In this article, third installment of Apache Spark series, author Srini Penchikala discusses Apache Spark Streaming framework for processing real-time streaming data using a log analytics sample application.
In this article, author discusses the survival prediction of colorectal cancer as a multi-class classification problem and how to solve that problem using the Apache Spark's MLlib Java API.
Data Lake-as-a-Service provides big data processing in the cloud for business outcomes in a cost effective way. InfoQ spoke with Lovan Chetty & Hannah Smalltree from Cazena about these solutions work.
Neo Technology, the company behind the graph NoSQL database Neo4j, recently released version 2.3 of the database and also announced openCypher initiative. InfoQ spoke with Philip Rathle about it.
In this article, author Dan Macklin discusses the transition to Riak NoSQL and Erlang based architecture coupled with Convergent Replicated Data Types (CRDTs) and lessons learned with the transition. 3
In this article, author discusses a bio-informatic software as a service (SaaS) product which was built as a public data warehousing and analytical platform for mass spectrometry data. 3
A new Eclipse Oozie plugin allows to significantly simplify implementation of Oozie processes by allowing to define them graphically. An article introduces plugin and provides an example of its usage. 1
ColumnarStore can offer performance improvements over traditional tables, but aren’t always faster. Aleksandr Shavlyuga explores the power, and limitations of SQL Server’s ColumnStore Indexes.
In this article, author Carlos Bueno discusses the strategies for estimating the server capacity for big data projects and initiatives, with the help of two case studies.
This article covers machine learning and cognitive computing, and how they are related to artificial intelligence (AI). Panelists discuss how this technology is applied in digital marketing space.
Author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure and the security infrastructure for IoT devices, like authentication & access policy enforcement. 1