In a past article on ICANN's new domain name transfer policy, we mentioned 101domain as one of a few other service providers. After that article our readers asked us to know more about their total set of services. What attracted us to 101domain is their insightful blog on technical matters around domains, SSL, and corporate brand services. The articles on their blog demonstrate carefulness around … [Read more...]
Fields of Application of Big Data : Part I
The possibilities with regard to the networking on the Internet means that a lot of data exchange takes place between the devices. This exchange includes both structured and unstructured data. More efficient process design and profit maximization should now be the focus of most business-driven companies. In order to be able to position the company position and the specially developed products … [Read more...]
Cloud Infrastructure for Sensitive Workloads
Business-critical applications in sensitive industries are facing hurdles in the cloud. Cloud made the entire IT infrastructures possible to be configured with just a few clicks of the mouse, making the servers are immediately available, and when RAM, storage or computing power is scarce, the infrastructure can be easily readjusted and scaled. Virtual Locations aims to combine the benefits of the … [Read more...]
Edge Computing vs. Cloud Computing
Cloud computing happens in some centralized location with a huge resource in the pay-as-you-go model. Edge computing happens on the device itself. This comparison arises in this era of big data and IoT for different reasons. Edge computing is the data processing power at the edge of a network which is pushing the computing applications, data, and services away from the centralized nodes. A … [Read more...]
How to Create Own Certificate Authority (CA) With EasyRSA
A certificate authority (CA) is who issues the digital certificates. We need this for installation of some software, such as OpenVPN. For doing that, we have to download the latest version of EasyRSA. EasyRSA is the CLI utility to build and manage a PKI CA. A CA acts as a trusted 3rd party. The format of these certificates is specified by the X.509 standard. A certificate signed by a … [Read more...]
What are the Differences Between DynamoDB and MongoDB?
DynamoDB is a proprietary NoSQL database service from Amazon. DynamoDB more closely resembles Apache Cassandra than MongoDB. However, peoples often compare DynamoDB with MongoDB. MongoDB is an open source NoSQL database with a AGPL license. DynamoDB is an evolution of Amazon SimpleDB. AWS DynamoDB provides an unique serverless interface which MongoDB does not have. DynamoDB is a cloud service, … [Read more...]
Uses of Text Mining in Web Content Mining : Part V (END)
This is The Final Part of Uses of Text Mining in Web Content Mining. In the forth part of this series, we discussed up to clustering. Concept linkage tools are able to parse and connect similar concepts used in documents and thus help the user to find information he might not have found through normal search methods. It is almost possible to select information, rather than cumbersome search. … [Read more...]
Data Warehouse as a Hybrid Cloud Service
With a data warehouse as a hybrid cloud service, users can take advantage of the cloud without having to move large, sometimes sensitive data to the cloud. There are lot of companies who are trying to scale their data solutions to meet growing or fluctuating demands. According to Gartner, growth of public cloud is expected to rise sharply to $411 billion by 2020. Some of the companies see their … [Read more...]
Uses of Text Mining in Web Content Mining : Part IV
In the third part of Uses of Text Mining in Web Content Mining, we informed that in this part we will discuss about the areas of application or tasks of text mining. Basically, the different methods should analyze texts and make the implicit information too explicit. Then form relations from the information in different texts, highlight and visualize them. The descriptions give an overview of the … [Read more...]
DevOps and Agile: What Are the Differences?
In our previous series of articles on DevOps, we stated that the aim of the collaboration should be to use the agile principles of software engineering across departments and thus to derive added value from the cooperation. While DevOps and Agile are two different things, they are often mistaken for one another. In reality, the two represent different approaches or practices in developing … [Read more...]
Uses of Text Mining in Web Content Mining : Part II
This articles assumes that the reader has read the first part of Text Mining in Web Content Mining. In the light of the methodology of Web Content Mining as second part of the series on Text Mining in Web Content Mining, two processes as well as the technology for this purpose will be explained in more detail. The basis for any text mining process is based on the existing document collections. … [Read more...]