What is a DDoS attack?

Viewer Rating A distributed denial of service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Historically, DoS (Denial of Service) attacks were a primary method for disrupting computer systems on a network. … Read more

MySQL Database Connection from Host to Guest Virtual Machine

MySQL Database

Viewer Rating MySQL is a relational database management system which is popularly used in web applications and other light-weight software systems. In this article, we shall walk through the process of connecting to a MySQL database server running on a guest operating system inside a virtual machine. Install MySQL Workbench on the host machine (Ubuntu … Read more

LEMP Stack Setup Guide with Firewall and FTP Configuration

Viewer Rating The Complete LEMP Stack Setup Guide For Beginners (Download PDF) LEMP Stack Setup L – Linux (Ubuntu 18.0.4 LTS) E – NGINX (NGINX 1.14.0) M – MySQL (MySQL 14.14 Distribution 5.7.29) P – PHP (PHP7.2) Pre-requisites 1 VPS Server: 4 GB RAM, 2 vCPU (AWS), 100 GB Hard Disk OR 1 Virtual Box … Read more

Internet of Things (IoT)


Viewer Rating The Internet of Things (IoT) is a system of inter-connected computing devices, mechanical and digital machines, objects and tools, including animals or people carrying connected devices that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. It is a concept that … Read more

Artificial Neural Network – Activation Function

Viewer Rating Today’s topic is Activation functions of ANN. Let me list out the most common activation functions. Sigmoid function . ReLU ( Rectified linear unit). Tanh Leaky ReLU. Let’s start the discussion with a simple example: If we try to predict house price then which function can we use? If we use sigmoid function … Read more

Machine Learning is Fun – Part 17 – Recommendation System Part 3

Viewer Rating Let’s start today’s discussion on product recommendation system. Key points as apart of Exploratory Data Analysis: Collect data from source in csv or excel format or in a database. Make sure the customer and product id are well maintained in the table (perform cleansing on null rows). Make the list of most frequent … Read more

Machine Learning is Fun – Part 16 – Recommendation System Part 2

Viewer Rating In my last post, I explained the concept and design of recommendation system for movie based products. Today, I want to explain the model for hotel based recommendation system. You must collect demographic data of customers who have booked the hotels and you can get it easily from any online hotel-booking website like … Read more