Blog year

    JanusGraph with Cassandra

    JanusGraph with Cassandra JanusGraph is a Graph Database. First of all, let’s see what is Graph Database. Graph Database: In computing, a graph database is a database that uses graph structures for semantic queries with nodes, edges, and properties to represent and store data. A key concept of the system...

    Read More

    DevOps Automation

    DevOps Automation About the Client Jain International Trade Organization (JITO) is a worldwide body of Jain businessmen, industrialists, knowledge workers and professionals in various fields reflecting their glory of ethical business practices. JITO is set to achieve socio-economic empowerment, value based education, community welfare, practice of compassion, spiritual upliftment of...

    Read More

    piStats AWS Lambda Architecture

    piStats AWS Lambda Architecture Problem Statement piStats enables its clients to analyze the users on their site and send Push Notifications to engage and retain them for a longer duration. For this purpose the clients’ register their users’ on piStats using piStats SDKs. The user base registered on piStats is...

    Read More

    Deep Diving in the World of Data Warehousing - Continued..

    Deep Diving in the World of Data Warehousing In our last blog, we tried to understand terminology around data warehouse. But data warehouse is only a central storage system, to build a complete analytical solution there are other components needed which we will be discussing in a while below. ETL...

    Read More

    Deep Diving in the World of Data Warehousing

    Deep Diving in the World of Data Warehousing “Information is the oil of the 21st century, and analytics is the combustion engine”. - Peter Sondergaard, Senior Vice President, Gartner. Number of companies are venturing into Big Data Analytics today and industries are investing money, effort and looking to utilize the...

    Read More

    How to automate copying an EC2 AMI from one region to another

    Automate copying an EC2 AMI from one region to another We have the previous blogs published to create AMI’s with EC2 tags and ELB tags in the specific region. The AMI’s copied across the different region helps in the scenarios like Disaster Recovery (DR) setup and also to quickly recover...

    Read More

    Guide to Redshift Remodeling- Friends and Foes

    Redshift Remodeling- Friends and Foes In this series, we make an attempt to chronicle our experience and best practices with redshift having used it in ‘anger’ in many projects. In this part 1 of the series, we look for appropriate schema design for redshift, the various alternatives and the pros...

    Read More

    Clash of the Titans – Which OLAP Will Win?

    Clash of the Titans – Which OLAP Will Win? There is a number of OLAP solutions available in the market, including the popular ones like Vertica, Oracle BI, SAP Business Warehouse, which have pre-existed for a long time. While many of these started as on-premise solutions, have tried to re-establish...

    Read More

    Don’t Let the Redis HyperLogLog Make You Hyper!

    Let the Redis HyperLogLog Make You Hyper! What is HyperLogLog? “How Many Distinct” is the question that is always asked in the current era of ‘Data’ wherein a count of unique entities is required in a fast and efficient way, trading off some accuracy in the result. Enters HyperLogLog which...

    Read More

    In Data We Trust: Power BI Capabilities

    In Data We Trust: Power BI Capabilities The goal is to turn data into information, and information into insight From fetching data and numbers to analyzing information it contains. Say hello to Power BI capabilities. Power BI offers basic data wrangling capabilities, as it lets you create interactive visualizations, reports,...

    Read More

    Business Intelligence in Consumer Goods

    Business Intelligence in Consumer Goods With a huge boom in the e-commerce industry, the customer is well-informed and has infinite options available under his thumb. Although, Aggregator apps help in increasing business visibility but also add to the cut-throat competition and this leaves the 'Consumer Goods Providers' to rely on...

    Read More

    Brutal DDoS Attack - Is it the Beginning of a Bleak Future?

    Brutal DDoS Attack Well…… NO! DDoS, short for Distributed Denial of Service, is a huge threat to our servers, web applications and other network resources causing outages in services in addition to associated financial implications as well. With the launch of AWS Shield, however, things have become far easier! Let...

    Read More

    Life of BluePi: 4 years of growth and how!

    Life of BluePi Clocking a 100% growth in revenues every year is no joke! More so, if you’re a self-funded, lean company, working on cutting-edge technologies, partnering with some high-profile names and helping clients across multiple industries to solve complex business problems. With an 80-member strong team, looking to grow...

    Read More

    Thinking to automate AMI backups; Use AWS Lambda, with ELB tags

    Thinking to automate AMI backups; Use AWS Lambda If you’ve been following our blog, you would know how we love to talk about advances in technology and ensure that our readers get the most out of reading our posts. This is the thing about being a tech enthusiast, we start...

    Read More

    How to containerize a Node.js Application

    How to containerize a Node.js Application The rise and rise of Node.js applications is, quite simply, phenomenal! Thanks to a JavaScript-everywhere architecture, the difference between backend and frontend is no longer as evident as it used to be. From emerging startups to large enterprises, every business is trying to leverage...

    Read More