Renaming a table within a database is a task that may need to be done occasionally. You might just need to rename it for clarification purposes, to archive old data, to make a copy when a restore is being done, or any number of other reasons. PhpMyAdmin helps you rename a database quickly with just a few clicks.Continue reading “Renaming Database Tables with PhpMyAdmin”
Using PhpMyAdmin to export a database or table is a great way to make a backup you can save locally, or it can help you with transferring that information to another server quickly. A few simple steps can be a powerful tool to help you and your business. We will go over exporting all databases at once, a single database, and exporting a single table. This guide assumes that you have already logged in to PhpMyAdmin.Continue reading “Exporting Databases and Tables with PhpMyAdmin”
Using PhpMyAdmin to import databases can help us in a few different situations, like when moving a database from one server to another, updating a table that is being developed elsewhere, or even restoring content from a backup. PhpMyAdmin helps make all those processes easy to accomplish through our browser.
This guide assumes that you have already logged in to PhpMyAdmin. We will go over what happens if we try to import into an existing database, importing a single table, and also partially restoring from a full database backup.Continue reading “Importing Databases and Tables with PhpMyAdmin”
Using PhpMyAdmin to search for records and information in your database can quickly help you get the information you need without having to run advanced search queries. This tutorial assumes you have already logged in to PhpMyAdmin, and shows how to search by keyword and for a range of records.Continue reading “Searching Through a Database with PhpMyAdmin”
In this tutorial, we will explore how to run SQL queries on a database within PhpMyAdmin. SQL stands for Structured Query Language. SQL statements or queries are used to perform database tasks such as searching, updating, or retrieving data from a database.Continue reading “Running SQL Queries on a Database with PhpMyAdmin”
In this tutorial, we will consider how to enable both Python 2 and Python 3 for use on CentOS 8. In earlier distributions of CentOS, an unversioned Python command was available by default.
When the CentOS installation was complete, it was possible to drop into a Python shell by simply running the “python” command in a terminal.
Paradoxically, CentOS 8 does not have an unversioned Python command by default. This begs the question, why? RedHat states that this choice is by design “to avoid locking users into a specific version of Python.” Currently, RedHat 8 utilizes Python 3.6 implicitly by default, although Python 2.7 is additionally provided to maintain existing software.Continue reading “How to Install Python on CentOS 8”
In this tutorial, we are going to take a look at how to get started with TensorFlow on CentOS. We will be covering two methods. First, we will take a look at installing TensorFlow in a Python virtual environment via the Python package manager pip. After that, we will walk through installing TensorFlow via the Anaconda package manager. Finally, we will cover building a TensorFlow pip package from source.Continue reading “How to Install TensorFlow on CentOS”
In this tutorial, we are going to cover how to set up a Python virtual environment on CentOS. A Python virtual environment makes it possible to install Python packages into a discreet Python ecosystem that is entirely separate from your system’s default Python framework. This means that you do not have to worry about overwriting the installation of any current packages that might be defaulted to the existing version of Python on your system.Continue reading “How to Set Up A Python Virtual Environment On CentOS”
We here at Liquid Web know how important good solid information can be. We also know that we have some of the most intelligent customers on the planet. With this in mind, we opt to try and ensure that you are kept up to date on the latest tech and information. It is with this in mind we continue to offer the latest knowledge available regarding ways to improve your service, upgrade your ability to work with your server(s), and enhance your overall effectiveness in growing your business.Continue reading “What Is Python?”
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was passed by Congress to protect sensitive user information related to health insurance. This act helps to reduce health care fraud and mandates a standard for handling confidential healthcare information for consumers and businesses. HIPAA compliance protects this sensitive information and specifies proper guidelines and standards for handling health insurance data. HIPAA also establishes rules for handling, administering, and maintaining electronic servers as well as the hosting of this Protected Health Information. Read more about our HIPAA compliant hosting here. Key Terms and Important Information:
- HIPAA – Health Insurance Portability and Accountability Act of 1996
- PHI – Protected Health Information
- Access Control – To limit who can log in or access sensitive PHI data. Access control helps provide accountability for authorized usage and access to servers with confidential information. HIPAA requires that all users are uniquely identifiable and that the server hosting PHI data is only accessible to specifically authorized users and entities.
- Audit Control – To log and record hardware, software and procedural work done to maintain and repair HIPAA compliant servers and data centers. HIPAA requires accurate and uniquely accountable logs for the type of work performed, what was accessed, and by whom. This notation is closely related to access control by limiting maintenance to authorized and uniquely identifiable persons or entities, but also refers explicitly to logging any maintenance of physical hardware or server software.
- Facility Access Control – To limit physical access to the data center from unauthorized or unaccountable persons. This control makes sure that only designated workers have access to physical servers containing PHI. Liquid Web’s data centers are HIPAA compliant and properly limit access to all servers.