Big Data database rolls out new features and adds new powers to its query language.more »
MongoDB NoSQL Database Migrating to NoSQL – MongoDBJul 02, 2013
MongoDB combines the usual advantages of NoSQL databases with sharding, load balancing, replication, and failover.more »
C++ B-Tree offers memory and time advantages over standard containers.more »
New organization will oversee interoperability and standards for the popular open source database.more »
Welcome EditorialOct 26, 2012
I’m looking at another crop of press releases and marveling at the ever-expanding market for products that fall under the ubiquitous heading of Big Data. Big Data is everywhere. (Or is it Big Data are everywhere – to reprise that classic quandary?) Gigantic file storage appliances from vendors like Oracle and HP and software tools like Apache Hadoop continually add new building blocks to the data infrastructure. And the goal of all this? Apart from more conventional uses for scientific modeling and analysis, one of the reasons for this huge interest in accumulating data is a phenomenon known as data mining, which Wikipedia defines as a process that “attempts to discover patterns in large data sets.”more »
Citrix Announces XenServer 6.1
Red Hat Updates Enterprise MRG
Xen.org Releases Xen 4.2more »
Hadoop Big data excavation with Apache HadoopSep 21, 2012
Experience the power of supercomputing and the big data revolution with Apache Hadoop.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.