Maciej Zalwert

Sign in

Machine Learning Operations: how to deploy and manage (not only) machine learning models reliably and efficiently.

Introduction

Kubernetes is an undisputed leader in terms of scalability and modern application orchestration. Nevertheless, its capabilities comes with a price — it’s complexity.

In this article, I introduce a general view on Kubernetes architecture


Machine Learning Operations: how to deploy and manage (not only) machine learning models reliably and efficiently.

Introduction

In the first part of MLOps series, I introduced Kubernetes and showed on how to install it. In this article, I will introduce Kubernetes tools in more details.

This article will cover:

  • Kubectl: command-line tool for Kubernetes
  • Kubeadm…


How counterintuitive birthday probability paradox helps hackers in cryptographic brute force attacks

Introduction

In its most interesting form hacking employs sophisticated techniques from different fields like: probability, programming and hardware.

In this article, I introduce how cyber criminals optimize brute force attacks with a fact that there is more than 50%…


Machine Learning Operations Series: how to deploy (not only) machine learning models reliably and efficiently.

This article is divided into two sections:

  1. In-depth introduction to Kubernetes. This section is for students, aspiring developers or managers that want to know the basics and what’s possible in this technology.
  2. Hands-on tutorial on…


Note: The goal is to keep the content fresh and up to date. The latest update is as of 25/08/2021.

Note: All the provided knowledge is to prevent cyber criminals by sharing the knowledge of existing vulnerabilities, tools and countermeasures.

Introduction

From the user perspective, login and logout seems like easy…


Intuition, Python, Excel and Math

I’ve never been interested in working for Google, but I’ve been seeing a lot of people that post interesting questions they ask in interviews.

Also, I don’t know how Google interview looks like, but I hope there’s a computer at hand if you need to…


Note: This article is being updated regularly. The latest update is as of 19/08/2021.

Note: All the provided knowledge is to prevent cyber criminals by sharing the knowledge of existing vulnerabilities, tools and countermeasures.

This article introduces one of the most common type of the cyberattack — Denial-of-Service (DoS) attack…


Note: This article is being updated regularly. The latest update is as of 19/08/2021.

Note: All the provided knowledge is to prevent cyber criminals by sharing the knowledge of existing vulnerabilities, tools and countermeasures.

This article aims to provide knowledge on different kind of viruses that can infect our computers…


There is a lot of the usual stuff that we should do to protect our computers against viruses like: installing antivirus software or not clicking on every file from the web.

But, there are also some unusual things we can do as well.

Let’s check out!

1. Install Russian virtual keyboard in your computer

As discovered by cybersecurity…


Note: This article is being updated regularly. The latest update is as of 16/07/2021

Hacking is a very complex process. To defend against cybercriminals, you need to think as one and know how they operate. …

Maciej Zalwert

Experienced in AI/risk/quant/programming and passionate in data/hacking/tech

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store