mapreduce - News, Features, and Slideshows
"Big data" is the buzzword of the day, and learning to manage it and extract value from it is top of mind for executives across industries. A contributing factor to the surge in big data is a shift in prevailing corporate data management philosophies.
By Jesse Davis, director, research and development, Progress DataDirect | 07 December, 2012 16:09
For some time Microsoft didn't offer a solution for processing big data in cloud environments. SQL Server is good for storage, but its ability to analyze terabytes of data is limited. Hadoop, which was designed for this purpose, is written in Java and was not available to .Net developers. So, Microsoft launched the Hadoop on Windows Azure service to make it possible to distribute the load and speed up big data computations.
By Sergey Klimov and Andrei Paleyes, senior R&D engineers at Altoros Systems Inc. | 06 December, 2012 21:14
MySpace on Tuesday will release as open source a technology called Qizmt that it developed in-house to mine and crunch massive amounts of data and generate friend recommendations in its social-networking site.
By Juan Carlos Perez | 16 September, 2009 05:36
We all know what buzz is: It's noise. At InfoWorld, one of its self-appointed tasks is to extract the signal from that noise, to separate the stuff valuable to IT professionals from that which is popularly considered a big deal.
By InfoWorld staff | 17 November, 2009 06:15
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
How do you ensure you are choosing the right threat intelligence solution for your organization? The recent Forrester Research, Inc. report, “Use Actionable Threat Intelligence to Protect Your Digital Business,” describes the characteristics of effective threat intelligence and what to look for in a threat intelligence vendor (August 2014).
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy