which are based on 3D XPoint memory technology developed by Intel and chipmaker Micron Technology, Inc. Intel claims Optane NVMe drives are approximately eight times faster than NAND flash memory-based NVMe PCIe SSDs.

Micron rolled out its 9200 series of NVMe SSDs and also branched into selling storage, launching the Micron Accelerated Solutions NVMe reference architecture and Micron SolidScale NVMe-oF-based appliances.

Seagate Technology introduced its Nytro 5000 M.2 NVMe SSD and started sampling a 64 terabyte (TB) NVMe add-in card.

What is Continuous Integration (CI)?

Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.

CI aims to provide rapid feedback so that when a defect is introduced into the code base, it is identified and corrected as soon as possible.

CI originated from within the Extreme Programming paradigm, which is a subset of the Agile methodology, but the principles can be applied to any iterative programming model. Traditional development approaches, such as the Waterfall model, can also benefit from the use of CI methods for the construction stage. Continuous integration commonly is paired with continuous delivery, wherein steps to deliver executable code to production occur rapidly and with automation, for CI/CD.

What are the common practices for CI?

According to Paul Duvall, co-author of Continuous Integration: Improving Software Quality and Reducing Risk, best practices of CI include:

  • Frequent code commits;
  • Developer test categorization;
  • A dedicated integration build machine;
  • Continuous feedback mechanisms; and
  • Staging builds.

CI releases can occur at any frequency, depending on the organization that runs it and the project at hand; generally, organizations that adopt CI release more frequently than with previous software development processes. Each significant change kicks off a build. A development team incorporates CI for a number of reasons, including to receive constant feedback on the status of the software. CI detects deficiencies early in development, which makes them less disruptive, less complex and easier to resolve than later in the software development life cycle.

A development team can use automation in the CI setup to incorporate code integration and testing, which reduces time to find bugs and enables faster feedback than when these tasks are carried out manually. Automation tools help teams perform common tests as part of the CI process, such as unit, application programming interface (API) and functional tests. A unit test examines the smallest application components. An API test assesses whether or not an API can reliably perform under its expected load of requests and responses. A functional test typically evaluates larger pieces of the source code to simulate a user workflow or function. With full CI automation, scripts or integration engines manage the movement of new code through tests and build.

This automated approach is often an integral part of a CI/CD pipeline and a DevOps methodology. CD acts as an extension of CI, not an alternative. CI focuses on the build and code testing parts of the development cycle, while CD includes deployment tests and configuration automation. In CD, a development team produces and releases software to production in short cycles. Continuous deployment is a more advanced step, wherein the code releases automatically into production, live to end users.

What are the benefits of CI?

When it incorporates CI into the development process, a dev team can bring worthwhile benefits to an organization.

CI enables shorter and less disruptive code integrations, as less code is integrated at a time, at a more frequent rate than in other dev approaches, such as waterfall. Similarly, reverted changes are less disruptive, because only isolated changes go out at once.

Bug detection is easier and faster as well, because if a bug surfaces, it will most likely be in the last integrated batch of code. Both of these benefits are the result of increased code visibility, as developers constantly add to the code base.

Continuous integration also enables continual feedback on changes, which can improve a product over time.

List of CI tools

A development team uses CI software tools to automate parts of the application build and construct a document trail. The following are examples of CI pipeline automation tools commonly found in enterprise IT shops. Many additional tools exist for steps in the CI pipeline, such as Version control, testing, builds and artifact storage, and are too numerous to detail here.

Jenkins is an open source CI automation server. Jenkins can distribute tests and builds over numerous machines. Plug-ins extend Jenkins’ feature capabilities, such as those for automated unit tests and test reporting. A developer can create a project build via specific URLs, commits in a version control system, or a pre-scheduled and sequential system. Once a system is tested, Jenkins also supports the ability to deploy code with CD. CloudBees enables the use of Jenkins at enterprise scale.

The open source GitLab repository and platform supports CI/CD. GitLab can run unit and integration tests on multiple machines and can split builds to work over multiple machines to decrease project execution times. The software also supports manual deployments for CD to staging environments and to production environments. GitLab also supports integration with tools such as Atlassian Jira, GitHub and Jenkins.

JetBrains TeamCity is an integration and management server for CI/CD. TeamCity enables developers to test code before they commit changes to a code base. If a test fails, TeamCity sends a notification. TeamCity features Build Grids, which enable developers to run multiple tests and builds for different platforms and environments. TeamCity includes support for Docker, Jira and other programs.

What is Cloud Services?

Cloud services refer to any IT services that are provisioned and accessed from a cloud computing provider. This is a broad term that incorporates all delivery and service models of cloud computing and related solutions. Cloud services are delivered over the internet and accessible globally from the internet.

Cloud services provide many IT services traditionally hosted in-house, including provisioning an application/database server from the cloud, replacing in-house storage/backup with cloud storage and accessing software and applications directly from a web browser without prior installation.

There are three basic types of cloud services:

  • Software as a service (SaaS)
  • Infrastructure as a service (IaaS)
  • Platform as a service (PaaS)

Cloud services provide great flexibility in provisioning, duplicating and scaling resources to balance the requirements of users, hosted applications and solutions. Cloud services are built, operated and managed by a cloud service provider, which works to ensure end-to-end availability, reliability and security of the cloud.

What is Oracle Public Cloud?

The Oracle Public Cloud is an application development platform solutions delivered entirely through the Internet on a subscription-based billing method from Oracle Corporation.

Oracle’s public cloud solution provides enterprise-class applications, middleware services and databases managed, hosted, patched and supported by Oracle itself. The services offered under Oracle public cloud are, Fusion CRM and HCM Cloud, Social Network Cloud, Database Cloud and Java Cloud and being hosted at Oracle’s datacenters by default, posses a scalable, flexible and secure architecture.

Oracle public cloud is a cloud enterprise as a service (Eaas) solution imparting all the three cloud service models and enterprise IT fundamentals within one single solution provided on a self-service basis.

Oracle provides its customers the flexibility to use its powerful CRM, Human Capital Management and Social Network enterprise collaboration tools for deploying their own business application processes on them or to create customized enterprise wide complex applications by using their Java and database backend platform; hosted on Oracle’s infrastructure or can easily be deployed on most public or private IaaS clouds. Oracle public cloud is different from Oracle on-demand CRM, where the former is a comprehensive suite of different applications and the latter only provides CRM on a per license billing method.

What is Oracle Database (Oracle DB)?

Oracle Database (Oracle DB) is a relational database management system (RDBMS) from Oracle Corporation. Originally developed in 1977 by Lawrence Ellison and other developers, Oracle DB is one of the most trusted and widely used relational database engines for storing, organizing and retrieving data by type while still maintaining relationships between the various types.

The system is built around a relational database framework in which data objects may be directly accessed by users (or an application front end) through structured query language (SQL). Oracle is a fully scalable relational database architecture and is often used by global enterprises which manage and process data across wide and local area networks. The Oracle database has its own network component to allow communications across networks.

Oracle DB is also known as Oracle RDBMS and, sometimes, simply as Oracle.

Databases are used to provide structure and organization to data stored electronically in a computer system. Before they were adopted, early computers stored data in flat file structures where information in each file was separated by commas (CSV files). However, as the number of fields and rows that defined the characteristics and structure of each piece of data continued increasing, it was only a matter of time before this approach would become unmanageable.

Relational models for database management represented the ideal solution to this issue by organizing data in entities and attributes that further describe them. Today, Oracle Database represents the RDBMS with the largest market share. Oracle DB rivals Microsoft’s SQL Server in the enterprise database market. There are other database offerings, but most of these command a tiny market share compared to Oracle DB and SQL Server. Fortunately, the structures of Oracle DB and SQL Server are quite similar, which is a benefit when learning database administration.

Oracle DB runs on most major platforms, including Windows, UNIX, Linux and macOS. The Oracle database is supported on multiple operating systems, including IBM AIX, HP-UX, Linux, Microsoft Windows Server, Solaris, SunOS and macOS.

Oracle started supporting open platforms such as GNU/Linux in the late 1990s. Different software versions are available, based on requirements and budget. Oracle DB editions are hierarchically broken down as follows:

  • Enterprise Edition: Offers all features, including superior performance and security, and is the most robust
  • Personal Edition: Nearly the same as the Enterprise Edition, except it does not include the Oracle Real Application Clusters option
  • Standard Edition: Contains base functionality for users that do not require Enterprise Edition’s robust package
  • Express Edition (XE): The lightweight, free and limited Windows and Linux edition
  • Oracle Lite: For mobile devices

A key feature of Oracle is that its architecture is split between the logical and the physical. This structure means that for large-scale distributed computing, also known as grid computing, the data location is irrelevant and transparent to the user, allowing for a more modular physical structure that can be added to and altered without affecting the activity of the database, its data or users.

The sharing of resources in this way allows for very flexible data networks with capacity that can be adjusted up or down to suit demand, without degradation of service. It also allows for a robust system to be devised, as there is no single point at which a failure can bring down the database since the networked schema of the storage resources means that any failure would be local only.

The largest benefit of the Oracle DB is that it is more scalable than SQL, which can make it more cost-efficient in enterprise instances. This means that if an organization requires a large number of databases to store data, they can be configured dynamically and accessed quickly without any periods of downtime.

Other structural features that make Oracle popular include:

  • Efficient memory caching to ensure the optimal performance of very large databases
  • High-performance partitioning to divide larger data tables in multiple pieces
  • The presence of several methods for hot, cold and incremental backups and recoveries, including the powerful Recovery Manager tool (RMAN)

What is Punchdown Block?

A punchdown block is a mechanism used to cross-connect sets of wires through a metal peg system in telecommunications closets or local area networks (LAN). Solid copper wires are punched into short and open-ended slots that serve as insulation displacement connectors.

A punchdown block is also known as a punch down block, cross-connect block, terminating block, connecting block, punchblock or quick-connect block.

The punchdown block mechanism facilitates quick and efficient wiring for the following reasons:

  • Insulation stripping is not required.
  • There are no screws to loosen and tighten.

Punchdown blocks are designed for 22-26 Average Wire Gauge (AWG) solid copper wire.

The most common punchdown block is the 66 block (or M-Block, which has 50 rows, each with four columns of electrically bonded metal peg clips. The 66 model is often used to cross connect work area outlets and patch panels. 66 model types are a 25-pair standard non-split version and a 25-pair split version.

What is DevOps as a Service?

DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization’s software development team and the operations team. In this delivery model, the DevOps as a Service provider provides the disparate tools that cover various aspects of the overall process and connects these tools to work together as one unit. DevOps as a Service is the opposite of an in-house best-of-breed toolchain approach, in which the DevOps team uses a disconnected collection of discrete tools.

The aim of DevOps as a Service is to ensure that every action carried out in the software delivery process can be tracked. The DevOps as a Service system helps to ensure that the organization achieves desired outcomes and successfully follows strategies such as continuous delivery (CD) and continuous integration (CI) to deliver business value. DevOps as a Service also provides feedback to the developer group when a problem is identified in the production environment.

What are the advantages of DevOps as a Service?

DevOps as a Service can appeal to organizations that lack internal DevOps expertise, or the budget to obtain or train up employees with those skills. This approach also hides the complexities of data and information flow management up and down the toolchain. Various individuals and teams involved with the DevOps process can use intuitive interfaces to call on the aspects of the tooling they require, without having to understand how the entire toolchain works. For example, using the same DevOps as a Service offering, a developer can call upon source code management tools, a tester can check application performance management tools and the IT operations team can make changes with configuration management tools. This allows the team to monitor and report on activities that occur in the toolchain.

By integrating chosen elements of DevOps tooling into a single overarching system, DevOps as a Service aims to improve collaboration, monitoring, management and reporting. An effective DevOps as a Service strategy enables a business to adopt a more flexible approach to its markets, and bring forth new products and services as the market changes. DevOps and DevOps as a Service can coexist with traditional development and deployment processes.

What are the disadvantages of DevOps as a Service?

Discussion of DevOps as a Service offerings presumes that there is agreement on a single complete toolchain for DevOps that effectively meets any organization’s needs, much less one that a provider could offer in a managed services model. Most DevOps toolchains incorporate some type of a CI/CD pipeline and monitoring capabilities, from the software development process to deployment into production, but organizations’ needs and preferences will vary.

A managed DevOps services model also may limit an organization’s options for tools and specific capabilities versus specific evaluation and selection of best-of-breed tools that are integrated in-house. Managed DevOps providers may offer fewer choices among individual tools, whether their own or from partners.

Other potential challenges with a DevOps-as-a-Service model involve tradeoffs in speed versus security, and a service provider’s ability to meet availability and reliability requirements. An organization must keep a close eye on its use of services and associated tools, to keep costs under control.

Moreover, an organization’s internal staff still must understand how the managed DevOps services and hosted tools interact and integrate with each other, as well as within the organization’s own IT infrastructure and chosen cloud platform, so they can support applications after deployment to production.

The DevOps as a Service market

DevOps as a Service providers include DevOps tools vendors, public cloud platform providers, systems integrators and even IT teams that curate a toolchain and integrate it in-house. A DevOps as a Service vendor typically offers at least one of the following:

  • a complete proprietary stack created, managed and maintained by the provider;
  • strategies for the user to manage the cultural change involved in blending tasks traditionally performed by siloed software application development and systems operations teams;
  • a more open stack wherein the vendor creates a proprietary interoperability system, allowing for some hosted open source components; or
  • an orchestration layer that uses open application programming interfaces to integrate with existing tools.

Top DevOps-as-a-Service tools and products. A wide range of providers offer some form of DevOps as a Service — major public cloud platforms, large and small managed services providers, global consultancies and DevOps-specific consulting firms.

Vendors may offer as-a-service versions of their tools that represent individual links in the DevOps toolchain, and integrate them with other tools in the DevOps toolchain. Typically, however, those vendors do not span and support an entire DevOps toolchain, especially ones that incorporate tools from multiple providers.

“By integrating chosen elements of DevOps tooling into a single overarching system, DevOps as a Service aims to improve collaboration, monitoring, management and reporting..” – Clive Longbottom

Related Terms: continuous delivery, continuous integration, open API, DevOps certification, configuration management

What is General Availability (GA)?

In the software release life cycle, general availability (GA) refers to the marketing phase when all commercialization activities pertaining to the software product have been completed and it is available for purchase. Commercialization activities encompass compliance and security tests as well as localization and worldwide availability. General availability is a part of the release phase of the software and is preceded by the release to manufacturing (RTM) phase.

General availability is also known as production release.

General availability is the phase of the software release life cycle where the software is made available for sale. The availability though, can largely vary on the basis of the form in which it is released, language and the region as well. General availability usually happens on a specific date, which has been announced in advance to customers. Any software that has made it to this stage is assumed to have gone through all of the earlier release stages, and has also passed them successfully. This means that the software product has proven to be reliable, free of critical bugs and is suitable for usage in production systems. The general availability phase is also when the software must support all its promised features and be available to developers outside the developing firm.

What is Narrow AI (Weak AI)?

Narrow AI, also known as weak AI, is an application of artificial intelligence technologies to enable a high-functioning system that replicates — and perhaps surpasses — human intelligence for a dedicated purpose.

Narrow AI is often contrasted with general artificial intelligence (AGI), sometimes called strong AI; a theoretical AI system that could be applied to any task or problem.

Examples of narrow AI

All forms of modern AI systems can be classified as narrow AI. They are as follows:

  • Image and facial recognition systems: These systems, including those used by social media companies like Facebook and Google to automatically identify people in photographs, are forms of weak AI.
  • Chatbots and conversational assistants: This includes popular virtual assistants Google Assistant, Siri and Alexa. Also included are simpler, customer-service chatbots, such as a bot that assists customers in returning an item to a retail store.
  • Self-driving vehicles: Autonomous or semiautonomous cars, such as some Tesla models and autonomous drones, boats and factory robots, are all applications of narrow AI.
  • Predictive maintenance models: These models rely on data from machines, often collected through sensors, to help predict when a machine part may fail and alert users ahead of time.
  • Recommendation engines: These systems that predict content a user might like or search for next are forms of weak AI.

What are the advantages and disadvantages of narrow AI?

Advantages. Narrow AI systems can perform single tasks well, often better than humans. A weak AI system designed to identify cancer from X-ray or ultrasound images, for example, might be able to spot a cancerous mass in images faster and more accurately than a trained radiologist.

Meanwhile, a predictive maintenance platform could analyze incoming sensor data in real time, a feat virtually impossible for a person or group of people to do, to predict roughly when a piece of a machine will fail.

Disadvantages. Still, narrow AI systems can only do what they are designed to do and can only make decisions based on their training data. A retailer’s customer-service chatbot, for example, could answer questions regarding store hours, item prices or the store’s return policy. Yet, a question about why a certain product is better than a similar product would likely stump the bot, unless its creators took the time to program the bot to respond to such questions specifically.

Meanwhile, AI systems are prone to bias, and can often give incorrect results while being unable to explain them. Complex models are often trained on massive amounts of data — more data than its human creators can sort through themselves. Large amounts of data often contain biases or incorrect information, so a model trained on that data could inadvertently internalize that incorrect information as true.

The model would make skewed predictions, yet its users, unaware it was trained on biased data, wouldn’t know the predictions are off.

Comparison between Narrow AI, general AI, weak AI, and strong AI

AGI involves a system with comprehensive knowledge and cognitive capabilities such that its performance is indistinguishable from that of a human, although its speed and ability to process data is far greater. Such a system has not yet been developed, and expert opinions differ as if such as system is possible to create.

Some experts believe that an artificial general intelligence system would need to possess human qualities, such as consciousnesses, emotions and critical-thinking.

Systems built on narrow AI, or weak AI, have none of these qualities, although they can often outperform humans when pointed at a particular task. These systems aren’t meant to simulate human intelligence fully but rather to automate specific human tasks using machine learning, deep learning and natural language processing (NLP).

What is Public Cloud Storage?

Public cloud storage is a cloud storage model that enables individuals and organizations alike to store, edit and manage data. This type of storage exists on a remote cloud server and is accessible over the internet under a subscription-based utility billing method where the users pay only for the storage capacity being used.

Public cloud storage is provided by a storage service provider that hosts, manages and sources the storage infrastructure publicly to many different users.

Public cloud storage service is also known as storage as a service, utility storage and online storage.

Public cloud storage generally enables the sourcing of massive amounts of storage space on demand over the internet, and is built over storage virtualization, which logically distributes large storage arrays into a multitenant architecture shared among various users and applications.

Public cloud storage capacity is made possible through two different sourcing models:

  • Web services APIs
  • Thin client applications

Public cloud storage enabled through APIs is designed to be used for web applications that require access to scalable storage at run time, whereas thin client applications provide end users with a way to back up and store their local data on remote cloud storage. Amazon S3, Mezeo and Windows Azure are popular examples of public cloud storage.

What is Ethical Hacker?

An ethical hacker, also referred to as a white hat hacker, is an information security (infosec) expert who penetrates a computer system, network, application or other computing resource on behalf of its owners — and with their authorization. Organizations call on ethical hackers to uncover potential security vulnerabilities that malicious hackers could exploit.

The purpose of ethical hacking is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure. The process entails finding and then attempting to exploit vulnerabilities to determine whether unauthorized access or other malicious activities are possible.

What is ethical hacking?

An ethical hacker needs deep technical expertise in infosec to recognize potential attack vectors that threaten business and operational data. People employed as ethical hackers typically demonstrate applied knowledge gained through recognized industry certifications or university computer science degree programs and through practical experience working with security systems.

Ethical hackers generally find security exposures in insecure system configurations, known and unknown hardware or software vulnerabilities, and operational weaknesses in process or technical countermeasures. Potential security threats of malicious hacking include distributed denial-of-service attacks in which multiple computer systems are compromised and redirected to attack a specific target, which can include any resource on the computing network.

An ethical hacker is given wide latitude by an organization to legitimately and repeatedly attempt to breach its computing infrastructure. This involves exploiting known attack vectors to test the resiliency of an organization’s infosec posture.

Ethical hackers use many of the same methods and techniques to test IT security measures, as do their unethical counterparts, or black hat hackers. However, rather than taking advantage of vulnerabilities for personal gain, ethical hackers document threat intelligence to help organizations remediate network security through stronger infosec policies, procedures and technologies.

Any organization that has a network connected to the internet or that provides an online service should consider subjecting its operating environment to penetration testing (pen testing) conducted by ethical hackers.

What do ethical hackers do?

Ethical hackers can help organizations in a number of ways, including the following:

  • Finding vulnerabilities: Ethical hackers help companies determine which of their IT security measures are effective, which need updating and which contain vulnerabilities that can be exploited. When ethical hackers finish evaluating an organization’s systems, they report back to company leaders about those vulnerable areas, which may include a lack of sufficient password encryption, insecure applications or exposed systems running unpatched software. Organizations can use the data from these tests to make informed decisions about where and how to improve their security posture to prevent cyber attacks.
  • Demonstrating methods used by cybercriminals: These demonstrations show executives the hacking techniques that malicious actors could use to attack their systems and wreak havoc on their businesses. Companies that have in-depth knowledge of the methods the attackers use to break into their systems are better able to prevent those incursions.
  • Helping to prepare for a cyber attack: Cyber attacks can cripple or destroy a business — especially a smaller business — but most companies are still unprepared for cyber attacks. Ethical hackers understand how threat actors operate, and they know how these bad actors will use new information and techniques to attack systems. Security professionals who work with ethical hackers are better able to prepare for future attacks because they can better react to the constantly changing nature of online threats.

What are the differences between Ethical hacking and penetration testing?

Pen testing and ethical hacking are often used as interchangeable terms, but there is some nuance that distinguishes the two roles. Many organizations will use both ethical hackers and pen testers to bolster IT security.

Ethical hackers routinely test IT systems looking for flaws and to stay abreast of ransomware or emerging computer viruses. Their work often entails pen tests as part of an overall IT security assessment.

Pen testers seeks to accomplish many of the same goals, but their work is often conducted on a defined schedule. Pen testing is also more narrowly focused on specific aspects of a network, rather than on ongoing overall security.

For example, the person performing the pen testing may have limited access only to the systems that are subject to testing and only for the duration of the testing.

How to become an ethical hacker?

There are no standard education criteria for an ethical hacker, so an organization can set its own requirements for that position. Those interested in pursuing a career as an ethical hacker should consider a bachelor’s or master’s degree in infosec, computer science or even mathematics as a strong foundation.

Individuals not planning to attend college can consider pursing an infosec career in the military. Many organizations consider a military background a plus for infosec hiring, and some organizations are required to hire individuals with security clearances.

Other technical subjects — including programming, scripting, networking and hardware engineering — can help those pursuing a career as ethical hackers by offering a fundamental understanding of the underlying technologies that form the systems they will be working on. Other pertinent technical skills include system administration and software development.

What is Private Cloud Storage?

Private cloud storage is a type of storage mechanism that stores an organization’s data at in-house storage servers by implementing cloud computing and storage technology.

Private cloud storage is similar to public cloud storage in that it provides the usability, scalability and flexibility of the storage architecture. But unlike public cloud storage, it is not publicly accessible and is owned by a single organization and its authorized external partners.

Private cloud storage is also known as internal cloud storage.

Private cloud storage works much like public cloud storage and implements storage virtualization across an organization, providing a centralized storage infrastructure that can only be accessed by the authorized nodes.

Private cloud storage operates by installing a data center, which houses a series of storage clusters that are integrated with a storage virtualization application. Administrative policies and a management console provide access to the different storage nodes and applications within the organization’s network. The applications or nodes access the private storage through file access and data retrieving protocols, while the automated storage administrator application allocates storage capacity to them on run time.

Private cloud storage has a multitenant architecture, where a single storage array can house storage space to multiple applications, nodes or departments.

List

Microsoft Mac Downloads is a one-stop shop for Mac-specific Microsoft installers. Explains, “It’s a cleanly-organized table of download links (automatically updated) for standalone installer packages of Microsoft products for macOS systems. As someone managing a 70/30 Win/Mac workstation environment this will save me quite a bit of hassle with the Apple side.”

Tip

A great idea for labelling cables: “Use wrap mode, but not directly on cable. Put a large diameter plastic straw over the cable first. On fiber, it gives you more space to type… also allows spinning to read it, and labels tend to stay stuck.”

Podcast

Network Collective is a network engineering podcast with industry experts, pioneers and fellow engineers from the networking community. Topics range from protocol deep-dives to career management, but with a focus on relevance and providing value to those working in the field.

Cheatsheet

CSP Cheatsheet is a quick reference on all the supported features and directives of Content Security Policy. Includes example policies and suggestions on how to make the best use of CSP. Can be helpful when you need to identify valid and invalid directives and values.

Blog

Practical Networking offers simple, concrete explanations of complex technology in a way that ensures what you learn is immediately applicable. It is intended to bridge the gap between very-basic articles on network engineering and those that get so far into the minutiae that they are virtually impossible to follow. Our thanks for the suggestion go to youngeng.

Free Tool

SeaweedFS is a fast, distributed storage system for blobs, objects, files and data that stores/serves billions of files. Can transparently integrate with the cloud with both fast local access and elastic cloud storage capacity. Blob store has O(1) disk seek, local and cloud tiering. Filer supports cross-cluster active-active replication, Kubernetes, POSIX, S3 API encryption, Erasure Coding for warm storage, FUSE mount, Hadoop and WebDAV.

AutoPkgr makes it simple to install and configure AutoPkg quickly and reliably in the Mac OS. It’s the easy way to take advantage of automated macOS software packaging and distribution without the need for command-line methods. Explains, “For Mac downloads AutoPkgr is a god send, and you can make some interesting workflows and automations.”

5G-air-simulator is an open-source, system-level simulator for modeling the 5G air interface. Explains, “It is a compiled C++ code for Linux, which it’s launched via terminal, that gives out a text trace. Then through grep and awk, I extracted the KPIs I needed.”

Patch My PC Home Updater is an easy way to update or install over 300 apps on any computer. This simple tool can help keep things secure for users whose home equipment might be accessing your network by making sure they always have the latest security patches and updates installed.

ScreenToGif is an open-source tool for recording your screen, webcam feed or sketchboard drawings. The integrated editor allows you to edit recordings to adjust individual frames in assorted ways and add overlays. Exports to gif, apng, video, project, images and psd.

Remote Utilities is a secure, configurable remote desktop tool for viewing screens, sending keystrokes, controlling the mouse, transferring files and more. A free license allows you to control up to 10 remote PCs.

Course

IW Mentor is offering a full day of FREE Power Automate advanced training with about 9 hours of content plus labs start at 12:00 AM on 7/16/2021 and end at 12:00 AM on 1 July 2021. Ramp up your skills in this in-depth class, taught by Microsoft MVP, Laura Rogers. Basic knowledge of the Flow interface and concepts is necessary. Visit IW Mentor and click Register Now button for registration.

Free Power Automate Day

Tutorial

Everything You Always Wanted to Know About Optical Networking – But Were Afraid to Ask is a nice tutorial that touches on every area related to fiber in order to provide a basic understanding of how and why these networks function. Covers topics from the day-to-day to the advanced.

Developing NetBox Plugins is a series of how-tos on creating small, self-contained applications that can add new functionality to Netbox—extending as far as creating full-fledged apps. Plugins can access existing objects and functions of NetBox and use any libraries, external resources and API calls.

Training Resource

dn42 is a large, dynamic VPN that uses various internet technologies (BGP, whois database, DNS etc.) where you can learn networking and experiment with routing. Gives you an opportunity to build your understanding of routing technologies risk-free using a reasonably large network.