NoSQL data storage systems lack the security measures and awareness that are required for data protection. Because code analysis alone is insufficient to prevent attacks in today's typical large-scale deployment, certain mitigations should be done throughout the entire software life cycle.
Our first .NET interview of the year is with Frans Bouma of the entity modeling tool LLBLGen Pro. This tool has been around for almost as long as .NET itself, but being a commercial product it isn’t as well-known as the free alternatives.
Cassandra: The Definitive Guide, 2nd Edition book authored by Jeff Carpenter and Eben Hewitt covers the Cassandra NoSQL database version 3.0. InfoQ spoke with the co-author Jeff Carpenter.
The key to effective database administration in DevOps initiatives is safe automation and enforced source control for the database, which prevents many errors from reaching the deployment stage.
Recent advancements have revitalized the reactive idea of the MVC architecture. In this article, Brent Chen and Victor Chen show how developers can leverage these new technologies.
In this series we explore ways of making sense of data science - understanding where it’s needed and where it’s not, and how to make it an asset for you, from people who’ve been there and done it.
With unstructured database technologies like Cassandra, MongoDB and even JSON storage in Postgres, unstructured data has become remarkably easy to store and to process.
In many cases the repository pattern is an apparently unnecessary layer around the underlying data access technology. But once you have a repository in place, many new opportunities become available. 3
This article will focus on the basic functionality of the repository pattern and how that functionality would be implemented using three different styles of ORM. 3
Yahoo uses Hadoop for different use cases in big data & machine learning areas. InfoQ spoke with Peter Cnudde on how Yahoo leverages big data technologies.
In this article we will explain what isolation levels and dirty reads are and how they are implemented in popular databases.