Data Management

Big Data, Hadoop, and analytics help unearth valuable patterns in business information. But without proper management, backup, archiving, and protection, you're taking an unacceptable risk.

  • Podcasts // Apr 2009

    LINQPad - New Features for Entity Framework

    In this podcast, the speaker will demonstrate some exciting new features that turn LINQPad into an essential tool for writing and performance-tuning Entity Framework queries. Features are: point LINQPad to an entity framework conceptual model in a few clicks, interactively execute LINQ queries against the model - with full auto-completion,...

    Provided By O'Reilly

  • White Papers // Jan 2014

    Preventing the Privacy Breach Using Perturbation

    Privacy-preserving is an important issue in the areas of data mining and security. The aim of privacy preserving data mining is to develop algorithms to modify the original dataset so that the privacy of confidential information remains preserved and as such, no confidential information could be revealed as a result...

    Provided By IJESIT

  • White Papers // Jan 2014

    Reducing Energy Consumption and Increasing Profit with Task Consolidation in Clouds

    Cloud computing systems rent resources on demand, pay-as-the user-go basis, and multiplex many users on the same physical infrastructure. However the revenue of cloud computing is get affected by various factors such as QoS constraints, energy consumption etc., energy aware task consolidation technique is used to allocate the tasks dynamically...

    Provided By IJESIT

  • White Papers // Jan 2014

    Various Approaches for Watermarking of Relational Databases

    As a tool for storing and managing data, relational database is widely used in many information systems. It is very critical issue to protect the copyright of relational data. As an invention of information hiding the digital watermark techniques have been attracting more interests in both research and industrial fields....

    Provided By IJESIT

  • White Papers // May 2013

    Study of Data Mining Techniques used for Financial Data Analysis

    In this paper the authors describe about different data mining techniques used in financial data analysis. Financial data analysis is used in many financial institutes for accurate analysis of consumer data to find defaulter and valid customer. For this different data mining techniques can be used. The information thus obtained...

    Provided By IJESIT

  • Podcasts // Oct 2009

    Two Big Data Analysis Tricks for Everyone

    In this podcast, the speaker provides some useful tips for common data problems that everyone faces, including: how to enhance the users' career (and save the world) by applying the tools of data analysis to the users' problems, how to make messy data well-structured and squeaky clean, how to create...

    Provided By O'Reilly

  • Podcasts // Jan 2010

    DRBD and MySQL - An HA Match Made In Heaven

    DRBD has grown in popularity as an excellent low-cost high availability solution for MySQL. It provides synchronous replication of the users' data without MySQL having to worry too much about the details. Combined with Linux Heartbeat, and the user have automatic failover as well.

    Provided By O'Reilly

  • Podcasts // Jan 2010

    Cloud Security Deep Dive

    In this podcast, the speakers explore a deep dive into cloud security issues and focus on three specific aspects: data security; identity management in the cloud and governance in the cloud (in the context of managing a cloud service provider with respect to security obligations).

    Provided By O'Reilly

  • Podcasts // May 2010

    Nullology: The Zen of Database

    Nullology is the study of the empty set. Of course, sets crop up all over the place in the database world; but the question is - and it's a crucial one - what happens if the set under consideration happens to be empty? For example, a relation contains a set...

    Provided By O'Reilly

  • Podcasts // Aug 2010

    Programming Beyond Relational Features in SQL Server 2008

    In this podcast, the speaker covered FILESTREAM, and learns how database developers can now enjoy the native ability to store large binary objects in the file system with full transactional integrity. Also build several applications that integrate location-awareness by leveraging the new geospatial data types.

    Provided By O'Reilly

  • Podcasts // Jul 2010

    MySQL Upgrades with No Downtime

    In this podcast, the speaker discusses a two-node MySQL multi-master replication setup. They will take the audience step-by-step through the process, and then uses MMM (MySQL Multi-master Manager) to manage & automate the process exposing a virtual IP address for their application to use. Then show how this architecture supports...

    Provided By O'Reilly

  • Podcasts // Jun 2010

    Effective Data Destruction Practices

    In this podcast, the speaker detailed the specifics of the data storage technology changes and how organizations can protect themselves from huge financial liabilities. Having a defined data destruction strategy not only ensures a greener environment, but also ensures that the terabytes of stored data on the hardware are completely...

    Provided By O'Reilly

  • Podcasts // Sep 2011

    Privacy and Big Data: Is There Room for Privacy in the Age of Big Data?

    The users' know that digital data is increasing at an exponential rate driven by all the devices they use, ubiquitous networks, social media, and emerging technologies like the Internet of Things. But what is not well understood is how the components of big data, in the form of cheap storage,...

    Provided By O'Reilly

  • Podcasts // Sep 2011

    Designing Data Visualizations

    There is an increasing abundance of tools, languages, and frameworks for data visualization. But success is built upon having a good design to implement, and that requires a linear process of encoding information for visual transmission and subsequent decoding by wetware (the reader's brain).

    Provided By O'Reilly

  • Podcasts // Nov 2011

    HBase Coprocessors - Deploy Shared Functionality Directly on the Cluster

    The newly added feature of HBase Coprocessors allows the application designer to move functionality closer to where the data resides. While this sounds like stored procedures as known in the RDBMS realm, they have a different set of properties. The distributed nature of HBase adds to the complexity of their...

    Provided By O'Reilly

  • Podcasts // Feb 2012

    An Introduction to Ethics of Big Data

    Ethics of big data is about finding alignment between an organization's core values and their day-to-day actions in a way that balances risk and innovation. As big data brings business operations and practices deeper and more fully into individual lives, it is creating a forcing function that raises ethical questions...

    Provided By O'Reilly

  • White Papers // Feb 2014

    Effective Data Structure for Mining Frequent Itemset in Cloud Databases

    Due to increase of data in cloud computing environment over the past few years, retrieving required data from the huge database with lesser amount of time becomes tedious. Hence without having a proper cache management framework the retrieval of required data from the cloud data servers becomes difficult. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Migration in Heterogeneous Databases (ETL)

    Development of economic systems presents rapid growth trend and requires establishing a rapid trans-regional clearing system in banks. The authors are studying the approaches and processes of data migration and take a bank's database as an example. The process of data migration has three methods. Data migrated by tools beforehand,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    M-Score and K-Anonymity: A Model for Detection and Protection of Data

    Conversely, limiting access to the information in the interests of preserving secrecy might damage their ability to implement the actions that can best serve the organization. Therefore, data leakage and data misuse detection mechanisms are essential in identifying malicious insiders. One of the emerging concepts in micro data protection is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An Efficient Anomaly Detection System Using Featured Histogram and Fuzzy Rule Mining

    Anomaly detection is a concept widely applied to numerous domains. A number of techniques are used for finding the anomalous attacks. As the network traffic increases the people need an efficient system to monitor packet analysis of network flow data. Due to this frequent item set mining is foremost problem...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    A Robust Data Preserving Technique by K-Anonymity and Hiding Association Rules

    With the development of data mining technology, an increasing number of data can be mined out to reveal some potential information about user. While this will lead to a severe problem, which is users' privacy may be violated easily. The goal of privacy preserving is to mine the potential valuable...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • Podcasts // Jan 2014

    New and Improved: Hacking Oracle From Web

    In this podcast, the speaker will explain about number of attacks against Oracle database and in almost every other CPU there is a shiny new exploit which allows a malicious database user to gain DBA privileges on the back-end database.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OwnCloud

    The advantages of storing data in the cloud are many: ubiquitous access to data from multiple devices, social interaction and sharing with others on the web and no extra software to install. In this webcast, the presenter will give an overview of this market and on getting ownCloud running in...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    HTML5/JS Security

    In this podcast, the speaker explores the vulnerabilities behind JavaScript, including: a new class of vulnerabilities unique only to JavaScript, vulnerabilities in 3rd-party platforms which are exploited through JavaScript code and HTML5 which is considered the NG-Javascript. In turn, HTML5 introduces a new set of vulnerabilities

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Top Ten Proactive Web Application Controls

    The OWASP proactive control is a \"Top 10 like document\" aimed to help developers build secure applications. In this podcast, the speaker will explain the fundamental controls in critical software categories such as authentication, access control, validation, encoding, query parameterization, data protection, secure requirements, secure architecture and secure design.

    Provided By SecurityTube.net

  • White Papers // Feb 2014

    Powering Transformation - The IT Revolution is Now

    The IT Revolution is happening and the time for change is now - don’t settle for inflexible systems built on legacy technology. Download this white paper for information and ideas on how you can: Get the most out of managing IT in the cloud Eliminate upfront investments and maintenance costs...

    Provided By ServiceNow

  • White Papers // Feb 2014

    Three IT Imperatives CIOs Use To Drive Change Throughout the Enterprise

    CIOs who have been successful in bridging the divide between IT operations and business did it by accelerating the transformation of IT. ServiceNow documents three common IT imperatives that leading CIOs use to drive change and assert themselves as strategic leaders in the business. In this white paper, you will...

    Provided By ServiceNow

  • White Papers // Feb 2014

    Proposed Local Data Mart Approach for Data Warehouse Architecture

    A data warehouse is a data repository, containing historical data, prepared for analysis and supporting decision making process. Data warehouses are in use for more than a decade but companies are still finding it difficult to decide on the approach they should take for successful implementation. Data warehouse architecture plays...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Solutions for Mobility in Wireless Body Area Networks

    Body Sensor Network (BSN) that is linked by a wireless network interface roams from one coverage zone to another then interference between Wireless-Body-Area-Networks (WBAN) created, which can cause serious throughput degradation, Scattering of WBAN and Remote Base Station (RBS) will not be in range. When a wireless body area network...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • Podcasts // Apr 2012

    The jQuery Mobile API In-Depth

    In this podcast, the speaker will discussed about what jQuery mobile is & how it works, events and how to use them, API methods, manipulating elements and configuring jQuery mobile.

    Provided By O'Reilly

  • Podcasts // May 2012

    MongoDB and PHP

    What would happen if the users' optimized a data store for the operations application developers to actually use? They arrive at MongoDB, the reliable document-oriented database. In this podcast, the speaker explains how to build elegant database applications with MongoDB and PHP.

    Provided By O'Reilly

  • Podcasts // Jun 2012

    How Pinterest Architected and Built Their Sharded MySQL Datastore

    In this podcast, the speakers will explain how they architected and built their sharded MySQL solution, including: UUID generation and what the alternatives were, how objects and mappings are stored, shard topology and the process of adding more capacity, caching.

    Provided By O'Reilly

  • Podcasts // Jul 2012

    Building Offline Web Apps with HTML5

    In this podcast, the speaker will covered web storage, web SQL database, offline application cache, indexed DB, offline data sync strategies, fallback techniques for older browsers. The terms \"Web\" and \"Online\" have been intrinsically linked in people's minds. With HTML5, the web's dependency on a connection to the internet has...

    Provided By O'Reilly

  • Podcasts // Oct 2012

    Python for Data Analysis

    Finding great data analysts is difficult. Despite the explosive growth of data in industries ranging from manufacturing and retail to high technology, finance, and healthcare, learning and accessing data analysis tools has remained a challenge. This podcast will highlight one of the most important tools in the field - Python....

    Provided By O'Reilly

  • Podcasts // Sep 2012

    Building Mobile Applications with jQuery Mobile: Tips and Techniques

    In this podcast, the speaker will explain about what the users' need to know to use jQuery mobile, overview of jQuery mobile features. The speaker will also explains how to get started with a jQuery mobile project and also to explore hands-on coding demonstration.

    Provided By O'Reilly

  • Podcasts // Sep 2012

    Designing for jQuery Mobile

    In this podcast, the speaker will explain about the review of UI elements that jQuery mobile builds for the users'. The speaker will also explains how to customize the appearance of jQuery mobile which includes what a designer needs to know and also to explore the jQuery mobile theme roller.

    Provided By O'Reilly

  • Podcasts // Mar 2013

    Introduction to Data Visualization with R and ggplot2

    In this podcast, the speaker will explain about the R graphics Cookbook, the users' will learn the basics of how to create data graphics using R and the popular ggplot2 package. Visualization is an essential part of a data analyst's toolkit. When the users' are in the exploratory phase of...

    Provided By O'Reilly

  • Podcasts // Mar 2013

    Data Visualization - The Value of Process

    In this podcast, the speaker will explain about the interactive data visualization for the web, also the speaker will introduce ideas from conceptual art, connecting them to the daily challenges faced by data visualizers working with code.

    Provided By O'Reilly

  • Podcasts // Jul 2009

    YQL: Select From Internet

    The Yahoo! Query Language (YQL) is an expressive SQL-like language that lets the users' query, filter, and join data across web services. With YQL, applications run faster with fewer lines of code and a smaller network footprint. With YQL, developers can access and shape data across the Internet through one...

    Provided By O'Reilly

  • Podcasts // Feb 2013

    Engaging Audiences with Data Visualization

    In this podcast, the speaker will explain about the interactive data visualization for the web, as the speaker guides the users' through the framework of three avenues of engagement: aesthetic, narrative, and interactive.

    Provided By O'Reilly