Just write what you want (idempotency). Control almost everything with one system (single source of truth). In plain text (infrastructure as code, versionable).
Control 10 computers. Or 100. Or 1000. Or control 2071 computers, like Jussi did on a previous course. Or handle 7 different operating systems and OS versions with a single master, like Matias. Course is in Finnish.
All my courses are online for spring 2020.
I'll use Jitsi video conferencing, VirtualBox and Xubuntu Linux 18.04. In addition to Internet connection, you'll need headphones, a mic and a webcam. Some 30-40 GB of free disk space would be nice, too.
Learn security fundamentals to understand current trends.
Blockchains, TOR network and video conference encryption all stand on these fundamentals.
Can artificial intelligence pick suspicious log entries? My students Tuomo Kuure and Joni Hakala are training a model for that.
They use ELK to collect logs from multiple computers to an ElasticSearch NoSQL database. These log entries are then analysed with their own model using Python Tensorflow in a Docker container with GPU support.
Automatically create your database and HTML forms from your model. Short, convenient, but a bit abstract. Short notes.
View all 2020 posts.
Visit old site 1998-2019 with 580+ posts and 3900+ comments.