The Democratization of AI: How AI is Becoming Accessible to All

Hey there, tech enthusiasts! It’s been a little while since I’ve posted. I figured it’s time we talked about something that’s been buzzing in the AI world lately – the democratization of AI. Now, I know what you’re thinking: “Another buzzword?” But stick with me here, because this is actually pretty cool stuff that’s changing the game for us regular folks in tech. What the Heck is AI Democratization Anyway? AI democratization is all about making AI tools and technologies accessible to everyone, not just the big tech companies with deep pockets. Think of it like this: AI used to be this exclusive club that only the elite could join. But now, thanks to some awesome advancements, the doors are wide open, and everyone’s invited. Whether you’re a small business owner, a solo developer, or just a tech hobbyist, there’s something for you in the AI world. ...

July 26, 2024 · 5 min · Scott

Demystifying AWS Security: A Beginner’s Guide to Key Concepts and Services

Managing firewalls, VLANs, and access control lists might be second nature in a traditional IT setting. But when it comes to AWS, the terminology and tools can seem foreign. This beginner’s guide aims to bridge that gap, translating AWS security concepts into the world of on-premise security you already know. Why AWS Security Matters AWS is a leading cloud provider, and its popularity, unfortunately, makes it an attractive target for cyberattacks. It’s essential to grasp the principles of AWS security to protect your valuable data and applications. Remember, AWS operates on a Shared Responsibility Model – they secure the cloud itself, while you’re responsible for securing your workloads within it. ...

March 6, 2024 · 6 min · Scott

Hardening Your CI/CD: Terraform, Docker, and Kubernetes Security

As I continue this series on CI/CD pipeline security, it is time to now work on securely building and deploying our application. This post picks up where my Build Secure Python Pipelines: Adding Tests and Hooks in Action post left off. In this post, we’ll continue our pipeline development by adding a container build and deployment to Kubernetes. In addition to this, we’ll add some security components to the build and deployment process. ...

March 1, 2024 · 11 min · Scott

Build Secure Python Pipelines: Adding Tests and Hooks in Action

As we continue this series started in my Getting Started with Secure CI/CD: Essential Practices for Beginners post, I’ll be securing my Python code with automated testing and hooks. While some of this information builds on some previous posts I’ve created in the past, Adding pre-commit Hooks to Python Repo Writing Tests For Your Python Project I still wanted to incorporate these together in a meaningful way. My goal is to help anyone that is trying to figure out how to piece together their own pipeline. ...

February 18, 2024 · 20 min · Scott

Cribl Splunk_HEC Datasource: The Ultimate Guide for Kubernetes Log Ingestion

After writing my From Scattered to Splunk: Bringing Order to Your Kubernetes Logs post, a buddy of mine Danny Ansell (oh by the way he does work for Cribl and used to work for Splunk) suggested that I could always import my logs into Cribl as well. I’m madly in love with Splunk and do so love one of their tag lines Splunk Rhymes with Drunk, but I’m always on the hunt for kicking the tires on new technology. In this post, I plan to configure the Cribl splunk_hec for Kubernetes logs. ...

February 11, 2024 · 6 min · Scott