Merge branch 'master' of https://gitea.sharpe6.com/Adog64/Rowan-Classes
This commit is contained in:
commit
4d1d89c595
Binary file not shown.
Binary file not shown.
@ -0,0 +1,36 @@
|
||||
---
|
||||
title: BIOL01113 Vocabulary Assignment 13
|
||||
author: Aidan Sharpe
|
||||
date: April 28th, 2025
|
||||
geometry: margin=1in
|
||||
---
|
||||
|
||||
#### Nucleotides
|
||||
Organic molecules composed of a nitrogenous base, a pentose sugar and a phosphate.
|
||||
|
||||
#### Complimentary bases
|
||||
A relationship between two DNA bases, each following the lock-and-key principle
|
||||
|
||||
#### Helix
|
||||
The shape of a cylindrical coil.
|
||||
|
||||
#### DNA template
|
||||
The original, now separated, strands of DNA that new nucleotides pair to.
|
||||
|
||||
#### DNA polymerase
|
||||
A family of enzymes that catalyze the synthesis of DNA molecules from nucleoside triphosphates, the molecular precursors of DNA.
|
||||
|
||||
#### Ribose
|
||||
A simple sugar and carbohydrate, a component of the ribonucleotides from which RNA is built.
|
||||
|
||||
#### RNA polymerase
|
||||
An enzyme that catalyzes the chemical reactions that synthesize RNA from a DNA template.
|
||||
|
||||
#### mRNA
|
||||
A single-stranded molecule of RNA that corresponds to the genetic sequence of a gene, and is read by a ribosome in the process of synthesizing a protein.
|
||||
|
||||
#### rRNA
|
||||
A type of non-coding RNA which is the primary component of ribosomes.
|
||||
|
||||
#### tRNA
|
||||
An adaptor molecule composed of RNA, that provides the physical link between the genetic code in messenger RNA (mRNA) and the amino acid sequence of proteins, carrying the correct sequence of amino acids to be combined by the protein-synthesizing machinery, the ribosome.
|
Binary file not shown.
@ -0,0 +1,30 @@
|
||||
---
|
||||
title: BIOL01113 Pre-Lab Project 9
|
||||
author: Aidan Sharpe
|
||||
date: March 31st, 2025
|
||||
geometry: margin=1in
|
||||
---
|
||||
|
||||
# External
|
||||
1. Sclera
|
||||
2. Cornea
|
||||
3. Optic nerve
|
||||
4. Adipose (fat)
|
||||
|
||||

|
||||
|
||||
|
||||
# Front
|
||||
5. Ciliary body
|
||||
6. Iris
|
||||
7. Pupil
|
||||
8. Lens
|
||||
|
||||

|
||||
|
||||
# Back
|
||||
9. Sclera
|
||||
10. Choroid
|
||||
11. Optic disc
|
||||
|
||||

|
Binary file not shown.
Binary file not shown.
After Width: | Height: | Size: 27 KiB |
Binary file not shown.
After Width: | Height: | Size: 52 KiB |
Binary file not shown.
After Width: | Height: | Size: 39 KiB |
@ -0,0 +1,11 @@
|
||||
import numpy as np
|
||||
import scipy as sp
|
||||
import matplotlib.pyplot as plt
|
||||
|
||||
|
||||
def main():
|
||||
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/cloud-hardware/IAM - In Class.docx
Normal file
BIN
8th-Semester-Spring-2025/cloud-hardware/IAM - In Class.docx
Normal file
Binary file not shown.
@ -0,0 +1,42 @@
|
||||
---
|
||||
title: ECE09488 AWS Assignment Notes
|
||||
author: Aidan Sharpe
|
||||
date: April 24th, 2025
|
||||
geometry: margin=1in
|
||||
colorlinks: true
|
||||
---
|
||||
|
||||
Video: [Amazon AI Conclave 2024 Generative AI Keynote | AWS Events](https://www.youtube.com/watch?v=p_CwWdPTdm8&list=PL2yQDdvlhXf8xcKr0-BHEyg_8VB4tWdu1&index=12)
|
||||
|
||||
## Overall vision
|
||||
- Enable easy deployment of generative AI in the cloud
|
||||
- "Drag and drop" foundational models
|
||||
- Make comparing models easy
|
||||
|
||||
## New services
|
||||
- Amazon Bedrock
|
||||
- Model evaluation
|
||||
- Knowledge bases
|
||||
- Agents
|
||||
- Amazon Titan Foundation Models
|
||||
- Titan Text Embeddings
|
||||
- Titan Text Lite
|
||||
- Titan Text Express
|
||||
- Titan Multimodal Embeddings
|
||||
- Titan Image Generator
|
||||
- Amazon Q
|
||||
|
||||
## Use cases
|
||||
- Choose between models from different providers
|
||||
- AI21Labs Jurassic
|
||||
- Amazon Titan
|
||||
- Anthropic Claude
|
||||
- Cohere Command + Embed
|
||||
- Meta Llama 2
|
||||
- Stability AI Stable Diffusion
|
||||
- Stitch different types of models together
|
||||
- Text and images
|
||||
|
||||
## Demos
|
||||
- Demonstrated automatic model evaluation on a specific task type (text summarization) on several different metrics
|
||||
- Demonstrated knowledge bases using text stored in an S3 bucket to give information to models
|
Binary file not shown.
@ -0,0 +1,16 @@
|
||||
---
|
||||
title: ECE09488 Chapter 7 Questions
|
||||
author: Aidan Sharpe
|
||||
date: April 3rd, 2025
|
||||
---
|
||||
|
||||
1. d
|
||||
2. c
|
||||
3. c
|
||||
4. b
|
||||
5. d
|
||||
6. c
|
||||
7. a
|
||||
8. d
|
||||
9. b
|
||||
10. a
|
Binary file not shown.
@ -0,0 +1,36 @@
|
||||
---
|
||||
title: ECE09488 Chapter 7 Questions
|
||||
author: Aidan Sharpe
|
||||
date: April 3rd, 2025
|
||||
geometry: margin=1in
|
||||
---
|
||||
|
||||
### 1. Which of the following employees will most likely need a privileged user account?
|
||||
d. A technician who helps users reset passwords
|
||||
|
||||
### 2. Which part of AAA lets you perform the creation of an EC2 instance?
|
||||
c. Authorization
|
||||
|
||||
### 3. When signing an electronic document, what secret must you keep?
|
||||
c. Your private key
|
||||
|
||||
### 4. Which of the following combinations is MFA?
|
||||
b. Fingerprint and password
|
||||
|
||||
### 5. When Lisa needs access to make edits to the tables in a database, her boss gives her user account the same role as he has. What tenet of IAM security has been comprimised?
|
||||
d. Least privilege
|
||||
|
||||
### 6. Which key is used to decrypt information contained within a server's digital certificate?
|
||||
c. The client's private key
|
||||
|
||||
### 7. Which access control method is controlled by individual users?
|
||||
a. DAC
|
||||
|
||||
### 8. Which technology ensures a cluster of servers can handle incoming requests without having to track individual conversations?
|
||||
d. REST
|
||||
|
||||
### 9. Haphazardly adding permissions every time someone needs to do a new task causes increased
|
||||
b. privilege creep
|
||||
|
||||
### 10. Which standard supports SSO?
|
||||
a. SAML
|
Binary file not shown.
@ -0,0 +1,67 @@
|
||||
---
|
||||
title: ECE09488 Final Project
|
||||
author: Aidan Sharpe
|
||||
date: May 2nd, 2025
|
||||
geometry: margin=1in
|
||||
---
|
||||
|
||||
# Part 1: Host a Website
|
||||
I created an EC2 instance running Debian. I downloaded the OpenSSH key to my computer, and SSH-ed into the VM. From there, I installed Docker, and created a folder for an Apache Container. Then, I copied a Docker compose file to configure the container. I added a file called `index.html`, where I added a bare bones "Hello World" HTML file. Finally, I configured the firewall rules on my EC2 instance to allow HTTP traffic on port 80 (no sense messing around setting up HTTPS). As seen below, I was able to access the web page using the DNS link provided by AWS.
|
||||
|
||||

|
||||
|
||||
# Part 2: Given a Scenario
|
||||
Your company, TechCo, has been successfully running its critical applications on a public cloud platform for several years. These applications handle sensitive customer data, financial transactions, and inventory management. The cloud provider offers robust infrastructure and high availability, but unforeseen events can still disrupt services.
|
||||
|
||||
Although TechCo has been lucky, they know they must plan for unfortunate events. Your management wants to know how Cloud an be used for disaster recovery and business continuity.
|
||||
|
||||
## Background and Assumptions
|
||||
Every company should be thinking about disaster recovery well before any disaster has the chance to occur. It is critical in any high availability infrastructure to have in place a disaster recovery plan. We will assume that the cloud provider has 99.999% (5-nines) uptime, which averages to about 5 minutes of downtime per year. We will also assume that some or most of our customer's data is sensitive, and therefore, we will have to treat all data as sensitive. This means following HIPPA laws, as some of our customers may hold medical records. Finally, we will assume that we are operating out of the Eastern United States.
|
||||
|
||||
## Technical Solution
|
||||
To start, I would recommend one of the big three cloud providers (GCP, AWS, Azure). Due to their sheer size, they have redundant datacenters and are able to take the most advantage of economies of scale. Therefore, our infrastructure will be more robust and cost-effective. All three providers have similar (yet incompatible) options when it comes to redundancy and security, so for the sake of choosing one, we will go with AWS, as it has been highlighted the most throughout this course.
|
||||
|
||||
### Architecture
|
||||
We will start our redundant system by setting up two VPCs. The primary VPC will be located on an EC2 instance located on `us-east-1` and our secondary instance will operate on `us-west-2`. Our database (lets assume we use Aurora) will be replicated accross both instances. Then, in the event of an outage, we can use Amazon Route 53 to redirect DNS failures to our secondary instance. We can automate this process using a health check trigger. For backups, we will use S3 Glacier for long-term cold storage.
|
||||
|
||||
### Why Cloud?
|
||||
The cloud is the best platform for this infrastructure, as cloud technology offers a wide array of tools to enable redundancy and automatic backups. It also enables easy monitoring, in our case we would use Amazon CloudWatch. The cloud also ensures that our services can scale with the growth of our company.
|
||||
|
||||
### Security Features
|
||||
All traffic must be end-to-end encrypted to protect data in transit. We will also block all unused ports in our firewall to reduce our attack surface. The data stored in our Aurora database shall also be encrypted without any possibility of data access on our part. The customers only will be responsible for holding the private keys. This will prevent our employees from accessing customer data, and reduce our responsibility for maintaining and protecting the private keys. Generally, we will enforce the principle of least privilege using IAM rules and policies. We will also use AWS GuardDuty for threat detection. Finally, we will protect ourselves from DDoS attacks using AWS WAF.
|
||||
|
||||
### Cost Breakdown
|
||||
Without any idea of the scale of TechCo and the number of customers, I cannot assume the monthly cost. To calculate the cost would involve the following:
|
||||
|
||||
#### Compute Costs
|
||||
- 2 EC2 instances
|
||||
- Load balancer
|
||||
|
||||
#### Database Costs
|
||||
- 1 active (primary) database
|
||||
- 1 read-only (backup) database
|
||||
|
||||
#### Storage Costs
|
||||
- 2 S3 buckets for cross-region data replication
|
||||
- S3 Glacier archival backups
|
||||
|
||||
#### Network Costs
|
||||
- Route 53
|
||||
- Automatic failover
|
||||
- DNS health check
|
||||
|
||||
#### Monitoring Costs
|
||||
- CloudWatch with logs
|
||||
|
||||
#### Security Costs
|
||||
- GuardDuty
|
||||
- IAM
|
||||
- WAF
|
||||
|
||||
#### Other
|
||||
- Data transfer from primary to backup instance
|
||||
|
||||
## Conclusions
|
||||
The cloud offers a plethora of tools to enable secure, reliable services. Unfortunately, simply spinning up a VM will not give you all the benefits of the cloud. To fully take advantage of the benefits of CSPs, a lot of work has to be done ahead of time to plan for and prevent disasters. This involves setting up redundant systems, creating regular backups in archival storage, protecting customer data, and automating monitoring and failovers.
|
||||
|
||||
Even still, no matter how much preparation work you do, it will never be enough. You can only protect yourself against known uncertainties, yet it is the unknown unknowns that have the potential to sneak up and cause the most damage. So when disaster inevitably strikes, it is absolutely critical to have a safety net to fall back on.
|
Binary file not shown.
Binary file not shown.
After Width: | Height: | Size: 525 KiB |
BIN
8th-Semester-Spring-2025/cloud-hardware/s3-assignment.png
Normal file
BIN
8th-Semester-Spring-2025/cloud-hardware/s3-assignment.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 90 KiB |
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-10.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-10.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-11.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-11.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-12.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-12.pdf
Normal file
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-8.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-8.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-9.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-9.pdf
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user