Cloud

Know About Google Cloud Storage And Google Cloud SQL

Reading Time: 2 minutes What is Google Cloud Storage? Google Cloud Storage is the object storage service. Google Cloud offers a storage service. It comes with a number of useful capabilities out of the box, including object versioning and fine-grained permissions (by object or bucket), which may simplify development and lower operating costs. Several services rely on Google Cloud Storage. Google Cloud Storage allows you to store any kind Continue Reading

Spring GCP BigQuery

Reading Time: 3 minutes BigQuery is Google’s fully managed, petabyte scale, low cost analytics data warehouse. It’s Serverless, highly scalable, and cost-effective multicloud data warehouse designed for business agility. BigQuery Benefits Gain insights with real-time and predictive analytics– Query streaming data in real time and get up-to-date information on all your business processes. Predict business outcomes easily with built-in machine learning–without the need to move data. Access data and Continue Reading

Spring Boot microservices with logging using Spring Cloud GCP

Reading Time: 4 minutes What is Spring Boot and Spring Cloud GCP? Spring Boot: Spring Boot is a java-based framework i.e. free and open-source.  Using Spring boot you can create java (web)apps mostly based on microservices  architecture. It makes it easier for you to focus on development work by simply  providing default dependencies that you may require in your project (it takes care of  boiler-plate code). Spring Cloud GCP: Continue Reading

BigQuery: Querying nested arrays

Reading Time: 2 minutes In a previous blog, we had seen BigQuery facilitate efficient data warehouse schema design. BigQuery supports the nested & repeated columns. We can use a combination of ARRAY and STRUCT data types to define our schema in BigQuery. It enables to denormalize data efficiently in single table. In this blog, for the same schema of sales data, we will execute a few DML operations on nested array fields. Schema In Continue Reading

BigQuery:  Efficient Data Warehouse Schema Design

Reading Time: 3 minutes Conventional data warehouses support data models based on star schema and snowflake schema. In these models, there are a number of fact tables and dimension tables. In order to minimize redundancy it is recommends to split data into multiple tables in . This is a normalization process. Normalization is the technique of eliminating the redundant data. It minimize the insertion, deletion, and update anomalies. It saves the disk Continue Reading

BigQuery: Rescue to the Conventional Data warehouse Problems

Reading Time: 4 minutes The present and future of every industry sector somehow depends on the ability to use the massive amounts of data. Use the data available to drive better product quality at a lower cost. Make favourable business decisions with data. Primarily, for decades, to store a wide variety of massive data and perform analysis on it, using Data Warehouse solutions. Traditional data warehouses designed on-premise specifically Continue Reading

aws

An Introduction to AWS GovCloud

Reading Time: 3 minutes AWS GovCloud(US) is an isolated AWS region that is designed to host sensitive data and regulated workloads in the AWS cloud. Basically, it helps customers to support their government compliance requirements (currently only in the US). Compliance requirements related to FISMA, fedRAMP, DoD, etc of the US.  FedRAMP stands for the “Federal Risk and Authorization Management Program”. DoD stands for the “Department of Defense”. FISMA stands Continue Reading

abstract business code coder

How to make AssumeRolewithSAML calls with AWS CLI

Reading Time: 3 minutes Many organizations uses SAML based authentication to authenticate their users to access AWS and other services. SAML(Security Assertion Markup Language) is a standard for logging users into applications based on their sessions in another context. You can read about How SAML authentication works from here. In this blog, we will check how we can use AssumeRoleWithSAML to get temporary security credentials to sign calls to Continue Reading

data codes through eyeglasses

How to use AWS Bottlerocket

Reading Time: 2 minutes AWS Bottlerocket is an open source, Linux-based OS. It is built specifically to run containers. It reduces the operational cost by automating updates to your container infrastructure. How is Bottlerocket different from other OS AMI’s? Bottlerocket includes only the essential software to run containers. This helps in the following: it Improves the resource usage Reduces security attack surface Reduces management overhead It also integrates with Continue Reading

app engine gcp

How to Deploy an application to App Engine in GCP

Reading Time: 3 minutes Hello Readers! In this we will see how easily we can deploy an application to App Engine in GCP. In this blog firstly we will create a simple app engine application using cloud shell local environment. Then I will deploy that application to the App Engine. So, before starting firstly we will see what is an App Engine? Basically, App Engine is a PaaS (Platform Continue Reading

How to install splunk universal forwarder

Reading Time: 3 minutes Hello Readers! In this blog we will see how to install splunk universal forwarder. But first let us know what splunk universal forwarder is? In short, we call splunk universal forwarder, as splunk uf. It is a separate software package and is free to download where a license is not required. Steps to install: 1. First we have to download the software. Open your web browser Continue Reading

How to Configure AWS EC2 Instance Using Vagrant

Reading Time: 3 minutes In this blog I am going to explain how simply we can configuring AWS EC2 Instance Using Vagrant.Before going forward first lets understand what is Vagrant.Lets Start!! What is Vagrant? Vagrant is a tool for working with virtual environments, and in most circumstances, this means working with virtual machines. It provides a simple and easy to use command-line client for managing these environments, and an Continue Reading

How to Secure Your Digital Data

Reading Time: 5 minutes Digital World Today’s world is called the digital world where our day-to-day life is directly/indirectly impacted by technology. The digital world is the world of digital fluency and digital literacy. We use various digital mediums and tools to communicate on the Internet, digital or smart devices. And our generation is fortunate enough to live in this era that has been never seen before. Digitization Digitization is Continue Reading