Deerwalk Blog

Three ways to innovate with Deerwalk

Posted by Jeff Rick on February 27, 2012

Here at Deerwalk I am constantly asked the question, "What is the best way to work with Deerwalk?” The answer to this question always comes back with the less than satisfying answer of "It depends." However unsatisfying as this is for the folks asking the question it is the truth.

Secondary Indexing in Hbase for easy sorting

Posted by Deerwalk on February 15, 2012

This is a introductory tutorial on possible methodology that can be used for sorting the data in Hbase in descending order. Further it also provides insight on what Hbase is and how it differs from conventional RDBMS

Why HTML5 and CSS3

Posted by Dambar Thapa on January 31, 2012

Since the first time I heard about HTML5 and CSS3, I have been exploring them very keenly. At the same time, I have been trying to re-educate my clients but that has not been so easy. It is sad that most clients still ask for the following:

Cloud Computing Explained

Posted by Milan Lamichhane on January 20, 2012

Cloud Computing is all about outsourcing IT infrastructure and applications to run on a remote resource. Most technical people still believe that Cloud Computing is the same as traditional web-hosting model. Among the multiple factors that led to the evolution of Cloud Computing, the way Internet Service Providers (ISP) matured over time is one. The figure below illustrates how ISP turned into Cloud Computing.

  Before discussing about agile methodology in data projects, first let’s briefly discuss about the nature of data projects. In almost all data projects, there are mainly three steps, popularly known as ETL,: Extraction (E), Transformation (T), and Loading (L). At Deerwalk, the three main steps of data projects are data import, data mapping, and application processing, and an analogy can be drawn between these three steps with ETL.

Security Risks and Security Testing

Posted by Lava Kafle on December 30, 2011


Hardware, software, and networks are created by humans and hence error prone. No human is perfect and any entity created by a human is always subject to arguments and flaws. Perfect security is merely a dream.

Servers, clients, smart phones, routers, switches, gateways, VPNs, VSATs, satellites and the like are nothing but pieces of hardware and software that allow individuals to share data and interconnect. With these technologies, we have created global systems which have[...]

EDI Standards in the Healthcare Industry

Posted by Anil on December 20, 2011

Typically health care providers will have patients who are customers of many different insurance companies. When a provider sends out billing information it has to send it in various formats as expected from the different companies. In some cases it goes even beyond data formatting. For example the billing code for a medical procedure could be different across multiple insurance companies. This forces providers to customize billing for each individual insurance company, which in turn[...]

SQL Query Optimization (Part 2) - Optimizing Queries With Indexes

Posted by Sushanta Pokharel on December 13, 2011

Continuing from the previous part This post continues with details on the role indexes play in SQL queries and how to use indexes effeciently to make our queries better.

SQL Query Optimization (Part 1) - Introduction To Execution Plans and Indexes

Posted by Sushanta Pokharel on December 12, 2011

As data engineers, our work time is mostly consumed with writing queries that produce the desired output or with designing systems that can properly capture the required data. However, we frequently run across situations where we also need to optimize our queries for efficiency. As entry level data engineers, (or even when we have gained much experience) we might tend to believe that all queries that produce equal output must be equivalent in resource consumption. This is a misconception[...]

Evolutionary Software Design: How you grow

Posted by Lekhnath Bhusal on October 20, 2011

Software evolves around few operations, events, business elements, and their interconnections. Lets call them software basic elements. The key to software design is where you start (which element) and how you grow. Its not just about code reuse rather is about artifact reuse i.e. reuse of these basic elements.

Subscribe to Blog Updates

Posts by Topic

see all

Recent Posts