<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Atharva Chandwadkar</title>
    <description>The latest articles on DEV Community by Atharva Chandwadkar (@atharva21stack).</description>
    <link>https://dev.to/atharva21stack</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F553263%2F34529c25-ae01-4130-883f-164edac843fd.PNG</url>
      <title>DEV Community: Atharva Chandwadkar</title>
      <link>https://dev.to/atharva21stack</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/atharva21stack"/>
    <language>en</language>
    <item>
      <title>GET STARTED WITH MACHINE LEARNING</title>
      <dc:creator>Atharva Chandwadkar</dc:creator>
      <pubDate>Fri, 20 Aug 2021 17:09:52 +0000</pubDate>
      <link>https://dev.to/atharva21stack/get-started-with-machine-learning-49be</link>
      <guid>https://dev.to/atharva21stack/get-started-with-machine-learning-49be</guid>
      <description>&lt;p&gt;So finally you made your mind to start machine learning , no worried I have got you covered,As a novice in machine learning (ML), you may be faced with numerous questions, including: Should I really put in the effort to learn about this technology? If that's the case, how can I get started? Are there any dangers? Will this information help me find work? This essay will attempt to address some of these concerns.&lt;/p&gt;

&lt;p&gt;To begin, you should absolutely research machine learning. It's the future: intelligent robots will anticipate your environment, explain key insights, automate some chores (like as driving a car), and help you make the best decisions. Even if you are a software professional, you will need to expand your skill set since machine learning will create expert systems, decreasing the necessity for conventional software development.&lt;/p&gt;

&lt;p&gt;It may appear difficult to begin. Should you take a course? No, not always. The majority of the courses are geared to turn you into a data scientist, which may not be what you want to do with your career. You may want to utilise ML as a casual practitioner rather than an expert.&lt;/p&gt;

&lt;p&gt;The next step would be to study up on how ML can help you achieve your goals, acquire restricted training data (the variables you believe are essential) to train the ML, and sign up for an ML platform that takes you through the process of developing predictive models. Some people prefer open source ML platforms, however this comes at a cost: presumed programming skills in languages like Python, which may dissuade you from doing ML.&lt;/p&gt;

&lt;p&gt;TYPES OF MACHINE LEARNING?&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Supervised&lt;/li&gt;
&lt;li&gt;Unsupervised&lt;/li&gt;
&lt;li&gt;Reinforcement Learning&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;HOW TO START WITH MACHINE LEARNING?&lt;br&gt;
So, in order to get started with machine learning, you'll need to learn Python. But why Python? Python is one of the easiest languages to learn in my experience. The process must be iterated rapidly, and the data scientist does not require a profound understanding of the language because they can pick it up quickly. Once you are familiar with the how python works , you should look for these python libraraies:&lt;/p&gt;

&lt;p&gt;Numpy:&lt;br&gt;
The famous numerical analysis library. It will help you do many things, from computing the median of data distribution, to processing multidimensional arrays.&lt;/p&gt;

&lt;p&gt;Pandas:&lt;br&gt;
For processing CSV files. Of course, you will need to process some tables, and see statistics, and this is the right tool you want to use.&lt;/p&gt;

&lt;p&gt;Matplotlib&lt;br&gt;
After you have the data stored in Pandas data frames, you might need some visualizations to understand more about the data. Images are still better than thousands of words.&lt;/p&gt;

&lt;p&gt;Seaborn:&lt;br&gt;
This is also another visualization tool, but more focused on statistical visualization. Things like histograms, or pie charts, or curves, or maybe correlation tables.&lt;/p&gt;

&lt;p&gt;Scikit-Learn&lt;br&gt;
This is the final boss of Machine Learning with Python. THE SO-CALLED Machine Learning with Python is this guy. Scikit-Learn. All of the things you need from algorithms to improvements are here.&lt;/p&gt;

&lt;p&gt;Tensorflow and Pytorch:&lt;br&gt;
I don’t talk too much about these two. But if you are interested in Deep Learning, take a look at them, it will be worth your time.&lt;/p&gt;

</description>
      <category>machinelearning</category>
      <category>ai</category>
    </item>
    <item>
      <title>Cyber security</title>
      <dc:creator>Atharva Chandwadkar</dc:creator>
      <pubDate>Wed, 04 Aug 2021 07:38:56 +0000</pubDate>
      <link>https://dev.to/atharva21stack/cyber-security-1oll</link>
      <guid>https://dev.to/atharva21stack/cyber-security-1oll</guid>
      <description>&lt;p&gt;So, you made here? Fear of being pirated? Here is all about cyber security you need to know&lt;/p&gt;

&lt;p&gt;Assume you are working on your computer while a hacker gains access to your company's secret data in the background. He takes critical information and sells it to thieves, putting your organisation in jeopardy.&lt;/p&gt;

&lt;p&gt;It seems like something out of a movie, but it's unfortunately all too prevalent in today's internet world. This is why cyber security has become such an important element of every corporate strategy—and why cyber security professionals are in higher demand than ever.&lt;/p&gt;

&lt;p&gt;This introduction to Cyber Security will teach you how it works, why it is necessary, what Cyber Security professionals do to protect data, and how to become one.&lt;/p&gt;

&lt;p&gt;What is Cyber Security?&lt;/p&gt;

&lt;p&gt;Cyber security is a procedure that safeguards networks and devices against external attacks. Businesses often hire Cyber Security specialists to safeguard sensitive information, maintain staff productivity, and boost customer trust in products and services.&lt;/p&gt;

&lt;p&gt;The industry standard of confidentiality, integrity, and availability, or CIA, governs the realm of cyber security. Privacy implies that data may only be viewed by allowed parties; integrity implies that information can only be added, updated, or withdrawn by authorised users; and availability implies that systems, services, and data must be accessible on-demand within agreed-upon boundaries.&lt;/p&gt;

&lt;p&gt;The use of authentication mechanisms is a critical component of Cyber Security. A user name, for example, identifies an account that a user wishes to access, whereas a password serves as proof that the user is who he claims to be.&lt;/p&gt;

&lt;p&gt;Types of Cyber crimes&lt;/p&gt;

&lt;p&gt;Cyber crime is Any unauthorised activity involving a computer, device, or network . Computer-assisted crimes, crimes in which the computer is a target, and crimes in which the computer is incidental to the crime rather than directly related to it are the three types.&lt;/p&gt;

&lt;p&gt;Cybercriminals usually try to profit off of their crimes using a variety of tactics, including:&lt;/p&gt;

&lt;p&gt;Denial of Service, or DOS&lt;br&gt;
When a hacker consumes all of a server's resources, legitimate users are unable to access it.&lt;/p&gt;

&lt;p&gt;Malware &lt;br&gt;
When people are infected with a worm or virus that renders their equipment inoperable.&lt;/p&gt;

&lt;p&gt;Man in the Middle &lt;br&gt;
When a hacker places himself between a victim's computer and a router in order to sniff data packets.&lt;/p&gt;

&lt;p&gt;Phishing &lt;br&gt;
When a hacker sends a supposedly legitimate-looking email requesting personal information from users.&lt;/p&gt;

&lt;p&gt;Cross-site script attacks, password attacks, eavesdrop attacks (which could be physical as well) and SQL injections, birthday attacks based on algorithm functions are also included for cyber attacks.&lt;/p&gt;

&lt;p&gt;One of the latest: Pegasus&lt;/p&gt;

&lt;p&gt;The NSO Group develops, markets, and authorises Pegasus as a hacking software (or spyware) to governments around the world. The malware is capable of infecting thousands of phones that run iOS or Android. It allows spyware operators to extract messages, images and emails, to record calls and to activate microphones discreetly.&lt;/p&gt;

&lt;p&gt;Tips to protect yourself against cyberattacks&lt;/p&gt;

&lt;p&gt;How can companies and people protect themselves from cyber threats? Our top advice on cyber security are as follows:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Updating your operating and software:This ensures that the latest security fixes are available to you.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The use of anti virus software will detect and eradicate threats by security solutions such as the Kaspersky Total Security programme. Keep the best degree of protection up to date with your software.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Make sure your passwords are not easily guessed by strong passwords.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Do not open unknown senders' email attachments: virus could infiltrate them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Do not click on links on strange e-mails or unknown websites: malware is often distributed.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Avoid using unsecure WiFi networks in public places:Unsecure networks leave you vulnerable to man-in-the-middle attacks.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>cyberattacks</category>
    </item>
    <item>
      <title>Introduction to Git &amp; GitHub</title>
      <dc:creator>Atharva Chandwadkar</dc:creator>
      <pubDate>Wed, 04 Aug 2021 07:35:32 +0000</pubDate>
      <link>https://dev.to/atharva21stack/introduction-to-git-github-522a</link>
      <guid>https://dev.to/atharva21stack/introduction-to-git-github-522a</guid>
      <description>&lt;p&gt;I am glad that you are working on a major project to the blog of Git &amp;amp; GitHub beginner? You work with a team? Or are you seeking for an open source start? You're in the proper position.&lt;br&gt;
This blog helps you get the fundamentals started. If you want to use Git &amp;amp; GitHub like an expert there are a lot of things you need to learn.&lt;br&gt;
Let's begin!&lt;/p&gt;

&lt;p&gt;What is Git and GitHub? &lt;/p&gt;

&lt;p&gt;Git is a version control facility designed primarily for developers and designers, GitHub is a special site for hosting code, which is presently the most popular and is a platform where different available code and methods are played and experimented with. It is home to open source and emerging technologies projects. You may develop simple code for others to refer to, or for your work, features and designs. You can also collect a chunk of your code and add functionality or repair issues for your project. You don't have to be a master programmer to learn Git &amp;amp; GitHub. First things you need to get to know your terminal first, because Git is a strong device,&lt;br&gt;
Allow some Git commands to pass&lt;br&gt;
git clone&lt;br&gt;
git status&lt;br&gt;
git add&lt;br&gt;
git commit -m “ “&lt;br&gt;
git push&lt;/p&gt;

&lt;p&gt;That's it, those are the big ones; if you've tried them, you're good to go.&lt;/p&gt;

&lt;p&gt;Let us now discuss,&lt;br&gt;
git init&lt;br&gt;
git branch&lt;br&gt;
git merge&lt;br&gt;
git checkout&lt;/p&gt;

&lt;p&gt;You may be working with others, and you may wish to review and test their code before committing it; the commands listed above are what you need for collaboration.&lt;br&gt;
The first step is to Sign up for an account at href&amp;gt;GitHub, and don't forget to download and install the most recent stable release of Git href&amp;gt;. &lt;br&gt;
Now you can go to your terminal and tell Git who you are.&lt;br&gt;
To create a username for every git repository type&lt;br&gt;
git config --global user.name ""&lt;br&gt;
replace “”with your name , Any name that you like is free to use&lt;/p&gt;

&lt;p&gt;Now you may tell Git your email address, but make sure it's the same one you used to create your GitHub account.&lt;br&gt;
git config --global user.email ""&lt;/p&gt;

&lt;p&gt;Now you’re ready to start using Git on your computer!&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>github</category>
      <category>computerscience</category>
    </item>
  </channel>
</rss>
