Solution Spotlight PREPARING A DATABASE STRATEGY FOR BIG DATA

Size: px
Start display at page:

Download "Solution Spotlight PREPARING A DATABASE STRATEGY FOR BIG DATA"

Transcription

1 Solution Spotlight PREPARING A DATABASE STRATEGY FOR BIG DATA

2 C ompanies need to explore the newer approaches to handling large data volumes and begin to understand the limitations and that come with technologies like Hadoop and NoSQL databases, if they are to avoid being swept away by the big data tidal wave. Read this SearchDataManagment.com E-Guide to learn why Big Data presents new database and opportunities. Discover why, according to experts, massively parallel processing (MPP) and distributed computing approaches are becoming a popular choice to handle growing data volumes. PAGE 2 OF 14

3 'BIG DATA' APPLICATIONS BRING NEW DATABASE CHOICES, CHALLENGES I started out my career as a systems programmer and database administrator, working on what was then the state of the art in the world of databases: IMS, from IBM. Companies needed somewhere to put (and sometimes even retrieve) their data, and once things had moved beyond basic file systems, databases were the way to go. The volumes of data that had to be handled back then seem amusingly modest by today s big data applications standards, with IBM s 3380 mainframe able to store what seemed like a capacious 2.5 GB of data when it was launched in To put data into IMS, you needed to understand how to navigate the physical structure of the database itself, and it was a radical step indeed when IBM launched DB2 in In this new approach, programmers would write in a language called SQL and the database management system itself would figure out the best access path to the data via an optimiser. I recall some of my colleagues deep scepticism about such dark arts, but the relational approach caught on, and within a few years the database world PAGE 3 OF 14

4 was a competitive place, with Ingres, Informix, Sybase and Oracle all battling it out along with IBM in the enterprise transaction processing market. A gradual awareness that such databases were all optimised for transaction processing performance allowed a further range of innovation, and the first specialist analytical databases appeared. Products from smaller companies, with odd names like Red Brick and Essbase, became available and briefly a thousand database flowers bloomed. By the dawn of the millennium, the excitement had died down, and the database market had seen dramatic consolidation. Oracle, IBM and Microsoft dominated the landscape, having either bought out or crushed most of the competition. Object databases were snuffed out, and the database administrator beginning his or her career in 2001 could look forward to a stable world of a few databases, all based on SQL. Teradata had carved out a niche at the highvolume end, and Sybase had innovated with columnar instead of row-based storage, but the main debates in database circles were reduced to arguments over arcane revisions to the SQL standard. The database world had seemingly grown up and put on a cardigan and slippers. How misleading that picture turned out to be. Few appreciated at the time that rapid growth in both the volume and types of data that companies collect PAGE 4 OF 14

5 was about to challenge the database incumbents and spawn another round of innovation. Whilst Moore s Law was holding for processing speed, it was most decidedly not working for disk access speed. Solid-state drives helped some, but they were, and still are, very expensive. Database volumes were increasing faster than ever due primarily to the explosion of social media data and machine-generated data, such as information from sensors, point-of-sale systems, mobile phone network, Web server logs and the like. In 1997 (according to Winter Corp., which measures such things), the largest commercial database in the world was 7 TB in size, and that figure had only grown to about 30 TB by Yet it more than tripled to 100 TB by 2005, and by 2008 the first petabyte-sized database appeared. In other words, the largest databases increased tenfold in size between 2005 and The strains of analysing such volumes of data started to stretch and exceed the capacity of the mainstream databases. ENTER MPP, COLUMNAR AND HADOOP The database industry has responded in a number of ways. Throwing hardware at the problem was one way. Massively parallel processing (MPP) databases allow database loads to be split amongst many processors. The columnar data PAGE 5 OF 14

6 structure pioneered by Sybase turned out to be well suited to analytical processing workloads, and a range of new analytical databases sprang up, often combining columnar and MPP approaches. The giant database vendors responded with either their own versions or by simply purchasing upstart rivals. For example, Oracle brought out its Exadata offering, IBM purchased Netezza and Microsoft bought DATAllegro. There are also a range of independent alternatives remaining on the market. However, the big data challenge is of such a scale that more radical approaches have also appeared. Google, having to deal with exponentially growing Web traffic, devised an approach called MapReduce, designed to work with a massively distributed file system. That work inspired an open source technology called Hadoop, along with an associated file system called HDFS. New databases followed that spurned SQL entirely or in large part, endeavouring to allow more predictable scalability and eliminating the constraints of a fixed database schema. This NoSQL approach brings with it a range of issues. A generation of programmers and software products have relied on a common standard for database access, with the removal of the need to understand internal database structure allowing considerable productivity gains. Programming for big PAGE 6 OF 14

7 data applications is an altogether trickier affair, and IT departments that are staffed with people who understand SQL are ill-equipped to tackle the world of MapReduce programming, parallel programming and key-value databases that is starting to represent the state of the art in tackling very large data sets. There are also considerable to the new database technologies in coping with high availability, guaranteed consistency and tolerance to hardware failure, things which many organisations had previously started to take for granted. Of course, not everyone is equally affected by such developments. The big data issues are most acutely felt in certain industries, such as Web marketing and advertising, telecoms, retail and financial services, and certain government activities. Understanding the relationships between data is important in areas as diverse as fraud detection, counter-terrorism, medical research and energy metering. However, the recent data explosion is going to make life difficult in many industries, and those companies that can adapt well and gain the ability to analyse such data will have a considerable advantage over those that lag. New skill sets are going to be needed, and these skills will be scarce. Companies need to explore the newer approaches to handling large data volumes and begin to PAGE 7 OF 14

8 understand the limitations and that come with technologies like Hadoop and NoSQL databases, if they are to avoid being swept away by the big data tidal wave. ANDY HAYLER is co-founder and CEO of analyst firm The Information Difference and a regular keynote speaker at international conferences on MDM, data governance and data quality. He is also a respected restaurant critic and author (see IT INDUSTRY VETERAN DEMYSTIFIES THE SCALE UP VS. SCALE OUT DEBATE Choosing sides on the scale used to be easy. Choices were few and for most organizations, it was symmetric multiprocessing (SMP) all the way the classic scale up approach to computing. But with the rise of commodity hardware and more organizations looking to capitalize on the Internet-driven "big data" explosion scaling out has become a more viable option. As a result, massively parallel processing (MPP) and distributed computing approaches are growing more popular all the time, PAGE 8 OF 14

9 according to Tony Iams, a senior vice president with IT analyst firm Ideas International in Port Chester, N.Y. SearchDataManagement.com got on the phone with Iams to learn more about the longstanding scale. Iams explained the most common uses of SMP, MPP and distributed computing and had some advice for those seeking to match database workloads with the correct architecture approach. Could you describe the prevailing approaches to hardware architecture and how they fit into the scale? Tony Iams: The first is symmetric multiprocessing, or SMP, which is the classic form of scaling up. That's where you have lots of processing units inside of a single computer. And I say "processing units" because that line is blurring. It used to be "processors," but now processors have multiple cores inside of them and those cores might have a lot of threads. But the point is that all of it is inside of one enclosure, one computer system. That is the traditional approach to scaling up. What are the other two major approaches? Iams: Then you have scaling out and the most extreme form of that is what you might call distributed computing. That is where you have lots and lots of PAGE 9 OF 14

10 computers that are cooperating to solve a problem. The third approach is massively parallel processing (MPP) and that kind of sits in between [SMP and distributing computing] in the sense that you still have lots of machines that are collaborating on solving a problem. The difference is that with massively parallel processing, there is usually some assumption that there is some sharing of something. At a minimum, you have shared management in that there may be many separate computers but you manage them as if they are a single computer. With MPP, there is also usually some form of sharing memory. How does MPP differ from SMP in terms of sharing memory? Iams: With SMP, by definition, all reading and writing can be done by any thread, core or processor. They can all get to the memory equally easily for reading or for writing purposes. In MPP, again there is usually some form of sharing, but depending on the implementation and there are many different implementations of MPP you have different compromises that you have to make in terms of who can get to what memory; whether there is a penalty for reading the memory; and whether there is a penalty for writing the memory. With MPP, users have to consider how that memory sharing works: Who can read? Who can write? The answers to those questions are going to vary significantly [depending on] the implementation. PAGE 10 OF 14

11 Why do I feel like I'm hearing vendor references to MPP more often than in the past? Iams: I think because the industry in general is trending towards scaling out. What I just explained to you is purely an architectural view. But the more important aspect of this is now matching [the computer hardware architecture] with workloads. Depending on what kind of workload you're trying to host, each of these approaches is going to make more sense or less sense. You always have to be careful about matching the right workload with the right scalability approach. How has the process of choosing the right scalability approach changed over the years? Iams: The rules 10 to 15 or 20 years ago were pretty clear. If you wanted to do heavy duty database processing, you wanted it to scale up and you would use SMP. That was it. End of story. The number of workloads that you would want to use with the distributed computing or even MPP was extremely limited. But nowadays with the Internet and Web-based computing and all of these services that people are using on the Web like Facebook and Google a lot of those work really well with a scale out approach, and distributed computing and MPP are starting to be applied more widely. PAGE 11 OF 14

12 How should an IT organization go about matching database workloads with the right scalability approach? Iams: If you're just talking about the classic transaction-driven database workloads that drive the day to day operations of a typical business, that still works best on SMP type systems. That is because with transactions, you're going to be writing a lot of data by definition. If you're going to write something, you have to have very efficient access to that memory, and that is why you need SMP. There is no more efficient way to access memory than with SMP. What if the database workload is created for business intelligence or analytics purposes? Iams: More and more database work is based on analysis, which is not necessarily writing data. In this case, you're more interested in reading the data because you're going to go through there and analyze it looking for patterns, business opportunities and trends. That is increasingly where the value is and that is not a new thing. People have been doing data warehouses and stuff like that for a long time. But now there has been an uptick in the volume of data. Internet usage is generating data, mobile phone usage is generating data and all that stuff is tracked now. That has produced an explosion in data. [Data warehouses and associated analytics projects] have to scale more than ever before, PAGE 12 OF 14

13 and MPP is the right answer for that. PAGE 13 OF 14

14 FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 14 OF 14

Hybrid cloud computing explained

Hybrid cloud computing explained computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted

More information

Data warehouse software bundles: tips and tricks

Data warehouse software bundles: tips and tricks Data software bundles: tips and tricks Data software bundles: Data The emergence of data appliances has broadened the potential uses of business intelligence (BI) and analytics within many organizations

More information

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level

More information

E-Guide THE CHALLENGES BEHIND DATA INTEGRATION IN A BIG DATA WORLD

E-Guide THE CHALLENGES BEHIND DATA INTEGRATION IN A BIG DATA WORLD E-Guide THE CHALLENGES BEHIND DATA INTEGRATION IN A BIG DATA WORLD O n one hand, while big data applications have eliminated the rigidity of the data integration process, they don t take responsibility

More information

Big Data and the Data Warehouse

Big Data and the Data Warehouse Big Data and the Data Warehouse When the phrase big data management hit the data management and business intelligence (BI) industry, it had many IT professionals wondering if it would be the real deal

More information

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES M id-sized companies plan to use more managed services and many see it as improving security. Read on to find

More information

E-Guide to Mobile Application Development

E-Guide to Mobile Application Development Mobilizing enterprise applications for the consumerization of for The rise of the mobile device in the enterprise is changing the way users access and share information at work, as well as how developers

More information

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression

More information

Skills shortage, training present pitfalls for big data analytics

Skills shortage, training present pitfalls for big data analytics present pitfalls for big The biggest challenges related to big data analytics, according to consultants and IT managers, boil down to a simple one-two punch: The technology is still fairly raw and user-unfriendly,

More information

Advanced analytics key component for decision management systems

Advanced analytics key component for decision management systems decision management In the last 20 to 30 years, companies have faced significant changes in how they perform their day-to-day operations, and so have the analytics used to make decisions. In this Q&A Tip

More information

Aligning Public Cloud Strategies to Improve Server Efficiency

Aligning Public Cloud Strategies to Improve Server Efficiency How to Successfully Implement Cloud Strategies Aligning Rather than simply being swept up in the cloud computing trend, IT admins must be careful to implement cloud strategies that match their organization's

More information

2013 Cloud Storage Expectations

2013 Cloud Storage Expectations 2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout

More information

E-Guide HADOOP MYTHS BUSTED

E-Guide HADOOP MYTHS BUSTED E-Guide HADOOP MYTHS BUSTED I n many organizations, the growing volume and increasing complexity of data are straining performance and highlighting the limits of the traditional data warehouse. Today,

More information

E-Guide BRINGING BIG DATA INTO A DATA WAREHOUSE ENVIRONMENT

E-Guide BRINGING BIG DATA INTO A DATA WAREHOUSE ENVIRONMENT E-Guide BRINGING BIG DATA INTO A DATA WAREHOUSE ENVIRONMENT I n many organizations, the growing volume and increasing complexity of data are straining performance and highlighting the limits of the traditional

More information

Best Practices for Scaling a Big Data Analytics Project

Best Practices for Scaling a Big Data Analytics Project Best Practices for Scaling a Big Data Analytics Project Putting an effective "big data" analytics plan in place can be a challenging proposition; thankfully, many proven data management and business intelligence

More information

3 common cloud challenges eradicated with hybrid cloud

3 common cloud challenges eradicated with hybrid cloud 3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,

More information

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal

More information

How to Develop Cloud Applications Based on Web App Security Lessons

How to Develop Cloud Applications Based on Web App Security Lessons Applications Based on Before moving applications to the public cloud, it is important to implement security practices and techniques. This expert E-Guide provides guidance on how to develop secure applications

More information

Social media driving CRM strategies

Social media driving CRM strategies Rapid changes in social computing, mobile and customer analytics are driving shifts in. In a recent survey, IT identified establishing a CRM strategy as the second greatest challenge, behind instituting

More information

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage

More information

Managing Virtual Desktop Environments

Managing Virtual Desktop Environments Managing Virtual Desktop Environments Desktop virtualization can be extremely beneficial to a company's operating system environment. Yet while working through the virtualization planning process, IT professionals

More information

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.

More information

Tips to ensuring the success of big data analytics initiatives

Tips to ensuring the success of big data analytics initiatives Tips to ensuring the success of big data Big data analytics is hot. Read any IT publication or website and you ll see business intelligence (BI) vendors and their systems integration partners pitching

More information

Big Data Technologies Compared June 2014

Big Data Technologies Compared June 2014 Big Data Technologies Compared June 2014 Agenda What is Big Data Big Data Technology Comparison Summary Other Big Data Technologies Questions 2 What is Big Data by Example The SKA Telescope is a new development

More information

Securing the SIEM system: Control access, prioritize availability

Securing the SIEM system: Control access, prioritize availability The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised

More information

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration Streamlining the move to the cloud Key tips for selecting the right cloud tools and preparing your infrastructure for migration When planning for a, you must (1) carefully evaluate various cloud tools

More information

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS E-Guide WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS SearchDataCenter D ata center managers have a handful of new converged and hyper-converged infrastructure to choose from, and though there are components

More information

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is

More information

Software Defined Networking Goes Well Beyond the Data Center

Software Defined Networking Goes Well Beyond the Data Center Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as

More information

Social channels changing contact center certification

Social channels changing contact center certification changing contact center certification Companies can expect big changes in contact center certification beginning next year. Many will see overhauled programs for certifications that address the full range

More information

Well packaged sets of preinstalled, integrated, and optimized software on select hardware in the form of engineered systems and appliances

Well packaged sets of preinstalled, integrated, and optimized software on select hardware in the form of engineered systems and appliances INSIGHT Oracle's All- Out Assault on the Big Data Market: Offering Hadoop, R, Cubes, and Scalable IMDB in Familiar Packages Carl W. Olofson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA

More information

E-Guide CRM: THE INTEGRATION AND CONSOLIDATION PAYOFF

E-Guide CRM: THE INTEGRATION AND CONSOLIDATION PAYOFF E-Guide CRM: THE INTEGRATION AND CONSOLIDATION PAYOFF T o move ahead with CRM, especially when social networking is concerned, companies must integrate consumer data and support seamless interactions with

More information

Expert guide to achieving data center efficiency How to build an optimal data center cooling system

Expert guide to achieving data center efficiency How to build an optimal data center cooling system achieving data center How to build an optimal data center cooling system Businesses can slash data center energy consumption and significantly reduce costs by utilizing a combination of updated technologies

More information

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age

More information

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and

More information

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance

More information

Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing

Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing Wayne W. Eckerson Director of Research, TechTarget Founder, BI Leadership Forum Business Analytics

More information

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS! The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader

More information

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools Why have virtual desktops been positioned as a cure-all for many of today s endpoint

More information

The skinny on storage clusters

The skinny on storage clusters The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across

More information

Benefits of virtualizing your network

Benefits of virtualizing your network While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.

More information

Bringing Big Data into the Enterprise

Bringing Big Data into the Enterprise Bringing Big Data into the Enterprise Overview When evaluating Big Data applications in enterprise computing, one often-asked question is how does Big Data compare to the Enterprise Data Warehouse (EDW)?

More information

E-Guide SHAREPOINT UPGRADE BEST PRACTICES

E-Guide SHAREPOINT UPGRADE BEST PRACTICES E-Guide SHAREPOINT UPGRADE BEST PRACTICES I n keeping with its practice of updating the collaboration platform SharePoint roughly every three years, Microsoft delivered another version,. Not that it is

More information

Big Data and Its Impact on the Data Warehousing Architecture

Big Data and Its Impact on the Data Warehousing Architecture Big Data and Its Impact on the Data Warehousing Architecture Sponsored by SAP Speaker: Wayne Eckerson, Director of Research, TechTarget Wayne Eckerson: Hi my name is Wayne Eckerson, I am Director of Research

More information

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

The Enterprise Data Hub and The Modern Information Architecture

The Enterprise Data Hub and The Modern Information Architecture The Enterprise Data Hub and The Modern Information Architecture Dr. Amr Awadallah CTO & Co-Founder, Cloudera Twitter: @awadallah 1 2013 Cloudera, Inc. All rights reserved. Cloudera Overview The Leader

More information

TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE

TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE E-Guide TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE SearchSolidState Storage F lash storage might seem like an easy answer for your applications because of its high performance, but deciding where to

More information

The changing face of scale-out networkattached

The changing face of scale-out networkattached scale-out network-attached scale-out network-attached By: Carol Sliwa The face of network-attached (NAS) is changing. Enterprise IT shops are increasingly seeking out the latest wave of scale-out network-attached

More information

NoSQL for SQL Professionals William McKnight

NoSQL for SQL Professionals William McKnight NoSQL for SQL Professionals William McKnight Session Code BD03 About your Speaker, William McKnight President, McKnight Consulting Group Frequent keynote speaker and trainer internationally Consulted to

More information

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take

More information

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED M obility spurs video conferencing software need; users want software-and cloud-based offerings to interoperate with their legacy

More information

The Future of Data Management

The Future of Data Management The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class

More information

Advantages on Green Cloud Computing

Advantages on Green Cloud Computing Advantages on Green Advantages of Green A growing number of organizations are becoming more green-conscious as there are several advantages of green IT. In this e-guide, brought to you by SearchDataCenter.com,

More information

E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE

E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE W orking with individual in hybrid cloud can be complex, but Quality of Experience can be

More information

Apache Hadoop Patterns of Use

Apache Hadoop Patterns of Use Community Driven Apache Hadoop Apache Hadoop Patterns of Use April 2013 2013 Hortonworks Inc. http://www.hortonworks.com Big Data: Apache Hadoop Use Distilled There certainly is no shortage of hype when

More information

Navigating the Big Data infrastructure layer Helena Schwenk

Navigating the Big Data infrastructure layer Helena Schwenk mwd a d v i s o r s Navigating the Big Data infrastructure layer Helena Schwenk A special report prepared for Actuate May 2013 This report is the second in a series of four and focuses principally on explaining

More information

FIVE PERVASIVE FLASH-BASED STORAGE MYTHS

FIVE PERVASIVE FLASH-BASED STORAGE MYTHS E-Guide FIVE PERVASIVE FLASH-BASED STORAGE MYTHS SearchSolidState Storage F lash has rapidly moved from a niche storage product that was used to differentiate storage vendors to a ubiquitous technology.

More information

How To Handle Big Data With A Data Scientist

How To Handle Big Data With A Data Scientist III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution

More information

MOBILE APP DEVELOPMENT LEAPS FORWARD

MOBILE APP DEVELOPMENT LEAPS FORWARD E-Guide MOBILE APP DEVELOPMENT LEAPS FORWARD SearchSOA B ackend as a Service (BaaS) is making waves in the mobile application development space. In this e-guide, learn how you can implement BaaS and how

More information

Rethink defense-in-depth security model

Rethink defense-in-depth security model e-guide E-Guide Rethink defense-in-depth By Mike Rothman Rethink defense-in-depth T oday s endpoint security modevl is failing. What s next? Learn why endpoint defense-in-depth controls must assume the

More information

Big Data and Data Science: Behind the Buzz Words

Big Data and Data Science: Behind the Buzz Words Big Data and Data Science: Behind the Buzz Words Peggy Brinkmann, FCAS, MAAA Actuary Milliman, Inc. April 1, 2014 Contents Big data: from hype to value Deconstructing data science Managing big data Analyzing

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS E-Guide BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS SearchHealthIT W ith a focus on, the next wave of EHRs will incorporate powers of big data, speech recognition and new database models. This eguide

More information

Unlocking data with document capture and imaging

Unlocking data with document capture and imaging Unlocking data with capture and imaging Unlocking data with Before organizations can banish paper from the office, proper and capture processes must be adopted. This E-Guide reveals the keys to effective

More information

Datenverwaltung im Wandel - Building an Enterprise Data Hub with

Datenverwaltung im Wandel - Building an Enterprise Data Hub with Datenverwaltung im Wandel - Building an Enterprise Data Hub with Cloudera Bernard Doering Regional Director, Central EMEA, Cloudera Cloudera Your Hadoop Experts Founded 2008, by former employees of Employees

More information

BIG DATA APPLIANCES. July 23, TDWI. R Sathyanarayana. Enterprise Information Management & Analytics Practice EMC Consulting

BIG DATA APPLIANCES. July 23, TDWI. R Sathyanarayana. Enterprise Information Management & Analytics Practice EMC Consulting BIG DATA APPLIANCES July 23, TDWI R Sathyanarayana Enterprise Information Management & Analytics Practice EMC Consulting 1 Big data are datasets that grow so large that they become awkward to work with

More information

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market

More information

E-Guide NAVIGATING THE TWISTS AND TURNS OF THE HADOOP LANDSCAPE

E-Guide NAVIGATING THE TWISTS AND TURNS OF THE HADOOP LANDSCAPE E-Guide NAVIGATING THE TWISTS AND TURNS OF THE HADOOP LANDSCAPE T hese days, the big data landscape is full of twists and turns with recent pursuits pinning analytics at the heart and big data as a backdrop.

More information

In-Database Analytics

In-Database Analytics Embedding Analytics in Decision Management Systems In-database analytics offer a powerful tool for embedding advanced analytics in a critical component of IT infrastructure. James Taylor CEO CONTENTS Introducing

More information

ios7: 3 rd party or platform-enabled MAM? Taking a look behind the scenes with Jack Madden

ios7: 3 rd party or platform-enabled MAM? Taking a look behind the scenes with Jack Madden ios7: 3 rd party or platform-enabled? Taking a look behind the scenes with Jack Madden party and platform-enables difference between 3rd party and platform-enabled Jack Madden You re probably well aware

More information

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media

More information

Discovering Business Insights in Big Data Using SQL-MapReduce

Discovering Business Insights in Big Data Using SQL-MapReduce Discovering Business Insights in Big Data Using SQL-MapReduce A Technical Whitepaper Rick F. van der Lans Independent Business Intelligence Analyst R20/Consultancy July 2013 Sponsored by Copyright 2013

More information

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS T his e-guide teaches you the importance of collaboration on a micro level for defending against cyber threats. Learn how to embed security practices

More information

Evaluating SaaS vs. on premise for ERP systems

Evaluating SaaS vs. on premise for ERP systems Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn

More information

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY and mean for F or IT managers, has always been high priority, however the new IT landscape and increased deployment of cloud has complicated the

More information

Server OS Buyer s Guide Vendor-neutral tips for choosing the best server operating system for your organization

Server OS Buyer s Guide Vendor-neutral tips for choosing the best server operating system for your organization Vendor-neutral tips for choosing the best server operating system for your organization Traditionally, choosing a server operating system meant simply selecting between Windows or Linux. However, now organizations

More information

Making the move from a tactical to a strategic supply chain

Making the move from a tactical to a strategic supply chain a tactical to a strategic Top five analytics Supply chain analytics appears to be a poorly understood technology in dire need of some best practices. Supply chain analytics and manufacturing BI raise cultural

More information

Big Data Defined Introducing DataStack 3.0

Big Data Defined Introducing DataStack 3.0 Big Data Big Data Defined Introducing DataStack 3.0 Inside: Executive Summary... 1 Introduction... 2 Emergence of DataStack 3.0... 3 DataStack 1.0 to 2.0... 4 DataStack 2.0 Refined for Large Data & Analytics...

More information

Managing Big Data with Hadoop & Vertica. A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database

Managing Big Data with Hadoop & Vertica. A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database Managing Big Data with Hadoop & Vertica A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database Copyright Vertica Systems, Inc. October 2009 Cloudera and Vertica

More information

E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES

E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES I n this E-Guide, Mike Chapple; a Search- Security.com expert discusses the new PCI Mobile Payment Acceptance Security Guidelines

More information

CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE

CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE E-Guide CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE SearchCloud Applications C loud application integration and continue to be some of the top for software developers. In this e-guide, learn

More information

Understanding the Value of In-Memory in the IT Landscape

Understanding the Value of In-Memory in the IT Landscape February 2012 Understing the Value of In-Memory in Sponsored by QlikView Contents The Many Faces of In-Memory 1 The Meaning of In-Memory 2 The Data Analysis Value Chain Your Goals 3 Mapping Vendors to

More information

High-Performance Business Analytics: SAS and IBM Netezza Data Warehouse Appliances

High-Performance Business Analytics: SAS and IBM Netezza Data Warehouse Appliances High-Performance Business Analytics: SAS and IBM Netezza Data Warehouse Appliances Highlights IBM Netezza and SAS together provide appliances and analytic software solutions that help organizations improve

More information

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics

More information

Whitepaper. Innovations in Business Intelligence Database Technology. www.sisense.com

Whitepaper. Innovations in Business Intelligence Database Technology. www.sisense.com Whitepaper Innovations in Business Intelligence Database Technology The State of Database Technology in 2015 Database technology has seen rapid developments in the past two decades. Online Analytical Processing

More information

Navigating Big Data business analytics

Navigating Big Data business analytics mwd a d v i s o r s Navigating Big Data business analytics Helena Schwenk A special report prepared for Actuate May 2013 This report is the third in a series and focuses principally on explaining what

More information

High Performance Data Management Use of Standards in Commercial Product Development

High Performance Data Management Use of Standards in Commercial Product Development v2 High Performance Data Management Use of Standards in Commercial Product Development Jay Hollingsworth: Director Oil & Gas Business Unit Standards Leadership Council Forum 28 June 2012 1 The following

More information

Getting Started Practical Input For Your Roadmap

Getting Started Practical Input For Your Roadmap Getting Started Practical Input For Your Roadmap Mike Ferguson Managing Director, Intelligent Business Strategies BA4ALL Big Data & Analytics Insight Conference Stockholm, May 2015 About Mike Ferguson

More information

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting

More information

Cloud Security Certification Guide What certification is right for you?

Cloud Security Certification Guide What certification is right for you? What certification is right for you? This exclusive guide examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud

More information

Big Data Are You Ready? Thomas Kyte http://asktom.oracle.com

Big Data Are You Ready? Thomas Kyte http://asktom.oracle.com Big Data Are You Ready? Thomas Kyte http://asktom.oracle.com The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

6 Point SIEM Solution Evaluation Checklist

6 Point SIEM Solution Evaluation Checklist With the evolution of security information and event management (SIEM) tools, it is important to recognize the benefits of SIEM technology. Analysis of automation and intelligence are major advantages

More information

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale WHITE PAPER Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale Sponsored by: IBM Carl W. Olofson December 2014 IN THIS WHITE PAPER This white paper discusses the concept

More information

Does consolidating multiple ERP systems make sense?

Does consolidating multiple ERP systems make sense? Does consolidating make sense? Many manufacturers run or multiple instances of one system as a result of past mergers and acquisitions; others choose to deliberately adopt different systems to meet compliance

More information

Next-Generation Cloud Analytics with Amazon Redshift

Next-Generation Cloud Analytics with Amazon Redshift Next-Generation Cloud Analytics with Amazon Redshift What s inside Introduction Why Amazon Redshift is Great for Analytics Cloud Data Warehousing Strategies for Relational Databases Analyzing Fast, Transactional

More information

In-Memory Analytics for Big Data

In-Memory Analytics for Big Data In-Memory Analytics for Big Data Game-changing technology for faster, better insights WHITE PAPER SAS White Paper Table of Contents Introduction: A New Breed of Analytics... 1 SAS In-Memory Overview...

More information

Introducing Oracle Exalytics In-Memory Machine

Introducing Oracle Exalytics In-Memory Machine Introducing Oracle Exalytics In-Memory Machine Jon Ainsworth Director of Business Development Oracle EMEA Business Analytics 1 Copyright 2011, Oracle and/or its affiliates. All rights Agenda Topics Oracle

More information

IBM Netezza High Capacity Appliance

IBM Netezza High Capacity Appliance IBM Netezza High Capacity Appliance Petascale Data Archival, Analysis and Disaster Recovery Solutions IBM Netezza High Capacity Appliance Highlights: Allows querying and analysis of deep archival data

More information

www.intelligentbusiness.biz mferguson@intelligentbusiness.biz Twitter: @mikeferguson1

www.intelligentbusiness.biz mferguson@intelligentbusiness.biz Twitter: @mikeferguson1 Welcome to Today s Web Seminar! March 15, 2011 12:00PM ET Sponsored by: Hosted by: Eric Kavanagh is the host of DM Radio and Information Management's Webcasts. He is a veteran journalist and consultant

More information