Articles about Queries

Bezos headshot

Phew! These DynamoDB queries are heavy. C'mon Amazon, give us a hand

Amazon has brought global secondary indexes to its non-relational, rentable DynamoDB database. The upgrade means cloud wranglers can perform more complicated queries on data stored in the system without having to sacrifice latency. It achieves this by implementing Global Secondary Indexes (GSIs) – a feature that lets admins …
Jack Clark, 13 Dec 2013
MapR logo

MapR revs up HBase queries with M7 Hadoop distro

You are not just imagining it. Every commercial distributor of the Hadoop system for storing and chewing through unstructured data has come up with its own a different way to deliver something akin to SQL query functionality while at the same time boosting the speed of ad hoc queries. MapR Technologies is one of the earlier …
Apple Maiden data center Teradata

Teradata boosts DRAM on appliances for in-memory queries

If it were as simple as adding more main memory to a server to crank up the performance of a parallel database, Teradata would have done it by now. But with memory capacities going up on x86 servers and memory prices coming down, now is the time to add more in-memory processing to data warehouse appliances – and that is …
The Register breaking news

ParAccel plugs SQL queries into its analytics engine

Strata 2013 Amazon-blessed database company ParAccel has layered an analysis suite for SQL users on top of its technology. The extra analytic capabilities – social-media parsing text features, sessionization, JSON parsing, and pattern matching – combine to make the complex system a little bit more attractive to old SQL pros, ParAccel …
Jack Clark, 28 Feb 2013
Data Centre

Siri, is it true that you're totally in love with Apache Mesos?

Apple’s digital assistant Siri is running on Apache Mesos, the cluster-manager billed by its creator as a data centre operating system. This means the open-source project, which began life in 2009, is now powering voice queries on iPhone and iPad. Cupertino is believed to be running one the industry’s largest Mesos clusters, …
Gavin Clarke, 27 Apr 2015
Parking meter FAIL from Ryan Stele's Flickr account  https://www.flickr.com/photos/tweek/139509551/in/photolist-dk2k6-8VcmSf-5w27pU-7RdimR-7RdiiK-7RdifK-7Rgz8f-7Rdiai-czUVBh-9Ls61i-5cY5jG-9bGK2Y-6VH3Xz-5YVGNT-abaRJ9-6PjTC5-6opqMB-jitAoe-5Yvee7-65tNZD-5xf3hB-a9Zegh-845DZg-ocfXQT-bfZB5z-aWWvax-bVe3vu-6yra6f-6yra4A-8nudtt-6WhDiL-6qNQyT-7YYReC-6yra5N-6yra3w-6yra2Y-6yn2HX-a6MPYs-6yn2Qx-6yn2Pv-6yra49-6yra2q-6yn2Hx-6yra57-6qT1yb-55rYVK-6yra75-6yr9ZQ-6odx71-68EVsF

Smart grid security WORSE than we thought

Don't try crypto at home, kids: the Open Smart Grid Protocol project rolled its own crypto and ended up with something horribly insecure. This paper at the International Association for Cryptologic Research explains big issues with the OSGP crypto protocol deployed in as many as four million smart meters and devices. The …

Bound to happen: BIND bug exploits now in the wild

Security bods are nagging anyone running BIND to install last week's patch, as active exploits have started to appear in the wild. That information comes from Sucuri's Daniel Cid, who writes that "attacks have begun," based on reports from the company's customers that they were experiencing DNS server crashes. The patch is …

AWS CloudFront wobbles at worst possible time

Don't start your Black Friday online shopping spree just yet: Amazon Web Services' CloudFront content delivery network has wobbled over the last few hours and the perennially-loss-making retailer, and customers of its cloud computing services, have reportedly been hard to access. Amazon's status page said “We are currently …
Simon Sharwood, 27 Nov 2014

Bing to encrypt search traffic by default

Microsoft product manager Duane Forrester says it will encrypt all Bing search traffic later this year. Forrester says the move follows Cupertino's 2014 decision to allow users to opt-in to HTTPS for web searches. "Beginning this (Northern hemisphere) summer, we will begin the process of encrypting search traffic by default," …
Darren Pauli, 16 Jun 2015
Abbott and Costello dressed as policemen

NYPD cop in court for allegedly hacking into the FBI

A New York City Police Department auxiliary deputy inspector faces charges of hacking into a restricted NYPD computer and other law enforcement databases, including a system maintained by the FBI. Yehuda Katz, 45, of Brooklyn, New York, allegedly used the databases to obtain information about local traffic accident victims …
John Leyden, 20 Mar 2015
Data storage everywhere - CD, DVD, DAT, DCC, HDD, MiniDisc, SSD, SD card, floppy, magnetic stripe, barcode

Microsoft turns on Windows 10 file backup to Azure

Microsoft has flicked the switch on its Azure Backup service for Windows 10 clients. Azure Backup is Microsoft's cloud backup service and is positioned as an alternative to tape, rather than a rapid recovery tool. Application data is the service's main target, if only because Azure Site Recovery already handles the chore of …
Simon Sharwood, 20 Aug 2015
Death Star cannon

Hey Google, what’s trending? Oh, just the death of journalism

Mountain View has announced "the biggest expansion of Google Trends since 2012" in a move set to thicken the already impenetrable walls of its media-baiting echo chamber. "Every journey we take on the web is unique" began the traffic consolidator's announcement. Offering churnalists the opportunity to find real-time data on …

Bitdefender feeling a bit tender: Hackers enter anti-distemper vendor

One or more miscreants have been able to slurp and leak usernames and passwords from Bitdefender. The unencrypted login details belonged to some of the security biz's small business customers. Bitdefender, which makes antivirus software and other stuff, admitted its system was breached following rumors (here and here) that …
John Leyden, 31 Jul 2015

Sophos' putrid patch snuffs Citrix kit, kills call centre

A Sophos Web Appliance update has crashed users' PC fleets including knocking offline the Australian call centre of a global company for two days after support was quietly revoked for SSL 3.0 ciphers used in Citrix Receiver. The British security firm pushed out update version 4.0.2.3 last week to correct four non-critical issues …
Darren Pauli, 29 Jun 2015
willy wonka oompa loompa

Google to block access to unofficial autocomplete API

Google has decided the autocomplete API it informally offers will no longer be available for “unauthorised” users as of August 10th. The company says its autocomplete API has found an audience among “a number of developers” who have used its ability to predict a query before a user finishes typing for uses other than Google's …
Simon Sharwood, 27 Jul 2015
Tools

What's that? The Bureau of Stats has an API and nobody TOLD you?

Australia's national data-collector, the Australian Bureau of Statistics, has quietly published an API to its data sets. While it won't replace most peoples' preferred (or at least tolerated) means to get ABS data - the spreadsheets and CSVs the ABS provides for easy database ingestion - the API will allow others to embed ABS …

Salesforce unleashes red-tape-as-a-service for regulation-heavy users

Salesforce has launched its slightly-more-secure-software-as-a-service for organisations in industries compelled to wrap themselves in red tape. The Salesforce1 service, dubbed "Shield", offers encryption, monitoring, and archiving for the platform's apps. Salesforce says the platform includes field audit trail, platform …
Team Register, 15 Jul 2015
paper cut-out men holding hands in linked semi-circle

NY, Connecticut investigate Apple for Music service violations

Although Apple has barely thrown back the covers on its Apple Music streaming service, it is already facing anti-trust investigations from two US states. According to the New York Times, attorneys general in New York and Connecticut are investigating whether Apple has pressured record labels – or colluded with them – to …

Microsoft improves Azure SQL Server cloud service, simultaneously makes it worse

Microsoft has announced improvements to its Azure SQL Database service, which offers a managed SQL Server database with patching and operating system maintenance handled automatically by the cloud service. At the Professional Association for SQL Server (PASS) summit currently under way in Seattle, Microsoft Data Platform VP T.K …
Tim Anderson, 06 Nov 2014

Dell System Detect update vulnerability exposed

Dell System Detect doesn't auto-update automatically, leaving millions of systems vulnerable as a result, according to security software firm F-Secure. Even though Dell disputes the problem with its application which interacts with the Dell Support website, F-Secure's claim is based on real figures regarding queries about older …
John Leyden, 08 Apr 2015

Old, forgotten, lonely? SQL Server 2016 will sling you into Azure

Ignite 2015 Microsoft has today announced SQL Server 2016 at its sysadmin-focused Ignite conference in Chicago. The software will be available as a preview release this summer. The Windows giant is continuing its commitment to hybrid cloud by adding a new called Stretch Database, which dynamically moves less active data to the Azure cloud …
Tim Anderson, 04 May 2015

Security sleuths, sniff out the stupid from your Oracle DBs

Databases remain a security nightmare, says Datacom TSS hacker David Litchfield, so he's built an application to give admins a hand. The Datacom TSS hacker says the Database Security Scorecard will help inform system administrators of security shortfalls in databases and help bridge the language gap between management and tech …
Darren Pauli, 04 Jun 2015
Ambulance

AshMad search outfit Trustify to El Reg: 'Trust us, we're the good guys'

Updated Online “Uber for private investigators” outfit Trustify is upset with The Register for not replicating its messaging with sufficient sycophancy. The company has, through PR company PR/serve, sent the following missive to explain why it harvested searches from the desperate and foolish visiting its site to see if they're on the …
botnet

Bunitu botnet crooks sell your unencrypted VPN traffic for £££

Cyber-crooks behind the Bunitu botnet are selling access to infected proxy bots as a way to cash in from their network. Users (some of whom may themselves be shady types, as explained below) who use certain VPN service providers to protect their privacy are blissfully unaware that back-end systems channel traffic through a …
John Leyden, 11 Aug 2015

F*cking DLL! Avast false positive trashes Windows code libraries

A misfiring signature update from anti-virus developer Avast triggered all sorts of problems on Wednesday. Avast acted promptly by withdrawing the definition update but not before numerous users had fallen foul of the problem. The withdrawn update incorrectly labelled various libraries (dlls) on Windows PCs as potentially malign …
John Leyden, 07 May 2015
Smilin' Marv

Mobile device screens recorded using the Certifi-gate vulnerability

Vulnerable plug-ins have been installed on hundreds of thousands of Android devices, allowing screens to be recorded, according to data from the scanning tool which discovered that the so-called Certifi-gate vulnerability is already being exploited in the wild. The Certifi-gate vulnerability was disclosed by security …
John Leyden, 25 Aug 2015
Derailed train wagon. Pic: New York MTA

Using SQL techniques in NoSQL is OK, right? WRONG

Now that we have CQL for Cassandra and N1QL for Couchbase, it seems the power of SQL is being opened for NoSQL database developers. There is, however, a real danger that developers who see these SQL-like languages as an implementation of SQL are in for a world of pain as they try to leverage their SQL skills on a NoSQL …
Andrew Cobley, 25 Aug 2015

Cloudy VMs leak ID details that could allow attacks, says researcher

Research published by a US masters student reaches the somewhat unsettling conclusion that current cloud technologies don't separate virtual machines (VMs) as well as they could. By spying on shared resources at a low level, the research suggests, an attacker's VM can retrieve data written by another (like crypto keys), and …

Choc Factory finds 84,000 ad injectors targeting Chrome

Google spam abuse researcher Kurt Thomas says some 84,000 injectors and apps are targeting its Chrome web browser with dodgy advertising. Thomas says the apps include 50,000 browser extensions and 34,000 applications which target Chrome to display revenue-generating ads within the sites that victims browse. About a third of …
Darren Pauli, 07 May 2015

Snowden to the IETF: Please make an internet for users, not the spies

NSA whistleblower Edward Snowden has urged the world's leading group of internet engineers to design a future 'net that puts the user in the center, and so protects people's privacy. Speaking via webcast to a meeting in Prague of the Internet Engineering Task Force (IETF), the former spy talked about a range of possible …
Kieren McCarthy, 20 Jul 2015
Close-up of the flu virus (artist's impression) - Shutterstock

VirusTotal wants YOU (but not you) to join its epic AV whitelist

Google-owned VirusTotal wants large software houses to send in their software catalogues so it can build what could well end up being one of the world's biggest anti-virus whitelists. The whitelist would clarify to users that software being checked for cleanliness came from a recognised developer, and warn vendors and anti-virus …
Darren Pauli, 12 Feb 2015

CloudFlare launches nameserver DDoS shield

CloudFlare has launched a DNS proxy service it says will help organisations improve DNS resilience by pushing distributed denial of service attacks to the outer edge of its network. The Virtual DNS service is billed as a means for DNS providers to mitigate a potential "massive single point of failure" in their nameservers caused …
Darren Pauli, 11 Mar 2015

Capita: Listen up redundo staff, we know you're leaving but...

The management team at Capita are all heart – they have asked staff being made redundant at a Glasgow call centre running O2’s phone support desk to prep newbies coming to the team. Some 700 workers – split evenly across centres in Bury and Glasgow – last week opted for voluntary redundancy, though according to the …
Paul Kunert, 18 Aug 2015

TrueCrypt + Norton AV = BSOD, wail disgruntled users

Updated Encrypted disk users who upgrade to Norton 2015 have been confronted by the dreaded Blue Screen of Death. Norton 2015 appears to trigger a crash on Windows 8.1 PCs that runs a disk encryption driver, according to user complaints about the problem in a thread on a Symantec support forum. Many of those affected are running …
John Leyden, 20 Feb 2015
"Image from the glassbrain project, neuroscapelab.com, UCSF

OH HAPPY DAY! Lawyers replaced by AI

Artificial intelligence is a worry on two fronts. In a worst-case scenario, we end up with The Terminator. In a less-painful scenario, we end up with billions of humans out of work as drudgery is replaced by machines. The second scenario looks just a little bit closer today, but also less painful, after the advent of “ROSS”, a …
Simon Sharwood, 30 Jan 2015
Google HQ logo. Pic: Bob Dormon

Cloud DNS, VPN, HTTPS load balancing ... Google looks at rivals, thinks: Yeah, we'll do all that

Google has expanded its portfolio of network services, with the aim of ensuring that customers of its cloud infrastructure have responsive, low-latency websites. On Monday, the online ad-slinger announced general availability of Cloud DNS, its managed DNS service. For a monthly fee, Google will handle DNS requests for as many as …
Neil McAllister, 13 Apr 2015
Cartoon of  green skeletal figure reaching out of phone

DARPA-funded team says it can SMELL Android malware

A trio of DARPA-backed Iowa State University researchers have developed a tool to help speed up android malware analysis. The Security Toolbox developed by the DARPA blue team uses features including 'smells' which sport stronger heuristics to flag possible signs of hidden malware badness. Benjamin Holland, Tom Deering, and …
Darren Pauli, 09 Apr 2015

Tax fraud fugitive nabbed after posting selfies

A US man charged with tax fraud and identity theft has been arrested after fleeing authorities and allegedly posting bragging selfies on Twitter. Lance Ealy, 28, of Ohio was arrested in a raid Wednesday in Atlanta by federal authorities after he skipped trial on charges he purchased stolen Social Security numbers and personal …
Darren Pauli, 20 Mar 2015
passwords_chopper_sling_648

Login creds for US agencies found scrawled on the web's toilet walls

A threat intelligence report into the availability of login credentials for US government agencies has identified 47 agencies across 89 unique domains may be compromised. The findings resulted from an analysis of open source intelligence (OSint) from 17 paste sites, carried out between 4 November 2013 and 4 November 2014. The …
Google HQ logo. Pic: Bob Dormon

Hurry up and just SLAP GOOGLE, MEPs fume at EU commish

The European Parliament took the EU’s executive arm to task on Tuesday for failing to give Google a good kicking resolve the ongoing investigation into Google’s alleged abuse of dominance in the search market. In a statement endorsed by members of the European Parliament (MEPs), it welcomed “further investigations into Google's …
Jennifer Baker, 11 Mar 2015
Tardis

Couchbase unhitches NoSQL: Multi-Dimensional Scaling is almost here

Couchbase is cracking open its NoSQL document store’s architecture by allowing core database services to run on different server parts. The firm announced Monday Couchbase Server 4.0, featuring an architecture it's developed called Multi-Dimensional Scaling. Multi-Dimensional Scaling will let you isolate query, index and data …
Gavin Clarke, 23 Mar 2015
Conrad Schnitzler

The Register IBM Bluemix programming challenge: The winner!

A month ago we announced our first coding competition, The Register's IBM Bluemix Programming Challenge 2015. The judges have just completed the evaluation of the entries we had to the competition. And you know what? We're very impressed. Just three of the entrants failed to get any of the answers right, which is far better …
HTML versions found online in the UK between 1996 and 2010

Watch this: Using Foundation for responsive design

Video Youtube Video Mobile Ready and responsive development are the must know skills for anyone involved with web development, Juggling the HTML5, CSS3 and Javascript is a challenging ask but Foundation is here to help! A rapid prototyping and industrial scalable framework it makes responsive design a simpler and more straightforward …
David Gordon, 06 Jun 2014
WD floods 1

Teradata bulks up its universe, joins data warehouse to data lake

Teradata is widening the use of its data warehouse and analytics by orchestrating access to more data silos and logically combining them, joining data lakes to data warehouses, so to speak. Teradata_Unified_Data_Architecture This is all part of Teradata's Unified Data Architecture push Teradata is the leading data warehouse …
Chris Mellor, 22 Apr 2015
Patching celebration

Sysadmins rejoice! Patch rampage killing off nasty DDoS attack vector

Sysadmins rejoice! NSFOCUS researchers say hundreds of thousands of Network Time Protocol (NTP) servers have been patched, reducing the threat from some devastating and cheap distributed denial of service (DDoS) attacks. The patching rampage saw the number of vulnerable NTP servers drop from 432,120 at the start of the year to …
Darren Pauli, 25 Jun 2014
Ben Mezrich, Once Upon a Time in Russia: The Rise of the Oligarchs and the Greatest Wealth in History

Global cybercrime fraud boss ran secret pro-Moscow intel sorties

Black Hat 2015 The elusive head of one of the world's most successful online criminal gangs wanted by the FBI was quietly using the Gameover Zeus banking trojan for political espionage inline with Russian interests and may have the protection of Moscow, researchers contend. Evgeniy Mikhailovich Bogachev, better known online as Slavik, has …
Darren Pauli, 06 Aug 2015
Jumping_Corinth_Canal

DSSD bridges access latency gap with NVMe fabric flash magic

EMC’s DSSD aims to bridge the gaping access latency chasm between networked arrays and PCIe server flash cards with its DSSD array hooked up to servers across an NVMe fabric. This form of externalised PCIe fabric networking is likely to be the future of all networked all-flash arrays, as it gets rid of existing network access …
Chris Mellor, 18 Aug 2015
Smilin' Marv

P0wned plug-in puts a million WordPress sites at risk of attack

Up to a million WordPress websites could be open to full compromise through a vulnerability in the WP-Slimstat plug-in, security bod Marc-Alexandre Montpas says. The weak key flaw can expose admin credentials; bad news for the folks who've downloaded the plug-in 1.3 million times. A patched version of the plug-in has been …
Darren Pauli, 26 Feb 2015

FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for

There has been growing disquiet over Apple's desktop search app Spotlight, which sends queries for things back to the company's servers to process. Spotlight phones home in OS X Yosemite, version 10.10, and it is enabled by default: it can be switched off, but with Apple insisting that it now takes people's privacy seriously, …
John Leyden, 20 Oct 2014

Woe, Daddy! GoDaddy customers wail as hosting service GOES TITSUP

Hosting outfit GoDaddy is suffering what appears to be a pretty widespread outage hitting website operators in the UK this morning. The company's own site was struggling to load at time of writing. A miserable message wrapped in a pink box on GoDaddy's support page coughs to a "known issue" with its hosting system. However, The …
Kelly Fiveash, 01 Sep 2014