top of page


Artificial Intelligence set to change the data storage landscape by 2025
If you ask anyone what they think that the future will hold and Artificial Intelligence or AI will definitely be a part of their fantasy....


Ransomware
Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files, and the only way to regain access to the...


Panorama
Panoramaâ„¢ network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce...


K-nearest Neighbor (KNN)
Introduction In pattern recognition, the k-nearest neighbors algorithm (k-NN) is a non-parametric method used for classification and...


Tour of Weka
Introduction Full form of WEKA is Waikato Environment for Knowledge Analysis (Weka). Waikato Environment for Knowledge Analysis (Weka)...


Software as a service (SaaS)
What is software as a service? Software as a service (SaaS) is a software distribution model in which a third-party provider hosts...


Data Visualization
Data Visualization What it is and why it matters Data visualization is the presentation of data in a pictorial or graphical format. It...
What is Port Number?
A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at...


Step by Step KNN in Weka
KNN algorithm is one of the simplest classification algorithm. Even with such simplicity, it can give highly competitive results. KNN...


Internet Protocol(IP)
The letters "IP" stand for Internet Protocol. It's the set of rules that govern how packets are transmitted over a network. The Internet...
bottom of page