Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- DATA SCIENCE



  Difference between ConcurrentHashMap and Hashtable

Both ConcurrentHashMap and Hashtable are Collection classes for storing key value pairs and they both provide fast element search with a supplied key. They have much in common. However, we will not discuss the similarities between them here, instead we will focus on the differences between them. ConcurrentHashMap and Hashtable are both thread safe. But the mechanism for thread safe is different between them. Hashtable is synchronized, it utilizes the synchronization mechanism; while ConcurrentHa...

   ConcurrentHashMap,Hashtable     2013-11-18 08:06:54

  Make Big Data Collection Efficient with Hadoop Architecture and Design Tools

Hadoop architecture and design is popular to spread small array of code to large number of computers. That is why big data collection can be made more efficient with hadoop architecture and design. Hadoop is an open source system where you are free to make changes and design new tools according to your business requirement.   Here we will discuss most popular tools under the category Hadoop development and how they are helpful for big projects. Ambari and Hive– When you are designing...

   HADOOP ARCHITECTURE,HADOOP HIVE ARCHITECTURE,HADOOP ARCHITECTURE AND DESIGN     2015-09-17 05:24:44

  Code Refurbishment

Within our industry we use a huge range of terminology.  Unfortunately we don’t all agree on what individual terms actually mean.  I so often hear people misuse the term “Refactoring” which has come to make the business in many organisations recoil in fear.  The reason for this fear I’ve observed is because of what people often mean when misusing this term.I feel we are holding back our industry by not being disciplined in our use of terminology.  If...

   Code Refurbishment,Code design,terminolo     2011-09-05 08:17:14

  Introduction to DTLS(Datagram Transport Layer Security)

Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...

   JAVA 9,DTLS,TLS,SECURITY     2016-04-02 05:55:36

  Could coding be the next mass profession?

Like farming was in the 17th century, factory work during the industrial revolution, construction during the Great Depression, and manufacturing after World War II. Better, because writing code is a creative act which can be done with or without a traditional (antiquated?) office-based job, and can create enormous personal and economic value. Most young people start in jobs that don’t have much of a future. Most don’t get higher education – only a third get a...

   Coder,Learning,Training,Profession     2012-01-05 08:02:50

  What is cache penetration, cache breakdown and cache avalanche?

When designing and developing highly available system, cache is an very important consideration. It is useful to cache some frequently accessed data so that they can be accessed quickly and also cache can protect the downstream system like DB from being hit too often.  To provide better cache design in large systems, some problems may need to be considered first. In this post, we will talk about some frequently discussed cache problems and mitigation plans. Cache penetration Cache penetrati...

   SYSTEM DESIGN,CACHE PENETRATION,CACHE BREAKDOWN,CACHE AVALANCHE     2020-04-10 08:43:00

  Google CEO : Facebook holds its users hostage

Google CEO Larry Page claimed in a media interview recently that it’s unfortunate that Facebook has been pretty closed with their data while Google is in the business of searching dataPage has been attacking Facebook ban on the search engine to search its data. In fact, the battle between the two sides has been going on for several years, and in June 2011 Google launched its social networking service Google+ which somehow further exacerbated the tension. On Monday, Page, in an interview...

   Google,Facebook,Hostage,Larry Page     2012-05-23 05:58:07

  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...

   MD5,Vulnerability,attack     2012-09-29 04:47:49

  Decision Trees in C#

Decision trees are simple predictive models which map input attributes to a target value using simple conditional rules. Trees are commonly used in problems whose solutions must be readily understandable or explainable by humans, such as in computer-aided diagnostics and credit analysis. Download source code Download sample applications Download the full Accord.NET Framework Introduction Decision Trees give a direct and intuitive way for obtaining the classification of a new instance f...

   C#,Decision tree     2012-03-23 10:00:56

  The dystopia from “Blade Runner 2049” to come to mobile phones

Next Games, a Finnish mobile game developer and publisher is working along with Alcon Entertainment for the development of "Blade Runner 2049". The Next Games CEO, Teemu Huuhtanen disclosed the news this month in Electronics Entertainment Expo 2017. Besides displaying only a screenshot, the companies are yet to uncover the details regarding the release date and the title of the game. Alcon Entertainment is busy in the production of movie "Blade Runner 2049", a sequel to the 1982's dys...

   MOBILE GAME DEVELOPMENT, MOBILE GAME SERVICE,GAMES APPS SERVICE,GAME APPLICATION SERVICE     2017-06-29 12:33:18