Quantcast
Channel: New Tech Forum's blog
Browsing latest articles
Browse All 36 View Live

5 signs you're outgrowing MySQL

MySQL has long been the go-to database of the Web. It has powered some of the largest websites on the planet, as well as countless installations of open source software on every scale imaginable. But...

View Article



Fast data: The next step after big data

The way that big data gets big is through a constant stream of incoming data. In high-volume environments, that data arrives at incredible rates, yet still needs to be analyzed and stored.John Hugg,...

View Article

Cloud-based analytics offer insight to all

The ubiquitous phrase "big data" has worn out its welcome. For most businesses, the emphasis lies in useful analytic results, not the size or the source of data that produces insight. But that doesn't...

View Article

How to choose between custom and commodity clouds

Not all cloud infrastructures are built the same way, and not all applications, services, and frameworks are built for cloud computing.In this week's New Tech Forum, Brent Bensten, CTO of custom cloud...

View Article

Know your options for infrastructure monitoring

Network monitoring is the nervous system of any infrastructure. Keeping tabs on your services -- whether they're local or in the cloud -- is vitally important to maintaining a stable and functional...

View Article


How virtualization is lifting us to the cloud

Over the past decade, the whole world seems to have embraced virtualization. Is there nothing left to conquer? Hardly. Virtualization technology itself is changing very fast. And the right solutions to...

View Article

Getting your hands on data with mobile analytics

Year after year, organizations cite business intelligence and analytics as top investment priorities, but they're seldom satisfied with the results. In part that's because traditional solutions require...

View Article

Why you need to deploy DNSSec now

The Domain Name System -- the distributed network of servers that reconciles the domain names in URLs and email addresses to numerical IP addresses -- is behind every successful Internet transaction....

View Article


How to solve Java's security problem

Java applications remain a popular target for cyber criminals, as they are widely used to control access to critical data, despite Java's continuing struggles with security vulnerabilities. In this...

View Article


Rethinking the data center network

The traditional core/aggregation/access network architecture has been a mainstay of enterprise data centers for decades. While compute and storage have evolved to become more flexible, dynamic, and...

View Article
Browsing latest articles
Browse All 36 View Live




Latest Images