Feeds

Beyond the relational database

Advanced data storage, access and analytics

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Tech Panel The ‘Big Data’ Bandwagon is now in full flow and IT professionals are already being swamped with marketing explaining why they cannot afford to leave information unmined.

Once again, we are being bombarded with terms and messages that are ambiguous at best, meaningless at worst and simply confusing most of the time. So in true Freeform Dynamics and Reg style, we want to get a handle on just what you think about the latest bandwagon to pitch up.

What we are seeing is a number of different technologies that originated in storage, access and analytical solutions are now attempting to move into business use under the label of ‘big data’. So what’s happening with your use of relational databases and how, if at all, are you exploiting Hadoop and emerging Big Data technologies?

We think it’s still early days and that data scientists are about as rare as honest politicians, but to help us understand how emerging solutions are being used or how they are influencing your plans going forwards, we would like your help by completing our latest Reg reader study.

You don’t need to be a big data or analytics expert to take part. In fact what we want is to understand how much knowledge and experience of specific technologies exists among readers and how you see ‘Big data’ and traditional data storage and manipulation solutions fitting together, if at all.

Ready to have a go? If so, please click here to get started.

Beginner's guide to SSL certificates

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.