A quick overview of the differences between SQL and NoSQL. SQL Structured Query Language (SQL) is used for relational databases, which are table based. For example, an column in table A (e.g. User_ID) may have a relation with a column in table B (e.g. Order_Ref) and table B may have a relation to a column … Continue reading SQL vs NoSQL (Notes)
Author: Geek_Dude
Data, Data Lakes and Data Warehouses (Notes)
Continuing on from my post looking at Data Architecture / Data Modelling, I am now going to look at data, data lakes and data warehouses by turning my notes into this blog post. Data Data can include emails, phone calls, financial transactions, sensor readings, metrics, logs, pretty much everything. When referring to corporate data, it … Continue reading Data, Data Lakes and Data Warehouses (Notes)
Data Architecture, Data Modelling and Data Processing (Notes)
Data Architecture (DA) Most organisations / companies have enterprise architecture which describes how a computer network (with storage, servers, switches, routers etc.) is laid out. Data architecture is very similar in that it shows the models, rules, standards, and policies that are used in the collection, storage, and use of data in an organisation / … Continue reading Data Architecture, Data Modelling and Data Processing (Notes)
Personal Update – April 2022
It's been a while since my last personal update (October 2021) so I think it's about time for one. Degree Apprenticeship Over the autumn I completed the module around Cloud Solutions and Architectures. I've been a cloud user for a years now, with experience of a few cloud environments and a few different ways to … Continue reading Personal Update – April 2022
What Is A .intunewin File And How To Create One
A .intunewin file is used with Microsoft's Intune to deploy Windows applications to Microsoft Windows devices managed by Intune, as an alternative to using apps from the Microsoft Store (i.e., for applications not available in the store). Creating A .intunewin File Microsoft provide a tool called "IntuneWinAppUtil.exe" that is used to create .intunewin files. The … Continue reading What Is A .intunewin File And How To Create One
What’s With All The Nines? (Availability)
If you are a user of cloud platforms (e.g. AWS, Azure, Google Cloud) you have probably noticed the mentions of availability that include a lot of nines (9s). Generally these are 99.xx (ninety-nine point something), and the more nines after the ninety-nine point means more availability but to what level? If the service was available … Continue reading What’s With All The Nines? (Availability)
Installing MediaWiki with Ansible (Linux)
MediaWiki was developed originally for Wikipedia and has grown to support lots of sites. With this in mind you may consider installing MediaWiki and running a local wiki, especially as MediaWiki provides instructions on specific operating system installs. In an effort to speed up installs I've created an Ansible playbook to carry out the MediaWiki … Continue reading Installing MediaWiki with Ansible (Linux)
SOCKS Proxy (Linux)
When working remotely (i.e. away from home) I often think about how it would be great if I could open up some of my internal projects when I have spare time and carry on working on them. There are multiple options on how I could do this, some are costly (moving environment to cloud) and … Continue reading SOCKS Proxy (Linux)
Security: MAC Address and ARP (Notes)
Every network interface controller (NIC) has a Media Access Control (MAC) address which is unique to the interface. A device may have multiple network interfaces (e.g., a ethernet network interface and a wireless network interface) and will a MAC address for each interface (e.g., a Rasperry Pi 4 has one MAC address for the ethernet … Continue reading Security: MAC Address and ARP (Notes)
Hacking: The Art of Exploitation – Book Review (Security)
Hacking: The Art Of Exploitation (2nd Edition) was released back in 2008, written by Jon Erickson and published by No Starch Press. I originally received a copy as part of a Humble Bundle and purchased physical copy in 2019 (19th printing!), off the bat that should show how much I enjoy this book. The book … Continue reading Hacking: The Art of Exploitation – Book Review (Security)
You must be logged in to post a comment.