For decades, percentages have been the cornerstone of academic assessment, a seemingly objective and straightforward way to quantify student performance. We assign a numerical score, average it out, and present it as a clear indicator of learning. Yet, beneath this veneer of simplicity lies a system riddled with flaws, one that actively hinders effective assessment, Read More
Author: Gary Ackerman
ETL and ELT
a post for students in my database course Queries are fundamental to data analytics, enabling the extraction and manipulation of information from databases and other sources. When working with data, particularly in building data pipelines, two primary methodologies for moving and preparing data are Extract, Transform, Load (ETL) and Extract, Load, Transform (ELT). While both Read More
Queries
a post for students in my database course In the fast-paced world of data, insights are currency, and queries are the keys to unlocking them. For anyone stepping into database design and management, understanding queries isn’t just a technical skill; it’s a fundamental capability that underpins almost every task, from collecting raw information to generating Read More
The Data Ecosystem: Unpacking Data Lakes, Data Warehouses, and Data Marts
a post for students in my database course In our previous post, we delved into the evolving landscape of databases, moving beyond the familiar structured world of SQL to explore NoSQL. We established that NoSQL, or “Not Only SQL,” encompasses a diverse range of databases, some structured and relational (like JSON’s key-value pairs), and others Read More
What Exactly is NoSQL? It’s More Nuanced Than You Think
a post for students in my database course The term “NoSQL” can be a bit misleading. While it literally stands for “Not SQL,” it’s more accurately interpreted as “Not Only SQL.” The core distinction, as the sources explain, is that anything that isn’t based on SQL is considered NoSQL. But here’s where it gets interesting: Read More
Foundations of SQL
a post for students in my database course Have you ever wondered how companies like Netflix recommend your next binge-watch, or how your favorite online store knows exactly what you might want to buy? It all comes down to data! In our increasingly digital world, data is everywhere, and the ability to understand, manage, and Read More
Digital Forensics
a post for students in my network security course In the intricate landscape of cybersecurity, understanding “what happened” after a security incident is as crucial as preventing it. This is where forensic investigations come into play. Often a critical component of incident response, forensic analysis is the meticulous process of examining systems, devices, or networks Read More
Essential Network Security Strategies
a post for students in my network security course In today’s interconnected world, an organization’s network is its digital nervous system, carrying vital information and enabling all operations. Protecting this critical infrastructure is paramount for cybersecurity analysts, who are responsible for securing the confidentiality, integrity, and availability of information and systems. Building a secure network Read More
Why Our Machines Need to Understand Us
In the rapidly evolving landscape of artificial intelligence, the conversation often centers on cutting-edge algorithms, computational power, and the impressive feats machines can now accomplish. But what happens when these incredibly capable systems need to operate in the messy, unpredictable world of human beings? In Chapter 13 of “Possible Minds,” titled “Putting the Human into Read More
Malware Definitions and Avoidance
a post for students in my network security course In the ever-evolving landscape of cyber threats, understanding malware is important for individuals and organizations alike. What is Malware? Malware, a portmanteau of “malicious software,” is an umbrella term for any software intentionally designed to cause damage to a computer, server, client, or computer network, or Read More