Feeds

SQL fights back against NoSQL's big data cred with SQL/MDA spec

The empire strikes back with multi-dimensional arrays

Security for virtualized datacentres

With the growing popularity of big-data tools like NoSQL databases and Hadoop, it might have looked like SQL could be in line to be moved on from “venerable” tag to “obsolete”, but last week, the ISO SQL working group agreed to start work on SQL/MDA (multi-dimensional array) specs.

The people behind SQL have decided it's time to get serious (really, really serious) about big (as in really, really big) multidimensional datasets, and have kicked off an effort to extend the standard, adding the new capabilities needed by spatial, scientific, engineering and medical users.

As spatial publication GIM International notes, SQL doesn't offer an elegant way to handle the kinds of arrays generated by scientific big data. For example, meteorology might maintain four-dimensional data sets covering location, altitude and time, and those kinds of arrays are held and processed in other environments, even if the data stores are then referenced in an SQL database.

Similarly, data collected by big sensor networks can easily become multi-dimensional – and even if the volume data isn't out of this world, the multi-dimensional nature of data sets puts them beyond SQL.

A separate effort, called Rasdaman (a scalable multi-dimensional array analytics server) has been working for some time to apply an SQL-like query language to array databases. Rasdaman's backer, Peter Baumann of Jacobs University Bremen in Germany, put forward the proposal now adopted by the ISO.

Rasdaman, GIM says, has showed impressive results: “In a recent technology demonstration, more than 1,000 computers collaborated in a cloud to jointly compute the result of a single database query. This ‘distributed query processing’ means a massive speed increase, and research challenges on multi-Petabyte data cubes can be answered that were previously unsolvable,” the outlet writes.

Rasdaman has also shown good adoption in the open source GIS world, being adopted by the ubiquitous GDAL (Geospatial Data Abstraction Library) as a library component, and with MapServer integration in beta. ®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.