Posts

Amazon SQS a distributed message queuing service

Image
Amazon Simple Queue Service (SQS) is provided by Amazon Web Services (AWS) as a managed message line service. Provides HTTP API in which objects can be moved and read online through applications. AWS fully controls the queue itself, making SQS a simple messaging solution between various components of software applications running in the cloud. Why use SQS? Amazon's Light Line Service is a fully integrated online service that allows you to compose and measure microservices, distributed systems, and applications without interruption. SQS eliminates the complexity and complexity associated with the management and operation of message-focused middleware and empowers developers to focus on making a difference in the workplace. Using SQS, you can send, store, and receive messages between software components at any volume, without losing messages or requiring other services. Get started with SQS in minutes using the AWS console, Command Line Interface or your favourite SDK, and three sim...

How Siemens Healthineers using Azure AKS

Image
So what is Azure Kubernetes Service? Azure Kubernetes Service (AKS) is a managed container management service, based on the Kubernetes open-source program, available on the Microsoft Azure public cloud. The organization can use AKS to deploy, measure and manage Docker containers and container-based applications in a container container container. So what is Kubernetes? Kubernetes is a fast and flexible platform that manages container-based applications as well as network and storage. Focus on the application burden, not the underlying infrastructure components. Kubernetes provides a way to approve submissions, supported by a powerful set of management performance APIs. It is a portable, portable, open platform for managing workloads with resources and services, which facilitates advertising and automation configuration. It has a large, fast-growing ecosystem. Kubernetes services, support and tools are widely available. How AKS can benefit users? Migration of existing applications: The...

Neural Network Case Study: Google Health/DeepMind

Image
Today, neural networks (NN) transform business and everyday life, bringing us to the next level in artificial intelligence (AI). By mimicking the way brain cells work, NN-enabled devices (including smartphones and computers we use every day) are now trained to read, detect patterns, and make humanoid predictions and problem-solving in all areas of business. So what is Neural Network? Computer programs inspired by neural networks to perform various functions with a large amount of information involved are called neural networks or artificial ANN networks. Various algorithms are used to understand the relationships in a given data set to obtain the best results for dynamic inputs. The network is trained to produce the desired results and various models are used to predict future results and data. The nodes are connected to function like the human brain. Different connections and hidden patterns in raw data are used to compile and separate data. Neural networks are a series of algorithms ...

Experts Session on Industry use case of OpenShift

Image
Hello every one, here’s a small article about a session I attended of Redhat on the Industry use case of Kubernetes and OpenShift. It was a great opportunity for me to attend a webinar, which was delivered by  Mr Amel Mathai  ( Technical Delivery Manager, Redhat Training, world’s First Ansible certified professional ),  Mr Daleep Singh Bais  ( Senior Technical Instructor, RedHat Technologies ) and  Abid Mattoo sir (Partner Sales Manager ). Here are some key points that I learnt in this session: Kubernetes Provide lot’s of benefits like scalability, stability, workload, portability, etc. And the challenges of Kubernetes are deployment, operations, hardening. Using Containerization we can launch a new OS in just 1 sec and using the resource like RAM/CPU of base OS. And That OS called a container. And the problem associate with that container is no one monitor their actions. Docker Represents As A Service Platform: Build → Ship → Run Openshift is an open-source con...

Configuring HAProxy using Ansible playbook

Image
Configuration Management  is the most important task, mostly task belonging to configuring different types of web servers with a different use-case and mostly in the industry, we have normally millions of webservers running behind the scene and manually configuring every webserver is practically not possible so the only key is automation. In this article, we would be configuring 1 system as Haproxy and 2 systems as a webserver using Ansible automation. So what is HaProxy? HAProxy is software that provides 2 services in a single packet, which stands for High Availability Proxy, It acts as a load balancer that helps in balancing the load between web servers and it also acts as a Reverse Proxy which improves the security of the webservers. So let's start with updating the Inventory file I  h ave created my inventory on the “ /root/ip.txt”  location of the Controller Node, and it will mainly consist of few details about  Target Node. vim /root/ip.txt Here I have created ...

What exactly can you do with Python?

Image
Python’s success revolves around several advantages it provides for beginners and experts alike Python is both popular and widely used, as the high rankings in surveys like the Tiobe Index and the large number of GitHub projects using Python attest. Python runs on every major operating system and platform, and most minor ones too. Many major libraries and API-powered services have Python bindings or wrappers, letting Python interface freely with those services or directly use those libraries. So let's start with how Data Handling is done in Python? Let's understand different methods python use for data handling Python numbers:  Python supp o rts integers, floating-point numbers and complex numbers. They are defined as int, float and complex classes in Python. Integers and floating points are separated by the presence or absence of a decimal point. For instance, 5 is an integer whereas 5.0 is a floating-point number whereas Complex numbers are written in the form, x + yj, where ...

Let’s Experiment With Something Interesting Using Route Table

Image
Hello readers, welcome to another exciting blog that demonstrates the use of Routing Table. The Routing Table is the route to perform any task on the network. In this article I would be creating a network by which we can able to connect with google but not with Facebook in spite of having internet  connectivity , So to achieve this network topology we will be using route tables. So let’s start with the experiment First, we will check whether we have internet connectivity and can be able to connect with Google and Facebook using the ping command. ping -c 2 google.com We can see that now we can ping to google and Facebook as well not let's check the routeing table but using the command route -n We can ping due to this route table where it is written destination Ip 0.0.0.0 and the genmask is 0.0.0.0 that means generate the packet no matter what is the IP my system will generate packet or we can say my system is allowed to connect with any network it wants and the gateway it will use t...