Blog year

    JanusGraph with Cassandra

    JanusGraph is a Graph Database. First of all, let’s see what is Graph Database. Graph Database: In computing, a graph database is a database that uses graph structures for semantic queries with nodes, edges, and properties to represent and store data. A key concept of the system is the graph...

    Read More

    DevOps Automation

    About the Client Jain International Trade Organization (JITO) is a worldwide body of Jain businessmen, industrialists, knowledge workers and professionals in various fields reflecting their glory of ethical business practices. JITO is set to achieve socio-economic empowerment, value based education, community welfare, practice of compassion, spiritual upliftment of fellow beings...

    Read More

    piStats AWS Lambda Architecture

    Problem Statement piStats enables its clients to analyze the users on their site and send Push Notifications to engage and retain them for a longer duration. For this purpose the clients’ register their users’ on piStats using piStats SDKs. The user base registered on piStats is unevenly distributed across different...

    Read More

    Deep Diving in the World of Data Warehousing - Continued..

    In our last blog, we tried to understand terminology around data warehouse. But data warehouse is only a central storage system, to build a complete analytical solution there are other components needed which we will be discussing in a while below. ETL Like we said earlier, the main hindrance to...

    Read More

    Deep Diving in the World of Data Warehousing

    “Information is the oil of the 21st century, and analytics is the combustion engine”. - Peter Sondergaard, Senior Vice President, Gartner. Number of companies are venturing into Big Data Analytics today and industries are investing money, effort and looking to utilize the technical advancements for the business growth. Till date...

    Read More

    How to automate copying an EC2 AMI from one region to another

    We have the previous blogs published to create AMI’s with EC2 tags and ELB tags in the specific region. The AMI’s copied across the different region helps in the scenarios like Disaster Recovery (DR) setup and also to quickly recover in case failure of EC2 service in the entire region...

    Read More

    Guide to Redshift Remodeling- Friends and Foes

    In this series, we make an attempt to chronicle our experience and best practices with redshift having used it in ‘anger’ in many projects. In this part 1 of the series, we look for appropriate schema design for redshift, the various alternatives and the pros and cons of each. Schema...

    Read More

    Clash of the Titans – Which OLAP Will Win?

    There is a number of OLAP solutions available in the market, including the popular ones like Vertica, Oracle BI, SAP Business Warehouse, which have pre-existed for a long time. While many of these started as on-premise solutions, have tried to re-establish them in today’s competitive market by providing SaaS variance....

    Read More

    Don’t Let the Redis HyperLogLog Make You Hyper!

    What is HyperLogLog? “How Many Distinct” is the question that is always asked in the current era of ‘Data’ wherein a count of unique entities is required in a fast and efficient way, trading off some accuracy in the result. Enters HyperLogLog which is a probabilistic cardinality estimation algorithm that...

    Read More

    In Data We Trust: Power BI Capabilities

    The goal is to turn data into information, and information into insight From fetching data and numbers to analyzing information it contains. Say hello to Power BI capabilities. Power BI offers basic data wrangling capabilities, as it lets you create interactive visualizations, reports, and dashboards, with a few clicks or...

    Read More

    Business Intelligence in Consumer Goods

    With a huge boom in the e-commerce industry, the customer is well-informed and has infinite options available under his thumb. Although, Aggregator apps help in increasing business visibility but also add to the cut-throat competition and this leaves the 'Consumer Goods Providers' to rely on consumer’s tendency to ‘pull’ products....

    Read More

    Brutal DDoS Attack - Is it the Beginning of a Bleak Future?

    Well…… NO! DDoS, short for Distributed Denial of Service, is a huge threat to our servers, web applications and other network resources causing outages in services in addition to associated financial implications as well. With the launch of AWS Shield, however, things have become far easier! Let us first understand...

    Read More

    Life of BluePi: 4 years of growth and how!

    Clocking a 100% growth in revenues every year is no joke! More so, if you’re a self-funded, lean company, working on cutting-edge technologies, partnering with some high-profile names and helping clients across multiple industries to solve complex business problems. With an 80-member strong team, looking to grow 3-fold, and with...

    Read More

    Thinking to automate AMI backups; Use AWS Lambda, with ELB tags

    If you’ve been following our blog, you would know how we love to talk about advances in technology and ensure that our readers get the most out of reading our posts. This is the thing about being a tech enthusiast, we start to believe in what sufficiently advanced technology can...

    Read More

    How to containerize a Node.js Application

    The rise and rise of Node.js applications is, quite simply, phenomenal! Thanks to a JavaScript-everywhere architecture, the difference between backend and frontend is no longer as evident as it used to be. From emerging startups to large enterprises, every business is trying to leverage the lightweight and lightning quick Node.js...

    Read More