Twitter’s unique design allows it to easily capture real-time, location-specific insights and sentiments about anything from current events to emerging trends to economic data. By analyzing public tweets for specific keywords, forecasting tools with a high level of accuracy can be (and have been) developed. This article discusses some real world examples of how tweets have been used to make predictions.
Zero Code Tech
...because I also write quite a lot of tech stuff that isn't necessarily programming. Every article in this category is a technology article. Some are even problem-solving (or how-to) articles. But generally, they contain zero code (or maybe very little generic code). If you love tech, but are not exactly a software developer, you should be able to follow and appreciate the content in this section.
Cost savings in the cloud are extremely important for small-sized technology businesses. In this article, I share some insights on saving costs while working with Amazon Route 53. I also discuss how to prevent DNS issues when recreating hosted zones.
Package managers are ubiquitous in today’s software ecosystem. But developers still have a love-hate relationship with them. This article discusses the pros and cons of package managers in general, without necessarily arguing FOR or AGAINST them.
Building web apps that require logins are difficult when you aren’t familiar with standard security procedures. You can help secure your applications and avoid the security for usernames and passwords by implementing OAuth logins in your web development projects. OAuth lets you create a “Log in with Facebook” button on your website, and it makes login authorization much simpler for new website coders.
SQL injection is a form of hack that lets the hacker run SQL code against your database. Hackers can steal or destroy data, but they can also insert malicious code into your database. SQL injection is common on WordPress sites. If you own a website and download plugins on your site, this article will help you understand how SQL injection works and what you can do to be protected from it.
If you have ever tried to figure out why Linux is running low on memory, you will agree that the memory usage information provided by the kernel is not easy to understand. This post explains what Pss means in the /proc/PID/smaps file.