Apache Kafka Security
Apache Kafka is an internal middle layer enabling your back-end systems to share real-time data feeds with each other through Kafka topics. With a standard ...
Apache Kafka is an internal middle layer enabling your back-end systems to share real-time data feeds with each other through Kafka topics. With a standard ...
Introduction to Logstash and Filebeat Filebeat FileBeat is basically a data-shipper that belongs to the Beats family. We can install this shipper on server...
Kafka Server Security Configuring Kafka Brokers Kafka Brokers support listening for connections on multiple ports. We need to configure listeners and optio...
Kafka Schema Registry Security Schema Registry provides a serving layer for your metadata. It provides a RESTful interface for storing and retrieving Avro s...
Kafka Rest Proxy Security The Kafka REST Proxy provides a RESTful interface to a Kafka cluster. It makes it easy to produce and consume messages, view the s...
Kafka KSQL Security Kafka enables companies to transform their business with event-driven architectures. They can deploy real-time data pipelines that organ...
Kafka Connect Security Kafka Connect is a tool for scalably and reliably streaming data between Apache Kafka and other data systems. It makes it simple to q...
Kafka clients The configs for SSL will be the same for both producer and consumer. Create Keytabs for Kafka Client Refer SASL_Kerberos for more details. ...
Sphinx is python recommended tool for generating documentation for python projects, it can generate the documentation of the project in various popular form...
Kafka KSQL Security Kafka enables companies to transform their business with event-driven architectures. They can deploy real-time data pipelines that organ...
Kafka Connect Security Kafka Connect is a tool for scalably and reliably streaming data between Apache Kafka and other data systems. It makes it simple to q...
Before we start with the consistency, replication and read-write operation in Cassandra, let’s first familiarize ourselves with what Cassandra is and its arc...
Before we dive into the installation of Cassandra, let’s first familiarize ourselves with what Cassandra is and its architecture. What is Cassandra? Cassand...
Before we start with our modeling, we must first educate ourselves with at least the rudimentary knowledge of Cassandra’s Architecture. Don’t worry we’re not...
Before we start with the consistency, replication and read-write operation in Cassandra, let’s first familiarize ourselves with what Cassandra is and its arc...
Before we dive into the installation of Cassandra, let’s first familiarize ourselves with what Cassandra is and its architecture. What is Cassandra? Cassand...
Before we start with our modeling, we must first educate ourselves with at least the rudimentary knowledge of Cassandra’s Architecture. Don’t worry we’re not...
Encryption solves the problem of the man in the middle (MITM) attack. That’s because your packets, while being routed to your destination, travel your networ...
SASL and GSSAPI SASL and GSSAPI are frameworks that various authentication providers can be plugged into. People wishing to use Kerberos authentication in a...
Introduction Outperforming the state-of-the-art BERT algorithm on 20 Natural Language Processing(NLP) benchmark tasks, XL-Net is a recent advancement in the...
Introduction 2018 was a breakthrough year in NLP, Transfer learning, particularly models like Allen AI’s ELMO, OPENAI’s transformer, and Google BERT was int...
Introduction Outperforming the state-of-the-art BERT algorithm on 20 Natural Language Processing(NLP) benchmark tasks, XL-Net is a recent advancement in the...
Introduction 2018 was a breakthrough year in NLP, Transfer learning, particularly models like Allen AI’s ELMO, OPENAI’s transformer, and Google BERT was int...
Interpretation and analysis of remote sensing imagery involves the identification and/or measurement of varied targets in an image so as to extract useful in...
Remote sensing Remote sensing is the science (and to some extent, art) of acquiring information about the Earth’s surface without actually being in conta...
Gabor Filters are known best to depict the mammalian multi-channel approach of vision for interpreting and segmenting textures. This article shows an impleme...
Gabor Filters are known best to depict the mammalian multi-channel approach of vision for interpreting and segmenting textures. This article shows an impleme...
Without sounding too smart as if to describe everything of YOLO artitecture here, in this article I would rather show you a lame approach of plugging the cus...
Introduction to Logstash and Filebeat Filebeat FileBeat is basically a data-shipper that belongs to the Beats family. We can install this shipper on server...
Introduction to Logstash and Filebeat Filebeat FileBeat is basically a data-shipper that belongs to the Beats family. We can install this shipper on server...
SASL and GSSAPI SASL and GSSAPI are frameworks that various authentication providers can be plugged into. People wishing to use Kerberos authentication in a...
Encryption solves the problem of the man in the middle (MITM) attack. That’s because your packets, while being routed to your destination, travel your networ...
The metadata stored in ZooKeeper is such that only brokers will be able to modify the corresponding znodes, but znodes are world readable. The rationale beh...
PM2 is a production process manager for Node.js applications with a built-in load balancer. It allows you to keep applications alive forever, to reload them ...
1.1 Linear combination Vectors A vector is an object that has both a magnitude and a direction. But for our purpose, consider vectors as groups of numbers. ...
2.3 Elimination using matrices In linear algebra, systems of linear equations are viewed as matrix-vector operations. Elimination is a method of solving sys...
Before we start with our modeling, we must first educate ourselves with at least the rudimentary knowledge of Cassandra’s Architecture. Don’t worry we’re not...
This post covers vector spaces, subspaces and then provides some understanding on pivot columns, free columns and rank and finally finds a complete solution ...
This post covers vector spaces, subspaces and then provides some understanding on pivot columns, free columns and rank and finally finds a complete solution ...
This post covers vector spaces, subspaces and then provides some understanding on pivot columns, free columns and rank and finally finds a complete solution ...
This post covers linear independence, span, basis, dimension and four subspaces: Row space, Column space, Null space and Left null space.
This post covers linear independence, span, basis, dimension and four subspaces: Row space, Column space, Null space and Left null space.
This post covers linear independence, span, basis, dimension and four subspaces: Row space, Column space, Null space and Left null space.
This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.
This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.
This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.
This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.
This post will briefly walk you through the determinants, its properties, Cramer’s rule and some applications of determinants.
This post will briefly walk you through the determinants, its properties, Cramer’s rule and some applications of determinants.
Volumetric Integration is one of the well-known and established algorithms in surface reconstruction. The long-term success of this method can be attributed ...
Volumetric Integration is one of the well-known and established algorithms in surface reconstruction. The long-term success of this method can be attributed ...
Volumetric Integration is one of the well-known and established algorithms in surface reconstruction. The long-term success of this method can be attributed ...
In this post we will dive into what are eigenvalues and eigen vectors, diagonalization of a matrix, symmetric matrices, system of differential equations and ...
In this post we will dive into what are eigenvalues and eigen vectors, diagonalization of a matrix, symmetric matrices, system of differential equations and ...
In this post we will dive into what are eigenvalues and eigen vectors, diagonalization of a matrix, symmetric matrices, system of differential equations and ...
In this post we will dive into what are eigenvalues and eigen vectors, diagonalization of a matrix, symmetric matrices, system of differential equations and ...
In this post we will dive into what are eigenvalues and eigen vectors, diagonalization of a matrix, symmetric matrices, system of differential equations and ...
Introduction 2018 was a breakthrough year in NLP, Transfer learning, particularly models like Allen AI’s ELMO, OPENAI’s transformer, and Google BERT was int...
Introduction 2018 was a breakthrough year in NLP, Transfer learning, particularly models like Allen AI’s ELMO, OPENAI’s transformer, and Google BERT was int...
Introduction 2018 was a breakthrough year in NLP, Transfer learning, particularly models like Allen AI’s ELMO, OPENAI’s transformer, and Google BERT was int...
Introduction 2018 was a breakthrough year in NLP, Transfer learning, particularly models like Allen AI’s ELMO, OPENAI’s transformer, and Google BERT was int...
Introduction Outperforming the state-of-the-art BERT algorithm on 20 Natural Language Processing(NLP) benchmark tasks, XL-Net is a recent advancement in the...
Introduction Outperforming the state-of-the-art BERT algorithm on 20 Natural Language Processing(NLP) benchmark tasks, XL-Net is a recent advancement in the...
Introduction Outperforming the state-of-the-art BERT algorithm on 20 Natural Language Processing(NLP) benchmark tasks, XL-Net is a recent advancement in the...
Introduction Outperforming the state-of-the-art BERT algorithm on 20 Natural Language Processing(NLP) benchmark tasks, XL-Net is a recent advancement in the...
Remote sensing Remote sensing is the science (and to some extent, art) of acquiring information about the Earth’s surface without actually being in conta...
Remote sensing Remote sensing is the science (and to some extent, art) of acquiring information about the Earth’s surface without actually being in conta...
Before we dive into the installation of Cassandra, let’s first familiarize ourselves with what Cassandra is and its architecture. What is Cassandra? Cassand...
Before we start with the consistency, replication and read-write operation in Cassandra, let’s first familiarize ourselves with what Cassandra is and its arc...
Before we start with the consistency, replication and read-write operation in Cassandra, let’s first familiarize ourselves with what Cassandra is and its arc...
Before we start with the consistency, replication and read-write operation in Cassandra, let’s first familiarize ourselves with what Cassandra is and its arc...
The Problem When we were working on a satellite image of one of the local area of Nepal, we had to simplify the obtained mask to feed into the GIS system. I...
U-Net U-Net is a U-shaped encoder-decoder network architecture, which consists of four encoder blocks and four decoder blocks that are connected via bridge...
U-Net U-Net is a U-shaped encoder-decoder network architecture, which consists of four encoder blocks and four decoder blocks that are connected via bridge...
U-Net U-Net is a U-shaped encoder-decoder network architecture, which consists of four encoder blocks and four decoder blocks that are connected via bridge...
Autoencoder Difference between generative and discriminative modelling Generative modelling Generative modelling is a statistical modeling technique that ...
Autoencoder Difference between generative and discriminative modelling Generative modelling Generative modelling is a statistical modeling technique that ...
Autoencoder Difference between generative and discriminative modelling Generative modelling Generative modelling is a statistical modeling technique that ...