Tuesday, 9 October 2018

Connect DB SQLite to Android With Android Studio

             SqLite Database connection

One of the first and more important information are: How to connect SQLite with Android app?
For this tutorial I am using Android Studio. You can download from official website.

First we need to create we database. I am using SQLite Manager (this is a plugin for Firefox).
I create a Data Base named "example" and a table named "exampleTable".

CREATE TABLE exampleTable ( name VARCHAR(200) NULL DEFAULT NULL, lastname VARCHAR(200) NULL DEFAULT NULL, ID VARCHAR(20) NULL DEFAULT NULL )

INSERT INTO exampleTable VALUES('Jhon', 'Sweet', '1');
INSERT INTO exampleTable VALUES('Audrey', 'Owen', '2');
INSERT INTO exampleTable VALUES('Michelle', 'Peters', '3');
INSERT INTO exampleTable VALUES('Helen', 'Black', '4');
INSERT INTO exampleTable VALUES('Jessica', 'Sweet', '5');
When the database are create, we need to put in the assent folder, in the Android Studio Proyect.








Then we create a Connection class.
In this class are two important lines in this class:

    private static String DB_PATH = "/data/data/com.example.databaseconnect/databases/";
    private static String DB_NAME = "example.sqlite";

Friday, 31 August 2018

Google Assistant - Security Guard For Your Home

Monitor your home 24x7.

There square measure several security cameras and lights out there that job with the Assistant to assist you retain a watch on your home whereas you’re away. With the new Arlo Security Lights, you'll be able to get instant alerts once motion is detected or try the lights with Arlo security cameras. There are many cameras, equivalent to the  Nest Cam, for the inside and exterior of your home that stream 24x7 and may be checked by merely asking the Google Assistant on the app. And with any Nest Cam model, you can additionally ask Assistant to stream live feeds onto Chromecast-enabled televisions. If there’s associate degree unwelcome person, speak and listen through the camera to scare them off.

Lock from anyplace.


 good locks permit you to lock and unlock your door from anyplace within the world, creating it simple for you to watch the doorstep whereas you’re away. starting tomorrow we’ll launch a replacement integration with the Nest x Yale Lock.You can use the Assistant to see the standing of your lock, remotely lock it, and even embrace it during a Routine. parenthetically you'll be able to lock the door mechanically before reaching to bed by language “Hey Google, goodnight.” to boot, with the recent integrations of the Assistant with the August good Lock, Schlage® Sense good bolt, and benny Lock by Candy House, you'll be able to share access with trusty friends and family and lock the door along with your voice. You’ll conjointly get associate degree alert whenever somebody locks or unlocks the door.

Keep your home in secure.


 Security systems square measuren’t new however “smart” security systems are. ADT Pulse, Honeywell’s new good Home Security answer and Nest Secure warning device can allow you to understand what’s happening at your home whereas you’re gone. If the alarm cracks, you’ll get associate degree alert on your phone with info regarding what triggered the alarm. Silence the alarm through the apps and alert the police.

With these new security devices, your currently have a simple thanks to shield your home with the Google Assistant.

Thursday, 30 August 2018

Python Languages Basics

Python Language Basics

Python  Language is associate object-oriented artificial language created by Guido Rossum in 1989. it's ideally designed for speedy prototyping of complicated applications. it's interfaces to several OS system calls and libraries and is protractible to C or C++. several massive corporations use the Python artificial language embody NASA, Google, YouTube, BitTorrent, etc.

Python Language is wide utilized in AI, linguistic communication Generation, Neural Networks and alternative advanced fields of engineering science. Python Language had deep specialize in code readability & this category can teach

Python Language First Program

Let us execute programs in different types of programming.

Interactive Mode Programming
Invoking the interpreter without passing  script file as a parameter bring up the following prompt −

$ python
Python 2.4.3 (#1, Nov eleven 2010, 13:34:43)

[GCC 4.1.2 20080704 (Red Hat 4.1.2-48)] on linux2

Type "help", "copyright", "credits" or "license" for a lot of info.
>>>
Type the following text at the Python prompt and press the Enter −

>>> print "Python, Language!"

If you're running new edition of Python, then you'd ought to use print statement with parenthesis as in print ("Python, Language!");. but in Python version 2.4.3, this produces the following result −

Python, Language!

Script Mode Programming
Invoking the interpreter with a script parameter begins execution of the script and continues till the script is finished. once the script is finished, the interpreter isn't any longer active.

Let us write an easy Python Language program in a very script. Python files are saved extension .py. kind the subsequent ASCII text file in a very take a look at.py file −

print "Python, Language!"

We assume that you simply have Python interpreter set in PATH variable. Now, try to run this program as follows −

$ python take a look at.py

This produces the following result −

Python, Language!

Let us attempt in a different way to execute a Python Language script. Here is that the changed take a look at.py file −

#!/usr/bin/python

print "Python, Language!"

We assume that you just have Python interpreter obtainable in /usr/bin directory. Now, try to run this program as follows −

$ chmod +x take a look at.py     # this can be to create file workable
$./test.py

This produces the following result −

Python, Language!

Big Data-Role Of Big Data In Gaming Industry


Greater engagement of players is that the key to increasing revenue and staying earlier than the competitors for each recreation company. each click and player interaction with the sports creates valuable knowledge that is totally analyzed by the recreation firms to confirm that players square measure incessantly engaged and keep returning for additional.

As the recreation business continues to grow and expand, the role of massive knowledge becomes additional crucial because of the buildup of an oversized volume of information. huge knowledge takes into consideration each single interaction created by players with the sport, storing an oversized volume of pure knowledge able to be analyzed. however the important challenge lies in creating the most effective use of the collected knowledge.

The global recreation business is growing at a fast pace annually and generating large revenue. For this reason, the highest recreation firms keep finding out new and distinctive ways in which of harnessing the best-in-class technologies to capture massive parts of the market. Around 50 Tb {of knowledge|of knowledge|of information} per day is generated by quite a pair of billion gamers within the world whereas around 150 Gb data per day is generated by social games. In such a situation, the utilization of massive knowledge technology within the recreation business does not come back as a surprise in any respect.

Gaming has become a key contributor to huge knowledge, and an efficient Bi system within the recreation business permits firms to effectively reach conclusions relating to a gamers' style, levels of satisfaction, and underpayment patterns. this can be achieved once {the knowledge|the info|the information} collected from many external sources is analyzed against the keep historical data to supply a stronger recreation expertise to players with uninterrupted play sessions.

Further, strategically enforced cloud-based services are verified to unambiguously address all technological challenges long-faced by the recreation business. choosing cloud services from the leading cloud service suppliers in Bharat is that the best answer for firms that require terabyte-scale space for storing and convenience to the massive volume of records for fast analysis at stripped-down long investment

Thursday, 23 August 2018

what is data science?

Data science may be a multidisciplinary mix of information abstract thought, algorithmm development, and technology so as to unravel analytically advanced issues.


At the core is knowledge. Troves of raw info, streaming in and hold on in enterprise knowledge warehouses. a lot of to find out by mining it. Advanced capabilities we will build with it. knowledge science is ultimately concerning victimisation this knowledge in inventive ways that to get business value: 

Data science – discovery of information insight

This facet {of knowledge|of knowledge|of information} data science is all concerning uncovering findings from data. Diving in at a granular level to mine and perceive advanced behaviors, trends, and inferences. It's concerning egress hidden insight that may facilitate alter firms to create smarter business selections. For example:

    Netflix knowledge mines moving-picture show viewing patterns to grasp what drives user interest, and uses that to create selections on that Netflix original series to provide.
    Target identifies what area unit major client segments among it's base and therefore the distinctive looking behaviors among those segments, that helps to guide electronic communication to completely different market audiences.
    Proctor & Gamble utilizes statistic models to a lot of clearly perceive future demand, that facilitate set up for production levels a lot of optimally.

How do knowledge scientists mine out insights? 
It starts with knowledge exploration. once given a difficult question, knowledge scientists become detectives. They investigate leads and take a look at to grasp pattern or characteristics among the information. this needs an enormous dose of analytical creativeness.

Then pro re nata, knowledge scientists might apply quantitative technique so as to urge level deeper – e.g. inferential models, segmentation analysis, statistic prognostication, artificial management experiments, etc. The intent is to scientifically piece along a rhetorical read of what the information is de facto expression.

This data-driven insight is central to providing strategic steerage. during this sense, knowledge scientists act as consultants, guiding business stakeholders on a way to act on findings.
Data science – development of information product

A "data product" may be a technical plus that: (1) utilizes knowledge as input, and (2) processes that knowledge to come arithmetically-generated results. The classic example of a knowledge product may be a recommendation engine, that ingests user knowledge, and makes personalized recommendations supported that knowledge. Here area unit some samples of knowledge products:

    Amazon's recommendation engines recommend things for you to shop for, determined by their algorithms. Netflix recommends moving to you. Spottily recommends music to you.
    Gmail's spam filter is knowledge product – associate degree rule behind the scenes processes incoming mail and determines if a message is junk or not to junk.
 pc vision used for self-driving cars is additionally knowledge product – machine learning algorithms area unit able to acknowledge traffic lights, alternative cars on the road, pedestrians, etc.

This is completely different from the "data insights" section on top of, wherever the result to it is to maybe offer recommendation to associate degree govt to create a better business call. In distinction, a knowledge product is technical practicality that encapsulates associate degree rule, and is intended to integrate directly into core applications. individual samples of applications that incorporate knowledge product behind the scenes: Amazon's homepage, Gmail's inbox, and autonomous driving software system.

Data scientists play a central role in developing knowledge product. This involves building out algorithms, still as testing, refinement, and technical readying into production systems. during this sense, knowledge scientists function technical developers, building assets that may be leveraged at wide scale. 

 Technology and Hacking

First, let's clarify thereon we tend to aren't talking concerning hacking as in breaking into computers. We're relating the technical school software engineer social group which means of hacking – i.e., creativeness and ingenuity in victimisation technical skills to create things and notice clever solutions to issues.

Why is hacking ability important? 

as a result of knowledge scientists utilize technology so as to wrangle huge knowledge sets and work with advanced algorithms, and it needs tools way more refined than stand out. knowledge scientists have to be compelled to be able to code — model fast solutions, still as integrate with advanced knowledge systems. Core languages related to knowledge science embrace SQL, Python, R, and SAS. On the boundary area unit Java, Scala, Julia, and others. however it's not simply knowing language fundamentals. A hacker may be a technical ninja, able to creatively navigate their manner through technical challenges so as to create their code work.

Along these lines, a knowledge science hacker may be a solid recursive thinker, having the flexibility to interrupt down mussy issues and recompose them in ways in which area unit resolvable. this is often essential as a result of knowledge scientists operate among tons of recursive quality. they have to own a powerful mental comprehension of high-dimensional knowledge and tough knowledge management flows. Full clarity on however all the items move to create a cohesive resolution.

Tuesday, 14 August 2018

Cloud Computing With Architecture

Cloud Computing

A cloud refers to a distinct IT environment that is designed for the purpose of remotely provisioning salable and measured IT resources.
The term originated as a metaphor for the Internet which is, in essence, a network of networks providing remote access to a set of decentralized IT resources.
 Prior to cloud computing becoming its own formalized IT industry segment, the symbol of a cloud was commonly used to represent the Internet in a variety of specifications and mainstream documentation of Web-based architectures. This same symbol is now used to specifically represent the boundary of a cloud environment.

cloud symbol








Architecture of cloud computing:
cloud computing architecture

The three cloud computing layers are:
layers


Ø  Infrastructure as a service(IAAS)
IAAS provider gives low-level abstraction of physical device Amazon Web Service is an example of IAAS.
Ø  Platorm as a service(PAAS)
PAAS provider offer managed services like Rails,Django etc. One good example of PAAS is Google App Engineering.
Ø  Software as a Service(SAAS)
SAAS Provider offer an actual working software application to clients.Sales-force and GitHub are good example of SAAS.

How cloud computing works

Cloud computing services all work a little differently, depending on the provider. But many provide a friendly, browser-based dashboard that makes it easier for IT professionals and developers to order resources and manage their accounts.
Some cloud computing services are also designed to work with REST APIs and a command-line interface (CLI), giving developers multiple options.

What is Front End Cloud Computing?

Front-end is the side that is visible to the client, customer, or user. Front-end pieces include the user interface, and the client’s computer system or network that is used for accessing the cloud system.
You have probably noticed that different cloud computing systems use different user interfaces—for example, not only can you choose from a variety of web browsers (including Chrome, Safari, Firefox, etc.), but the Google Docs user interface is different than that of Sales-force.

What is Back End Cloud Computing?

On the other hand, the back-end pieces are on the side used by the service provider. These include various servers, computers, data storage systems, virtual machines, and programs that together constitute the cloud of computing services.
The back-end side also is responsible for providing security mechanisms, traffic control and protocols that connect networked computers for communication.
To briefly summarize: the front-end is the part you see, and the back-end is the computing that happens behind the scenes.

Saturday, 11 August 2018

What is Mangodb?

What is MongoDB?

MongoDB is a document oriented database. It is a key feature of MongoDB. It offers a document oriented storage. It is very simple you can program it easily.
MongoDB is an open-source document-based database management tool that stores data in JSON-like formats. It is a highly scalable, flexible and distributed NoSQL database.

Introduction to MongoDB

As a definition, MongoDB is an open source database that uses a document-oriented data model and a non-structured query language. It is one of the most powerful NoSQL systems and databases around today. Since it is a NoSQL database it does not use the usual rows and columns that we so much associate with the relational database management. It is an architecture that is built on collections and documents. The basic unit of data in this database consists of a set of key-value pairs.
Businesses are increasingly finding that MongoDB is ticking all the right boxes when it comes to meeting the business requirements. Here is how:
MongoDB provides the right mix of technology and data for competitive advantage
It is the most suited for mission-critical applications since it considerably reduces risks
It increasingly accelerated the time-to-value and lowers the total cost of ownership
It builds applications that is just not possible with traditional relational databases

Wednesday, 4 July 2018

Google Assistant can identify a song -Pixel 2 & Pixel 2 XL

Google Assistant can identify a song


Google Assistant has always been good at fetching information and now it can identify songs as well. The feature - "What song is this" -  was earlier introduced on the new Pixel 2 and Pixel 2 XL smartphones. Google is now rolling out this feature for more Android devices by releasing an update for Google Assistant. Once the Google Assistant app has been updated, the Assistant will be able to recognise songs without the need of any third party app.

This feature will work similar to the popular app Shazam, which uses built-in microphone to gather a brief sample of the media playing and compares it against a central database for the match.

When we tested this feature, Google Assistant was able to read the lyrics of the song playing in the background and fetch a card with lyrics and other details. But when we specifically asked Google Assistant - 'What song is this', it came up with a standard response of 'I don't have this information'. While the feature is not yet live in India, some of the international media reports claim the feature was made available with the update released today.

Friday, 2 February 2018

Cryptocurrencies bitcoin

What is Cryptocurrencies?

If you take away all the noise around cryptocurrencies and reduce it to a simple definition, you find it to be just limited entries in a database no one can change without fulfilling specific conditions. This may seem ordinary, but, believe it or not: this is exactly how you can define a currency.
Take the money on your bank account: What is it more than entries in a database that can only be changed under specific conditions? You can even take physical coins and notes: What are they else than limited entries in a public physical database that can only be changed if you match the condition than you physically own the coins and notes? Money is all about a verified entry in some kind of database of accounts, balances, and transactions.

How miners create coins and confirm transactions?
Let‘s have a look at the mechanism ruling the databases of cryptocurrencies. A cryptocurrency like Bitcoin consists of a network of peers. Every peer has a record of the complete history of all transactions and thus of the balance of every account.
A transaction is a file that says, “Bob gives X Bitcoin to Alice“ and is signed by Bob‘s private key. It‘s basic public key cryptography, nothing special at all. After signed, a transaction is broadcasted in the network, sent from one peer to every other peer. This is basic p2p-technology. Nothing special at all, again.

Reasons to use Cryptocurrencies? 

It’s fast and cheap
 The transactions happen quickly and receivers receive it in a couple of minutes. The transaction fee is very low compared to other monetary transaction done online, like transactions made by PayPal and Pioneer
.  
There are no chargebacks.
 Once payment is sent, you cannot chargeback. So the chance of fraud is very less.  

People can’t steal your information from merchants. 
 Your details are not sent to the merchant. You can even create a Cryptocurrency waller with fake detail and use forever without disclosing your real identity 

How to work


Thursday, 1 February 2018

Artificial Intelligence (AI)

What is Artificial Intelligence (AI)?
AI (pronounced AYE-EYE) or artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning (the acquisition of information and rules for using the information), reasoning (using the rules to reach approximate or definite conclusions), and self-correction. Particular applications of AI include expert systems, speech recognition and machine vision.

Artificial Intelligence (AI) is about to go mainstream

Real Estate giant Coldwell Banker is experimenting with AI to target classes of likely buyers for a specific property, and piloting new AI software that helps identify likely sellers. Leading law firms use AI to scan thousands of legal documents in minutes, rather than weeks, to build stronger cases at a fraction of the cost.
While Netflix, Amazon, Google and Facebook pioneered artificial intelligence, AI is beginning to be deployed by increasing numbers of mid-sized and even small businesses. Here, the applications are exploding.
 At Coldwell Banker, when their data shows a confluence of events, the software alerts the company to a likely new prospect. For example, the homeowner’s youngest kid just went off to college. The couple has been in their home beyond the average of 10 years.  And it sees that the couple has been online browsing for properties in North Carolina. AI brings these data-points together and concludes that this household is likely to be selling soon. “If we can find those people before they even know they’re selling, we’re that much ahead,” Coldwell Banker CEO Charles Young tells Chief Executive Magazine.

Types of artificial intelligence

Type 1: Reactive machines. An example is Deep Blue, the IBM chess program that beat Garry Kasparov in the 1990s. Deep Blue can identify pieces on the chess board and make predictions, but it has no memory and cannot use past experiences to inform future ones.

Type 2: Limited memory. These AI systems can use past experiences to inform future decisions. Some of the decision-making functions in autonomous vehicles have been designed this way.

Type 3: Theory of mind. This is a psychology term. It refers to the understanding that others have their own beliefs, desires and intentions that impact the decisions they make. This kind of AI does not yet exist.

Type 4: Self-awareness. In this category, AI systems have a sense of self, have consciousness. Machines with self-awareness understand their current state and can use the information to infer what others are feeling.


Advantages of AI

a. Error Reduction
We use artificial intelligence in most of the cases. As this helps us in reducing the risk. Also, increases the chance of reaching accuracy with the greater degree of precision.

b. Difficult Exploration
In mining, we use artificial intelligence and science of robotics. Also, other fuel exploration processes. Moreover, we use complex machines for exploring the ocean. Hence, overcoming the ocean limitation.

c. Daily Application
As we know that computed methods and learning have become commonplace in daily life.
Financial institutions and banking institutions are widely using AI. That is to organize and manage data. Also, AI is used in the detection of fraud users in a smart card based system.

d. Digital Assistants
“Avatars” are used by highly advanced organizations. That are digital assistants. Also, they can interact with the users. Hence. They are saving human needs of resources.

Risks of Artificial Intelligence

a. High Cost
Its creation requires huge costs as they are very complex machines. Also, repair and maintenance require huge costs.

b. No Replicating Humans
As intelligence is believed to be a gift of nature. An ethical argument continues, whether human intelligence is to be replicated or not.

c. Lesser Jobs
As we are aware that machines do routine and repeatable tasks much better than humans. Moreover, machines are used of instead of humans. As to increase their profitability in businesses.

d. Lack of Personal Connections
We can’t rely too much on these machines for educational oversights. That hurt learners more than help.
 

Featured Documents

Customization

View more

Tips and Tricks

View more

Image Documents

View more

Tutorials

View more

Legal Documents

View more

Getting Started

View more