Skip to main content

Posts

Manage multiple data sources for high-performance applications

Applications can pull from and work with data from , multiple sources as long as the app design incorporates these five fundamental data management and mapping techniques. If you don't account for and carefully manage data sources during application design, there's a real risk that the application will fail to meet performance, resilience and elasticity expectations. This risk is especially true in analytics applications that draw from multiple data sources. However, there are five ways to address the problem of multiple data sources in an application architecture: Know what data you need to combine, use data visualization, add data blending tools, create abstracted virtual database services and determine where to host data sources. Let's look at what each of these tasks entails and why they make a difference in application data management. 1. Know what data to combine The first thing to understand is what you should combine, both in terms of the data sources and ...

Dimensional Modeling in the Age of Big Data and Hadoop

This long article has the following sections: Why do we need to model our data? Why do we need dimensional models? Data Modelling vs Dimensional Modelling So why do some people claim that dimensional modelling is dead? The Data Warehouse is dead Confusion The Schema on Read Misunderstanding Denormalization revisited. The physical aspects of the model. Taking de-normalization to its full conclusion Data distribution on a distributed relational database (MPP) Data Distribution on Hadoop Dimensional Models on Hadoop Hadoop and Slowly Changing Dimensions Storage evolution on Hadoop The verdict. Are dimensional models and star schemas obsolete? Complementary Reading on Dimensional Modelling in the Era of Big Data The purpose of this article is threefold (1) Show that we will always need a data model (either done by humans or machines) (2) Show that physical modelling is not the same as logical modelling. In fact it is very different and depends on the underlying techn...

51% Attack in Blockchain Technology [Explained]

Through the design of the technology, we know that the blockchain is immune to attack from any individual member of the network. However, what happens if the blockchain comes under attack from a  large group  of participants? More precisely, what happens if a group successfully takes control of over 50% of the computing power of the blockchain? Such a scenario is known as a  51% attack , and it is one of the few real vulnerabilities of a blockchain. To understand the problems posed by a 51% attack, we must return to the fundamentals of the blockchain and recall the process of adding a new block to the chain. Members of a network compete to be the first to compute a valid seal for the block and claim a reward. Inevitably, a group of individuals in control of over half the computing power of the network can monopolize this process and claim all the rewards for themselves. Such a situation allows this group to be the only entity to benefit from the rewards of the block...

Blockchain Technology Use Cases in the Banking Sector

The blockchain technology has successfully disrupted many industries, and the banking sector is one of the main beneficiaries, dare we say. The fintech sector is truly up and running, and companies everywhere are building blockchain solutions. With use cases such as international payments, KYC, and optimized cash management, the blockchain is truly the next big thing when it comes to the finance. According to surveys, 90% of executives surveyed said that their firm was looking into using blockchain for their operations. Due to the decentralized nature of the blockchain, it is easier to form a global banking network where international transactions and other operations could be carried out easily. Santander, a Spain-based bank, reports savings of USD 20 billion a year if blockchain is incorporated. Different consortiums and organizations have started taking collective steps toward blockchain adoption. Talking about the current scenario, there exist many potential use cases for b...

Blockchain Applications in Supply Chain

The distributed-nature technology of Blockchain has disrupted many industries, with its uses and applications leading to new innovations everywhere. Bitcoin and other cryptocurrencies are just the initial use cases of the blockchain. The truth is that blockchain technology can be applied to far more sectors than was initially imagined. More security, decentralized nature, easy verification, and protected identities are just some of the many features that make the blockchain truly transformational. One area where this technology can be efficiently exploited is the supply chain sector. Blockchain essentially is a distributed ledger that is updated in real time with each network participant making a transaction. This specific feature can be put to good use when it comes to the supply chain management. Logistics demand transparency and traceability. It is clear that customers want their meat or grains to be exactly as has been promised on the packaging. Incorporating blockchain int...

2019 Belongs to Modi

Those who think BJP has lost its support and people are unhappy might want to hear this. “People who are making those comments are either middle class or short business class who were saving taxes. The tax component was their earning and now they have lost it. Now here comes data science. Picking data from rural India. How many families have benefited from the cooking gas and electricity? How many have got access to toilets and how many kids are going to school now? When I study this I am getting a figure of fifty crore. Even in forty-fifty crore, being a conservative I divide it by two, it is twenty crore. You know in 2014, the elections were won by a small margin of 1.4 crore and here you have a larger swing. So my calculation says 2019 belongs to Modi.

DANGER (STILL) LURKS IN THE INTERNET OF THINGS (IOT)

All of the media, both “mainstream” and “tech”, has gushed over all of the new appliances and devices that are now in the category of what we would call the Internet of Things.  Items like home security,  home lighting, and refrigerators, to name a few. There are many advantages to having connected appliances and devices, Threats that can and will be exploited if unsuspecting users don’t secure them.   Two “layers” of security : The first layer of offering  is a security API that will provide [a way] to easily do a virtual patch, to prevent a remote attack, for example . . . the third layer is cloud: IoT cannot do anything without the cloud.  Most data is sent to the cloud and you will need to have proper protection and make sure the cloud is always available. In both situation Users are vulnerable, mostly due to their own apathy.  Users often either don’t know how to patch their own machines (and in this case, devices) or have glanced...