Skip to main content


Featured post

8 Top Data Science Platform Developers in the World

Top data science tools and platforms providers across the world. Useful information for data science and data analytics developers.

Data Science is a combination of multiple skills. AI and Machine Learning are part of data science. You can create AI and Machine Learning products with data. 

Related Posts

Top Skills You Need for Data Science CareerData Science Sample Project an Example
Recent posts

PL/SQL: Popular Reserved Words

Perfect in PL/SQL is an art. To become this you need to understand top reserved words and their meanings. The below list is useful for your projects.


SQL queries how to use built-in functions correctly

In this post I am giving top examples on SQL functions. About built-in functions, I have covered in my previous post.
List of examples:DATE-TIME functionsNumeric functionsChar functionsNull-related functions1. DATE/TIME functions SELECT p_code, launch_dt, CURRENT_DATE FROM product; CURRENT_DATE returns current date.
SELECT p_code, TO_CHAR(launch_dt, 'DD MONTH YYYY') reformatted_dt FROM product; TO_CHAR function returns DATE in CHAR format.
2. Numeric functions SELECT p_code, price, (price - 20), ABS(price - 20.00) FROM product; ABS - function returns absolute value
SELECT p_code, price, ROUND (price, 1) FROM product;
ROUND function - Round to 1 digit.
SELECT p_code, price, SIGN(price - 15) FROM product;
SIGN function - It returns sign; either + or -
SELECT p_code, price, TRUNC(price, 1) FROM product;
TRUNC function - Truncates to a certain number of decimal places.
3. CHAR functions SELECT p_code, CONCAT(CONCAT(p_name, ' -- ') , price) FROM product; CONCAT function - co…

SQL built-in functions useful to read quickly

You can find there are four different types of functions in SQL. All these are built-in functions. You no need to create these functions, and these come with your SQL.

I am discussing today about SQL functions List.
SQL functionsDATE-TIME functionsNumeric functionsChar functionsNull-related functions 1. DATE-TIME functions These functions useful to get DATE and Time. Also you can covert DATE and TIME to Char. These are TO_CHAR, CURRENT_DATE and CURRENT_TIME 2. Numeric Functions These functions you can use for numeric calculations. Those are TRUNC, SIGN, ROUND, ABS 3. Char Functions To handle string related tasks you can use CHAR functions. The CHAR functions are like SUBSTR, CONCAT, LENGTH. 4. NULL related functions To handle null values you can use different functions. Those are COALESCE, NVL, NULLIF

This post covered all your answers for SQL functions list, SQL built-in functions in Oracle, and SQL functions in any DBMS.
Also Read SQL tips to improve Query performanceSummary
I have e…

Ubuntu VI editor Commands to learn today

I have given VI editor commands to use in Ubuntu operating system. You can practice using them for your benefit and you can complete your work quickly.

To begin changing or adding to text with vi, you can enter Insert or Replace modes, as shown in the following list. When you enter Insert or Replace mode, the characters you type will appear in the text document (as opposed to being interpreted as commands).
Ubuntu Vi editor commands Press the Esc key to exit to Normal mode after you are done inserting or replacing text.
List of VI Editor Commands.. i—Typed text appears before current character.

a—Typed text appears after current character.

o—Open a new line below current line to begin typing.

s—Erase current character and replace with new text.

c?—Replace ? with l, w, $, or c to change the current letter, word, end of line, or line.

r—Replace current character with the next one you type.

Shift+i—Typed text appears at the beginning of current line.

Shift+a—Typed text appears at the end…

Data science Secrets Simple Project Useful for Practice

I want to share with you how to use Python for your Data science or analytics Projects. Many programmers struggle to learn Data science because they do not know where to start. You can get hands on if you start with a mini project.

I have used Ubuntu Operating System for this project Skills You Must Need to become a Data Scientist You need dual skills - Learning and Apply knowledge. In Data science you need to learn and apply your knowledge. After study engineering, any person getsB Tech or M Tech Degree. You can become a real engineer if you apply engineering principles. So Data science also the same.

Data Visualization in Python is my simple project Importance of Data Data is the precious resource in resolving Machine Learning and Data Science Problems. Define first what is your problem. Collect Data Wrangle  the Data and Clean it.Visualize the PatternsIn olden days you might be studied a subject called Statistical Analysis. In this subject, you need to study the actual problem an…

Top Solidity Interview Questions for Sure Success

Solidity is the prime language to write logic for smart contracts in Ethereum blockchain. These are selected interview questions refresh before you take any interview.

Interview Questions on Solidity1. What is Solidity?

A) Solidity is the main language that you can use to write programs in Blockchain, such as smart contracts.

2. Where the Solidity programs run in Ethereum?

A). Those will run in EVM. You can also call it as Ethereum virtual Machine.

3. What kind of logic a Smart Contract can contain?

A contract in the sense of Solidity is a collection of code (its functions) and data (itsstate) that resides at a specific address on the Ethereum blockchain

4). Can the source code of smart contract accessible to the outside world? 

A). No, it is not possible to access source code to the network. Also, there is a limited access to one smart contract logic to the other smart contract logic. Eve, file system and other processes cannot access the source code.

Actually the code is sand boxed an…

8 Popular Encryption methods real Usage

Encryption works as it replaces original data with some special characters and stores the data. You need a private key to decrypt the data. Else it is not possible to understand encrypted data even for hackers.

Private keys are two types. Sender uses one private key and receiver uses one other private key.
I have given in this post about 8 encryption methods.

Flow Diagram Encryption
 Different Encryption Methods Classic CipherRandom Key GenerationRSA TokenHash FunctionsMac value - Message Authentication codeKey HashTLS ProtocolAuthenticated Cipher  1. Classic Cipher The best example is this kind of algorithm was used in world war -II communication machines. 2. Random Key Generations One kind of security. They use an algorithm that sends random numbers. People use that number as a password.
3. RSA Token Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password. 4. Hash Functions It assigns a hash va…