Home > Topics > Data

Data

Articles

Introducing NoSQL and MongoDB
In this chapter from NoSQL with MongoDB in 24 Hours, Sams Teach Yourself, learn about the design considerations to review before deciding how to implement the structure of data and configuration of a MongoDB database. You'll also learn which design questions to ask and then how to explore the mechanisms built into MongoDB to answer those questions.
Continue reading...
By Brad DayleySep 18, 2014
Stephen B. MorrisHit the Ground Running with MongoDB and Python
Stephen B. Morris describes how to get started with MongoDB and Python. As usual with Python, you can get productive quickly, without worrying about complex IDEs. MongoDB has a simple data model and easy-to-understand semantics, giving you a handy on-ramp to this interesting technology.
Continue reading...
By Stephen B. MorrisSep 16, 2014
Cory IsaacsonIntroduction to Understanding Big Data Scalability
This introduction describes the goals of the Big Data Scalability four-volume series, focusing on the underlying growth of databases (the "data explosion") and providing some background into big data's relevance.
Continue reading...
By Cory IsaacsonAug 18, 2014
SQL Queries for Mere Mortals: Thinking in Sets
This chapter introduces the concept of an SQL set. It discusses each of the major set operations implemented in SQL in detail (intersection, difference, and union), and shows how to use set diagrams to visualize the problem you’re trying to solve. Finally, it introduces the basic SQL syntax and keywords (INTERSECT, EXCEPT, and UNION) for all three operations.
Continue reading...
By Michael J. Hernandez, John ViescasJul 1, 2014

See More Data Articles

Blogs

Brad YaleHow the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...
By Brad YaleCommentsOctober 21, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Access,General Security and Privacy,Information Technology,Web Services,Information Management,Network Security,Data,Security,Business & Management
Brad YaleHow the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...
By Brad YaleCommentsOctober 13, 2014
Topics: Software Security,Access,General Security and Privacy,Information Technology,Web Services,Network Security,Data,Security,Cloud Computing
John  TraenkenschuhWhich new phone is best?

How do you evaluate the many new mobile device choices?

Continue reading...
By John TraenkenschuhCommentsSeptember 21, 2014
Topics: Windows Phone,iOS,Networking,Data,Mobile Application Development & Programming,Android,HTML5 & Web Standards,Business Applications,Business & Management
John  Traenkenschuh1830 wasn't so long ago

My family and I had a meal in Pigeon Forge, in an old mill building that's quite old, in an area settled in 1830.  Walking in with a MacBook Pro certainly seemed odd to some, but no one noticed my phone offering tethering rights.  And so it was that I posted a blog in a building that dated back 160 or more years ago.

Continue reading...
By John TraenkenschuhCommentsSeptember 18, 2014
Topics: Access,Information Technology,Engineering,Data,Global Business,Communications Engineering,Business & Management

See More Data Blogs

Sign Up for Our Newsletters

newsletters Subscribing to the InformIT.com newsletters is an easy way to keep in touch with what's happening in your corner of the industry. Sign up today.