Posts

Featured Post

SQL Interview Success: Unlocking the Top 5 Frequently Asked Queries

Image
 Here are the five top commonly asked SQL queries in the interviews. These you can expect in Data Analyst, or, Data Engineer interviews. Top SQL Queries for Interviews 01. Joins The commonly asked question pertains to providing two tables, determining the number of rows that will return on various join types, and the resultant. Table1 -------- id ---- 1 1 2 3 Table2 -------- id ---- 1 3 1 NULL Output ------- Inner join --------------- 5 rows will return The result will be: =============== 1  1 1   1 1   1 1    1 3    3 02. Substring and Concat Here, we need to write an SQL query to make the upper case of the first letter and the small case of the remaining letter. Table1 ------ ename ===== raJu venKat kRIshna Solution: ========== SELECT CONCAT(UPPER(SUBSTRING(name, 1, 1)), LOWER(SUBSTRING(name, 2))) AS capitalized_name FROM Table1; 03. Case statement SQL Query ========= SELECT Code1, Code2,      CASE         WHEN Code1 = 'A' AND Code2 = 'AA' THEN "A" | "A

Cloud Security Top Course Contents You Need to Learn

Image
Below is a list of course contents that you need in Cloud security training.  Missing any of these, you will miss many things. Cloud Security Course Contents  Cloud Architecture: Computing Evolution, cloud vocabulary, Essential Characteristics of Cloud Computing, Cloud deployment models, Cloud Service Models, Multi-Tenancy, Approaches to create a barrier between the Tenants, cloud computing vendors, Cloud Computing threats, Cloud Reference Model, The Cloud Cube Model, Security for Cloud Computing. How Security Gets Integrated Governance and Enterprise Risk Management - Information security governance processes, Governance and enterprise risk management in Cloud Computing, Governance Recommendations, Enterprise Risk Management Recommendations, Information Risk, Management Recommendations, Third Party Management Recommendations, Legal and Electronic Discovery Risk Management, Legal and Electronic Discovery Risk Management Security Recommendations. Compliance and Audit Cloud customer re

Cloud in India Rural Education

Image
Many a times we do things beyond a formal classroom without realizing that we are learning in the process. For example, an individual surfs and accesses material on the Internet in the form of audio, video, wiki and then goes ahead to even create and store information. Understanding the immense power of peer-to-peer learning, Classle, a Chennai-based startup has developed a cloud based education system for rural India. Classle gets lakhs of people together and enables them to connect to each other in thousands of communities available on open social network of Classle. People can connect with these communities to collaborate and share exchange resources in their chosen areas of interest. There are many features to collaborate in addition to make learning fun oriented. The cloud-based system enables students to access learning material free of cost, through their basic, low-cost mobile devices. The impact - more than 55 academic institutions have partnered with Classle-- almost all o

Social Media Jobs You need to look in

Image
Social media has transformed the way people socialize, network and stay in touch. Social Media Jobs Social media is more than liking or retweeting a post; it's a new, cutting-edge marketing medium with unlimited potential. According to Constant Contact's Small Businesses: Then and Now Survey conducted in May 2013, social media marketing has exploded, with 87 percent of small businesses using social media as a marketing tool today. Since social media marketing requires a combination of analytical skills, good communication and performing extensive research, you can bet business, communications and English-related degrees are good candidates for 2014 social media job openings. Explore the new frontier of marketing with these six up-and-coming social media positions: Search engine optimization (SEO) specialist Social media strategist Online community manager Social media marketing manager Social media marketing coordinator Blogger or social media copywriter

Cloud Security rules top book to read it now

Image
The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. 1. Questions you will find answers about include Do I have to accept that standard SLA? What should an SLA include? What standards should I be paying attention to, if any? How do I treat mobile workers, and how do they fit into the cloud? Do I really need to care about logging? 2. Other Stuff You Will Learn Many more! Since the cloud co

6 Worth-it Cloud Security Courses

Image
Cloud security is critical to run cloud-applications. I have shared few courses useful for cloud security. To get a job you need good training. Security courses are currently hot in the market. Cloud Security Hands-On Trainin g: This course provides a solid foundation in cloud security, and includes a full day of hands-on labs to apply the principles in practice. We cover all the material needed to pass the Cloud Security Alliance Certificate of Cloud Security Knowledge (CCSK) exam, but add a pragmatic approach to immediate kick start your cloud security projects. For Black Hat we also add expanded material to show you how to take cloud security to the next level by leveraging DevOps techniques and the characteristics of the cloud. Cloud Security Fundamentals : An overview of security issues within each of these models will be covered with an in-depth discussion of the risks involved. This cloud security training course will go in-depth on architecture and infrastruc

Top IT Skills 2015

Image
IT spending for security technologies will increase 46% in 2015, with cloud computing increasing 42% and business analytics investments up 38%. Enterprise investments in storage will increase 36%, and for wireless and mobile, 35%. IT spending for security technologies will increase 46% in 2015, with cloud computing increasing 42% and business analytics investments up 38%. Cloud computing initiatives are the most important project for the majority of IT departments today (16%) and are expected to cause the most disruption in the future. IDG predicts the majority of cloud computing’s disruption will be focused on improving service and generating new revenue streams. These and other key take-aways are from recent IDG Enterprise research titled Computerworld Forecast Study 2015. The goal of the study was to determine IT priorities for 2015 in areas such as spending, staffing and technology.  Computerworld spoke with 194 respondents, 55% of which are from the executive IT roles. 1

Tech Mahindra Launched Big data platform

Image
Tech Mahindra has announced the launch of Usage Based Insurance (UBI), a big data and predictive analysis driven platform for auto insurers. It allows them to adjust premiums according to actual usage patterns of individual drivers instead of industry averages. UBI Platform The platform is flexible to fit to the growing needs of global insurance enterprises, where the market is expected to grow $100 billion plus by the end of the decade. The solution utilizes the capabilities of Tech Mahindra and AT and T in the areas of multi-vertical, engineering and infrastructure capabilities. As a result of this, the global insurers can reduce their claim costs by up to 20%,while reducing eligible insured driver premiums up to 40%. This Usage Based Insurance solution is hosted on the seamless AT&T cloud and served through AT and T's global Machine-to-Machine (M2M) capabilities. What is usage based insurance This technology is already being used successfully for both car a