Skip to content

solidfish

Blogs

October 2024October 2024 John

Tensorflow Overview

Posted in BlogsTagged machine learning, python
September 2024December 2024 John

Machine Learning – Adversarial Sample Detection

Posted in BlogsTagged cybersecurity, machine learning
September 2024December 2024 John

Machine Learning – Inference Attacks

Posted in BlogsTagged cybersecurity, machine learning
September 2024December 2024 John

Machine Learning – Adversarial Attacks

Posted in BlogsTagged cybersecurity, machine learning
September 2024December 2024 John

Machine Learning – Black Box Attacks and Transferability

Posted in BlogsTagged cybersecurity, machine learning
August 2024August 2024 John

Model Evaluation – Regression

Posted in BlogsTagged machine learning, python
August 2024August 2024 John

Model Evaluation – Classification

Posted in BlogsTagged machine learning, python
August 2024August 2024 John

Machine Learning – Regression Algorithms

Posted in BlogsTagged machine learning, python
August 2024August 2024 John

Machine Learning Algorithms Scikit-Learn

Posted in BlogsTagged machine learning, python
August 2024August 2024 John

Python Panda Data Visualization

Posted in BlogsTagged python
August 2024August 2024 John

Python Pandas

Posted in BlogsTagged python
August 2024August 2024 John

Python Introduction including Numpy

Posted in BlogsTagged python
May 2024June 2024 John

CoPilot and OpenAI API

Posted in BlogsTagged ai
May 2024June 2024 John

Entra ID

Posted in BlogsTagged azure, identity, microsoft
March 2024May 2024 John

Cryptography

Posted in BlogsTagged cybersecurity
February 2024May 2024 John

Network Security

Posted in BlogsTagged cybersecurity, networking
February 2024May 2024 John

Web Security

Posted in BlogsTagged cybersecurity
February 2024May 2024 John

Software Security

Posted in Blogs
February 2024May 2024 John

Security – Operating Systems

Posted in BlogsTagged cybersecurity
January 2024May 2024 John

Security – Passwords and Authentication

Posted in BlogsTagged cybersecurity
January 2024May 2024 John

Security – Malware

Posted in BlogsTagged cybersecurity
January 2024May 2024 John

Security – Side Channel Attacks

Posted in BlogsTagged cybersecurity
January 2024May 2024 John

Security – User Access Controls

Posted in BlogsTagged cybersecurity
October 2023October 2024 John

OAuth Principles

Posted in Blogs
September 2023January 2024 John

Matrices

Posted in BlogsTagged math
September 2023January 2024 John

Cardinality of Sets

Posted in BlogsTagged math
September 2023January 2024 John

Sequences and Summations

Posted in BlogsTagged math
September 2023January 2024 John

Functions

Posted in BlogsTagged math
September 2023January 2024 John

Set Operations

Posted in BlogsTagged math
September 2023January 2024 John

Basic Structures: Sets, Functions, Sequences, Sums and Matrices

Posted in BlogsTagged math
September 2023January 2024 John

Recursive Definitions

Posted in BlogsTagged logic, math
September 2023January 2024 John

Induction and Recursion

Posted in BlogsTagged logic, math
September 2023January 2024 John

Logic and Proofs

Posted in BlogsTagged logic, math
August 2023January 2024 John

Predicate Logic

Posted in BlogsTagged logic, math, programming
August 2023January 2024 John

Propositional Logic

Posted in BlogsTagged logic, math, programming
June 2023June 2023 John

Cloud Microservice Security

Posted in BlogsTagged cloud, cybersecurity, microservices, security, serverless
May 2023August 2023 John

DevOps Security

Posted in BlogsTagged security
April 2023May 2023 John

Data Privacy

Posted in BlogsTagged cybersecurity
March 2023May 2023 John

Cyber Ethics and Law

Posted in BlogsTagged cybersecurity
March 2023May 2023 John

Cyber Risk, Security, Economics and Insurance

Posted in BlogsTagged cybersecurity
February 2023January 2024 John

Contributors to Science and Technology from marginalized groups

Posted in Blogs
January 2023January 2023 John

AWS SageMaker Overview

Posted in BlogsTagged aws, machine learning
January 2023January 2023 John

Machine Learning Overview

Posted in BlogsTagged machine learning, python
December 2022December 2022 John

UNIX Program Execution, CPU, Memory and Virtualization

Posted in BlogsTagged architecture, linux, system engineering, unix
December 2022December 2022 John

C / C++ Review

Posted in BlogsTagged c, coding, programming
December 2022December 2022 John

Unix System

Posted in BlogsTagged system engineering, unix
November 2022November 2024 John

Microsoft Intune

Posted in BlogsTagged microsoft
September 2022August 2023 John

Review of Bash and Zsh

Posted in BlogsTagged unix
July 2022August 2023 John

Cybersecurity Strategies 2022

Posted in BlogsTagged cybersecurity
October 2021January 2023 John

XDR EDR SOAR and SIEM

Posted in BlogsTagged compliance, cybersecurity, security
December 2020January 2023 John

Web APIs and Streaming Data

Posted in BlogsTagged networking, web-api
November 2020September 2021 John

AWS Developer Associate Certification

Posted in BlogsTagged aws
April 2020November 2020 John

Angular Material

Posted in BlogsTagged angular, web
April 2020August 2020 John

IoT on AWS

Posted in Blogs, ProjectsTagged aws, cloud, iot
March 2020May 2021 John

Managing vs Leading

Posted in BlogsTagged project management
March 2020April 2022 John

Web Application Security

Posted in BlogsTagged cybersecurity, web
January 2020August 2020 John

AWS Tagging Strategy

Posted in BlogsTagged aws, best practices, cloud, tagging
January 2020June 2020 John

AWS Service Quotas

Posted in BlogsTagged aws, cloud
December 2019August 2023 John

AWS Solutions Architect Certification

Posted in BlogsTagged architecture, aws, cloud
December 2019December 2019 John

Review of .Net Core 3

Posted in BlogsTagged .net, .net core
November 2019January 2020 John

Load Balanced and Auto Scaling containerized app with AWS ECS

Posted in Blogs, ProjectsTagged aws, cloud, containers, docker, ecs
November 2019January 2020 John

Revisiting Angular

Posted in Blogs, ProjectsTagged angular, web
October 2019April 2022 John

Federal Identity and Credentials

Posted in BlogsTagged cybersecurity, security
October 2019April 2022 John

Information Systems Government Compliance

Posted in BlogsTagged aws, azure, cloud, compliance, cybersecurity, security
August 2019December 2019 John

Azure implementing caching

Posted in BlogsTagged azure, cloud
August 2019December 2019 John

Azure developing scalable apps

Posted in BlogsTagged azure, cloud, scaling
August 2019December 2019 John

Azure Monitor and Logging

Posted in BlogsTagged azure, cloud
August 2019December 2019 John

Azure Secure Data Solutions

Posted in BlogsTagged azure, cloud, data management, security
August 2019December 2019 John

Azure implementing Access Control

Posted in BlogsTagged azure, cloud, security
August 2019December 2019 John

Azure Managing Identities

Posted in BlogsTagged azure, cloud, identity
August 2019December 2019 John

Azure Implementing Authentication

Posted in BlogsTagged authentication, azure, cloud, security
August 2019December 2019 John

Azure develop solutions Blob Storage

Posted in BlogsTagged azure, cloud, data management, storage
August 2019December 2019 John

Azure develop solutions Relational Database

Posted in BlogsTagged azure, cloud, database
August 2019December 2019 John

Azure develop solution for Cosmos DB

Posted in BlogsTagged azure, cloud, data management
August 2019December 2019 John

Azure develop solution for Table Storage

Posted in BlogsTagged azure, cloud, data management, storage
August 2019December 2019 John

Azure App Service API Apps

Posted in BlogsTagged app service, azure, cloud
August 2019December 2019 John

Azure App Service Functions

Posted in BlogsTagged app service, azure, cloud, serverless
August 2019December 2019 John

Azure App Service Mobile Apps

Posted in BlogsTagged app service, azure, cloud, mobile
August 2019December 2019 John

Azure App Service In Depth

Posted in BlogsTagged app service, azure, cloud, paas
April 2019May 2019 John

Revisiting Swift

Posted in BlogsTagged swift
April 2019January 2020 John

AWS SAM (Serverless Application Model)

Posted in Blogs, ProjectsTagged aws, cloud, serverless
March 2019April 2019 John

Facial Recognition using AWS Rokognition

Posted in Blogs, ProjectsTagged aws, cloud
February 2019April 2019 John

High Performance Computing Overview

Posted in BlogsTagged computing, hpc
February 2019April 2019 John

ARM vs Intel

Posted in BlogsTagged hardware, processors
January 2019August 2019 John

Azure Functions

Posted in Blogs, ProjectsTagged azure, cloud, serverless
January 2019August 2019 John

Azure hosted .NET web application

Posted in Blogs, ProjectsTagged .net, .net core, azure, cloud, web, web-api
January 2019December 2019 John

Azure Securing Identity

Posted in BlogsTagged azure, cloud, security
January 2019December 2019 John

Azure Governance and Compliance

Posted in BlogsTagged azure, cloud, identity, security
January 2019December 2019 John

Azure Active Directory

Posted in BlogsTagged azure, cloud
January 2019December 2019 John

Azure Data Services

Posted in BlogsTagged azure, cloud, data management
January 2019December 2019 John

Azure Data Protection

Posted in BlogsTagged azure, cloud, security
January 2019December 2019 John

Azure Monitoring

Posted in BlogsTagged azure, cloud
January 2019December 2019 John

Azure Network Traffic Management

Posted in BlogsTagged azure, cloud, networking
January 2019December 2019 John

Azure Intersite Networking

Posted in BlogsTagged azure, cloud, networking
January 2019December 2019 John

Azure Virtual Networking

Posted in BlogsTagged azure, cloud, networking
January 2019December 2019 John

Azure Storage In Depth

Posted in BlogsTagged azure, cloud, database, storage
January 2019December 2019 John

Azure Storage

Posted in BlogsTagged azure, cloud, database, storage
January 2019December 2019 John

Azure Security

Posted in BlogsTagged azure, cloud, security
January 2019December 2019 John

Azure Resource Manager and ARM Templates

Posted in BlogsTagged azure, cloud
December 2018September 2019 John

Azure Overview and App Service

Posted in BlogsTagged .net, .net core, azure, cloud, web

Posts navigation

Older posts

Recent Posts

  • Tensorflow Overview
  • Machine Learning – Adversarial Sample Detection
  • Machine Learning – Inference Attacks
  • Machine Learning – Adversarial Attacks
  • Machine Learning – Black Box Attacks and Transferability
  • Model Evaluation – Regression
  • Model Evaluation – Classification
  • Machine Learning – Regression Algorithms
  • Machine Learning Algorithms Scikit-Learn
  • Python Panda Data Visualization
  • Python Pandas
  • Python Introduction including Numpy
  • CoPilot and OpenAI API
  • Entra ID
  • Cryptography
  • Network Security
  • Web Security

Archived Posts

  • Blogs
  • Projects

Tags

.net .net core angular app service architecture aws azure best practices book cloud coding cybersecurity database data management design patterns devops docker dynamodb identity javascript lambda logic machine learning math microservices networking nosql ocsmp perl programming project management python scripting security serverless sql storage sysml system engineering system modeling testing unit testing visual studio web web-api
© solidfish | dei gratia