Author: Diyana Weerasuriya

What is DevOps? DevOps is the umbrella term for a collection of techniques, methodologies, and tools. This model improves an organisation’s capacity to deliver applications and services quickly. Because of this speed, organisations can provide better customer service and engage in competition. In simple terms, DevOps combines people, processes, and technology in application design, development, delivery, and operations by combining development (Dev) and procedures (Ops). DevOps allows formerly separate tasks like development, IT operations, quality engineering, and security to coordinate and collaborate. Figure 01: https://www.dotnettricks.com/learn/devops/what-is-devops-and-devops-advantages DevOps and the application lifecycle DevOps impacts the application lifecycle’s planning, development, delivery, and operations…

Read More

What is a cloud platform? A server’s hardware and operating system are called the “cloud platform.” It enables the remote coexistence of hardware and software products. A cloud computing platform allows for the Internet deployment of many services. Instead of keeping your contents on a specialised hard drive or a local storage device, cloud-based storage enables you to store them in a remote database. An electronic device with access to the data and the software programs will be required to run it as long as it has internet connectivity. Cloud computing platforms are becoming increasingly popular among individuals and organisations…

Read More

What is Big Data? Before understanding big data, it is essential to know what “data.” Information converted into binary digital form for usage with modern computers and communication channels is called data. Some may use the topic of data in either the singular or the plural form. “raw data” refers to information in its most basic digital form. Big data is characterised as more diverse, arriving more quickly, and coming in more significant amounts. (Variety, Volume, Velocity) Big data is used for more extensive, complex data collection, especially from new sources. The size of these data sets prevents them from…

Read More

What is Cloud Deployment Model? A cloud deployment model defines your cloud architecture and computing resource scalability, and you can alter your services and how much of the build you own. Cloud deployment types define relationships between your users and the cloud infrastructure. You can choose from various deployment models depending on how much data you want to keep and who will have access to the Infrastructure. It functions as your virtual computing environment. Types of Cloud Deployment Models The following are the four primary types of cloud deployment models. Figure 01: https://images.prismic.io/superpupertest/b1544f40-5f01-41f1-87bc-810bec240f28_Frame+1975.jpg?auto=compress,format Private Cloud ModelThe private cloud deployment paradigm…

Read More

What is Edge computing? Edge computing is a networking philosophy that aims to get computation as close as feasible to the data source to minimize latency and bandwidth consumption. In simple terms, edge computing is shifting fewer processes from the cloud to local locations, such as a user’s PC, an IoT device, or an edge server. As a result of moving computing to the edge of the network, it will be reduced the long-distance communication between a client and server. If further explained, instead of running on a centralized server or in the cloud, edge computing is a distributed computing…

Read More

What is Green Cloud Computing? The term “green cloud computing,” which has gained popularity in the IT sector, refers to the potential advantages cloud-based services may have for the Environment. The term “green cloud” combines the terms “green,” which has the meaning of environmentally friendly, with “cloud computing,” which refers to the delivery of IT services via the internet. Therefore, green cloud computing delivers IT services via the internet in an environmentally friendly manner. There are three core objectives of green cloud computing: maximising energy efficiency throughout a device’s lifecycle, promoting recyclable materials, and reducing the usage of hazardous IT…

Read More

What is Cloud Security? Before defining cloud security, we should know what cloud computing is. To enable rapid innovation, flexible resources, and scale economies, cloud computing delivers computing services over the Internet (the “cloud”), encompassing servers, storage, databases, networking, software, analytics, and intelligence. Typically, we only have to pay for our cloud services, which lowers operational expenses and improves infrastructure management. When it comes to cloud security is a branch of cyber security that is dedicated to protecting cloud computing infrastructure. This includes preserving data privacy and security across web-based platforms, systems, and applications. Whether individuals, small- to medium-sized businesses…

Read More

What is Blue Borne? IoT security company Armis described “BlueBorne” as a collection of Bluetooth implementation flaws in multiple operating systems, including Android, Linux, iOS, and Windows. They can let attackers remotely commandeer the device. An attacker might be able to run malicious code, steal information, and perform Man-in-the-Middle attacks. Figure 01: https://fossbytes.com/blueborne-bluetooth-zero-day-bug/ Aramis has identified a set of 8 zero-day bugs, collectively known as Blueborne attacks or vulnerabilities. CVE-2017-1000251: a remote code execution (RCE) vulnerability in Linux kernel CVE-2017-1000250: an information leak flaw in Linux’s Bluetooth stack (BlueZ) CVE-2017-0785: an information disclosure flaw in Android CVE-2017-0781: an RCE vulnerability…

Read More

What is the Browser-in-Browser? A Browser-in-Browser (BiTB) attack uses a faked domain to simulate a login window within a parent browser window to obtain login information. This browser-in the browser phishing tactic uses the Single Sign-On authentication mechanism to deceive users into disclosing sensitive information, primarily their login credentials. Users are presented with a fake pop-up that mimics the appearance and feel of an actual SSO authentication window. Since the SSO authentication mechanism has been used for so long, most users are no longer suspicious of it. A login prompt window can be imitated using a few lines of HTML…

Read More

Installing macOS from a bootable installer can be helpful if you want to install macOS on several computers without downloading the installer each time or if a compatible macOS cannot be installed through the Finder or macOS Recovery. You don’t require a bootable installer to update or completely reinstall macOS. Things you need to create a bootable drive USB flash drive or another secondary media formatted in Mac OS Extended with at least 14GB of available capacity. OS X El Capitan or later installer. Your Mac must be running the most recent version of OS X El Capitan, macOS Sierra,…

Read More