Modified Thursday 22-05 00:47
Dot . in a regular expression matches any character in the supported character set with this characteristic, by default: newline characters are not included without setting a flag. See matchnewline the match stops at the first occurrence. See greedy...
Modified Sunday 11-05 03:45
in java. Java offers two basic synchronization idioms: synchronized methods synchronized statements final fields, which cannot be modified after the object is constructed, can be safely read through non-synchronized methods, once the object...
Modified Sunday 11-05 03:44
Synchronized method To make a method synchronized, simply add the synchronized keyword to its declaration: A synchronized method: performs a lock action when it is invoked; its body is not executed until the lock action has successfully completed....
Modified Friday 09-05 00:58
TELNET (TELetype NETwork) is a net client used on the Internet or local area network LAN connections. It was developed in 1969. By extension, telnet also refers to the program that provides the client part of the protocol. TELNET clients have been available...
Modified Friday 02-05 08:27
A normal distribution is one of underlying assumptions of a lot of statistical procedures. In nature, every outcome that depends on the sum of many independent events will approximate the Gaussian distribution after some time, if respected the assumptions...
Modified Wednesday 23-04 00:02
The NUMBER data type stores zero as well as positive and negative fixed numbers with absolute values from 1.0 x 10-130 to (but not including) 1.0 x 10126. If you specify an arithmetic expression whose value has an absolute value greater than or equal...
Modified Wednesday 23-04 11:59
The term floating point refers to the fact that the number's radix point can float, that is, it can be placed anywhere relative to the significant digits of the number. They are fractional numbers written with a decimal point, like 1.970 The floating-point...
Created Wednesday 05-03 01:45
A Mail eXchange (MX) is a smtp server that is responsible for : receiving emails for one or more domain and delivering them to a mail delivery agent (MDA) for final delivery The email servers IP are set in the DNS via the MX record. This is how...
Created Monday 03-02 09:04
The X.509 Public Key Infrastructure is a Public key infrastructure (PKI) that uses a hierarchical system of Certificate authorities that brings trust to the transactions by signing certificate. A Hierarchical PKI consists of: A certificate authority...
Always keep one hand firmly on data, Amos liked to say.
Data is what set psychology apart from philosophy, and physics from metaphysics.
Developing a data warehouse means assembling a lot of subsystems in order to create a whole and coherent data application.
Discovers the 34 Kimball Subsystems and drill down to discover them
Data processing has changed a lot since 1940 :) and luckily, we are not using punch card anymore.
Stream processing is becoming the norm in data integration task while batch processing stays the king in data analysis.
ENIAC, 1946The first fully electronic digital computer
Dimensional Data Modeling permits you to model a (hyper)cube and analyse a process through different perspective. You define dimensions, measures and metrics.
Most programs process some input to produce some output; that’s pretty much the definition of computing.
A Function is the basic block of all reusable code component. It is also becoming the central component of any serverless architecture.
Knowledge isn't free. You have to pay attention.
The table format (known also as a relation) is the most important data structure used in data analysis. Did you know that its name originate from the medieval counting table ?
Education isn't something you can finish.