Wednesday, July 11, 2018

Data Science and Data Engineering

Standard




So this is the world of technology. And This entire world is now almost relying on technology. And Yes! that is true. Our business our education our technical life each and everything is depending on technology and science of course. And when there are technology and science there is also a word appears behind which is DATA. Data is everywhere. We are using data to find results of anything.
No matter what is happening data is mainly responsible for everything. And thus Data has been introduced in the field of science and technology. And then it was divided into two more parts in terms of its usability and productivity, which is Data Science and Data Engineering.  
Most of the people out there often mix up between Data Science and Data  Engineering.
But the truth is these both are totally different. They both have their own task but they are both connected with each other.

So let's start with Data Science.



  • What is Data Science?

Data Science involves using automated methods to analyze massive amounts of data and to extract knowledge from them.



Data science is everywhere. It uses for Statistical research, Mathematics, Data processing and most importantly on Computer science as well as Machine Learning which is now a great game changer on technology. 
In terms of mathematics, data science contributes a lot. But in present in the field of computer technology and science machine learning and deep learning are ruling the most. 

Machine Learning explores the study and construction of algorithms that can learn from and make predictions on data. It is closely related to computational statistics. Besides, it used to devise complex models and algorithms that lend themselves to a prediction which in commercial use is known as predictive analytics.

Side by side Deep learning is one of the only methods by which we can circumvent the challenges of feature extraction in machine learning. This is because deep learning models are capable of learning to focus on the right features by themselves, requiring little guidance from the programmer.
Therefore, we can say that Deep Learning is:
 1. A collection of statistical machine learning techniques
 2. Used to learn feature hierarchies
 3. Often based on artificial neural networks.


Reference:  https://www.quora.com



  • What is Data Engineering?
Data engineering includes what some companies might call Data Infrastructure or Data Architecture. The one who gathers and collects the data, stores it, does batch processing or real-time processing on it and serves it via an API (application programming interface) to a data scientist who can easily query it. And one who does all these is called a Data Engineer.




Data engineering means a good Data engineer has to gain good computing skills along with extensive knowledge on databases and best engineering practices. This includes some backend systematic skills like handling and login errors, monitoring the system, building human-fault-tolerant pipelines, understanding what is necessary to scale up, addressing continuous integration, knowledge of database administration, maintaining data cleaning, ensuring a deterministic pipeline and so on.
It all requires several types of software engineering skills and experience. 

Data Engineers' Responsibilities

The data engineer is someone who develops, constructs, tests and maintains architectures, such as databases and large-scale processing systems. The data scientist, on the other hand, is someone who cleans, massages, and organizes (big) data. 

Data engineers deal with raw data that contains human, machine or instrument errors. The data might not be validated and contain suspect records; It will be unformatted and can contain codes that are system-specific. 

Lastly, to deliver the data to the data science team, the data engineering team will need to develop dataset processes for data modeling, mining, and production. 



Data Scientists' Responsibilities


Data scientists will usually already get data that has passed the first round of cleaning and manipulation, which they can use to feed to sophisticated analytics programs and machine learning and statistical methods to prepare data for use in predictive and prescriptive modeling. Of course, to build models, they need to do research industry and business questions, and they will need to leverage large volumes of data from internal and external sources to answer business needs. This also sometimes involves exploring and examining data to find hidden patterns.

Once data scientists have done the analyses, they will need to present a clear story to the key stakeholders and when the results get accepted, they will need to make sure that the work is automated so that the insights can be delivered to the business stakeholders on a daily, monthly or yearly basis. 

The data scientist needs to be aware of distributed computing, as he will need to gain access to the data that has been processed by the data engineering team, but he or she'll also need to be able to report to the business stakeholders: a focus on storytelling and visualization is essential. 



Finally,

Both are different in terms of task and perspective.
But Both are also connected with each other. A data scientist cannot do their job without a data engineer. Data engineers enable data scientists to do their jobs more effectively! And thus the entire technical process works on.















Wednesday, March 2, 2016

Keeping Facebook account secure

Standard



Nowadays Facebook is a very strong and popular social site in the world. Most of the internet users has their own Facebook account and they love to use that frequently. Facebook is now a part of our lives. Facebook stores many memorable thoughts,pictures,videos and many other things. It is a very good way of communication also. So Facebook is a very important and useful thing for every users! But as it is getting famous some people are also trying to break the security of a facebook account to grab or deface those important stuffs! Which is called Facebook Hacking which is also a Cyber Crime as well. Day by day Facebook Inc. is improving a lot security issues on their system so that hackers can not break into their system OR steal someones account. But still there are some ways to hack someones facebook account's password. It depends on the users. So there are some things to keep notice on. Here are some steps to ensure account privacy and security.

1. Protect your Password: Password is a very essential thing to protect your account(s) from accessing other. Be sure that your Password is long including numbers,letters and symbols. Don't use your Birth date,name or anything that related with you as a password. Try something unique that no body knows. Do not use the same password that you have used already in other online accounts such as Email accounts. Use different passwords for different accounts. You can use password manager app (download only verified ones) to save your passwords to recall those.

2. Turn On the Login Approval: Login approval is pretty helpful for securing your account. It applies an extra security layer on your account which is also known as two step authentication system. If anybody steals your password then he/she cannot login OR get fully access on your account. After putting the username/email and password you have to put another code on the next box after login. That code will be sent on the users phone as a text message OR the user can get that code from his/her Facebook App. If that code is entered on that box then the user can gain access to his/her account otherwise its impossible to gain access. So login approvals can make hackers far away from defacing your important stuffs. If anybody knows your password then he/she has to get that one time use code also. This system can be added by setting and verifying your mobile number on your account.

3. Secure your Email account(s) : Since your facebook is connected with your email account(s), you have to protect those emails also. Because hackers can hack your Email account to reset your facebook account's password. So use a strong password and Two step authentication on your linked email account.

4. Think before you Click: Facebook and other social account users often face this threat. It is called Phishing Attack. The hacker tries to grab somebody's password by phishing links. It totally depends on the user.If that user click on those kind of links and follow that site's instructions,his/her accounts password will be stolen instantly. Normally this method is quite famous and still workable.This links contains a replicated image and information of a particular site (e.g Facebook.com ) that's why the users often puzzle and so they login with their email and password on that fake site/phishing site. As a result the hacker can get your password then can login in your account. But if you have turned on your Login Approval then that hacker can not login in your account! That guy has to input another code which is sent to your phone. So you can see that login approvals can help your account getting secured! To check any links/URL that you doubt,you can scan from here: https://www.virustotal.com/

5. Remove untrusted apps: Untrusted apps that is installed on your facebook id is not fully safe! Since you have given the permission to post something and other access of your account to those apps so those untrusted apps are not fully safe! So it is good to remove those apps from your account.

6. Remove the untrusted browsers and seasons: Removing untrusted browsers and seasons from your account ensure more privacy of your account. Sometimes many browsers saves the season that you forgot to logout. You can remotely remove those seasons so that other person cannot use your account from that season from that place.
















Friday, February 26, 2016

Reaction Buttons are here in Facebook!

Standard
See in the world of online social communication there are a lots of lots of stuffs out there,many features are here and improving according to the era of technology. Facebook is one of the most vast using social media sites in this planet! From 2004 to 2016 today, Facebook Inc. has improved many features and helped us for making our communication a bit more easier than before! It helps us to express our mind, helps us to share what we have in our minds. Within a seconds we can rapidly share our thoughts,pictures,videos life event around the world and its not the end we can also select the peoples who can see the post. So facebook ensures our right of sharing and also ensures our online privacy as well. The celebrities can go live with their Facebook accounts and share what they are going to do and what they are doing just in real time! so Facebook is trying hard to give all the possible features. Apart from these there are much more things to explain!
Another interesting thing is LIKE button. Its a very unique thing in Facebook product! People uses this LIKE button on  people's post so that other people and the user himself can know how amount of people likes that particular post. But as the time goes on people got bored with that Button. Many of them requested to give a Dislike button with the LIKE button because all the post are not worthy for Like. In many Townhall Q&A of Facebook, CEO Mark Zuckerberg faced the same question that why he don't launch Dislike Button.


LIKE button is not suitable for all posts like if anyone posts sad or ill news then its not the right place to give a like button because you are not going to show other people that you are liking this post besides you are also not going to give a Dislike instead of that because its also not looks good where you need to show Sympathy here. In Facbeook all the users has the right to post something good according to their taste and if anybody Dislikes this it looks mean or rude thats why facebook doesn't want to create a harsh situation. We’ve been listening to people and know that there should be more ways to easily and quickly express how something you see in News Feed makes they feel. That’s why after a huge thinking and working on it today Facebook has launched Reactions, an extension of the Like button, to give you guys more ways to share our reaction to a post in a quick and easy way. From that button there is Love,Laughing,Amazed,Sad and Angry and of course there will be LIKE button also so that people can get a meaningful expression for their posts. So these are the reaction button which is launched in Facebook. All they need is to press the Like button for a few seconds and then they will able to see the 5 new reaction button and click/tap on that icon of reaction.










Sunday, June 14, 2015

Clearing the confusion the reason behind Facebook Hacking

Standard


Some of the people out there often request me to Hack someones Facebook account or any social network's account. This post is for those who often ask me to Hack. **SORRY TO THOSE WHO KNOWS MUCH BETTER ABOUT THIS, I AM JUST HIGHLIGHTING ABOUT THIS POINT ** 

So Talking about Hacking- It is a way, it is a technique or a trick to bypass someone’s login panel or make access without any authorization or something. It means the breaching of an online security system. Please guys stop creating rumours about hacking. SOME of the people don't know what actually Hacking is! Trust me i don't know the H of hacking, all I want to say that i got only the meaning of Hacking and i know a FEW things about Hacking but NOT about all. Yes i'm really passionate about hacking but true to say I don't have that skill properly. I m here to let you guys know what is hacking or what is Facebook hacking. Actually Nowadays a Facebook Account can not be Hacked! By reading this line most of u wondering that facebook is still hacking so this line is not true. Yeah its true that nowadays people's Facebook accounts are being hacked and perhaps many accounts are being hacked at this moment somewhere! So how does it happen?
Basically nowadays everyone can be a hacker. And this type of hackers uses Phishing attack to grab somebody's facebook account's login credentials. so all they need a fake facebook login page and send that link to the victim and as he/she clicks that link and login to that fake facebook page with his/her facebook username and password, that hacker/phisher instantly catch that login credentials from his specific email which came from that victim! see it is that easy! It is an example of phishing attack. there are many other phishing trick out there to grab somebody's password but this example is quite famous. Most of the people have already beware about this and they know enough about this. Another way is Keylogging. Its a simple Software/tool that may installed in a computer or any other device that can be used to grab your keystrokes and when you are typing your password on the keyboard the keylogger tool can grab your password and store that password into its specific location or send it to any specific email remotely! and after that when you are gone the hacker can easily open that file of Keylogger and find your all keystrokes including your passwords,email and pin number! One more trick is guessing. I think that I don't need to say anything about this.You guys know about this very well.

So these are some common reason behind hacking/stealing passwords.
Except these a Facebook account can NOT be hacked because Facebook Inc has improved their security system very strongly and they are still improving their system everyday and as far as i know that's why Facebook is the most famous Social Network in the entire world! Facebook has a lot of brilliant engineers to give much security codings. Now if anybody can break into their security system he must go to Facebook HQ for a job with a huge amount of salary.






Friday, June 12, 2015

WhatsApp can be Hacked by the Loophole!

Standard



Smartphone messaging service WhatsApp was acquired by the corporate giant Facebook for over $20 billion last year, and it seems that news of a potential hack has reportedly been found that could undermine all of their forecasted profits.
Prone to hijacking without unlocking or even knowing your device’s password, this hack is making its hundreds of millions of users vulnerable to, not just hackers, but even small children.



This trick lets any random stranger to get effectively control over your WhatsApp account. The attacker needs nothing more than the phone number of the target person, and is able to access to the target’s mobile phone for a few seconds, even if it is locked.



This is not even a loophole or vulnerability in WhatsApp… rather, it is simply the way WhatsApp and its account setup mechanism works.


NOTE: We aren’t encouraging users to hack others WhatsApp account, but the purpose of publishing this article is to warn and remind our readers that you should be extra careful to whom you lend your mobile phone…. and not to leave it unattended for longer durations than necessary, particularly with strangers around.


This trick allows the non-technical-hacker to get full control over the victim’s WhatsApp account in no time at all, and the most surprising part is that it works on ALL mobile platforms, including Android, Windows and Apple’s iOS.


Below are the clear steps to hack the WhatsApp account on any Smartphones:

Step 1: Begin by setting up a WhatsApp account on a new mobile phone using the phone number of your target.


Step 2: During the setup process, WhatsApp will call the target’s phone number and will provide a PIN that needs to be entered for the authentication of the account.

Step 3: If you already have access to the victim’s phone, you can just answer the phone call and grab the code with no effort at all. Even if the victim has a lock screen enabled on the phone, you can receive the phone call to get the “secret” PIN.



Step 4: Profit?



Think your fancy iPhone is “safer” than other models? Think again.



Things get even worse on the iPhone if the users have configured their iPhones with Siri authentication for the lock screen, because all their contact details are available for access via Siri’s settings, effectively giving EVERYONE access to their phone number, bypassing their PIN.



Thus, if you try to steal the account information of their WhatsApp, without even having the phone number of the target user, you can just call the number from the target’s phone using Siri.



Just check the given video demonstration that explains the simple trick of taking control of anyone’s WhatsApp account.




Thursday, June 11, 2015

Meet Android M

Standard


The Android M developer preview was recently launched at Google I/O 2015 in San Francisco. At the conference, Google senior VP of Products Sundar Pichai said the company had "gone back to basics" with this new version of Android. While Android Lollipop introduced a new visual aesthetic, Android M brings some much-needed stability and usability improvements which might not be as eye-catching, but may prove to be significant additions for a while to come.

1. App permissions



First up, app permissions. As had previously been speculated, app permissions have been overhauled in Android M, with users now being able to choose to accept or deny individual permissions as they see fit. Permissions have also been simplified.

Permissions will now be requested the first time you try to use a feature, not at the point of installation. "You don't have to agree to permissions that don't make sense to you," Burke said, and used WhatsApp to give an example of how this works.

If you want to record a voice message, WhatsApp will prompt you with a one-time request for permission to use your mic: if you still wish to give it access and record the message, you can, but you don't have to. Android M is giving users greater control of the information apps can access, and this is a truly positive step forward for Android.

You can modify the permissions granted to apps at a later date in your Settings, or you can view permissions by type and see which apps have that permission granted. It's all about giving the user complete control over their Android.


2. Web experience



Google has been exploring trends in the way web content is consumed to provide a better user-experience when interacting with websites and apps. "Chrome Custom Tabs is a new feature that gives developers a way to harness all of Chrome's capabilities, while still keeping control of the look and feel of the experience," said Burke.

Chrome Custom Tabs will allow apps to open a customized Chrome window on top of the active app, instead of launching the Chrome app separately. This will provide a faster and more intuitive user-experience when navigating between apps and the web.

Chrome Custom Tabs supports automatic sign-in, saved passwords, autofill, and multi-process security to assist the integration of the app and web experience. So, for example, a Pinterest custom tab will have a Pinterest share button embedded in it, can include custom overflow menu options and doesn't require the Pinterest developers to build their own web browser.Android M will introduce standardized fingerprint support.

3. Fingerprint support



Google will "standardize support" for fingerprint scanners on phones running Android M. The new functionality will allow fingerprint scanners to be used not only to unlock phones, but to make purchases shopping in real-life or within Play Store apps.

Of course, your device will need a hardware fingerprint scanner to begin with, but with Google's full support, expect to see these appear on many more devices in the future.

4. Mobile payments




Android Pay is Google's new mobile payments system designed to make the checkout process easier and faster. Google is aiming to provide "simplicity, security, and choice," with Android Pay, allowing you to use your existing credit cards to pay for products in more than 700,000 stores in the US.

Compatible with any device housing NFC capabilities (and running 4.4 KitKat or above), the Android Pay platform is being supported by American Express, Visa, Mastercard, and Discover, as well as carriers such as AT&T, Verizon and T-Mobile. Google's response to Apple pay is here.


5. App links


"When a user selects a weblink from somewhere, Android doesn't know whether to show it in a web-browser, or some other app that claims support for the link," this was the problem facing the Google developers before Android M.

You may be familiar with the "Open with" dialogue box which appears when you try to open a link within an app on Android. You might be asked if you want to open a link with YouTube, or with Chrome, for example.

App links are being changed in M so that Android has a greater awareness of which apps can open content directly, instead of stopping users every time with the dialog box. If you tap a Twitter link in an email, for example, the Twitter app will open automatically instead of prompting you to ask if you want to use Twitter to view it.

This is almost a blink-and-you'll-miss-it improvement, but it's representative of Google's attention to detail: Android M is probably going to feel more usable without the user ever understanding why.

6. Power and charging



Android M makes use of a new function known as Doze to improve device standby time. By using motion detectors, Android will recognize when devices haven’t been interacted with for a while, such as when a person is asleep or a device has been left on a table, to reduce background processes.

Burke said that Google tested two Nexus 9 devices, one running Lollipop and one running the Android M preview, and learned that M will provide up to two-times longer standby time. Even in Doze mode, your Android can still start alarms or notify you of priority notifications.

Android M also supports USB Type-C which provides faster charging, and lets users charge other devices with their phone.Doze is going to bring up to two-times longer standby time compared to Android.

Android M release date


The Android M Developer Preview is available now for Nexus 5, Nexus 6, Nexus 9 and Nexus Player, and the final version is due to launch in Q3, 2015.

What else is in new in Android M?

Auto Backup and Restore for Apps


Possibly the most interesting aspect of Android M not discussed in Google’s I/O keynote speech was Android Auto Backup and Restore for Apps. This feature will be used in conjunction with Google Drive to automatically backup app data and settings with a file size of 25 MB or less.

These backups occur no more than once per day, and run only when the device is idle and connected to Wi-Fi and power. The uploaded data does not count towards your Google Drive storage quota, and is encrypted.

If you lose your device or delete the app, your previous progress will be restored the next time you install it, and it even works with apps which are side-loaded or accessed through a third-party app store.

New app drawer



One of the most immediately noticeable visual changes to Android M is the new app drawer. This now scrolls vertically instead of horizontally, and is held against a white background, rather than a muted shade of your homepage wallpaper. Across the top of the menu you will see your four most recently used apps, and down the left-hand side are the letters of the alphabet.


Android M RAM manager


Google has introduced a new RAM manager to Android M with the aim of providing users with more accurate and comprehensible information regarding the maximum and average RAM usage of apps.

The menu can be found in Settings > Apps > Options (three dots button) > Advanced > Memory. Though it's a little hard to navigate to, the page offers a far clearer insight into app demands, and the overall effect they will have on your device.

With a reading of an individual app's RAM consumption, as well as how often it is running in the background, users will be able to better determine which apps should be removed in endless bid to increase device performance and battery life.

Android M even includes a simple bar at the top of the page displaying the current performance status of a person's handset; if it says "good performance", you're likely running an efficient set of apps.The Android M logo.

Adoptable Storage Devices


Though Google has in the past tried to step away from external storage use (the reason why none of its Nexus devices house a microSD card slot), it appears that Android M is striking a compromise.

Adoptable Storage Devices is Google's new storage feature which essentially takes an external storage source (such as an SD card or USB drive) and formats it like an internal storage space. This means that app and personal data can be moved freely between a devices internal storage and its "adopted" storage source.

Adopted storage devices are wrapped in a layer of encryption to soothe security concerns and both microSD cards and USB OTG drives are currently supported.

Dark Theme



Buried within the Android M settings is a "Dark theme" option which transforms the menu background to a dark grey color rather than the normal pale shade. Currently this only affects the settings menu, not the app drawer, and its function is purely cosmetic. Still, it looks nice on our Nexus 6 and we hope it gets developed further.


Google Now


Google Now has been improved upon once again in Android M. Focusing on three key ares: being aware of different contexts, providing answers and helping you take action, Google Now is now smarter than ever.

Google Now's context awareness understand over 100 million different places, so when you ask ''How far is it to there?'' Google Now know exactly which ''there'' you're referring to. This awareness is compounded by Google's Knowledge Graph, which understands one billion different entities, from sports teams to gas stations, TV shows to recipes.


Google Now is also rolling out a pilot program called ''Now on Tap'' with 100 popular apps. Now on Tap provides Google Now-like content right where you are, without having to leave the app you're in. So if you're in Spotify and say ''Ok Google, what is his real name?'' Now on Tap will know you're talking about the musician you're listening to and provide search results right there an then.

The same goes for content in emails. If someone asks you a question about a restaurant and to not forget something on your way home, Now on Tap can automatically pop up a restaurant card with Maps info, Yelp, OpenTable and the dialer, as well as offer to set a reminder for whatever it was you were supposed to not forget.

Google Chrome


Chrome is also leaner and faster than ever before. Initially revamped with Android One devices in mind, where stable and speedy internet connections are not always possible, Chrome's new optimizations are set to arrive for everyone.

Chrome is now aware of network strength and can modify what you see as a result. For example, if your connection is bad, you might see colored squares rather than preview images in Search results. Optimized web pages will load four times faster and use 80 percent fewer bytes. You'll also see a memory usage reduction of up to 80 MB. Chrome will also support offline mode.


Google Photos


As expected, Google pulled the wraps off its new Google Photos service. Previously a part of Google+, Google Photos is now standalone photo and video storage and sharing service that provides unlimited free storage for up to 16 MP photos and 1080p video. That is seriously impressive.

The Google Photos service stores high-quality compressed versions of your photos and movies but doesn't store anything on your device, so you can search through thousands of photos at high speed and without bogging your device down with gigabytes of photos.


Popular features like Auto-Awesome and Stories are a key highlight, accessible through a new Assistant feature, which will automatically suggest creative uses of your images and footage. Through simple pinch gestures you can see tiled images for particular days, weeks, months or even years and then zoom right back in at any point you like.

Google Photos is also powerful for search, as you'd expect. You can search by People, Places, Things and Types, which are all automatically created, and you can drill down in each of those categories to see, for example, every picture you have of a particular person, all without ever tagging them.

Sharing is also a breeze. You don't even need you contacts to have the Google Photos app. You can simply share a link that they can view in Chrome. If they are logged in they can easily download an entire album in seconds.

Tuesday, April 21, 2015

Browse free internet using internet.org

Standard


Thanx to Mr Mark Zuckerberg and his team as well as to our Government for giving us the Internet.org service in Bangladesh. From today that means from 21st of April anyone can access into the internet free of cost. This service will be available to another countries very soon and already this service is available in many countries.


Lot of people does not know what is actually Internet.org is… so Internet.org is a Facebook-led initiative bringing together technology leaders, nonprofits and local communities to connect the two thirds of the world that doesn’t have internet access.Internet.org is making the internet available to every person on earth is a goal too large and too important for any one company, group or government to solve alone. Everyone participating in Internet.org has come together to meet this challenge because they believe in the power of a connected world.

>> For using the free internet via Internet.org, a user has to download the internet.org app in his/her phone and those who doesn’t have the app he can easily visit www.internet.org site to use free internet. so it is really easy to use <<

internet.org app download link (apk file)---

Google Play: http://is.gd/pbKTSU

mirror link: http://is.gd/TcLM96

Shared link: https://shared.com/ze2lql6kjy?s=l 

From Today Internet.org is available in Bangladesh and now anyone can access Facebook,Facebook Messenger,Whatsapp,Accu Weather, BBC News,Facts for Life,Newshunt,Social blood,USPN, cricinfo,Translator,Bing search,OLX,Wikipedia,Internet Basics,WikiHow and many other according to our country’s background free of cost!But sad thing is we can’t access to Google.com. So whatever it’s a very new beginning in connecting with the world in a very new way.