Category: Technical

  • Home
  • Category: Technical
Shape Image
Shape Image
How to improve EHR using AI and ML

How to improve EHR using AI and ML

Data science techniques, including artificial intelligence (AI) and machine learning (ML), share a symbiotic relationship with healthcare and can help solve many critical healthcare challenges. Whereas data science involves drawing meaningful insights through the analysis of data, healthcare collects and generates vast amounts of data, both critical and general, to provide best possible services to

Read More
Cloud Migration – How to decide if you are ready?

Cloud Migration – How to decide if you are ready?

Cloud technologies and services are very popular, many business (small, medium and large) moving to cloud. There are many cloud providers in the market some of the TOP providers are AWS, GCP, AZURE, IBM, ORACLE. But moving to the cloud is a significant change in the existing infrastructure and adoption of new technologies. Before organization

Read More
Machine Vision

Machine Vision

Machine vision also known as computer vision is one of the exciting applications of artificial intelligence (AI). Machine learning algorithms that are able to detect, understand and differentiate images and videos. This is key behind many innovative industries around the world like healthcare, autonomous, self-driving vehicles to smart industrial machinery and even most likely used

Read More
Chatbot – Design and Architecture

Chatbot – Design and Architecture

What is chatbot? A chatbot, also known as a dialogue system or a conversational agent, is an intelligent program which help to imitate a conversation with a users. In the recent times chatbot technology gained lots of popularity and It also evolved, thanks to the growing popularity of AI and ML. Chatbots are proving as

Read More
Healthcare – Use of AI and ML

Healthcare – Use of AI and ML

Why healthcare facilities are better in United States. Because of shortest wait times, better access to preventive care and care for serious diseases. All the money put in the research and technology, US has the world’s best cancer survival rates, best longevity after age 80 and better heart attack survival rates than average comparable countries.

Read More
CloudSQL to CloudSQL Replication

CloudSQL to CloudSQL Replication

Google cloud platform (GCP) provides RDBMS (Relational Database Management Service), Cloud SQL fully managed highly available service. As per the google documentation it is highly available but a good software design always prepares for failure. Consider a scenario in which your server fails from that zone. To handle this situation, when cloud SQL enabled on

Read More
Validate firewall status from container shell

Validate firewall status from container shell

This might be very simple for lot of people but while working in IT industry, so many years sometime API development team stuck for this issue. When we deploy our APIs on GKE and APIs calling external services which are located outside of GCP, we required to open firewall OR it might be already open.

Read More
How to secure AWS VPC?

How to secure AWS VPC?

Amazon VPC (Virtual Private Cloud) is probably one of the most used and famous services inside the Amazon Web Services suite. Because it is mostly related to the concepts of security in the cloud and access to our data inside a third-party data center, like the ones of Amazon. In this article we will talk about

Read More
VPC Basics

VPC Basics

The Virtual private cloud or VPC is a private virtual cloud network. As it is private, it is logically separating from other networks or VPCs. This means that others can’t see inside data. It also means there’s no problem with IP addresses. You can use same level of IP addresses in different VPCs. Following are

Read More
Difference between Security Groups Vs Network ACL?

Difference between Security Groups Vs Network ACL?

This question is always been asked when you go for an interview for cloud security, cloud architect or cloud technologies. To understand different between “Network access control list (NACL)” and “Security Groups” lets first understand following terms in the reference of cloud. Virtual Machines VPC Subnet Firewall Virtual machine (VM) – In simple term, VM

Read More
1 2