Posts by Tag

Kafka

Apache Kafka Security

1 minute read

Apache Kafka is an internal middle layer enabling your back-end systems to share real-time data feeds with each other through Kafka topics. With a standard ...

Introduction to Logstash and Filebeat

4 minute read

Introduction to Logstash and Filebeat Filebeat FileBeat is basically a data-shipper that belongs to the Beats family. We can install this shipper on server...

Kafka Server

less than 1 minute read

Kafka Server Security Configuring Kafka Brokers Kafka Brokers support listening for connections on multiple ports. We need to configure listeners and optio...

Kafka Schema Registry

less than 1 minute read

Kafka Schema Registry Security Schema Registry provides a serving layer for your metadata. It provides a RESTful interface for storing and retrieving Avro s...

Kafka Rest Proxy

less than 1 minute read

Kafka Rest Proxy Security The Kafka REST Proxy provides a RESTful interface to a Kafka cluster. It makes it easy to produce and consume messages, view the s...

Kafka KSQL

less than 1 minute read

Kafka KSQL Security Kafka enables companies to transform their business with event-driven architectures. They can deploy real-time data pipelines that organ...

Kafka Connect

less than 1 minute read

Kafka Connect Security Kafka Connect is a tool for scalably and reliably streaming data between Apache Kafka and other data systems. It makes it simple to q...

Kafka clients

less than 1 minute read

Kafka clients The configs for SSL will be the same for both producer and consumer. Create Keytabs for Kafka Client Refer SASL_Kerberos for more details. ...

Back to Top ↑

Sphinx

Kafka KSQL

less than 1 minute read

Kafka KSQL Security Kafka enables companies to transform their business with event-driven architectures. They can deploy real-time data pipelines that organ...

Kafka Connect

less than 1 minute read

Kafka Connect Security Kafka Connect is a tool for scalably and reliably streaming data between Apache Kafka and other data systems. It makes it simple to q...

Back to Top ↑

SASL

SSL Encryption

5 minute read

Encryption solves the problem of the man in the middle (MITM) attack. That’s because your packets, while being routed to your destination, travel your networ...

SASL and GSSAPI

3 minute read

SASL and GSSAPI SASL and GSSAPI are frameworks that various authentication providers can be plugged into. People wishing to use Kerberos authentication in a...

Back to Top ↑

Texture Segmentation

Image Texture Segmentation Using Gabor Filter

4 minute read

Gabor Filters are known best to depict the mammalian multi-channel approach of vision for interpreting and segmenting textures. This article shows an impleme...

Back to Top ↑

Gabor Filter

Image Texture Segmentation Using Gabor Filter

4 minute read

Gabor Filters are known best to depict the mammalian multi-channel approach of vision for interpreting and segmenting textures. This article shows an impleme...

Back to Top ↑

YoloV2

Training YoloV2 in Custom Dataset

8 minute read

Without sounding too smart as if to describe everything of YOLO artitecture here, in this article I would rather show you a lame approach of plugging the cus...

Back to Top ↑

Logstash

Introduction to Logstash and Filebeat

4 minute read

Introduction to Logstash and Filebeat Filebeat FileBeat is basically a data-shipper that belongs to the Beats family. We can install this shipper on server...

Back to Top ↑

Filebeat

Introduction to Logstash and Filebeat

4 minute read

Introduction to Logstash and Filebeat Filebeat FileBeat is basically a data-shipper that belongs to the Beats family. We can install this shipper on server...

Back to Top ↑

GSSAPI

SASL and GSSAPI

3 minute read

SASL and GSSAPI SASL and GSSAPI are frameworks that various authentication providers can be plugged into. People wishing to use Kerberos authentication in a...

Back to Top ↑

SSL

SSL Encryption

5 minute read

Encryption solves the problem of the man in the middle (MITM) attack. That’s because your packets, while being routed to your destination, travel your networ...

Back to Top ↑

zookeeper

Zookeeper Security

1 minute read

The metadata stored in ZooKeeper is such that only brokers will be able to modify the corresponding znodes, but znodes are world readable. The rationale beh...

Back to Top ↑

python

Using Pm2 To Serve Python Application

2 minute read

PM2 is a production process manager for Node.js applications with a built-in load balancer. It allows you to keep applications alive forever, to reload them ...

Back to Top ↑

vectors

Introduction to Vectors

10 minute read

1.1 Linear combination Vectors A vector is an object that has both a magnitude and a direction. But for our purpose, consider vectors as groups of numbers. ...

Back to Top ↑

matrices

Solving Linear Equations

8 minute read

2.3 Elimination using matrices In linear algebra systems of linear equations are viewed as matrix-vector operations. Identity Matrix An identity matrix $I...

Back to Top ↑

nosql

Cassandra Data modeling

8 minute read

Before we start with our modeling, we must first educate ourselves with at least the rudimentary knowledge of Cassandra’s Architecture. Don’t worry we’re not...

Back to Top ↑

data modeling

Cassandra Data modeling

8 minute read

Before we start with our modeling, we must first educate ourselves with at least the rudimentary knowledge of Cassandra’s Architecture. Don’t worry we’re not...

Back to Top ↑

cassandra

Cassandra Data modeling

8 minute read

Before we start with our modeling, we must first educate ourselves with at least the rudimentary knowledge of Cassandra’s Architecture. Don’t worry we’re not...

Back to Top ↑

Vector space

Vector Spaces and Subspaces

10 minute read

This post covers vector spaces, subspaces and then provides some understanding on pivot columns, free columns and rank and finally finds a complete solution ...

Back to Top ↑

Rank

Vector Spaces and Subspaces

10 minute read

This post covers vector spaces, subspaces and then provides some understanding on pivot columns, free columns and rank and finally finds a complete solution ...

Back to Top ↑

Complete solution

Vector Spaces and Subspaces

10 minute read

This post covers vector spaces, subspaces and then provides some understanding on pivot columns, free columns and rank and finally finds a complete solution ...

Back to Top ↑

Four Subspaces

Four Fundamental subspaces

5 minute read

This post covers linear independence, span, basis, dimension and four subspaces: Row space, Column space, Null space and Left null space.

Back to Top ↑

Dependence and Independence

Four Fundamental subspaces

5 minute read

This post covers linear independence, span, basis, dimension and four subspaces: Row space, Column space, Null space and Left null space.

Back to Top ↑

Span and Basis

Four Fundamental subspaces

5 minute read

This post covers linear independence, span, basis, dimension and four subspaces: Row space, Column space, Null space and Left null space.

Back to Top ↑

Orthogonality

Orthogonal matrices and Gram-Schmidt

11 minute read

This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.

Back to Top ↑

Orthogonal vectors

Orthogonal matrices and Gram-Schmidt

11 minute read

This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.

Back to Top ↑

Subspaces

Orthogonal matrices and Gram-Schmidt

11 minute read

This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.

Back to Top ↑

Gram-Schmidt

Orthogonal matrices and Gram-Schmidt

11 minute read

This post introduces about projection, orthogonal vectors, orthogonal matrices and Gram-Schmidt orthogonalization process.

Back to Top ↑

Determinants

Determinants

7 minute read

This post will briefly walk you through the determinants, its properties, Cramer’s rule and some applications of determinants.

Back to Top ↑

Cramer's rule

Determinants

7 minute read

This post will briefly walk you through the determinants, its properties, Cramer’s rule and some applications of determinants.

Back to Top ↑

Volumetric Integration

How does volumetric integration work?

5 minute read

Volumetric Integration is one of the well-known and established algorithms in surface reconstruction. The long-term success of this method can be attributed ...

Back to Top ↑

Surface Reconstruction

How does volumetric integration work?

5 minute read

Volumetric Integration is one of the well-known and established algorithms in surface reconstruction. The long-term success of this method can be attributed ...

Back to Top ↑

Open3D

How does volumetric integration work?

5 minute read

Volumetric Integration is one of the well-known and established algorithms in surface reconstruction. The long-term success of this method can be attributed ...

Back to Top ↑