Big Data database rolls out new features and adds new powers to its query language.more »
MongoDB NoSQL Database Migrating to NoSQL – MongoDBJul 02, 2013
MongoDB combines the usual advantages of NoSQL databases with sharding, load balancing, replication, and failover.more »
C++ B-Tree offers memory and time advantages over standard containers.more »
New organization will oversee interoperability and standards for the popular open source database.more »
Welcome EditorialOct 26, 2012
I’m looking at another crop of press releases and marveling at the ever-expanding market for products that fall under the ubiquitous heading of Big Data. Big Data is everywhere. (Or is it Big Data are everywhere – to reprise that classic quandary?) Gigantic file storage appliances from vendors like Oracle and HP and software tools like Apache Hadoop continually add new building blocks to the data infrastructure. And the goal of all this? Apart from more conventional uses for scientific modeling and analysis, one of the reasons for this huge interest in accumulating data is a phenomenon known as data mining, which Wikipedia defines as a process that “attempts to discover patterns in large data sets.”more »
Citrix Announces XenServer 6.1
Red Hat Updates Enterprise MRG
Xen.org Releases Xen 4.2more »
Hadoop Big data excavation with Apache HadoopSep 21, 2012
Experience the power of supercomputing and the big data revolution with Apache Hadoop.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.