All posts by Atul Kumar

Data Engineering : All you need to know

๐Ÿ“In the IT industry , you might have heard about the word “Data Engineer”. Today we are going to study everything about data engineering. ๐Ÿ“Data Engineer is someone who collects, uses and analyze the data at scale, Every organization have large amount of data and they need some people and technology who can make a […]

Read More

All you need to know about Linux EC2 Instance

โœ… EC2 stands for Elastic Compute Cloud. Virtual Machines in AWS are called instances. โœ… AWS provides a variety of instances with different configurations of CPU, memory, and storage depending on the needs of the user. Amazon Linux 2 is a Linux operating system from Amazon Web Services (AWS).๐Ÿ–ฅ๏ธ โœ… Benefits of AWS Linux Instance: […]

Read More

Machine Learning Model in Databricks

โœ… Azure Databricks is a data analytics platform optimized for the Microsoft Azure cloud services platform. โœ… Databricks Machine Learning is an integrated end-to-end machine learning environment incorporating managed services for experiment tracking ๐Ÿ“Š, model training, feature development and management, and feature and model serving. ๐Ÿ–ฅ๏ธ โœ… With Databricks Machine Learning, you can: โ€ข Train […]

Read More

๐๐จ๐ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐’๐ญ๐š๐ง๐๐š๐ซ๐๐ฌ (๐๐’๐’): ๐€๐ฅ๐ฅ ๐˜๐จ๐ฎ ๐๐ž๐ž๐ ๐ญ๐จ ๐Š๐ง๐จ๐ฐ

๐Ÿ“Œ To enhance Kubernetes security, you must regulate and limit the number of pods that may be generated and deployed in your environment. Kubernetes has given a beta feature called Pod Security Policy (PSP) for this purpose, which will shortly be deprecated and replaced with a standard called Pod Security Standards (PSS). ๐Ÿ“Œ Because PSPs […]

Read More

Oracle Exadata Cloud [ExaCC & ExaCS) Training: Step-By-Step Activity Guides/Hands-On Lab Exercise

๐Ÿ“Œ This blog post discusses the Step-By-Step Hands-On Activity Guides you must perform to learn Oracle Exadata Cloud Service Administration (ExaCS & ExaCC). These will help you learn and implement ExaCS & ExaCC in a better way. You can use the mentioned steps for supporting customers who are working or want to work on Exadata […]

Read More

ExaCS & ExaCC for Oracle Exadata Cloud | FREE Learning Material

Do you want to build your Career in Oracle Cloud & want to learn the high demanding topic “Exadata on Cloud” then you are at the right place! This post covers all the useful information & learning material for Oracle Exadata Cloud@Customer (ExaCC) and Oracle Exadata Cloud Service (ExaCS). It will help you with the […]

Read More

Google Cloud Platform Certifications : All you need to know

๐Ÿ“When we talk about Google cloud , there is a list of certifications that are provided by google ๐Ÿ“Why GCP certification? First of all, a particular certification will help you to prove the interviewer that you fulfill the job requirements. ๐Ÿ“ same goes with the google cloud platform certifications, if you think that you know […]

Read More

Exam PL-300: Microsoft Power BI Data Analyst | A Replacement Of DA-10

Microsoft Certified: Data Analyst Associate was renamed Microsoft Certified: Power BI Data Analyst Associate on February 28, 2022. DA-100 Analyze Data with Microsoft Power BI Training was the previous name for this PL-300 Microsoft Power BI Data Analyst course. Participants will learn how to create actionable insights by leveraging diverse data sets and then developing […]

Read More

๐“๐จ๐ฉ ๐Ž๐ฉ๐ž๐ง ๐’๐จ๐ฎ๐ซ๐œ๐ž ๐Š๐ฎ๐›๐ž๐ซ๐ง๐ž๐ญ๐ž๐ฌ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐“๐จ๐จ๐ฅ๐ฌ

๐Ÿ“Œ ๐Š๐ฎ๐›๐ž๐ซ๐ง๐ž๐ญ๐ž๐ฌ is the most used platform among admins and developers. Containerization has made it easier than ever to swiftly design and deploy application environments with Kubernetes. However, security is the most common source of concern when it comes to container adoption. ๐Ÿ“Œ ๐Š๐ฎ๐›๐ž๐ซ๐ง๐ž๐ญ๐ž๐ฌ security is all about establishing and implementing security measures to protect […]

Read More

๐”๐ง๐๐ž๐ซ๐ฌ๐ญ๐š๐ง๐๐ข๐ง๐  ๐€๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐ข๐จ๐ง & ๐€๐ฎ๐ญ๐ก๐จ๐ซ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง ๐ข๐ง ๐Ž๐ฉ๐ž๐ง๐’๐ก๐ข๐Ÿ๐ญ

๐Ÿ“Œ In OpenShift or K8s, ๐€๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐ข๐จ๐ง & ๐€๐ฎ๐ญ๐ก๐จ๐ซ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง are very crucial. These are required for cluster security. One must be authenticated (logged in) before your request can be authorized (granted permission to access) ๐Ÿ“Œ A cluster administrator can enable user ๐š๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐ข๐จ๐ง to guarantee only allowed users have access to an OpenShift Container Platform cluster. Users […]

Read More