Numpy Vectorization

As you may already know, I have been taking several AI / ML related courses. I am a firm believer in always keep on learning. Some time ago I read a report about people in the USA reading books. The statistic that called my attention was:  42% of college graduates never read another book after college. That seems to me quite disturbing. Another statistic is:  57% of new books are not read to completion. To this indicates that a) readers are not committed to learning and / or books are getting worse. Continue reading “Numpy Vectorization”

Partial Retrieve from Encrypted Store

In a previous post we covered the retrieval of data from a store. It was described that the data at rest and in transit were not encrypted. The reason was that the store was deployed in facilities behind the firewall. Access from the outside was not allowed.

As time changed, data was only encrypted in transit using secure sockets or HTTPS. Given that facilities had to allow remote access, it made sense to encrypt the data at rest. When a client application would request data, the storage server would decrypt the file and send it to the requesting client via a secure protocol. Continue reading “Partial Retrieve from Encrypted Store”

Smart Delay with Fibonacci

In the past few weeks I have been cleaning and optimizing some operations in a storage server. After running millions of operations I noticed an interesting condition and decided to use a different approach. Did a quick Internet search using Google Chrome for “smart delays” and nothing related seemed to come up. I thought using it for a title for this post would be fine. Continue reading “Smart Delay with Fibonacci”

ACM and Coursera

It is getting late in the day for me. I am a believer in deep work so several months ago I decided to get up early morning and study for a couple hours. So far, it has worked very well for me. I have set a wakeup alarm for 05:00 AM 7-days a week. Typically I am awake between 04:30 and 05:00 so I just turn off the alarm and head down to my home office. Around 05:00 PM I feel the work day coming to an end and am ready to punt. I use EyeDefender to break every two hours. During my 5 to 10 minute breaks I walk and get some fresh water. What can I say; it works for me. On weekends I tend to just do two are three blocks. On work days I tend to do five. Continue reading “ACM and Coursera”

Encrypted Store

This post has to do with encrypting data in a storage server. When the storage server in question was architected and implemented the data at rest and in transit were raw (unencrypted). The main reason was that clients and servers where deployed in the same facility.

Years when by and the requirements called for encrypting data in transit while the data at rest was left raw. Encrypting data in transit could be performed by using HTTPS, secure sockets or encrypting the data when retrieved from the servers and decrypting by clients when received. Storing data would be the opposite. The initial decision, given that the client and server where under control, was to encrypt transmissions using the Advanced Encryption Standard (AES) which was designed by Vincent Rijmen and Joan Daemen back in 1998. Continue reading “Encrypted Store”