5 signs you're outgrowing MySQL
MySQL has long been the go-to database of the Web. It has powered some of the largest websites on the planet, as well as countless installations of open source software on every scale imaginable. But...
View ArticleFast data: The next step after big data
The way that big data gets big is through a constant stream of incoming data. In high-volume environments, that data arrives at incredible rates, yet still needs to be analyzed and stored.John Hugg,...
View ArticleCloud-based analytics offer insight to all
The ubiquitous phrase "big data" has worn out its welcome. For most businesses, the emphasis lies in useful analytic results, not the size or the source of data that produces insight. But that doesn't...
View ArticleHow to choose between custom and commodity clouds
Not all cloud infrastructures are built the same way, and not all applications, services, and frameworks are built for cloud computing.In this week's New Tech Forum, Brent Bensten, CTO of custom cloud...
View ArticleKnow your options for infrastructure monitoring
Network monitoring is the nervous system of any infrastructure. Keeping tabs on your services -- whether they're local or in the cloud -- is vitally important to maintaining a stable and functional...
View ArticleHow virtualization is lifting us to the cloud
Over the past decade, the whole world seems to have embraced virtualization. Is there nothing left to conquer? Hardly. Virtualization technology itself is changing very fast. And the right solutions to...
View ArticleGetting your hands on data with mobile analytics
Year after year, organizations cite business intelligence and analytics as top investment priorities, but they're seldom satisfied with the results. In part that's because traditional solutions require...
View ArticleWhy you need to deploy DNSSec now
The Domain Name System -- the distributed network of servers that reconciles the domain names in URLs and email addresses to numerical IP addresses -- is behind every successful Internet transaction....
View ArticleHow to solve Java's security problem
Java applications remain a popular target for cyber criminals, as they are widely used to control access to critical data, despite Java's continuing struggles with security vulnerabilities. In this...
View ArticleRethinking the data center network
The traditional core/aggregation/access network architecture has been a mainstay of enterprise data centers for decades. While compute and storage have evolved to become more flexible, dynamic, and...
View Article
More Pages to Explore .....