Author: Geetika Gupta

Apache Hadoop vs Apache Spark

The term Big Data has created a lot of hype already in the business world. Hadoop and Spark are both Big Data frameworks – they provide some of the most popular tools used to carry out common Big Data-related tasks. In this blog, we will cover what is the difference between Spark and Hadoop MapReduce. Introduction Spark – It is an open source big data Continue Reading

Knolx: Getting started with Presto

Hi all, Knoldus has organized a 1-hour session on 8th September 2017. The topic was “Getting started with Presto”. Many people have joined and enjoyed the session. I am going to share the slides here. Please let me know if you have any question related to linked slides or video. The slides of the Knolx are here: And Here’s the video of the session: For any Continue Reading

What’s new in Apache Spark 2.2

Apache recently released a newer version of Spark i.e Apache Spark2.2. The new version comes with new improvements as well as the addition of new functionalities. The major addition to this release is Structured Streaming. It has been marked as production ready and its experimental tag has been removed. Some of the high-level changes and improvements : Production ready Structured Streaming Expanding SQL functionalities New distributed Continue Reading

Authentication using Actions in Play Framework

Actions plays an important role in Play Framework, the requests received by a Play application are handled by an Action. Action composition is an incredibly powerful way to enhance or restrict controller behaviour. In Play Framework controllers consist of methods that create Action objects to handle the incoming requests. A play.api.mvc.Action is basically a (play.api.mvc.Request => play.api.mvc.Result) function that handles a request and generates a result to be sent to the client. We Continue Reading

On the go with ReactiveMongo

Hi Guys, In today’s blog we’ll be discussing about ReactiveMongo. It is a Scala driver that provides fully non-blocking and asynchronous I/O operation. It is designed to avoid any kind of blocking request to your database. Every operation returns immediately, freeing the running thread and resuming execution when it is over. Before starting using reactive mongo, one should have an understanding about mongoDb. So let’s Continue Reading

Connecting To Presto via JDBC

Hi Guys, In this blog we’ll be discussing about how to make a connection to presto server using JDBC, but before we get started let’s discuss what Presto is. What is Presto ? So, Presto is an open source distributed SQL query engine for running interactive analytic queries against different data sources. The sizes may ranges from gigabytes to petabytes. It runs on a cluster Continue Reading

Reading data from different sources using Spark 2.1

Hi all, In this blog, we’ll be discussing on fetching data from different sources like csv, json, text and parquet files. So first of all let’s discuss what’s new in Spark 2.1. In previous versions of Spark, you had to create a SparkConf and SparkContext to interact with Spark whereas in Spark 2.1 the same effects can be achieved through SparkSession, without explicitly creating the SparkConf, Continue Reading

Learning Markdown

Markdown is a lightweight markup language with plain text formatting syntax designed so that it can be converted to HTML and many other formats using a tool by the same name. Markdown is often used to format readme, for writing messages in online discussion forums, and to create rich text using a plain text editor. So, here is a quick introduction to some of the elements of Continue Reading

Knolx : Realm Mobile Database

Hi guys, Knoldus organized a knolx session on the topic : Realm Mobile Database. A better mobile database means better apps. Realm is a mobile database that runs directly inside phones, tablets or wearables. It saves data in minutes so you can build mobile apps in a fraction of time. It is a simple alternative to SQLite and Core Data. It works on all major Continue Reading

Security threats in web applications

Today, most security breaches online occur through the application rather than the server. The majority of web application attacks occur through cross-site scripting (XSS) and SQL injection attacks which typically result from flawed coding, and failure to sanitize input to and output from the web application. In this blog I will be discussing these two attacks and methods on how to counter them. Cross Site Continue Reading

%d bloggers like this: