Home > Topics > Data

Data

Open Source Resource Center

Articles

Doug EadlineVideo: Hadoop Fundamentals: Install Hortonworks HDP2.1 Sandbox
Are you ready to get up and running with Hadoop? One of the first things you'll want to do is install Hortonworks HDP 2.1 Sandbox. Doug Eadline shows you how in this excerpt from Hadoop Fundamentals LiveLessons (Video Training), 2nd Edition.
Continue reading...
By Doug EadlineDec 17, 2014
NoSQL Databases: An Overview
Pramod Sadalage provides an overview of NoSQL databases, explaining what NoSQL is, types of NoSQL databases, and why and how to choose a NoSQL database.
Continue reading...
By Pramod J. SadalageDec 11, 2014
Steven HainesHBase Data Analysis with MapReduce
HBase supports two types of read access: table scans by row key and MapReduce jobs. Table scans enable you to retrieve the exact subset of rows you are looking for, and MapReduce jobs enable you to perform analysis across a greater set of data. This article reviews HBase’s support for MapReduce and demonstrates how to create a MapReduce job to analyze 10,000 records in a table.
Continue reading...
By Steven HainesNov 26, 2014
Cory IsaacsonBig Data Scalability: Why Your Database Is Slow, and When You Should Start Scaling
Constant increases in the volume of Big Data worldwide have begun to overwhelm the database management systems on which we all rely. We need a comprehensive method for managing this overflow. Database expert Cory Isaacson, CEO/CTO of CodeFutures and author of Understanding Big Data Scalability, discusses how scaling can help to keep your databases from being overwhelmed, how you'll know when you should start scaling, and the best way to make it happen.
Continue reading...
By Cory IsaacsonNov 12, 2014

See More Data Articles

Blogs

Brad YaleMobile Security: Physical Location Tracking
On the level of global commerce, we are addicted to devices. By the start of 2015, it is estimated there will be 3 billion Android devices in circulation around the world. Of those, there are roughly 19,000 distinct devices in operation. On the same accord, there are roughly 550 million active iOS devices globally with another few hundred million being phased out. As a global culture we love our mobile devices. Yet here is the thing, by all measures, our devices aren't all that secure. In both data and physicality, our devices have an operational tendency to betray us. 

This said, a question: what is more worrisome, mobile data security risks or mobile device physical security risks? 


Continue reading...
By Brad YaleCommentsDecember 5, 2014
Topics: Windows Phone,General Security and Privacy,Information Technology,iOS,Network Security,Data,Mobile Application Development & Programming,Android,Security
Brad YaleHow the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...
By Brad YaleCommentsOctober 21, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Access,General Security and Privacy,Information Technology,Web Services,Information Management,Network Security,Data,Security,Business & Management
Brad YaleHow the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...
By Brad YaleCommentsOctober 13, 2014
Topics: Software Security,Access,General Security and Privacy,Information Technology,Web Services,Network Security,Data,Security,Cloud Computing
John  TraenkenschuhWhich new phone is best?

How do you evaluate the many new mobile device choices?

Continue reading...
By John TraenkenschuhCommentsSeptember 21, 2014
Topics: Windows Phone,iOS,Networking,Data,Mobile Application Development & Programming,Android,HTML5 & Web Standards,Business Applications,Business & Management

See More Data Blogs

Sign Up for Our Newsletters

newsletters Subscribing to the InformIT.com newsletters is an easy way to keep in touch with what's happening in your corner of the industry. Sign up today.