<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sandarbh Bajpai</title>
    <description>The latest articles on DEV Community by Sandarbh Bajpai (@sandarbh_bajpai).</description>
    <link>https://dev.to/sandarbh_bajpai</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3034819%2Fa764596c-f05e-45da-969e-9c5e8a8b6f4f.jpg</url>
      <title>DEV Community: Sandarbh Bajpai</title>
      <link>https://dev.to/sandarbh_bajpai</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sandarbh_bajpai"/>
    <language>en</language>
    <item>
      <title>India-Pakistan Cyber Warfare</title>
      <dc:creator>Sandarbh Bajpai</dc:creator>
      <pubDate>Wed, 14 May 2025 05:26:37 +0000</pubDate>
      <link>https://dev.to/sandarbh_bajpai/india-pakistan-cyber-warfare-3kn</link>
      <guid>https://dev.to/sandarbh_bajpai/india-pakistan-cyber-warfare-3kn</guid>
      <description>&lt;p&gt;&lt;strong&gt;Operation Sindoor Cyber Fallout:&lt;/strong&gt;&lt;br&gt;
In the aftermath of Operation Sindoor-India's military response to the April 22 Pahalgam terror attack that killed 26 civilians-a coordinated cyber warfare campaign targeted India's digital infrastructure. Maharashtra Cyber identified seven Advanced Persistent Threat (APT) groups responsible for these attacks, including Pakistan-based APT 36, Pakistan Cyber Force, Team Insane PK, Mysterious Bangladesh, Indo Hacks Sec, Cyber Group HOAX 1337, and National Cyber Crew.&lt;/p&gt;

&lt;p&gt;The attackers employed various techniques including malware campaigns, Distributed Denial-of-Service (DDoS) attacks, and GPS spoofing, primarily targeting government organizations (75% of attacks), along with education (8.3%), finance (7.4%), manufacturing (6.5%), and telecom sectors (6.5%). While the cyber assault originated primarily from Pakistan, it also involved hackers from Bangladesh, Indonesia, Morocco, and Middle Eastern countries. Despite the ceasefire agreement between India and Pakistan, these cyber attacks have continued, though at a reduced rate, demonstrating the persistence of digital warfare even when conventional hostilities subside.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;APT36 Hacking Techniques:&lt;/strong&gt;&lt;br&gt;
APT36, also known as Transparent Tribe, employs sophisticated cyber-espionage techniques primarily targeting Indian government, military, and diplomatic entities. Their attack methodology has evolved significantly, with their arsenal now including ElizaRAT, a Windows remote administration tool with advanced evasion capabilities including process injection, rootkit functionality, and anti-debugging mechanisms.&lt;/p&gt;

&lt;p&gt;The group's infection vectors include spear-phishing emails with malicious attachments, malvertising through Google Ads to distribute trojanized versions of legitimate applications like Kavach MFA, and domain spoofing of official Indian government websites. They've expanded their toolkit to include cross-platform malware targeting both Windows and Linux systems, with payloads like ApoloStealer and Crimson RAT that can exfiltrate sensitive data, capture screenshots, and execute remote commands. APT36 maintains stealth by leveraging legitimate cloud services such as Telegram, Google Drive, and Slack for command-and-control communications, implementing time zone checks to ensure execution only on Indian systems, and creating elaborate infrastructure designed to obscure their Pakistani origins.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;DDoS Attack Statistics:&lt;/strong&gt;&lt;br&gt;
The surge in cyber hostilities following Operation Sindoor saw Distributed Denial-of-Service(DDoS) attacks emerge as the dominant threat vector, accounting for 55.5% of all identified attacks against Indian targets. This represents a dramatic escalation compared to normal activity levels-while only 147 DDoS attacks targeted India between February and April 2025, a staggering 112 were recorded in just the first nine days of May. The peak occurred on May 10, when attack volumes reached levels 97 times (9700%) higher than pre-conflict baseline measurements from April 22.&lt;/p&gt;

&lt;p&gt;The attacks displayed clear strategic patterns, with government institutions bearing the brunt (52% of incidents), followed by education (21.5%), technology/IT services (6.5%), finance (8.5%), and telecom (6.4%) sectors. The most active threat groups included RipperSec (responsible for 30% of all DDoS claims), AnonSec (16.8%), Keymous+ (10.2%), Sylhet Gang (9%), and Mr Hamza (4.7%). Attack intensity peaked at 4pm UTC on May 7, with seven claimed DDoS attacks per hour, though activity began declining after both nations agreed to a comprehensive ceasefire on May 11.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Olake (Lakehouse)</title>
      <dc:creator>Sandarbh Bajpai</dc:creator>
      <pubDate>Wed, 09 Apr 2025 18:09:31 +0000</pubDate>
      <link>https://dev.to/sandarbh_bajpai/olake-lakehouse-1670</link>
      <guid>https://dev.to/sandarbh_bajpai/olake-lakehouse-1670</guid>
      <description>&lt;p&gt;In this blog, we’ll explore what OLake is, how it works, and why it’s useful—all explained in simple, beginner-friendly language.&lt;/p&gt;

&lt;p&gt;📦 What is OLake?&lt;br&gt;
OLake is an open-source data lakehouse platform designed to help developers and data engineers store, manage, and analyze large volumes of data effectively.&lt;/p&gt;

&lt;p&gt;It’s built on top of Apache Iceberg, a powerful open table format, and it brings the best features of data lakes and data warehouses into one unified system.&lt;/p&gt;

&lt;p&gt;🧩 Let’s Break Down the Word "Lakehouse"&lt;br&gt;
To understand OLake, let’s quickly look at the three major data storage terms:&lt;/p&gt;

&lt;p&gt;Term                            Simple Meaning&lt;br&gt;
Data Lake   A big storage system for raw data (like a messy hard drive &lt;br&gt;
                full of unorganized files)&lt;br&gt;
Data Warehouse  A clean, structured place where data is prepared for &lt;br&gt;
                analysis (like a well-organized Excel sheet)&lt;br&gt;
Lakehouse   A hybrid system that combines both—it stores raw data but &lt;br&gt;
                also makes it easy to query and analyze.&lt;/p&gt;

&lt;p&gt;So essentially:&lt;br&gt;
Lakehouse = Data Lake + Data Warehouse&lt;br&gt;
And OLake is a modern tool that builds this Lakehouse system for you.&lt;/p&gt;

&lt;p&gt;⚙️ What Does OLake Actually Do?&lt;br&gt;
OLake lets you:&lt;/p&gt;

&lt;p&gt;📥 Ingest huge amounts of raw data (from logs, apps, sensors, etc.)&lt;/p&gt;

&lt;p&gt;🧹 Manage schema changes (add or remove columns easily)&lt;/p&gt;

&lt;p&gt;⏳ Time travel through your data (see older versions of data tables)&lt;/p&gt;

&lt;p&gt;⚡ Query data efficiently using SQL&lt;/p&gt;

&lt;p&gt;🔄 Keep data consistent and clean across versions&lt;/p&gt;

&lt;p&gt;All of this is possible because OLake is powered by Apache Iceberg under the hood.&lt;/p&gt;

&lt;p&gt;🧑‍💻 Real-World Example&lt;br&gt;
Imagine you're a data engineer at an e-commerce giant like Flipkart:&lt;/p&gt;

&lt;p&gt;You collect data from 1 crore+ users: orders, reviews, page visits, etc.&lt;/p&gt;

&lt;p&gt;You need to store that raw data cheaply and efficiently.&lt;/p&gt;

&lt;p&gt;You also want to analyze it: “What products are trending this week?”&lt;/p&gt;

&lt;p&gt;You need the flexibility of a data lake, but the performance of a warehouse.&lt;/p&gt;

&lt;p&gt;That’s where OLake becomes the perfect solution—it brings you the best of both worlds!&lt;/p&gt;

&lt;p&gt;🔧 What Technologies Power OLake?&lt;br&gt;
✅ Apache Iceberg – Open table format for massive datasets&lt;/p&gt;

&lt;p&gt;✅ SQL Support – For querying the data like a traditional warehouse&lt;/p&gt;

&lt;p&gt;✅ Open-source – You can contribute or customize it as needed&lt;/p&gt;

&lt;p&gt;✅ Cloud and Big Data Ready – Scales well with modern infrastructures&lt;/p&gt;

&lt;p&gt;🚀 Why Should You Care About OLake?&lt;br&gt;
Whether you’re a developer, data scientist, or student, OLake is worth learning about because:&lt;/p&gt;

&lt;p&gt;It’s free and open-source&lt;/p&gt;

&lt;p&gt;It’s designed for modern, cloud-native data platforms&lt;/p&gt;

&lt;p&gt;It teaches you about real-world data architecture&lt;/p&gt;

&lt;p&gt;It’s built on trending technologies (Apache Iceberg, Lakehouse architecture)&lt;/p&gt;

&lt;p&gt;📝 Final Thoughts&lt;br&gt;
OLake is a modern, open-source platform that bridges the gap between messy raw data and clean, analyzable data.&lt;br&gt;
If you’re exploring data engineering, OLake is a great tool to learn and write about!&lt;/p&gt;

&lt;p&gt;💡 Next Up: Want to see how Apache Iceberg works? In my next blog, I’ll break down Iceberg in simple terms—stay tuned!&lt;/p&gt;

</description>
      <category>devrel</category>
      <category>database</category>
      <category>opensource</category>
      <category>sql</category>
    </item>
    <item>
      <title>GPMI (General Purpose Media Interface)</title>
      <dc:creator>Sandarbh Bajpai</dc:creator>
      <pubDate>Wed, 09 Apr 2025 17:16:11 +0000</pubDate>
      <link>https://dev.to/sandarbh_bajpai/gpmi-general-purpose-media-interface-4kgj</link>
      <guid>https://dev.to/sandarbh_bajpai/gpmi-general-purpose-media-interface-4kgj</guid>
      <description>&lt;p&gt;‼️Information update ‼️&lt;/p&gt;

&lt;p&gt;Say Hello to GPMI – The Future of Connectivity! 🌐&lt;/p&gt;

&lt;p&gt;A new era of wired interfaces is here! The General Purpose Media Interface (GPMI), developed by over 50 leading Chinese tech companies like Hisense, Skyworth, and TCL, is set to revolutionize how we connect our devices. This innovative standard might soon replace HDMI, DisplayPort, Thunderbolt, and USB.&lt;/p&gt;

&lt;p&gt;Why GPMI is a Game-Changer:&lt;br&gt;
🔗 All-in-One Solution: Combines video, audio, network connection, and power supply into a single cable.&lt;br&gt;
⚡ Unmatched Power &amp;amp; Speed:&lt;/p&gt;

&lt;p&gt;Type-C Variant: 96 Gbps bandwidth + 240W power.&lt;/p&gt;

&lt;p&gt;Type-B Variant: 192 Gbps bandwidth + 480W power.&lt;br&gt;
📉 Less Clutter: Say goodbye to multiple cables—GPMI reduces wire clutter and e-waste.&lt;br&gt;
🔒 Advanced Features: Bidirectional multi-streaming, ultra-fast data transfer, and full-chain security.&lt;br&gt;
💡 Compatibility: Type-C works seamlessly with USB Type-C devices.&lt;/p&gt;

&lt;p&gt;How Does It Compare?&lt;br&gt;
GPMI outpaces HDMI 2.1 (48 Gbps), DisplayPort 2.1 (80 Gbps), and USB4 (40 Gbps).&lt;/p&gt;

&lt;p&gt;Unlike HDMI or DisplayPort, it also delivers power—up to an impressive 480W!&lt;/p&gt;

&lt;p&gt;The Catch?&lt;br&gt;
Currently, GPMI supports up to 8K resolution (lower than HDMI’s 10K or DisplayPort’s 16K) and is being adopted primarily by Chinese companies. But with its potential to simplify connectivity and reduce e-waste, it’s exciting to see where this technology heads next!&lt;/p&gt;

&lt;p&gt;💡 Imagine a world where one cable does it all—streaming data, powering devices, and connecting seamlessly. Could this be the future of Smart TVs, monitors, and beyond? 🌟&lt;/p&gt;

&lt;p&gt;What are your thoughts on GPMI? Will it become the universal standard for connectivity? Let’s discuss! 👇&lt;/p&gt;

</description>
      <category>futurechallenge</category>
      <category>connectivity</category>
      <category>smartfuture</category>
    </item>
  </channel>
</rss>
