Boris Gigovic
Bio
As the Executive VP and owner, I am responsible for defining Eccentrix's direction and strategy, developing the corporate services portfolio and offerings, leading the sales and business development, and ensuring the company's visibility.
Stories (14/0)
Docker and Kubernetes
In the world of software development and IT operations, two technologies have dramatically transformed how applications are developed, deployed, and managed: Docker and Kubernetes. These tools have become synonymous with containerization and automation, offering a robust solution for deploying applications quickly, consistently, and scalably. This short article explores how Docker and Kubernetes work together to streamline the deployment and management of containerized applications, ensuring your infrastructure is both resilient and adaptable.
By Boris Gigovic9 days ago in Education
Mastering Kubernetes in Azure
In today's dynamic digital landscape, where the demand for agility, scalability, and reliability is at an all-time high, container orchestration has emerged as a pivotal technology. Kubernetes, often abbreviated as K8s, stands out as the leading solution for managing containerized applications. When combined with the robust cloud infrastructure of Microsoft Azure, it creates a powerhouse for deploying, scaling, and managing containers effectively. In this comprehensive guide, we will dive deep into the world of Kubernetes in Azure, exploring key concepts, practical use cases, real-world examples, and more. By the end of this article, you'll have a solid understanding of how to leverage Kubernetes in Azure for your container orchestration needs. Additionally, we'll touch upon Eccentrix's training programs, which can help you become a Kubernetes expert and gain certification in this critical technology.
By Boris Gigovic5 months ago in Education
Understanding the Landscape of AI, Machine Learning, Deep Learning, and Data Science
Introduction In the rapidly evolving world of technology, terms like AI (Artificial Intelligence), Machine Learning (ML), Deep Learning (DL), and Data Science are often used interchangeably. However, they represent distinct fields with unique applications and capabilities. In this article, we'll dive into the landscape of AI, ML, DL, and Data Science, and provide concrete implementation scenarios with examples to help professionals understand how to apply these technologies effectively.
By Boris Gigovic5 months ago in Education
Navigating the Digital Crime Scene
Introduction In the digital age, the importance of safeguarding digital assets and investigating cybercrimes cannot be overstated. Digital forensics is the critical field dedicated to uncovering digital evidence and analyzing it to unravel cybercrimes. In this comprehensive guide, we will delve into how digital forensics works, its potential impact on companies, forensic tools used in the process, the benefits of implementing a digital forensics strategy, and its connection to the Computer Hacking Forensic Investigator (CHFI) training offered by ECCENTRIX.
By Boris Gigovic5 months ago in Education
Exploring Unusual Types of Cloud Hosting Services: Beyond the Basics
The landscape of cloud computing has changed drastically in the last couple of years. There's a plethora of new hosting services that have gone beyond your classical Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) models. However, this is not a complete list of hosting services and, in this article, we will delve into the fascinating world of unusual cloud hosting services, such as Anything as a Service (XaaS) and specialized offerings like Security as a Service (SECaaS).
By Boris Gigovic6 months ago in Education
Revolutionizing Device Deployment
Introduction In the fast-paced world of IT, efficiency and precision are paramount. Windows Zero-Touch Deployment is a game-changing technology that empowers organizations to streamline the setup and configuration of Windows devices with minimal human intervention. In this article, we'll delve into how Zero-Touch Deployment works, explore five concrete examples of its use, and dissect the underlying technologies that make successful deployments possible.
By Boris Gigovic6 months ago in Education
Setting Up a Computer Network: A Comprehensive Configuration Guide
Understanding Computer Networks What is a Computer Network? A computer network is a collection of interconnected devices, such as computers, servers, routers, switches, and more, that can communicate and share resources. Networks can be as small as a few devices at home or as vast as global data centers that power the internet. They facilitate the exchange of data, enable remote access to resources, and support collaborative work.
By Boris Gigovic7 months ago in Education
SharePoint terminology we should know about
SharePoint allows users to create intranet sites, team sites, document libraries, lists, and other features that can be customized to suit the needs of the organization. Users can also use SharePoint to create forms, build dashboards, and manage tasks.
By Boris Gigovic8 months ago in Education
Microsoft Cloud App Security – a brief overview
What is MCAS? It enables you to identify and mitigate potential risks and security threats across a range of cloud services, including SaaS, PaaS, and IaaS. MCAS uses various security technologies and features to provide a comprehensive approach to cloud security, including:
By Boris Gigovic8 months ago in Education
Unveiling the Differences: Azure ExpressRoute vs. Standard VPN Tunnel
Azure offers two primary networking options for connecting on-premises networks to Azure virtual networks: ExpressRoute and Virtual Private Network (VPN) tunnels. In this article, we will delve into the differences between Azure ExpressRoute and a standard VPN tunnel, exploring their capabilities, use cases, and performance characteristics.
By Boris Gigovic8 months ago in Education
Understanding the Inner Workings of TCP/IP: A Foundation for Modern Networking
Introduction This writing delves into the inner workings of TCP/IP, explaining its fundamental concepts and mechanisms. By understanding how TCP/IP works, individuals can gain a deeper appreciation for the internet's infrastructure and the critical role it plays in our daily lives.
By Boris Gigovic9 months ago in Education
Microsoft Sentinel as a SIEM solution
What is the role of a SIEM? The role of a Security Information and Event Management (SIEM) system is to provide real-time visibility into security events and threats across an organization's network and systems. The primary functions of a SIEM include:
By Boris Gigovic10 months ago in Education