Posts

Showing posts from September, 2018

BIG DATA Analysis

Image
Artificial Intelligence (AI), mobile, social and Internet of Things (IoT) are driving data complexity, new forms and sources of data. Big data analytics is the use of advanced analytic techniques against very large, diverse data sets that include structured, semi-structured and unstructured data, from different sources, and in different sizes from terabytes to zettabytes.... Read more

Creating and Deleting User in Oracle

Image
Oracle with Linux, Commands Command for creating a new user in oracle : CREATE USER <> IDENTIFIED BY <> DEFAULT TABLESPACE < TEMPORARY TABLESPACE temp QUOTA 50M ON <>; In oracle users can be created by the above syntax ,but before creating a new user one have to create table space ...... Read more

How cloud speed helps SQL Server DBAs

Image
A few years ago, the Microsoft SQL Server product team introduced a new cloud Platform-as-a-Service (PaaS), Azure SQL Database, which shares the SQL Server code base. Running a cloud-first service required significant changes to the legacy SQL Server engineering model which took years of investment in order to fully enable. With these engineering model changes came big benefits which positively impacted both Azure SQL Database and SQL Server..... Read more

Mission Critical Artificial Intelligence forArtificial Intelligence Fraud Prevention

Image
The economy relies on secure and safe transactions. Maintaining a stable and efficient business depends on effective security. In particular, eliminating fraud is fundamental to the ongoing viability of many businesses, especially those buying and selling on the Internet..... Read more

How do end-to-end encryption and group chats work?

Image
In recent years we’ve seen plenty of evidence that centralized messaging servers aren’t a very good place to store confidential information. The good news is: we’re not stuck with them. One of the most promising advances in the area of secure communications has been the recent widespread deployment of end-to-end (e2e) encrypted messaging protocols..... Read more