Posts

Showing posts with the label Cloud Standards

Featured Post

SQL Query: 3 Methods for Calculating Cumulative SUM

Image
SQL provides various constructs for calculating cumulative sums, offering flexibility and efficiency in data analysis. In this article, we explore three distinct SQL queries that facilitate the computation of cumulative sums. Each query leverages different SQL constructs to achieve the desired outcome, catering to diverse analytical needs and preferences. Using Window Functions (e.g., PostgreSQL, SQL Server, Oracle) SELECT id, value, SUM(value) OVER (ORDER BY id) AS cumulative_sum  FROM your_table; This query uses the SUM() window function with the OVER clause to calculate the cumulative sum of the value column ordered by the id column. Using Subqueries (e.g., MySQL, SQLite): SELECT t1.id, t1.value, SUM(t2.value) AS cumulative_sum FROM your_table t1 JOIN your_table t2 ON t1.id >= t2.id GROUP BY t1.id, t1.value ORDER BY t1.id; This query uses a self-join to calculate the cumulative sum. It joins the table with itself, matching rows where the id in the first table is greater than or

Overview Of Cloud Standards

Image
Cloud computing slowly becoming reality. So it has to address many concerns such as security, interoperability, portability, and governance at the earliest opportunity. This can be accelerated by compliance to guidelines and standards defined in consensus by the cloud providers.  Without addressing these concerns, users would be wary to tread this path in spite of its powerful economic model for business computing. Interoperability/integration Interoperability enables products/software components to work with or integrate with each other seamlessly, in order to achieve the desired result. Thus, it provides flexibility and the choice to use multiple products to achieve our needs. This is enabled by either integrating through standard interfaces or by means of a broker that converts one product interface to another. Cloud computing depends on compliance standards. Security Security involves the protection of information assets through various policies, procedures, a