PinnedAshish BansalinSystem WeaknessHunt them in WindowsWhat is Windows Event Log?Jan 29, 2023Jan 29, 2023
PinnedAshish Bansal“AI” - Things You Might Not Know | Langchain & Hugging Face eh?Oct 23, 2023Oct 23, 2023
Ashish BansalinAWS TipColumnar DB DemystifiedAuthor’s Note: There is connection between “Data Lake” and “Columnar Databases”, Know it right!Aug 15, 2023Aug 15, 2023
Ashish BansalETL vs ELT — Choose your “Data Battles” wisely | 1st PartIn today’s data-driven world, information surrounds us in every move of our life. Data logs are generated from using mobile phones…Jul 14, 2023Jul 14, 2023
Ashish BansalinSystem WeaknessAWS Security Lake (Data Lake)Before we dive into our discussion, I would suggest that you have a clear understanding of Database , Data Warehouse and Data Lake.Jun 10, 2023Jun 10, 2023
Ashish BansalCan I clone you?"A digital twin, a clone so grand, Crafted with AI and voice command. A voice so real, it's hard to tell, If it's a human or machine as…Feb 6, 2023Feb 6, 2023
Ashish BansalinSystem WeaknessGuide to ITAMA key step in building a successful security program is identifying and listing down the assets of your organization.Jan 17, 2023Jan 17, 2023
Ashish BansalinSystem WeaknessSecurity Risk Assessment: Threat ModelingThreat modeling in information security is the process to identify, analyze, and prioritize the potential security threats for the…Jan 8, 2023Jan 8, 2023
Ashish BansalinSystem WeaknessDetection Engineering Automation: ChatGPTChatGPT is the latest buzzword, but its capabilities go far beyond just answering a few questions.Dec 30, 20221Dec 30, 20221
Ashish BansalSalesforce CRM Security: Are you secure?Salesforce is a cloud-based solution that enables businesses to find more business leads, better customer outreach, helps in managing new…Oct 30, 2022Oct 30, 2022