Author Archives: Colin Hoad
Have you ever tried to import a CSV into a database and found that it won’t load because one of your CSV fields has a text qualifier inside the field itself? In this post I look at how to resolve this issue using a few lines of Python code.
Ever wanted to forward engineer a SQL script of DDL statements to automatically generate the tables based on a Visio entity relationship diagram (ERD)? In the steps below, I will explain what you need to do in order to install the Forward Engineer plugin for Microsoft Visio 2010, based on the original work by Alberto Ferrari.
How, exactly, does a computer know where to load a program into memory, and how does that program then access and retrieve information from memory? The key to answering both of these questions lies in the concept of memory addressing, which will be the subject of this post.
In this post, we will explore how memory is actually used by computer programs. In so doing, we will also examine the concept of memory addressing and why it is fundamental to the workings of any computer program.
How does a computer ‘remember’ something, and furthermore how is it able to recall some things but not others? In this post, we will explore the concept of memory, what it means and how a computer uses it.
In this post, we will examine the concept of dates and time to see how it is possible to store them in computer memory.
In this post, we will look at how a computer is able to store and represent text – once again, using just ones and zeros.
We will examine exactly how data is stored by a computer. In this post, we will look at numbers.
Just how can meaningful information be rendered into a series of ones and zeros in the first place? In this post, we will look at the architecture of a computer, how programming languages are translated and – ultimately – how everything can be captured by a computer in binary.
Most of us are familiar with the concept of data encryption: masking meaningful data so that it can’t be understood by anyone besides the person or machine it is intended for. It’s what makes secure data transactions on the internet possible, and it underpins any system that provides secure access using a password. We provide a password […]