Big Data database rolls out new features and adds new powers to its query language.more »
MongoDB NoSQL Database Migrating to NoSQL – MongoDBJul 02, 2013
MongoDB combines the usual advantages of NoSQL databases with sharding, load balancing, replication, and failover.more »
C++ B-Tree offers memory and time advantages over standard containers.more »
New organization will oversee interoperability and standards for the popular open source database.more »
Welcome EditorialOct 26, 2012
I’m looking at another crop of press releases and marveling at the ever-expanding market for products that fall under the ubiquitous heading of Big Data. Big Data is everywhere. (Or is it Big Data are everywhere – to reprise that classic quandary?) Gigantic file storage appliances from vendors like Oracle and HP and software tools like Apache Hadoop continually add new building blocks to the data infrastructure. And the goal of all this? Apart from more conventional uses for scientific modeling and analysis, one of the reasons for this huge interest in accumulating data is a phenomenon known as data mining, which Wikipedia defines as a process that “attempts to discover patterns in large data sets.”more »
Citrix Announces XenServer 6.1
Red Hat Updates Enterprise MRG
Xen.org Releases Xen 4.2more »
Hadoop Big data excavation with Apache HadoopSep 21, 2012
Experience the power of supercomputing and the big data revolution with Apache Hadoop.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.