Configuration Managment Systems - Palvelinten Hallinta - Spring 2020

Tux the Linux penguin

Just write what you want (idempotency). Control almost everything with one system (single source of truth). In plain text (infrastructure as code, versionable).

Control 10 computers. Or 100. Or 1000. Or control 2071 computers, like Jussi did on a previous course. Or handle 7 different operating systems and OS versions with a single master, like Matias. Course is in Finnish.

Remote Learning Tools for Tero's Courses

All my courses are online for spring 2020.

I'll use Jitsi video conferencing, VirtualBox and Xubuntu Linux 18.04. In addition to Internet connection, you'll need headphones, a mic and a webcam. Some 30-40 GB of free disk space would be nice, too.

ICT Security Basics - from Trust to Blockchain - ict4hm003 3001 2020 Spring

Learn security fundamentals to understand current trends.

Blockchains, TOR network and video conference encryption all stand on these fundamentals.

Log Anomaly Detection With Artificial Intelligence

 Can artificial intelligence pick suspicious log entries? My students Tuomo Kuure and Joni Hakala are training a model for that.

They use ELK to collect logs from multiple computers to an ElasticSearch NoSQL database. These log entries are then analysed with their own model using Python Tensorflow in a Docker container with GPU support.

Flask Automatic Forms

Automatically create your database and HTML forms from your model. Short, convenient, but a bit abstract. Short notes.

View all 2020 posts.

Visit old site 1998-2019 with 580+ posts and 3900+ comments.