Unix Tools: Data, Software and Production Engineering
About this Course
Processing information is the hallmark of all modern organizations, which are increasingly digital: absorbing, processing and generating information is a key element of their business. Being able to interact flexibly and efficiently with the underlying data and software systems is an indispensable skill. Knowledge of the Unix shell and its command-line tools boosts the effectiveness and productivity of software developers, IT professionals, and data analysts. The Unix tools were designed, written, actively used and refined by the team that defined the modern computing landscape. They allow the performance of almost any imaginable computing task quickly and efficiently by judiciously combining key powerful concepts. The power of Unix tools for exploring, prototyping and implementing big data processing workflows, and software engineering tasks remains unmatched. Unix tools, running on hardware ranging from tiny IoT platforms to supercomputers, uniquely allow an interactive, explorative programming style, which is ideal for the efficient solution of many of the engineering and business analytics problems that we face every day. Through the use of Unix tools: Software developers can quickly explore and modify code, data, and tests. IT professionals can scrutinize log files, network traces, performance figures, filesystems and the behavior of processes. Data analysts can extract, transform, filter, process, load, and summarize huge data sets. The course is uniquely based on carefully-selected, interactive walk-through examples that demonstrate how each command operates in practice. The examples that we use involve problems that engineers and analysts face every day. _ ___ Class Central: Best Online Courses of the Year (2021 edition)Created by: Delft University of Technology
Level: Intermediate
Related Online Courses
With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across... more
On the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
In this Capstone course, you will apply your skills and knowledge acquired in previous courses and demonstrate your proficiency in DevOps practices. You’ll plan, develop, test, deploy, monitor, a... more
This course takes you through the last nine lessons of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. In this final course... more