Home > Topics > Data

Data

Open Source Resource Center

Articles

Video: Working with Big Data: How to Write Data Into the Hadoop File System
In this video excerpt from Working with Big Data LiveLessons (Video Training): Infrastructure, Algorithms, and Visualizations, Paul Dix shows you how to copy files up to Hadoop using a StackExchange public data dump as an example.
Continue reading...
By Paul DixMar 3, 2015
Working with Records in FileMaker Pro 13
In this chapter from FileMaker Pro 13 Absolute Beginner's Guide, explore and work with the Filemaker database. You change, add, and delete records; navigate through records and layouts; and much more.
Continue reading...
By Tim DietrichJan 5, 2015
Practical Advice for Building Secure Android Databases in SQLite
This chapter from Bulletproof Android: Practical Advice for Building Secure Apps looks at how developers have used SQLite and, more importantly, how they have tried to secure that data in progressively more secure ways so you don’t make the same mistakes.
Continue reading...
By Godfrey NolanJan 2, 2015
Doug EadlineVideo: Hadoop Fundamentals: Install Hortonworks HDP2.1 Sandbox
Are you ready to get up and running with Hadoop? One of the first things you'll want to do is install Hortonworks HDP 2.1 Sandbox. Doug Eadline shows you how in this excerpt from Hadoop Fundamentals LiveLessons (Video Training), 2nd Edition.
Continue reading...
By Doug EadlineDec 17, 2014

See More Data Articles

Blogs

John  TraenkenschuhThe Enemy Within

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

Continue reading...
By John TraenkenschuhCommentsFebruary 8, 2015
Topics: Human Resources,Software Security,Access,General Security and Privacy,Information Management,Network Security,Management & Strategy,Data,Security,Business & Management
Brad YaleThe Rise of Communication through Haptic Feedback

For most of us, haptic feedback takes two forms - a vibrating phone in your pocket alerting you to an incoming message and key stroke vibrations when typing a text message/playing a game on your smart device. This though, is a shame because as Apple and Google engineers know, haptic feedback could be and should be used for so much more.

Continue reading...
By Brad YaleCommentsJanuary 14, 2015
Topics: Other Applications,Home & Office Computing,Information Technology,Web Services,Engineering,Information Management,Data,Mobile Application Development & Programming,Hardware,Communications Engineering,Cloud Computing
Brad YaleMobile Security: Physical Location Tracking
On the level of global commerce, we are addicted to devices. By the start of 2015, it is estimated there will be 3 billion Android devices in circulation around the world. Of those, there are roughly 19,000 distinct devices in operation. On the same accord, there are roughly 550 million active iOS devices globally with another few hundred million being phased out. As a global culture we love our mobile devices. Yet here is the thing, by all measures, our devices aren't all that secure. In both data and physicality, our devices have an operational tendency to betray us. 

This said, a question: what is more worrisome, mobile data security risks or mobile device physical security risks? 


Continue reading...
By Brad YaleCommentsDecember 5, 2014
Topics: Windows Phone,General Security and Privacy,Information Technology,iOS,Network Security,Data,Mobile Application Development & Programming,Android,Security
Brad YaleHow the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...
By Brad YaleCommentsOctober 21, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Access,General Security and Privacy,Information Technology,Web Services,Information Management,Network Security,Data,Security,Business & Management

See More Data Blogs

Sign Up for Our Newsletters

newsletters Subscribing to the InformIT.com newsletters is an easy way to keep in touch with what's happening in your corner of the industry. Sign up today.