Posts

Showing posts from June, 2019

How Big Data Analytics Can Help You Improve And Grow Your Business?

Image
Big Data Analytics There are certain problems that can only solve through big data. Here we discuss the field big data as "Big Data Analytics". The big data came into the picture we never thought how commodity hardware is used to store and manage the data which is reliable and feasible as compared to the costly sources. Now let us discuss a few examples of how big data analytics is useful nowadays. When you go to websites like Amazon, Youtube, Netflix, and any other websites actually they will provide some field in which recommend some product, videos, movies, and some songs for you. What do you think about how they do it? Basically what kind of data they generated on these kind websites. They make sure to analyze properly. The data generated is not small it is actually big data. Now they analysis these big data they make sure whatever you like and whatever you are the preferences accordingly they generate recommendations for you. If you go to Youtube you have noticed

AI Vs Machine Learning Vs Deep Learning

Image
AI Vs Machine Learning Vs Deep Learning Artificial intelligence, deep learning and machine learning are often confused with each other. These terms are used interchangeably but do they do not refer to the same thing. These terms are closely related to each other which makes it difficult for beginners to spot differences among them. The reason I think of this puzzle is that AI is classified in many ways. It is divided into subfields with respect to the tasks AI is used for such as computer vision, natural language processing, forecasting and prediction, with respect to the type of approach used for learning and the type of data used. Subfields of Artificial Intelligence have much in common which makes it difficult for beginners to clearly differentiate among these areas. Different approaches of AI can process similar data to perform similar tasks. For example Deep learning and SVM both could be used for object detection task. Both have pros and cons. In some cases Machine Learn

How To Become A Successful Programmer?

Image
Photo by Samuel Zeller on Unsplash How To Become A Successful Programmer? I have heard many novice programmers saying I want to get better at programming but there is hardly a slight improvement in their skills. I have observed that most of them say they want to get better but that is just a wish. They do not really mean it. They mere wish to improve their skills. They do not work for it. Your wish does not guarantee that you will become a successful programmer. Many other people who have developed an interest in computer programming do not know how to reach to a point where they will be called successful programmers. They either keep wandering in the middle of nowhere or just give up. The same response is for them too as it was for the wishers. Your interest does not guarantee that you will succeed. Programming is a field which requires intensive work to master. Along with improving your technical knowledge of programming, you need to work on your interest. You n

Introduction to Data Science: What is Big Data?

Image
What Is Big Data First, we will discuss how big data is evaluated step by step process. Evolution of Data How the data evolved and how the big data came. Nowadays the data have been evaluated from different sources like the evolution of technology, IoT(Internet of Things), Social media like Facebook, Instagram, Twitter, YouTube, many other sources the data has been created day by day. 1. Evolution of  Technology We will see how technology is evolved as we see from the below image at the earlier stages we have the landline phone but now we have smartphones of Android, IoS, and HongMeng Os (Huawei)  that are making our life smarter as well as our phone smarter. Apart from that, we have heavily built a desktop for processing of Mb's data that we were using a floppy you will remember how much data it can be stored after that hard disk has been introduced which can stored data in Tb. Now due to modern technology, we can be stored data in the cloud as well. Similarly, n

How To Code? Function Overloading

Image
If you are thinking how does this image relates to the topic, don't think. Keep calm and keep reading. What is function overloading? Function overloading is a concept in programming where there are multiple functions with the same name having different parameters. Different parameters mean either the number of parameter is different or the data type or the order of input parameters is different. If the names of multiple functions are the same then how does a compiler/interpreter recognize which function has been called? Recall function signature from the previous post . Compiler recognizes each function by its signature and function signature includes function name, number of parameters passed to it, their data type and the order in which they are provided. Each version of an overloaded function is almost same for us but entirely a different function for compiler. It just executes the function to which a call has been made irrespective of it is an overloaded function

How To Code? Types Of Functions In Programming

Image
Types Of Functions In Programming: In previous post we briefly discussed what are functions in programming and how to use them  in a generic way. Here, you will learn what are different types of functions. Functions are divided into two categories based on where their definition exists. Built in functions User define functions 1. Built-in Functions Built-in functions are those which are already defined in a library. All you need to do is to import the library and call the function. There is no need to define and declare the required function. Steps to use Built-in function: Each and every language has a rich set of libraries developed for specific purposes. It is really hard to remember all of these libraries and functions and there is no need to remember at all. Here are listed some steps that I would suggest you to find a library and its functions for certain task. Understand both the problem and your solution Search a library suitable for your need Find you

How To Use Notepad To Keep Your Credentials Secure From A Kelogger?

Image
Thanks to Dmitry Ratushny Keylogging is considered one of the most dangerous attack in cyber security because it is hard to detect and it can steal your most valueble information. Keylogger is a malware which records your keystrokes and send it to the intended person or store it in local storage which can latter be used for any purpose. It can record your social media account passwords, bank acount PIN, emails you type to your boss, messages you send to you ba, litrally everything you type. Keyloggers are spread through the same means other malware are distributed. It could be directly installed in a victim's device or sent via the Internet. Direct installation is hard and could be easily prevented. However, you need to take some security measures in order prevent remote installation.  There are some useful methds which can keep you secure from keyloggers. Gavin Phillips lists here  5 of them to protect yourself against keyloggers . But these precautionary measure