Top

Category: Performance, security, and availability


Performance, security, and availability

What is Grafeas? Better auditing for containers

October 16, 2017

Via: Info World

The software we run has never been more difficult to vouchsafe than it is today. It is scattered between local deployments and cloud services, built with open source components that aren’t always a known quantity, and delivered on a fast-moving […]


Performance, security, and availability

Centralized security in the cloud is the best security model

October 13, 2017

Via: Info World

It’s 6:00 a.m. on a Monday morning. You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address. All […]


Performance, security, and availability

Kinetica’s GPU-Accelerated Database Turbo-Charges Geospatial Processing for Real-time Analytics

October 12, 2017

Via: Dataversity

Kinetica today announced at Tableau Conference 2017 the availability of innovations to the industry’s fastest GPU-accelerated database that deliver new geospatial capabilities and enterprise-grade features for better performance and user experience, as well as improved efficiency and utilization to drive […]


Performance, security, and availability

Safer but not immune: Cloud lessons from the Equifax breach

October 9, 2017

Via: Info World

I’ve stopped covering breaches. First, because clouds are nowhere to be found among them. (The focus of this blog is advice to enterprises that are moving, or have moved, to cloud computing.) Second, because it just seems like piling on […]


Performance, security, and availability

PowerShell Tools Have Become an Attackers Weapons

October 9, 2017

Via: Tom's IT Pro

PowerShell is rapidly becoming a weapon of choice for post-breach (infiltration) steps, used in many recent high profile breaches. PowerShell, according to Dave Kennedy, is “BASH for Windows” – it’s a scripting language and framework that in Windows is used […]


Performance, security, and availability

Oracle Aims to Overtake AWS With Simplified Cloud Services Pricing

October 5, 2017

Via: eWeek

Previewing what may well be the biggest news at the company’s Oracle OpenWorld next month, the database giant gave details of its autonomous or “self-driving” database and a simplified pricing scheme for cloud computing customers. During the Sept. 19 briefing […]


Performance, security, and availability

How to choose a database for your mobile apps

September 22, 2017

Via: Info World Database

Today’s consumers are highly reliant on their mobile applications. If apps don’t work, users won’t use them—it’s that simple. To require an Internet connection for mobile applications is to live in the past. If apps rely on a connection, odds […]


Performance, security, and availability

Micro Focus Enhances Security and Strengthens Enterprise Protection

September 18, 2017

Via: Database Trends and Applications

Micro Focus is releasing new innovations across its expanded security portfolio following the successful spin-merge with HPE Software, allowing customers to take an intelligent approach to safeguard against sophisticated threats. Micro Focus’s comprehensive security solutions spanning security operations, application security, […]


Performance, security, and availability

Ensuring big data and fast data performance with in-memory computing

September 13, 2017

Via: Info World

In-memory computing (IMC) technologies have been available for years. However, until recently, the cost of memory made IMC impractical for all but the most performance-critical, high value applications. Over the last few years, however, with memory prices falling and demand […]


Performance, security, and availability

Big Data and Security: Are You Scared to Death?

September 11, 2017

Via: Dataversity

Being paranoid about Big Data Security no longer looks funny. The growing cyber security threats are making brands scared to the death. The article explains major challenges and best practices for Big Data Security. Let me ask you a simple […]