Machine Learning (ML) is a branch of Artificial Intelligence (AI) like Algebra is a branch of Mathematics. In this story, I am not planning to delve into defining what is Machine Learning or Artificial Intelligence. Instead, I am going to present some of the materials already prepared by the best in the industry and give my commentary on them. In essence, this story doesn’t give you any original ideas you can learn ML from, rather use this as a guide to go through some of the already available ML contents.

Machine Learning Crash Course

Google has published a Machine Learning Crash Course and it…


Secure Docker containers are crucial for your mission-critical services. You might be running your containers using sophisticated orchestrators such as Kubernetes (K8S) in Google Cloud Platform (GCP). You might think that you have implemented extremely safe role-based access controls (RBAC) in your environment. You have not even enabled an OS shell in the running containers. You might think that your services are super secure. Still, somebody will be able to take out crucial information out of your Docker containers that can tarnish your reputation. What do you do for that? Before somebody hack your Docker container, you hack your own…


It is imperative to have an isolated Virtual Private Cloud (VPC) in Google Cloud Platform (GCP) as the foundation for building a strong and secure service deployment platform. A private Kubernetes (K8S) cluster in a VPC is required to protect the computing infrastructure from external adversaries. A very well thought-out service account with the just-enough required permissions and custom roles is to be used to build the infrastructure needed. You need to have a very good idea about the network IP ranges you need to have in your K8S cluster. Once a secure K8S cluster is ready, it is the…


In a secure and private Kubernetes (K8S) cluster in Google Cloud Platform (GCP), it is important to make sure that you are using private IPs and right-sized IP ranges for your current and future scaling needs. A bad network design is very difficult to fix especially after the services started running in production. The story Securing Your Kubernetes Cluster in Google Cloud Platform covered the basics of the setup. Detailed coverage of the IP address ranges in the K8S cluster deserves a story on its own and this one is trying to achieve that. Before jumping into the matter, it…


You have seen how you can secure your Kubernetes (K8S) cluster in the Google Cloud Platform (GCP) by creating a private K8S cluster with its associated management infrastructure using Terraform scripts. But who will run the Terraform scripts to create the infrastructure? The GCP project owner? No way. The GCP project owner is too powerful and any bug in the Terraform script can cause unwanted side effects and at times that will become too catastrophic. …


Your Kubernetes (K8S) cluster does the heavyweight lifting off when you run your microservice applications in Docker containers. Google Cloud Platform (GCP) provides managed K8S service named Google Kubernetes Engine (GKE). When you use GCP to host and run your microservices, it is important to make sure that your K8S cluster is set up in a highly secure fashion. Any kind of security model that you design and implement should be tried and tested right from the lowest environment such as Development before trying out in higher environments such as Production. This article is going to talk about securing your…

Rajanarayanan Thottuvaikkatumana

Fellow @Equifax, published author, architect… Speaks Go, Scala, and Python. Loves Mathematics, Computer Science, Classical Music, and Tennis. Find me @rajtmana

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store