Blog Posts
- Home /
- Blog Posts
Big Data Security and Privacy Issues
March 2, 2018
Big Data shares what is commonly termed the V properties or characteristics such as Velocity, Volume and Variety which are amongst the most typical or frequently repeated.
Read More
How to delete/revert a Git commit
March 2, 2018
You’ve just pushed something to a Git repository and you immediately regret it!
Read More
[Solved] Pip: There was a problem confirming the ssl certificate
February 26, 2018
If you ever get the following error when trying to install a Pip module under Python:
Read More
How to Learn Python Programming Quickly
February 22, 2018
So you want to learn to program in Python and you don’t have a lot of time?
Read More
NoSQL Pandas Dataframes
February 16, 2018
Pandas Dataframes are simply a table with some rows (McKinney, 2015) and many additional features built right in to make data scientists lives much easier.
Read More
Relational (SQL) vs NoSQL Database Models
February 4, 2018
The Relational (SQL) database has been a central piece to businesses since the 1970s when they first had their claim to fame.
Read More
Netflix Hadoop Big Data Marketing Use Case
January 28, 2018
Netflix is a video streaming service that has a wealth of information about their user base likes, dislikes, general consumer habits, retention lengths and much more.
Read More
Using Hadoop to manage Dark Data
January 19, 2018
Dark Data is the biggest piece of the pie (Datumize , n.
Read More
An Introduction to Client-Server Systems
December 10, 2017
A client-server architecture/system is one where the server maintains all models of the backend datasets and business logic around taking and providing information to fulfill a service request from a client which in turn shows the representation thereof.
Read More
When to use FLUSH PRIVILEGES in MySQL
December 6, 2017
So if you’ve ever created users and given them specific permissions from with SQL or the commandline, you will be familiar with a statement called FLUSH PRIVILEGES.
Read More
MySQL Community Server MSI Installer Hangs on Windows 10
December 6, 2017
I was trying to install MySQL Community Server for Windows 10 using the standard .
Read More
Android device supports x86, but APK only supports Arm
December 4, 2017
I get this error quite a lot when trying to deploy an Android APK to an emulator.
Read More
Weird Dialog Boxes
November 30, 2017
Adobe Setup setup? Got this one while using Chrome, it complains about Safari?
Read More
A bit on SQL Standards
November 12, 2017
SQL (Structured Query Language) for relational databases was maintained and standardised by the American National Standards Institute (ANSI) and the International Organisation for Standardisation (ISO) which is affiliated with the International Electrotechnical Commission (IEC).
Read More
A Brief Talk on Databases
October 29, 2017
Databases have been around since ancient times, when elaborate database systems were deployed by governments, hospitals and organisations to keep track of vast amounts of information; but only until around the 1960s did computerised databases start to take shape and become cost effective for private organisations to start using (Quickbase, n.
Read More
Cloud Computing – The Refute
September 24, 2017
Cloud is great, but when you know what you are doing, think about alternatives (Blippex, 2013).
Read More
Auditing Organisational Information Systems – Security
September 17, 2017
Auditing an organisation?s information systems is a vital part of operating a business at any decent scale.
Read More
Biometric Technology
September 17, 2017
What is Biometric Technology? Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits (Margaret Rouse, n.
Read More
Copyright Compensation in the Internet Age
September 9, 2017
The original conception of copyright in 1710 (Craig Joyce, n.d.) was that it usually covers only the expression of a particular idea and not the idea itself, but this was a very long time ago, before the challenges of a digital society.
Read More
Controlling employee digital access
September 3, 2017
Organisations of all sizes have taken to controlling what their employees can access in order to conserve computing resources, keep their employees focused 100 percent on the work they were hired to do and to make sure employees performance is high and as productive as possible (Cyberoam, n.
Read More
Tags
- Actionscript
- Advertising
- Agile
- AI
- Android
- Angular
- Ansible
- API
- Automation
- AWS
- Bash
- Big Data
- Biometrics
- C
- C++
- CDK
- Chef
- CICD
- CLI
- Cloud
- CloudFormation
- Containers
- CSS
- Data Structures
- Databases
- DevOps
- Distributed
- Docker
- Domains
- EKS
- Envoy
- Excel
- Firebase
- Forensics
- General
- Git
- Go
- Graal
- Hosting
- HTML
- IaC
- IDE
- Interview
- Istio
- Java
- Javascript
- Jenkins
- Kotlin
- Kubernetes
- Linux
- Mac
- MariaDB
- Maths
- Maven
- Microservices
- Misc
- ML
- MySQL
- Networking
- Nexus
- Node
- NPM
- Pandas
- PHP
- PIP
- Platform
- PowerShell
- Puppet
- Python
- React
- Ruby
- Rust
- S3
- Security
- SEO
- Software
- Spring
- SQL
- SRE
- SSH
- SSL
- Startup
- Terraform
- Typescript
- Ubuntu
- Web3
- Windows
- WSL