Hierarchical Temporal Memory (HTM) is a learning theory proposed by Jeff Hawkins and developed by Numenta. It aims to reflect the functioning of the human neocortex, reminiscent of the enthusiasm of early AI, and this time may succeed due to the advances in neuroscience research. Every day, the human neocortex learns the structure of the world from temporal data flowing in through our sensory organs and makes numerous predictions every second, directly influencing our behaviour — whether its to catch a ball thrown at us or to plan what time to leave in the morning to reach work on time…

In this tutorial we’re going to create, develop and deploy a Serverless Vue.js Web App using Github Codespaces and Azure Portal.

I wasn’t keen on getting back to Web Development because of the sheer set up for full-stack projects, separate deployments for back-end & front-end, yada yada. But combining Static Web Apps with Codespaces provides an end-to-end solution to develop and deploy web apps completely on the cloud using web browsers without any local installations. It sounds futuristic :) but it’s here! So, let’s walk through it -

To know more about Static Web Apps - Azure Static Web Apps…

Azure Data Science Virtual Machine

  • Pre-installed with a ton of useful Analytics/Deep learning libraries
  • Provisioned an Azure Ubuntu DSVM — N series (with a GPU), specifically the Standard NC6_Promo (6 vcpus, 56 GiB memory)


  • Currently, the pip install thundersvm is compatible with Cuda 9.
  • Our Azure DSVM runs Cuda 10, hence we need to build and install our own Python wheel (.whl)
$ git clone https://github.com/Xtra-Computing/thundersvm.git
(Navigate to thundersvm --> $ cd thundersvm)
$ mkdir build && cd build && cmake .. && make -j
(Navigate to thundersvm again)
$ cd python
Tag the wheel build using a BUILD_TAG…

Security Icons in mixed reality
Security Icons in mixed reality

Penetration testing is a black hat (red team) activity to assess the security of a system by actively trying to exploit vulnerabilities at a program or application level. An external team uses tools and ingenuity to explore the systems’ attack surface and test it for weaknesses. This is conducted with varying levels of access from outsider to knowledgeable insider. Tools are used to probe the attack surface, gather information and test hypotheses and finally exploit a vulnerability if it exists. Parts of the process can be automated once patterns are established.

A pen tester

  1. Knows the working of the target…

When developing applications and computer software, developers focus on writing and testing accurate software that meets the requirements of the user. The security aspect of software design requires the same attention and testing but is often overlooked in favour of faster time to deployment. This poses a huge risk to the system in the long run as attackers may exploit vulnerabilities to try to steal personal or corporate information, modify information by installing malware or deny access to the system affecting the C,I and A respectively. Currently, most organisations employ black-box techniques such as firewalls, intrusion detection systems and anti-virus…

This post focuses on software security and covers several vulnerabilities and flaws to keep in mind while designing secure software. A system with design flaws and implementation bugs provides an entry point to attackers looking to damage the company or steal from the user. This is where Software Security comes in — it focuses on secure design and implementation of software from the coding level. Bugs are an inevitable part of the software and for most users, just a minor inconvenience. However, malicious actors actively look for bugs and exploit them to cause harm. …

Smartphones are an essential part of our lives today, taking care of everyday activities from getting to work on time to communicating with people. These devices transmit hundreds of messages, store memories and use location services throughout the day, admittedly making lives a lot easier but inadequate privacy laws and open security issues remain a cause for concern. Employee productiveness and responsiveness has improved by flexible practices such as bringing mobile devices in workplaces, usage of enterprise applications over these devices and the BYOD (Bring-Your-Own-Device) trend but has created major security challenges for enterprises.

This is part of a series…

The increasing popularity of cloud services and applications, with servers handling millions of queries a minute and hosting vast stores of customer data, has led to a number of security concerns in this vast and rapidly changing landscape. Cloud services work in multi-tenant environments, sharing the underlying resources with multiple other applications, creating a new attack surface. Moreover, the high concentration of data and operations in one place makes a data breach or account hijacking especially costly to a company.

This is part of a series covering topics in Information Security:

  1. Introduction to Information Security
  2. Security in the Cloud (this…

Millions of bytes of customer data are stored somewhere on the Internet, maybe in the data centres of tech giants like Google, Microsoft and Amazon or (hopefully not) floating around the web from a data breach of a system they registered with. Attacking systems to obtain and sell this information — termed as Cybercrime — is a lucrative industry and is estimated to cost companies over $6 trillion by 2021. …


Find them at

(a monthly issue):

Or a quick review (Two Minute Papers on Youtube)

With a little help from

And learn from

Srishti Mishra

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store