Today's multiheaded malware needs a multipronged solution

By analyzing and predicting process behavior, a new approach to endpoint protection overcomes the limitations of traditional AV detection and sandboxing

12/11/14

Beyond Storm for streaming data applications

Why a distributed, in-memory, SQL-relational database beats Apache Storm for apps that make real-time decisions on streaming data

12/03/14

MongoDB, Cassandra, and HBase -- the three NoSQL databases to watch

MongoDB, Cassandra, and HBase -- the three NoSQL databases to watch

With so many NoSQL choices, how do you decide on one? Here’s a handy guide for narrowing your choice to three

11/19/14

In-memory computing brings real-time intelligence to operational systems

In-memory data grids enable instant responses to financial transactions, shopping cart contents, monitoring streams, and other operational data

11/13/14

Why your old SAN doesn't scale

The speed of flash storage devices has changed how applications should access data and heralded the end of old storage

10/29/14

Why Redis beats Memcached for caching

Redis is more powerful and more flexible and usually the right choice, but Memcached still has its place

10/15/14

Moving Hadoop beyond batch processing and MapReduce

Apache Tez framework opens the door to a new generation of high-performance, interactive, distributed data processing applications

10/02/14

4 ways Docker fundamentally changes application development

How Docker containers streamline development and deployment, encourage best practices, and enable a new breed of micro-services based applications

09/18/14

Rethinking the data center network

In stark contrast to traditional three-tier architecture, core and pod network design paves the way to flexibility and innovation

09/04/14

How to solve Java's security problem

Bringing application security natively into the JVM can provide stronger, faster, more accurate protection against dangerous vulnerabilities

08/20/14

Why you need to deploy DNSSec now

Putting off updating your DNS servers to DNSSec? Do you really want to risk cache poisoning? DNS luminary Cricket Liu tells about the risks and why you can't wait

08/05/14

Getting your hands on data with mobile analytics

Mobile touchscreen interfaces, when designed correctly, provide a more intimate relationship with business data. Donald Farmer of Qlik offers his take on three key UI design principles

07/16/14

How virtualization is lifting us to the cloud

Server virtualization has been a huge win for the data center. Nimboxx CTO David Cauthron explains how the next phase will deliver dramatic benefits in the cloud

07/09/14

Know your options for infrastructure monitoring

As the number and variety of monitoring tools grow, it's getting harder to track which metrics to collect and why. Ernest Mueller of CopperEgg walks you through the decision points

07/02/14

How to choose between custom and commodity clouds

Dramatic price drops have helped popularize cloud computing. But as Brent Bensten of Carpathia observes, big enterprise workloads often require more configurability and control

06/26/14

Cloud-based analytics offer insight to all

Conventional analytics deliver value to an elite few. Tidemark CEO Christian Gheorghe explains how his cloud-based analytics platform offers insight to the whole organization

06/18/14

Fast data: The next step after big data

Open source tools help companies process data streams. To bring in complex queries and transactional capabilities, VoltDB's John Hugg suggests adding an in-memory NewSQL data store

06/11/14

5 signs you're outgrowing MySQL

MySQL has earned its huge installed base. But as Scott Sullivan of Clustrix argues, performance warning signs may indicate it's time to consider a NewSQL alternative

05/28/14

How JSON sparked NoSQL -- and will return to the RDBMS fold

Developers rely on JSON -- giving rise to NoSQL document databases. VoltDB CTO Ryan Betts predicts JSON will ultimately be incorporated into relational database software, too

05/21/14

To secure the cloud, keep all your keys in one place

Cloud services may be more secure than the average data center, but managing access -- including handling encryption keys -- raises new risks. Larry Warnock of Gazzang offers one answer

05/14/14

Load More