Wasabi
- May 8 – Dell
Aws
- May -8 – Telefonica
Microsoft
Krutrim Ai
- Ola
The websites provided are excellent resources for checking the safety of a link before clicking it. Here’s a breakdown of what each one offers:
1. Online Tech Tips: This website provides a user-friendly guide on identifying suspicious links. They recommend using Norton Safe Web, a free tool that scans URLs for malware, phishing attempts, and other security risks.
2. BacklinkManager.io: This website goes beyond simply checking a link. It allows you to analyze an entire website’s spam score. This can be helpful for identifying low-quality websites that might engage in spammy practices.
3. Scamvoid.net: This website offers a WHOIS lookup tool. WHOIS is a database that stores information about a domain name’s registration, including the owner’s contact details and the creation date. While not a definitive indicator of safety, a suspicious WHOIS record with hidden ownership details can raise red flags.
4. Norton Blog: Norton, a well-known security software company, offers a comprehensive blog post on website safety. This resource provides general guidelines to remember when evaluating a website’s legitimacy. These might include checking for typos in the URL, unrealistic promises, and pressure tactics.
By combining the insights from these resources, you can develop a strong strategy for checking link safety:
Remember, exercising caution when clicking on links is essential for protecting yourself from online threats. These resources can empower you to make informed decisions about your web browsing safety.
https://youtube.com/shorts/rjVTe_5HXow?si=Pkc7Z5QidlaUmS2Q
https://dev.to/m4rri4nne/automating-your-api-tests-using-python-and-pytest-23cc
Lexica.art – images to a animated
https://www.marktechpost.com/2024/03/31/top-data-science-books-to-read-in-2024/
https://www.thestreet.com/investing/stocks/1-billion-fund-manager-favors-several-big-tech-stocks
https://techcrunch.com/2024/03/26/ai-and-data-infrastructure-drives-demand-for-open-source-startups/
https://www.theguardian.com/technology/2024/mar/27/anthropic-amazon-ai-startup
https://www.theregister.com/2024/03/27/nvidia_blackwell_efficiency/
https://www.tomsguide.com/ai/google-gemini/7-google-gemini-prompts-to-try-this-weekend
https://www.youtube.com/watch?v=-dJPoLm_gtE MLOps Course – Build Machine Learning Production Grade Projects – YouTube
https://www.techlearning.com/how-to/8-ways-to-create-ai-proof-writing-prompts
https://hackaday.com/2024/03/22/generative-ai-now-encroaching-on-music/
Ai powered e-bikes https://insideevs.com/news/698006/eclair-ai-powered-ebike/
Amazon Reinvent- code whisperer
https://youtube.com/shorts/XgfHQBfRB5o?si=DsM5Ow9yghYoQkpR co rover
Claude
Moon valley https://youtube.com/shorts/NupAwJqra58?si=KIICbtvOtIlQ1tP4
Bing chat / copilot vs chat gpt
Chat gpt 3.5, j4 and 5
https://www.kdnuggets.com/5-free-courses-to-master-data-science
https://hackaday.com/2023/11/12/data-science-the-stanford-way/
https://thenewstack.io/new-ai-dev-platform-allows-you-to-customize-open-source-llms/
https://hbr.org/2023/11/the-skills-your-employees-need-to-work-effectively-with-ai
https://venturebeat.com/ai/forget-chatgpt-why-llama-and-open-source-ai-win-2023/
humata AI – upload school or any any syllabus and ask questions- helps for studying
kaiber.ai – converts video to animation from young to old
https://analyticsindiamag.com/5-new-ai-courses-launched-by-andrew-ng/
https://inc42.com/startups/how-portkey-ai-is-steering-indian-enterprises-through-the-genai-maze/
https://neurosciencenews.com/machine-learning-peace-language-25137/
https://the-decoder.com/anthropics-prompt-optimizer-turns-short-prompts-into-detailed-templates/
https://interestingengineering.com/innovation/neural-network-ai-outperforms-chatgpt
Splunk user roles decide what the user can see, do, interact with Splunk with the access. Three General roles are mentioned below:
Each Organization has a config on having the types of user roles based on the hierarchy, billing, usage and may not be same across!
Classic Dashboard, Dashboard Studio
and the 2nd dashboard is
created from Search
Absolute/Grid is the 2 view types
Grid layout has the view mode first and then
can see edit the search, visualization, code in json for the visualization.
Data Sources, inputs, general layout -> order in which dashboard source code is ordered
json code/file has .viz and .splunk prefixes
dashboard from web page, create dashboard
set private/all aps
Classic or Dashboard studio can be selected.
Edit mode is default from absolute layout.
icons, shapes text options along with background color can be changed.
Grid to absolute or vice versa can be made, but it’s not an innovative idea to change the dashboard studio dashboard.
Grid layout has charts and rows.
In Search there are certain commands like each other but have unique functionality.
SEARCH JOB INSPECTOR – trouble shooting the searches.
EXECUTION COSTS – Based on the more time the search time, more the components.
Comments in general used to make a note of what eh search code is intended to be executed as ”’is a sample comment”’
Indexer vs Search head, Splunk uses bloom to find the search terms
Search head is for the centralized streaming and transforming commands
Transforming commands – time charts, stats, chart, top, Rare
Centralized– is made in search head – stateful Streaming commands
Distributable streaming command- eval- executes on indexer
Notes: Rename- distributive-streaming command | Rename to added before stats
Search tokens- event tokens from Segmentation – affect search performances, either improve or not.
Major breakers – Space-new line-carriage return, Comma, exclamation mark
Minor breakers – Symbols like:
Searches– tokens-> Search in address- click search log
Splunk uses lispy expressions to create bloom filters.
AND OR NOT
Hot bucket- stores data as it arrives
Warm bucket- Read only then cold then
Frozen bucket – deletion and archiving
Bucket– journal has the raw data, and the tsi (timeStamp index) file – index keys to journal file has a unique lexicon
Validating the same functionality across devices would be time consuming, using the tool xcode/simulator makes tasks easy to do.
For example: sizes of the screens, font sizes, buttons, can be validated.
Validations can be made on physical device, which is the ultimate step, but in cases where we do not have the devices, a simulator is helpful.
Intro to knowledge objects
Fields – when a search is made the fields are displayed. This helps in narrowing the data which contains only that specific field/keyword. the events,
All the fields can be found in the field side bar, on hover and clicking on the fields specifically, it can be added to the search.
Field extractions
field aliases – normalize data to provide a normal name if the current name is like another field or common!
calculated fields – perform calculations based on existing fields.
lookups – sources like csv can be configured to additional fields and events in search
Event types – same combination over and over- save the search as event type to categorize the data
Tags – key value pairs can be made into tags, can be used in search as event type
note: event types and tags can be also noted in the field side bar
Workflow Actions – interact with external resources to narrow the searches, http get and post to external sources and back to Splunk for secondary searches.
Reports – Repeated search can be saved as reports
Alerts – to receive a notification, search can be saved as alerts
both are used for scheduling
Macros – similar or more complicated syntax – can store entire search strings including commands,
Data models – data sets can be events, can be used in pivot
Name ur objects using Six segmented keys
Primary type of knowledge objects
permissions lay a key role in creating and sharing KO,
When a user creates a ko, it automatically private and only available to that user,
when a power user or admin creates a Ko, it is shared across all users, and has control on other roles by hide/give permissions
only admin has access to allow ko to access across all apps, can edit permissions, can read or edit private objects created by anyone.
Admin can only reassign a ko to user- when the user leaves the org but has knowledge.