This technical blog is my own collection of notes , articles , implementations and interpretation of referred topics in coding, programming, data analytics , data science , data warehousing , Cloud Applications and Artificial Intelligence . Feel free to explore my blog and articles for reference and downloads . Do subscribe , like , share and comment ---- Vivek Dash
Saturday, May 1, 2021
Machine Learning Revision Notes - part 01
* Every time you want to
search any particular word or term or statements over the internet , one might be
able to do so in the internet with
full ease by the help of Google or
Microsoft who have a very developed
Machine Learning algorithms and their infrastructure
which help the users these days in
the finding of all the search items and texts
easily . This not only works for the particular search and key words
that the user is trying to find , but
the same also happens to be true for the terms
associated with the term which
help in searching related terms and related
text over the internet .
* Every time you want to access
your friends or your own
photos over Facebook of any
other social media site , if the
photo is found out or fetched properly by the social media platform then it is due to the help of machine learning
* Every time you access
your mail and see some unrelated ,
unimportant mail in your mail
box appear in front of you ,
it happens because of the use of Machine Learning which filters all the not much important mails in
the inbox and shows it to
the user which help the user in scrutinizing which of the emails
are of more importance and
which of the mails are less importance or least
important is done with the help of machine learning which is the backbone of the application running the
Machine Learning Code in the background of the application
* Some of the basic and
important task that the machine learning algorithms do these days can be
thought of as the tasks like finding
the shortest path among a given set of points which were more important for finding or doing the generic
things that the users would like to perform
through the help of the computers
within the shortest time possible
* Today ,
Machine Learning touches several segments of
Computing and Basic Science
* Some of the common
things that are used in the subject of Machine
Learning are the following things like :
01) DataBase Mining
* Here , large datasets from growth of Internet and Web have resulted in the creation of large amount of data which can be mined to pick out relevant results and information as per the desire of the user or the store-keeper of the data .Here , the role of database administrator is different from that of the Database Miner as DBA short for Database Administrator is only to handle the overall functioning , storing and permissions over the database whereas the Database Miner has to do the task of housekeeping , performing relevant transformations and processing of the data . This is how the task of the Database Mining Engineer does his or her relevant tasks. The applicable areas over where these things could be put to usage are: Web Click Data , Medical Records , Biology and Engineering Subjects . For instance in the case of accessing Medical Records , the database applications are used for the purpose of finding out historical medical records , similar cases of Medical problems and finding out predictions of some medical problems etc In Medical fields , the field is used in the solving of problems associated with Genes and Gene Engineering , Mutations etc .
* The secondary use of Machine
Engineering is that as most of the
applications can not program by hand,
the applications are Autonomous Helicopter where the computer residing within
the autonomous helicopter learns to fly by itself and selects the paths which
are well suited for its least route problem . Several other associated algorithms might be
also in use with the path finding and path tracing algorithms in the given scenario..
so with this the autonomous
helicopter is able to do so much of different actions that even
the maneuvered helicopters cannot perform . One of the other uses of such program is in the field of
Handwriting Recognition where a machine learning algorithm is capable to perform the usage of pattern
and word recognition of handwriting
of any person , along with that the other uses of ML are also in the
context of Natural Language Processing where algorithms are used to read and
infer sentiments , patterns and various other aspects of the words of the users
. Now, after all these things have been put to usage , things have evolved to
such an extent that ML and AI can evolve own text and precedence of words and
can even write stories on their own . The next thing used by Machine Learning
is the use of Computer Vision which is quite significant as the computing
algorithms can learn to recognize faces and gestures and make inferences based
on their assessment . The same is also used for vigilance and security purposes
as well .
* ML is
also used in the context of Self-Customization
programs for example in the case of
programs like Amazon , Netflix product
recommendations etc which get
tuned to the usage pattern of
the user who is using a particular product
* Finally , Machine Learning algorithms are being used for identification of Human Learning which happens in the brain which is associated with the real workings of the neural networks which are used for the purpose of enhancement of real Artificial Engines and networks
* In the
forthcoming articles , we will dig deeper into the main types of Machine
Learning Algorithms and their usages
Last
modified: 1 May 2021
Saturday, April 24, 2021
Thursday, April 15, 2021
Tech Commandments for a safer digital life - 5 principles to adhere to when using Internet
Tech Commandments for a safer digital life
* Technology has become a mammoth sized factor in our daily
lives and to top it all , Technology is always on the change which means that
one should always stay vigil of the changes happening around us as many
perpetrators and miscreants are on the lookout for finding new ways to
infiltrate into the loopholes that we set knowingly or unknowingly which leads
them directly in hold of sensitive information which can lead to a big
devastation if left unguarded and unprotected
* Some experts from leading security firms assert that one
should always remember that any piece of our identity that we post online could
eventually be used by fraudsters and hijackers / hackers to pervade into our
online accounts for which one needs to keep oneself and connected members safe
when online . These days bots ( trackers) can track any account and collect account
information at any point of time
* Therefore in order to keep oneself on the guard and stay safe
, some of the commandments that one needs to adhere to all the time are the
following :
1) One should not overshare personal info
As many of us use high ended camera phones with very high or unlimited
storage capacity , one gets into a clicking mode and becomes a self-proclaimed cameraman
/ photographer . But these days thanks to highly developed AI programs which
can take even pictures as input parameters and retrieve all relevant
information from the photo , one should stay vigil about the photos that one
clicks , location , people in that photo , context and backdrop for that photo and
several other factors before one gets into clicking mode to showcase one's photography
skills
2) One should not use Weak and Easy to crack
passwords
We all have a tendency to associate easy passwords which are
small and easy to remember for all of our accounts as we normally want to skip
ahead of all the mental work of recalling big and complex things whenever we
want to get into our accounts .. be it social media accounts , bank accounts ,
insurance accounts
(and Swiss Bank Deposit accounts too .. ) . As mentioned , these
days tracker bots can track all the gateways of access that an individual
leaves upon their online pathways , so unrecognised and unregulated access into
our trails can beonline pathways , so unrecognised and unregulated access into
our trails can be
discovered by bots and provide the information to the collecting
agency which is on the lookout of such paths which could be exploited . Many
such agencies pass on these trail paths to hackers to peek into and steal out
money / documents .. anything precious to them (remember .. "precious" of LOTR , one can turn into
Gollum for such "precious" things ) . Therefore , always make use of stronger and lengthier
passwords which is one's somewhat safety check for stopping unwanted and
malicious intrusion . Many people make use of password managers who make use of
multiple accounts , but this is also vulnerable as these are stored in the form
of either xml , json objects in the form of cookies which could be again
collected from the browser plugins that one uses on a regular basis . Thats why
, one should also try disconnecting from cookie storage from browser when one
closes the session . And thus , the best thing to do is to note down all the
important passwords over a piece of paper and keep them at a safe storage space
.
3) One should use Multi-factor authentication or
two-step verification
These days password comprehension can be done is so different
forms by hackers that , if someone wants to any way hack into some account ,
then they will eventually get into the account and that too using several tools
. Thats why most of the security experts recommend that one should make use of
multifactor authentication (two-factor , three-factor etc) in order to access a
given account which involves a user's verification before logging into account
using a system of OTP over phone and authenticator apps that send temporary
always changing codes that ensure that the user who is using the account is the
real one and not a dummy or someone else
4) One should not share data about friends and
Contacts
This comes as a completely new method of data siphoning which
occurs when someone accepts any permissions to any app or software over the
phone . This makes the app-owner a party to the shared information as requested
by the app within the permission page of the application . Therefore, one thing
that one needs to keep in mind is to keep a check over the permission page of
the
applications that one installs .Best is .. one should try to
limitise one's wants , keep few applications and software over one's phone and
do not install those software that require a lot of permissions to be accepted
before making use of the software .
5) One should always stay vigilant and skeptical
These days all the security experts accept the one rule of thumb
for all security practices -- "
Trust No One in this Greed Infested World" . Whenever you recieve any
call ,message , email soliciting any personal information .. then do not trust
any of message , email soliciting any personal information .. then do not trust
any of the mails . This could be a phishing attack from someone who wants to
profit out of undoubting people who out of trust and foolishness get entrapped
in their untrustworthy traps , thereby losing security over their devices and
mediums .Fraudsters nowadays can embed malware over legitimate looking emails
within hyperlinks which once clicked could install unsuspecting software over
your system all without anyone's coming to know of such a background activity
running on your system . Therefore, whenever any suspicion occurs , always opt
out of such apps , softwares , emails , anything (sigh ... wish I had known
these earlier )
These days I personally feel .. the days of Nokia 1100 and Nokia
1600 , movies without real-looking CGI , games like Tetris and Mario were the
best .
Fast Spreading Digital Adaptation in Emerging Nations and the associated "Theory of Everything" in the trade and commerce world - An article by Vivek Dash
Fast Spreading Digital Adaptation in Emerging Nations and the
theory of Everything
* Emerging economies have been struggling with growth through the 2010's and still the feeling of pessimism clouds over the present decade whether the steadfast growth trend could be seen to be going strong or whether the trend would be gauged down as it is being seen that People have accrued high amounts of debt during the ongoing pandemic which has become a detrimental factor to growth in not only emerging countries but also countries which are developed like USA , Russia , China , Japan , Germany , France , UK , Finland as questions over Growth tapping and keeping the same pace steady even during a pandemic period is of paramount importance to all
* As per some key metrices and data collected by popular
editorials , the onslaught and adaptation of digital revolution is much more in
emerging economies than that of developed nations and has been growing at a
much higher rate year on year .
* The European Centre for Digital Competitiveness scores G20 nations by the pace of progress in the digital ecosystem and "mindset" and thus puts four emerging nations in the top 5 category - Saudi Arabia , Indonesia , China and Argentina
* The digital divide and access to information and services is
narrowing down which used to be the key parameters upon which the developed
nations had been brought up and this is trickling down to developing and
under-developed nations too .
* But as economies start evolving and growing, chances may arise that the things which catapulted such growth coupled with the rise of globalisation and access to great quality products from around the globe through way-to-go retail apps would slowly and slowly come down again and perhaps this could be a smaller miniscule side-effect of indigenisation which is again a cyclic effect which takes into factor indigenisation and globalisation which would also go all the time (You see ... one has to always keep in mind the cyclic effect of all things to understand all concepts of science , arts , culture , trade , war and even peace ... which encompasses the all round "theory of everything" )