Posts

Featured Post

SQL Interview Success: Unlocking the Top 5 Frequently Asked Queries

Image
 Here are the five top commonly asked SQL queries in the interviews. These you can expect in Data Analyst, or, Data Engineer interviews. Top SQL Queries for Interviews 01. Joins The commonly asked question pertains to providing two tables, determining the number of rows that will return on various join types, and the resultant. Table1 -------- id ---- 1 1 2 3 Table2 -------- id ---- 1 3 1 NULL Output ------- Inner join --------------- 5 rows will return The result will be: =============== 1  1 1   1 1   1 1    1 3    3 02. Substring and Concat Here, we need to write an SQL query to make the upper case of the first letter and the small case of the remaining letter. Table1 ------ ename ===== raJu venKat kRIshna Solution: ========== SELECT CONCAT(UPPER(SUBSTRING(name, 1, 1)), LOWER(SUBSTRING(name, 2))) AS capitalized_name FROM Table1; 03. Case statement SQL Query ========= SELECT Code1, Code2,      CASE         WHEN Code1 = 'A' AND Code2 = 'AA' THEN "A" | "A

Social Media Jobs You need to look in

Image
Social media has transformed the way people socialize, network and stay in touch. Social Media Jobs Social media is more than liking or retweeting a post; it's a new, cutting-edge marketing medium with unlimited potential. According to Constant Contact's Small Businesses: Then and Now Survey conducted in May 2013, social media marketing has exploded, with 87 percent of small businesses using social media as a marketing tool today. Since social media marketing requires a combination of analytical skills, good communication and performing extensive research, you can bet business, communications and English-related degrees are good candidates for 2014 social media job openings. Explore the new frontier of marketing with these six up-and-coming social media positions: Search engine optimization (SEO) specialist Social media strategist Online community manager Social media marketing manager Social media marketing coordinator Blogger or social media copywriter

Cloud Security rules top book to read it now

Image
The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. 1. Questions you will find answers about include Do I have to accept that standard SLA? What should an SLA include? What standards should I be paying attention to, if any? How do I treat mobile workers, and how do they fit into the cloud? Do I really need to care about logging? 2. Other Stuff You Will Learn Many more! Since the cloud co

6 Worth-it Cloud Security Courses

Image
Cloud security is critical to run cloud-applications. I have shared few courses useful for cloud security. To get a job you need good training. Security courses are currently hot in the market. Cloud Security Hands-On Trainin g: This course provides a solid foundation in cloud security, and includes a full day of hands-on labs to apply the principles in practice. We cover all the material needed to pass the Cloud Security Alliance Certificate of Cloud Security Knowledge (CCSK) exam, but add a pragmatic approach to immediate kick start your cloud security projects. For Black Hat we also add expanded material to show you how to take cloud security to the next level by leveraging DevOps techniques and the characteristics of the cloud. Cloud Security Fundamentals : An overview of security issues within each of these models will be covered with an in-depth discussion of the risks involved. This cloud security training course will go in-depth on architecture and infrastruc

Top IT Skills 2015

Image
IT spending for security technologies will increase 46% in 2015, with cloud computing increasing 42% and business analytics investments up 38%. Enterprise investments in storage will increase 36%, and for wireless and mobile, 35%. IT spending for security technologies will increase 46% in 2015, with cloud computing increasing 42% and business analytics investments up 38%. Cloud computing initiatives are the most important project for the majority of IT departments today (16%) and are expected to cause the most disruption in the future. IDG predicts the majority of cloud computing’s disruption will be focused on improving service and generating new revenue streams. These and other key take-aways are from recent IDG Enterprise research titled Computerworld Forecast Study 2015. The goal of the study was to determine IT priorities for 2015 in areas such as spending, staffing and technology.  Computerworld spoke with 194 respondents, 55% of which are from the executive IT roles. 1

Tech Mahindra Launched Big data platform

Image
Tech Mahindra has announced the launch of Usage Based Insurance (UBI), a big data and predictive analysis driven platform for auto insurers. It allows them to adjust premiums according to actual usage patterns of individual drivers instead of industry averages. UBI Platform The platform is flexible to fit to the growing needs of global insurance enterprises, where the market is expected to grow $100 billion plus by the end of the decade. The solution utilizes the capabilities of Tech Mahindra and AT and T in the areas of multi-vertical, engineering and infrastructure capabilities. As a result of this, the global insurers can reduce their claim costs by up to 20%,while reducing eligible insured driver premiums up to 40%. This Usage Based Insurance solution is hosted on the seamless AT&T cloud and served through AT and T's global Machine-to-Machine (M2M) capabilities. What is usage based insurance This technology is already being used successfully for both car a

Cloud Security the real challenges you need to look in

Image
You may curious that cloud computing will solve all your problems. In reality, there is security problem. That is- data security problem. I am just explaining my thoughts on data security in cloud. Really many security professional need in future. Data is crucial to any organization. When data leaks into public, organization may collapse and loose its business. Try to understand where we lack on data security.

The best career skills need for Social media platform

Image
#How-to-apply-social-media-analytics-for-all-it-developers Listening -  This one is still very much true, and perhaps even more so. The best social media pros listen the most actively and most aggressively. Pattern Recognition -  This is getting more and more critical as the data and complexity of social continues to ratchet up. Are these posts on our Facebook page a crisis in the making, or just noise? Where are the real-time marketing opportunities?  Instantly identifying patterns and being able to capitalize upon them  are some of the skills that separate good social practitioners from great ones. Visual Thinking -  This is perhaps the biggest change in the past year or two. Being a great writer was formerly a key characteristic of many social pros, as being able to coherently write in 140 characters isn’t as easy as it appears. Today, with every social network embracing visuals and multi-media,  being able to represent the brand visually is absolutely critical.  This i