Open in app

Sign In

Write

Sign In

Aaryan
Aaryan

9 Followers

Home

About

1 day ago

ChatGPT: The Future of Productivity

ChatGPT is an advanced language model developed by OpenAI, designed to assist users in various tasks, from answering questions to generating text. The model’s conversational nature and ability to understand context have made it a popular choice for businesses and individuals looking to boost their productivity. …

Chatgpt 3

2 min read

ChatGPT: The Future of Productivity
ChatGPT: The Future of Productivity
Chatgpt 3

2 min read


1 day ago

The Power of Data: How Netflix Revolutionized the Entertainment Industry

Netflix, the world’s leading streaming service, has revolutionised the entertainment industry with its unique content creation and distribution approach. The company’s success can be attributed to several factors, but one of the key components is its use of data analytics. …

Netflix

2 min read

Netflix

2 min read


Sep 19, 2021

History of Open Source

Prior to the 1980s, free software such as UNIX was available, but users were not permitted to share or alter it. Charging for software licenses became a common business strategy for software firms and computer manufacturers in the late 1970s and early 1980s. Copyrights, trademarks, and other contracts were used…

3 min read

3 min read


Published in IoT Lab KIIT

·Jul 11, 2021

Serverless Computing

When I first heard about Serverless computing, the word itself perplexed me. I began to wonder where the code ran, but after reading more about it, I discovered that the term “serverless computing” is misleading because serverless computing uses servers as well. Now we all have the same question: what…

7 min read

Serverless Computing
Serverless Computing

7 min read


Jun 6, 2021

Confusion Matrix and Cyber Attack

Confusion Matrix, Cybercrimes, Security, Machine learning — What is a cyber attack? A cyber attack is an attempt to gain unauthorized access to a computer, computing system, or computer network with the intent to cause damage. Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. 20 Types Of Cyber Attacks To Aware Of In 2021 The current internet age is witnessing the enormous development of technology and digital advancements. However, this…www.jigsawacademy.com

5 min read

Confusion Matrix and Cyber Attack
Confusion Matrix and Cyber Attack

5 min read


Jun 2, 2021

A Machine Learning Model inside the Container

Introduction In this article, I am going to show you how to create a machine learning model inside the docker. Steps: pull the centOS image from DockerHub Install the Python on the container Create the ML model inside Docker Firstly, we have to check that the docker is installed or…

3 min read

A Machine Learning Model inside the Container
A Machine Learning Model inside the Container

3 min read


Mar 13, 2021

How secure is Docker?

Discussion about Docker security and docker vulnerabilities. — Over the past few years, the use of virtualization technologies has increased exponentially. Accordingly, the demand for efficient and secure virtualization solutions is increasing. The two most used virtualization technologies are Container-based virtualization and hypervisor-based virtualization. …

Docker

10 min read

How secure is Docker?
How secure is Docker?
Docker

10 min read

Aaryan

Aaryan

9 Followers
Following
  • Dimitris Poulopoulos

    Dimitris Poulopoulos

  • Prakriti Sharma

    Prakriti Sharma

  • Rohith Vazhathody

    Rohith Vazhathody

  • Suminda Niroshan

    Suminda Niroshan

  • Jay Kachhadia

    Jay Kachhadia

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech