Tek-Tips | Data Management RSS feed for this section
ARM TechCon 2013: How ARM Impacts the Digital Society—Introduction

ARM TechCon 2013: How ARM Impacts the Digital Society—Introduction

In the recent ARM TechCon 2013, I attended several keynote speeches. ARM chips are known to consume less energy than other chips, but they are becoming powerful enough to fuel our digital society. To learn more about this trend, I went to hear several keynote speakers at the recent ARM TechCon 2013. Tom Lantzsch, ARM’s […]

Read full story Comments { 0 }
Streaming Analytics Applied to the Power Industry

Streaming Analytics Applied to the Power Industry

I research the application of ICT to the power industry. ICT moves and progresses very rapidly, but it does not do so in isolation. Its benefits should be applied to other areas for assistance and further improvement. With the advent of sensor technologies, more equipment and devices in the smart grid are being tagged with […]

Read full story Comments { 0 }
Prying eyes steal customer data at a major EU Telco: How to avoid insider data theft

Prying eyes steal customer data at a major EU Telco: How to avoid insider data theft

This notification is possibly the first major breach made visible under the new tough EU Telecoms rules on data privacy. The data stolen includes “names, addresses, birth date, gender, bank sort code and bank account numbers for approximately 2 million applications from individuals seeking to sign up with Vodafone Germany”. The key word here is […]

Read full story Comments { 0 }
New Paradigm and Thinking Required for Massively Distributed and Complex Systems – Part 1

New Paradigm and Thinking Required for Massively Distributed and Complex Systems – Part 1

In addition to the tutorial I attended at NoSQL Now 2013, I heard two keynote speech sessions. They had similar themes but different emphases. The power grid transmits not just power but also a vast amount of data/information about power delivery. This is similar to the telephone system’s consisting of signaling (control) and voice transmission […]

Read full story Comments { 2 }
What I Learned at NoSQL Now 2013

What I Learned at NoSQL Now 2013

This was the second time I’ve attended the NoSQL conference. I attended one of the tutorials and two keynotes and interviewed one company this year. My interest in the NoSQL marketplace is to follow and monitor Big Data produced by instrumented sensors in the smart grid, and to produce useful information for its operations. Tutorial […]

Read full story Comments { 1 }
There is a needle in the haystack, Ground Control.

There is a needle in the haystack, Ground Control.

All of us are engaged daily in the process of looking for information on the Internet, or “searching”. Sometimes, we search for clarification, facts, confirmation, projects, solutions, while other times our searches help us broaden our views, come to terms with a concept, make a plan, find a definition, or cross check a fact. Watch yourself […]

Read full story Comments { 0 }
Voltage says United Nations allegations against the NSA highlight the need for securing company communications

Voltage says United Nations allegations against the NSA highlight the need for securing company communications

Commenting on reports that the NSA hacked the internal communications of the United Nations (http://usat.ly/1djSPLp), Voltage Security says that, while they will not come as a surprise to many, the takeaway is that all organizations need to better defend their internal communications and allied data. According to Dave Anderson, a senior director with the data […]

Read full story Comments { 0 }

Considering Software Usability and Data Integration in Data Center Infrastructure Management Tools

The data center market is unique but has a lot of issues that IT can provide solutions for. Data center infrastructure management (DCIM) is the monitoring, measuring, and understanding of what’s going on in a data center to produce action items for operations. One of DCIM’s objectives is to conserve energy at data centers. In […]

Read full story Comments { 0 }
Can Software Define a System?

Can Software Define a System?

A system can be anything. It can consist of only software pieces. In that case, we already know it is doable. But what if a system consists of software, hardware, and infrastructure, like a data center? The data center market is unique and many IT people, especially software applications and middleware people, tend to think […]

Read full story Comments { 0 }
Voltage Security Comments on Largest US Data Breach

Voltage Security Comments on Largest US Data Breach

In light of charges filed last week in a US court against five cybercriminals in what’s being considered the largest ever US data breach, Voltage Security cautions that the risk is still high but can be avoided with a data-centric security strategy. Voltage customer Heartland Payment Systems Inc., was one of the companies involved in […]

Read full story Comments { 0 }