PinnedAshish BansalinSystem WeaknessHunt them in WindowsWhat is Windows Event Log?5 min read·Jan 29, 2023----
PinnedAshish Bansal“AI” - Things You Might Not Know | Langchain & Hugging Face eh?6 min read·Oct 23, 2023----
Ashish BansalinAWS TipColumnar DB DemystifiedAuthor’s Note: There is connection between “Data Lake” and “Columnar Databases”, Know it right!4 min read·Aug 15, 2023----
Ashish BansalETL vs ELT — Choose your “Data Battles” wisely | 1st PartIn today’s data-driven world, information surrounds us in every move of our life. Data logs are generated from using mobile phones…5 min read·Jul 14, 2023----
Ashish BansalinSystem WeaknessAWS Security Lake (Data Lake)Before we dive into our discussion, I would suggest that you have a clear understanding of Database , Data Warehouse and Data Lake.4 min read·Jun 10, 2023----
Ashish BansalCan I clone you?"A digital twin, a clone so grand, Crafted with AI and voice command. A voice so real, it's hard to tell, If it's a human or machine as…3 min read·Feb 6, 2023----
Ashish BansalinSystem WeaknessGuide to ITAMA key step in building a successful security program is identifying and listing down the assets of your organization.5 min read·Jan 17, 2023----
Ashish BansalinSystem WeaknessSecurity Risk Assessment: Threat ModelingThreat modeling in information security is the process to identify, analyze, and prioritize the potential security threats for the…6 min read·Jan 8, 2023----
Ashish BansalinSystem WeaknessDetection Engineering Automation: ChatGPTChatGPT is the latest buzzword, but its capabilities go far beyond just answering a few questions.4 min read·Dec 30, 2022--1--1
Ashish BansalSalesforce CRM Security: Are you secure?Salesforce is a cloud-based solution that enables businesses to find more business leads, better customer outreach, helps in managing new…13 min read·Oct 30, 2022----