In Part 2 of this article the author takes a look at how the transaction system is implemented, the role of the administrative layer, how all components work together and what to expect in the future.
In Part 1 of this article the author introduces NuoDB and covers some of its main features: 3-tiered architecture, nodes are equal peers, Atoms - the fundamental data unit, and the versioning and concurrency system used to handle data update conflicts and implement consistency.
Although Hadoop is a set of an open source Apache (and now GitHub) projects, there are currently a large number of alternatives for installing a version of Hadoop and realizing big data processes. 1
MetaModel - an Apache Incubator project – is a Java library used to browse, query and update various types of data stores, such as RDBMS, CSV, Excel, NoSQL, etc., in a uniform and programmatic way. 3
In this article, author Jonathan Ellis addresses common concerns of using Apache Cassandra database, in terms of architecture, deployment, configuration, performance, query language (CQL) & maturity. 11
In this article, we'll explore some of the design considerations of distributed databases, and how they respond to network partitions. 3
InfoQ spoke with co-authors of "Graph Databases" book Ian Robinson and Jim Webber about the book, role of Graph Databases in the NoSQL database space, and what’s coming up in the Graph Databases.
"Real-Time Big Data Analytics: Emerging Architecture" white paper by Mike Barlow discusses the difference between traditional & real-time analytics. InfoQ spoke with Mike about this topic. 3
James Turnbull makes a compelling case for using Logstash for centralizing logging by explaining the implementation details of Logstash within the context of a logging project. 2
Paul Dix leads a practical exploration into Big Data in this video training series. The training focuses on the high level architecture while teaching practical usage skills and Ruby algorithms.
To refactor legacy code, the ideal is to have a suite of unit tests to prevent regressions. However it's not always that easy. This article describes a methodology to safely refactor legacy code. 7