The Expert

object.title

How to detect anomalies with Machine Learning? (3/3)

July 12, 2021

Wrote by Wassim B., Cybersecurity Expert SQUAD As illustrated in Figure 2, the proposed anomaly detector monitors VNFs (Section 1), preprocesses the monitored data (Section 2), trains models (Section 3), evaluates models’ performance and detects anomalies. 1) VNF Monitoring VNFs ...

object.title

Background on time series modeling and forecasting (2/3)

July 7, 2021

Time series modeling carefully collects and studies the past observations expressed as a time series for the purpose of developing an appropriate model which describes the inherent structure of the series. One of the most frequently used stochastic time series ...

object.title

AWS S3M Pattern: 5 Steps to tie Serverless & Microservice ...

July 6, 2021

Wrote by Naoufal E., Cloud Expert Making serverless architectures tied to microservices architectures on the AWS Cloud is a fun job, and it allows us to learn new things every day ! But mostly, we need Abstract Patterns that already ...

object.title

Introduction to Machine learning (1/3)

June 29, 2021

Wrote by Wassim B., Cybersecurity Expert SQUAD Nowadays, network Functions Virtualization (NFV) [1] and Cloud-native Network Functions (CNFs) offer new ways of designing, scaling and operating networks, as customer-centric services can be elastically scaled and easily orchestrated, not only at ...

object.title

AWS S3M Pattern: 5 Steps to tie Serverless & Microservice ...

June 24, 2021

Wrote by Naoufal E., Cloud Expert Making serverless architectures tied to microservices architectures on the AWS Cloud is a fun job, and it allows us to learn new things every day ! But mostly, we need Abstract Patterns that already ...

object.title

Kubernetes Operators, Code human operational knowledge into software

June 8, 2021

By Raouf B., Expert DevOps SQUAD Kubernetes is one of the most widely used open-source container orchestration platform. It helps to automate the deployment, scaling, self-healing, service discovery, and management of applications using containers. Stateless applications are a perfect use ...