Author: rodrigtech

  • Text Clustering and Topic Modeling

    Text clusterings is an attempting to group similar texts based on their semantic content, meaning, and relationships. The utilization of clustering our text based on these three categories allows us to explore the data that is unstructured for data analysis further the image to demonstrate this concept has groupings for visual purpose simplicity. For an…

  • Sentiment Analysis in Python using NLTK

    Analyzing troves of reviews many organizations use for outreach and measurement but are they capturing the overall tone of a review? When I’m referencing the concept of tone I’m trying to extract from text on positive or negative reception. This is where Sentiment Analysis can be used to determine what is the reception tone whether…

  • Automated Red Teaming Agent in Azure Foundry

    Your organization is likely navigating methods and uses of Generative AI whether this is innovation of a existing application that is internal to operations or a external web application the use of this technology should be thoroughly evaluated prior to release. You’ve likely encountered the term “Prompt Injection” however you’re also aware of automation that…

  • Model Router in Azure Foundry

    Costs are typically a pain point for ideation on using state-of-the-art (SoTA) AI models for even some basic testing in the API. Most of the time if you’re building a proof of concept you’ll find that you don’t need the Ferrari to produce relatively strong results. In a nutshell the use of “reasoning” and “small-language…

  • Azure Container Registry Continuous Patching

    Introduction If your organization stores images in a repository chances are it’s hosted in a cloud based solution. Typically, every Cloud Service Provider has an offering in Azure this is known as Azure Container Registry. This stores your Docker Images, OCI Artifacts in a centralized location. You can also get the advantage if you’re using…

  • Network Security Perimeters in Azure

    Introduction Microsoft has announced the public preview of Network Security Perimeters, a new Azure service that creates isolation boundaries for Platform-as-a-Service (PaaS) resources deployed outside your virtual network. With Network Security Perimeters, you can: This capability lets organizations define precise security perimeters around their Azure PaaS workloads controlling what external services can connect but also provide…

  • GCP Service Account Impersonation

    Google Cloud Platform identity is a large domain of the GCP Security Engineer exam and the emphasis also expands on the use of Service Accounts. Similar to Azure environments service accounts by abstraction come in the form of being used for various services to access other resources via REST APIs. Notably these resources without proper…

  • Container Scanning in Kubernetes

    While the escapades of Certified Kubernetes Security specialist renewal are continued and ongoing I’ve felt it was best to craft another scenario to leverage for the container security portion of the exam. Particularly you’re required to remediate many items in your cluster and ideally these items should be caught in your CI/CD pipeline before deployment.…

  • DeepSeek-V3 (MoE)

    DeepSeek-V3 (MoE)

    DeepSeek-V3 is an open-source large language model that boast a 671-billion parameter Mixture-of-Experts architecture with only 37 billion parameters activated per token. This specific model uses Multi-Head Latent Attention (MLA) for inference this compresses the attention keys and values in a low dimensional latent representation. Additionally this has also the strategy of Auxiliary-Loss-Free load balancing…

  • Hacking Kubernetes via ServiceAccountTokens

    Kubernetes has a large amount of advancements and inherent good security principles but these are dependent on configurations that are typically not well-known to end users. Predominantly the constructs of Service Accounts or (Non-human Identities) for the masses are populated in many services as they act as the go-between for service to authenticate and operate…