Big Data database rolls out new features and adds new powers to its query language.more »
MongoDB NoSQL Database Migrating to NoSQL – MongoDBJul 02, 2013
MongoDB combines the usual advantages of NoSQL databases with sharding, load balancing, replication, and failover.more »
C++ B-Tree offers memory and time advantages over standard containers.more »
New organization will oversee interoperability and standards for the popular open source database.more »
Welcome EditorialOct 26, 2012
I’m looking at another crop of press releases and marveling at the ever-expanding market for products that fall under the ubiquitous heading of Big Data. Big Data is everywhere. (Or is it Big Data are everywhere – to reprise that classic quandary?) Gigantic file storage appliances from vendors like Oracle and HP and software tools like Apache Hadoop continually add new building blocks to the data infrastructure. And the goal of all this? Apart from more conventional uses for scientific modeling and analysis, one of the reasons for this huge interest in accumulating data is a phenomenon known as data mining, which Wikipedia defines as a process that “attempts to discover patterns in large data sets.”more »
Citrix Announces XenServer 6.1
Red Hat Updates Enterprise MRG
Xen.org Releases Xen 4.2more »
Hadoop Big data excavation with Apache HadoopSep 21, 2012
Experience the power of supercomputing and the big data revolution with Apache Hadoop.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm