NoSQL Pandas Dataframes

**tldr; **Pandas Dataframes are simply a table with some rows (McKinney, 2015) and many additional features built right in to make data scientists lives much easier. What are NoSQL Pandas dataframes? Pandas is an open source Python library that provides high performance yet easy to use data structures and data analysis tools (Pandas, 2018). Dataframes are two-dimensional size-mutable, potentially heterogeneous tabular data structure with labeled axes. They can be thought of as dictionary type containers for Series objects (PandasDocs, 2018); they are also the primary data structure used in Pandas.

Relational (SQL) vs NoSQL Database Models

The Relational (SQL) database has been a central piece to businesses since the 1970s when they first had their claim to fame. Experts say that the world?s data is doubling every two years (Gajani, 2017) and this is simply something that traditional relational databases cannot manage with their architectural inner workings and scalability concerns. Carlo Strozzi first used the term NoSQL in 1998 to name his then lightweight database to show distinctions between it?

Netflix Hadoop Big Data Marketing Use Case

Netflix is a video streaming service that has a wealth of information about their user base likes, dislikes, general consumer habits, retention lengths and much more. Netflix uses their big data to commission original programming content that it knows will succeed and be accepted in relevant published markets (O?Neill, 2016). They perform various A/B tests to determine which variant of similar things perform higher, for example, when showing cover images for series or movies, they will at random show alternative images to determine which proves more reactive from their user base.

Using Hadoop to manage Dark Data

Dark Data is the biggest piece of the pie (Datumize , n.d.) when it comes to Big Data and what lies beneath huge datasets of collected information. IBM has stated in a report that over 80 percent of all data is dark and unstructured, meaning that it is simply too much data to process, analyse or unlock valuable information from. This data is termed Dark Data and is mostly unstructured and oftentimes missing or incomplete, which leaves a lot of potential for solutions to be built around high volume analytics and processing.

An Introduction to Client-Server Systems

A client-server architecture/system is one where the server maintains all models of the backend datasets and business logic around taking and providing information to fulfill a service request from a client which in turn shows the representation thereof. The client/server model has quickly grown in popularity throughout the 1990s and today serves as a favoured choice for most organisations? (Subramanian, Lacity, 1997) operations. There is a statement which asserts that ?

When to use FLUSH PRIVILEGES in MySQL

So if you’ve ever created users and given them specific permissions from with SQL or the commandline, you will be familiar with a statement called FLUSH PRIVILEGES. It is said that if you create a new user, or alter than user, you should run FLUSH PRIVILEGES in order for the MySQL Engine’s Session to take the change into immediate effect. But what about if you GRANTed or REVOKEd a permission? Do you still need to use it?

MySQL Community Server MSI Installer Hangs on Windows 10

I was trying to install MySQL Community Server for Windows 10 using the standard .MSI installer provded from the MySQL website and the installer just hung, saying that there was 3 seconds remaining. About half an hour later, it still said “3 seconds remaining”. It turned out that you have to run cmd (commandline) as Administrator: Press Windows Key (Super), type “cmd”, right click on “Command Prompt” and select “Run as administrator”.

Android device supports x86, but APK only supports Arm

I get this error quite a lot when trying to deploy an Android APK to an emulator. “Device supports x86_64, x86, but APK only support , all, armeabi-v7a“ The good thing is that it is actually a very easy thing to fix. While doing development you can simply change the Build Variant target. How do you do that? Click “View” -> “Tool Window” -> “Build Variants“ Notice that ARM is currently selected and most of the time you will want x86 to be the build target if you are deploying to a emulator.

Weird Dialog Boxes

Adobe Setup setup? Got this one while using Chrome, it complains about Safari? What a load of bullshit! Really? Very handy tips screen! ERROR: NO ERROR!

A bit on SQL Standards

SQL (Structured Query Language) for relational databases was maintained and standardised by the American National Standards Institute (ANSI) and the International Organisation for Standardisation (ISO) which is affiliated with the International Electrotechnical Commission (IEC). When a new SQL standard is published by these organisations it is outlined on the ISO website and available for everyone to both reference and use as required. The current version used in most production instances is commonly ISO/IEC 9075-11:2011; however, in December of 2016 a new version was published and is described under ISO/IEC 9075-11:2016 which can be found here: https://www.

A Brief Talk on Databases

Databases have been around since ancient times, when elaborate database systems were deployed by governments, hospitals and organisations to keep track of vast amounts of information; but only until around the 1960s did computerised databases start to take shape and become cost effective for private organisations to start using (Quickbase, n.d.). I have used countless databases over my career to reliably store and retrieve many sizes of information, from a small collection of less than ten items of data to terabytes worth of hundred of billions of data points spread across clusters of machines around the world.

Cloud Computing – The Refute

Cloud is great, but when you know what you are doing, think about alternatives (Blippex, 2013). What is Cloud? “The cloud” is a term given to pay as you go – or pay monthly – off premises computing services that provide either hosting or storage to it?s user base. These services are created, maintained and wholly operated by a cloud computing provider. Instead of purchasing and managing your own infrastructure, many opt for a cloud based model where you simply pay for the amount of resources you require at a given time.

Auditing Organisational Information Systems – Security

Auditing an organisation?s information systems is a vital part of operating a business at any decent scale. Particularly from a security standpoint (Mohamed ElBorno, n.d.). Information systems have many different facets and each organisation operates slightly differently, so while auditing can be handled the same on general shared traits, more bespoke business units and organisational structures should be taken into account when designing a well thought out auditing system that fully guarantees the security of an organisation?

Biometric Technology

What is Biometric Technology? Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits (Margaret Rouse, n.d.) Such recognition usually falls into one of the main categories such as: Facial recognition Hand geometry Earlobe geometry Signature comparison Voice waveform recognition Iris-pattern and Retina-pattern recognition Fingerprint recognition The above are the verification patterns which various technologies are built around in order to create working application use cases for larger security concerns.

Copyright Compensation in the Internet Age

The original conception of copyright in 1710 (Craig Joyce, n.d.) was that it usually covers only the expression of a particular idea and not the idea itself, but this was a very long time ago, before the challenges of a digital society. Since then, copyright has had to encompass a wide variety of extended property far removed from it?s original case studies that were available at the time. In the Internet Age, digital items such as music, video (films, series, etc.

Controlling employee digital access

Organisations of all sizes have taken to controlling what their employees can access in order to conserve computing resources, keep their employees focused 100 percent on the work they were hired to do and to make sure employees performance is high and as productive as possible (Cyberoam, n.d.). However, keeping employees motivated and productive is not as simple as simply restricting specific access to internet resources and computer controls. There are many advantages and disadvantages when it comes to controlling said access (CCM, 2017).

Electronic monitoring in the workplace

Electronic monitoring is not a new thing, nor one that only affects the workplace. From closed circuit television (CCTV) in stores and down many streets, to similar surveillance in offices everywhere, we are constantly being monitored in all aspects of our lives. Why and how employers are monitoring employees Many employers and organisations tend to perform similar tactics when it comes to monitoring (Emma Anderson, 2014), but I would like to focus on my current and previous employer in order to draw a common ground and paint a picture as to where and how we as employees are being electronically monitored.

The Therac-25 Case Study – What Actually Happened?

The Therac-25 was a computerised medical technology radiation therapy machine produced by Atomic Energy of Canada Limited (AECL) in 1982. Between 1985 and 1987, it was involved in at least six patients deaths due to incorrect radiation doses because of computer software related failure. When the error was first seen, it was thought to be a hardware problem with the microswitches. After further inspection and deeper technical analysis; the problem was due to a software bug where a Race-Condition – which is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time but the operations must be done in the proper sequence to be done correctly.

Your Responsibilities as an IT Professional

As an IT professional it is extremely important to make sure that you do not take advantage of your position on being able to introduce certain skewed characteristics into a computing system in order to gain unfair advantage to your company or client?s business. This is seen as unethical and in many cases can also be illegal. Your professional responsibilities are: Role The person assigned a task is considered the responsible one (Illinois Ideals, n.

New capabilities with technology

Computing technology has undoubtedly had some very prominent impact on society at large. Of the almost countless capabilities that it has brought us, the following five core capabilities are without a doubt at the top of any compiled list on the subject: Ever increasing speed Unlimited storage potential Lack of human error Global connectivity Auditability Being able to store an unlimited amount of data is one of the main capabilities that we will expand upon and explore in a bit more detail as it provides innumerable offsprings into technological advancements and data insights generally for a wide range of applications and technologies in almost all sub-industries.