Opslag

Introduction to Neural Networks - Part 1

Billede
Why should you learn Machine Learning? It’s no secret that machine learning and AI is one of the most popular buzzwords of this decade, but is the hype justified? Lets take a closer look at what exactly we should expected from Machine Learning and AI followed by a closer look at what exactly Neural Networks really is and why they have become so popular. Even though Machine Learning and the algorithms used in todays applications was introduced several decades ago, it's first within the last 10-15 years that we have started to see the real benefit of these. The reason why the area of Machine learning has seen such a growth can be boiled down to the data available. The amount of data we are able to collect nowadays w ith the introduction of the internet, Social media platforms and Internet of things just to mention some..    has lead to a revolution of the Machine Learning field, as these algorithms are in need of large datasets to achieve high accuracy. Examples of areas where we

REST API (Web API) Part 2 - Security

Billede
This post is part 2 in the series of REST API's using spring and spring boot. If you have not yet read part 1, then please do so in order to follow along the steps in this tutorial. However if you only wish to obtain the information about API Security and have no interest in building a rest service yourself using JAVA then feel free to read along. In order to secure a REST API or anything else for that matter, we need to have a formal understanding of what security is within this context. This tutorial will focus on security centered around Authentication and Authorization as this is what we are going to center our implementation around. Authentication Authentication is the act of proving the identity of who we are. So when someone is trying to access our REST API, we want to ensure that the caller can be identified and thereby only allow trusted users to access the service. The most basic way of authentication is by using a User/password approach which works if we trust tha

Neuralink - The merging of Brain and Machine

Billede
It has been showcased in numerous movies, how people in sci-fi universes is capable of uploading their brain to a computer or a network either to escape death or as way to achieve super human intelligence. However, as of now such ideas has been kept within fiction and not something that anyone thought could be possible in the near future, this however might just have changed after Elon Musk and the Neuralink company revealed their current research at a press conference which took place Tuesday 16th of July 2019. So in this blog post we will look further into exactly what Neuralink is doing and how they are doing it, along with some advise of how you can get into this exiting area yourself. Should you be interested in the full Neuralink event it can be seen at Neuralinks own YouTube channel below: What is Neuralink? The company were founded in 2016 by Elon Musk and 8 others and has since its founding raised more than 150 million dollars in funding to support its vision and f

Java Password Hashing (Bcrypt)

Billede
This article is an extension of the Python Password Hashing article which explains some of the flaws in traditional password hashing and how it can be mitigated with salting. The article can be found here:  https://vinsloev.blogspot.com/2019/07/python-password-hashing-bcrypt.html As an introduction to this article a short explanation of password hashing in general can be found below. A hash is designed to act as ”one-way-function” making it easy to perform but very hard to reverse. The reason why this is so beneficial when it comes to password managing and login handling, is because it allows the developers to convert the original password into a unique phrase that can be stored in the database. By using a hash function the application don’t have to match the original password in clear text with the password given upon login as it does not know what that password is. Instead it only need to know what hashing function where used and then see if the password entered generates the

Python Password Hashing (Bcrypt)

Billede
A hash is designed to act as ”one-way-function” making it easy to perform but very hard to reverse. The reason why this is so beneficial when it comes to password managing and login handling, is because it allows the developers to convert the original password into a unique phrase that can be stored in the database. By using a hash function the application don’t have to match the original password in clear text with the password given upon login as it does not know what that password is. Instead it only need to know what hashing function where used and then see if the password entered generates the same hash value as the one saved in the database. This little trick provides the same login functionality as when all passwords were in clear text but the difference here is that now it’s only the user who knows exactly what the password is. Is Hashing flawless? However this technique is not flawless, as nothing is really secure when it comes to Information Security. Since the has

Machine Learning Basics

Billede
Why should you learn Machine Learning? It’s no secret that machine learning and AI is one of the most popular buzzwords of this decade, but is the hype justified? Lets take a closer look at three areas in which Machine Learning has changed or will change our way of life: E-health:  With the use of Machine learning we have in recent years seen several studies where a trained algorithm were capable of predicting what kind of disease a person was suffering from, despite the doctors could not. The use of such technology in everyday healthcare is however only in its early stages but in the future we would most likely see that Algorithms will give a second oppinion on the doctors judgment. Transportation:  Transportation has for centuries been an important area that we as humans benefit from in our daily life. It’s therefore no wonder that every generation has been trying to optimize and improve the way we transport ourselves from A to B. With the progress in Machine Learning tr

How To Excel In Your First Month as A Software Developer

Billede
E veryone has to start somewhere. This certainly do also applies for Software Developers and Programmers, whether you’re coming straight out of College with a degree in your hand or you have been self taught. The one thing that we all have in common is that we at some point has to face the life changing experience of getting our first paid job as a Developer. When we get our first job it’s both exiting but also a huge eye opener, especially when it comes to believing in our own abilities. Wheras we comes from a safe and secure environment of education where we might rank at the top of our class or have no difficulties solving online exercies we now face a work environment with colleagues who have 5, 10 or even more years of real programming experience. In other words we now for the first time get to know how limited our skills actually are and how big of a journey we have ahead to master this exiting career path that we have choosen. The quickest way to master something is to