Cuelogic Blog Icon
Cuelogic Career Icon
Evaluation of Machine Learning Algorithms for Intrusion Detection Systems

Evaluation of Machine Learning Algorithms for Intrusion Detection System

The last decade has seen rapid advancements in machine learning techniques enabling automation and predictions in scales never imagined before. This further prompts researchers and engineers to conceive new applications for these beautiful techniques. It wasn’t long before machine learning techniques were used in reinforcing network security systems. The most common risk to a network’s …

Node.js as a Standard for Enterprise Web Apps

Why has Node.Js become a gold standard for Enterprise Web Apps?

Why is Node.Js becoming popular with Enterprises? Node.js is a JavaScript runtime environment for building robust web applications. It is an efficient and lightweight platform which comes out-of-the-box with the bare essentials or modules like npm, install, uninstall, update which are necessary for developing scalable apps. Node.js can be extended using third-party modules for creating …

Container Security at the Speed of CI-CD

Securing Containers at the pace of CI/CD

Why Container Security? The domain of modern software development always remains subject to the pushes and pulls of evolution. One of the primary imperatives in custom software development concerns the creation and deployment of agile practices, primarily because these serve to boost the speed of software operations. In this context, container technology has emerged as …

What-is-Anthos

What is Anthos : The multicloud platform by Google (in 7 mins)

Google recently announced the availability of Anthos, a platform designed to allow users to run applications on-premise not just in Google Cloud but also with other providers such as Amazon Web Services (AWS) and Microsoft Azure. Announced at the Cloud Next conference held in San Francisco earlier in April, Anthos stands out as the tech …

Walking-the-tightrope-between-protecting-consumer-privacy-and-utilising-generated-data

Walking the tightrope : Balancing between Consumer Privacy & Utilizing Generated Data

Data Utilization vs Consumer Privacy Walking the tightrope has been challenging for many companies that are using legacy systems. They’re unable to handle consumer privacy issues and control the generated data the right way. They’re also looking towards other companies within the industry to analyze how they are working with data. Companies should be looking …

Cover_Design Thinking for AI

Design Thinking for AI : Sustainable AI Solution Design

Design Thinking and AI : “Un”Complexing Automation.  It’s important to approach the subject area of AI from the philosophy of design thinking. This is, so that there are a structure and an approach that is chartered out in the complex world of AI. Since there is an extensive range of solutions that one can design …

reactjs-life-cycle

ReactJs Lifecycle | Initialization, Mounting, Updating & Unmounting

The ReactJS lifecycle is an extensive tool that can be used to design a memorable experience on the web. They’re one of the most robust avenues in the development word to allow us to create UI-oriented applications. These apps can be launched on the web for the greater audience to consume as well. While ReactJS …

Healthcare-Analytics_Roadmap-from-data-to-Insights-to-Intelligence

Healthcare Analytics Roadmap : Actionable Intelligence from Data

Healthcare Analytics : The talk of the town Healthcare analytics is a robust field that has many different factors at play. From insights to intelligence, the journey is long and arduous, but many companies are already mastering their approach. They’re creating greater value in the domain by affecting the way that data has an impact …

Healthcare_cybersecurity

Healthcare Cybersecurity: The Solution is Security & Operations Center (SOC)

As the security of data becomes one of the most serious issues, a robust Security and Operations (SOC) team could be the solution to cybersecurity in the Healthcare industry. In the last two years, almost 90% of hospitals in the United States have reported a security breach. Cyber attacks cost the United States healthcare system …

python_java

Python vs Java : The programming language fight for dominance

Anatomy of Python and Java Both languages offer something unique to the table. While they have their unique technical differences, they’re essentially fully developed languages that have thriving communities aiding in innovation. Both languages are written differently as well, as they’re utilized uniquely as per their running efficiencies. While one is extensively used for Machine …

Blockchain Healthcare

Blockchain in Healthcare : A Case for Innovations & Opportunities

Blockchain in Healthcare : The new “made for each other”   In taking a big leap in the healthcare space, the industry has taken a giant step for Blockchain and AI. It has introduced new tools that make the industry that much more secure, compliant and resource-intensive. The companies that participate in the healthcare space …

Why-Are-Great-Quality-Javascript-Developers-Hard-To-Find

Why Are Great Quality Javascript Developers Hard To Find?

“Great” Javascript Developers – A Rare Commodity? It’s becoming increasingly difficult to find the right JavaScript developers in the marketplace owing to the skill gap increasing. As we move towards a more AI driven market, we see innovations in ML, IoT, and other disruptive platforms. Businesses are exploring these areas to find the best modality …

Home-automation-development_defining-the-next-steps

Home Automation Development : Defining the Next Steps

As we move towards a more automated future, the state of home assistants is becoming brighter. More companies are creating sophisticated home assistants to bring engaging experiences to customers. They’re perfect for interacting with patients suffering from Alzheimer’s and are the right companion for younger ones to learn effectively. Developing home assistants is becoming increasingly …

Data-collection-tool-in-healthcare

Powerful Data Collection Tools in Healthcare

Understanding the tools to collect Healthcare Data Data collection through various tools has been one of the primary ways through which the healthcare industry gets new insights. With time, data collection has extended reach, through which it can deliver on key problem areas and create viable Healthcare IT solutions. This solutions-oriented methodology is the core …

pytorch

Pytorch : Everything you need to know in 10 mins

The latest release of Pytorch 1.0 by Facebook marks another major milestone for the open source Deep Learning platform. It is increasingly making it easier for developers to build Machine Learning capabilities into their applications while testing their code is real time. In this piece about Pytorch Tutorial, I talk about the new platform in …

AI-in-Cybersecurity-Pitting-Algorithms-vs-Algorithms

AI in Cybersecurity : Pitting Algorithms vs Algorithms

The Cure that is Artificial Intelligence  AI in cybersecurity has been revolutionizing the way we view defending against dark hat hackers and penetrators that have malicious intent. That’s why it’s essential to have a dedicated approach when it comes to  cybersecurity. From a technology standpoint, it’s necessary to have a holistic approach, when companies understand …

Istio-Service-Mesh-The-Complete-Guide

Istio Service Mesh: The Step by Step Guide

What is Istio Service Mesh? Istio service mesh provides several capabilities for traffic monitoring, access control, discovery, security, resiliency, and other useful things to a bundle of services. It delivers all that and strikingly does not require any changes to the code of any of those services. To make this possible, Istio deploys an Istio …

Azure-for-Enterprise-Migration-and-Native-Development

Azure for Enterprise: Migration and Native Development

How has Azure become so popular in the Enterprise Space? Azure Cloud Services has not only started setting new trends in the demanding market of cloud deployments lately but has also found a considerable impetus in its usage for Infrastructure as a Service(IaaS) surpassing others. The infrastructure is hosted on the cloud whereas the operating …