July 15, 2013

Remote replication: Comparing data replication methods
The third option is network-based replication, generally using an appliance that sits at the edge of the network. These tools, such as EMC's RecoverPoint, have the advantage of being able to manage heterogeneous arrays and servers. The other advantage of this data replication method is that it makes it easier to orchestrate replication policies that take multiple arrays and servers into account.

The hot new technology in Big Data is decades old: SQL
Over the past six months, vendors have responded to the demand for more corporate-friendly analytics by announcing a slew of systems that offer full SQL query capabilities with significant performance improvements over existing Hive/Hadoop systems. These systems are designed to allow full SQL queries over warehouse-size data sets, and in most cases they bypass Hadoop entirely (although some are hybrid approaches).

Microsoft Uses SQL Server 2012 5.8-Terabyte SAP ERP Database to Run Its Global Business
AlwaysOn also resolves another problem the Microsoft SAP Support team often encountered. In order to refresh their SAP ERP test system with the most recent data from the production database, they needed to copy the 1.6-terabyte backup over to the DR site that also hosts the SAP ERP test system. This process could take many hours and required monitoring. With AlwaysOn, backups can be taken from the secondary replicas.

When You've Done Enough, Do More
"Overdelivering" makes you stand out in the moment and makes people remember you later. You become locked in as someone who deserves to be listened to, and people don't wonder whether you have ulterior motives or hidden agendas. Doing more isn't just a onetime thing but an ongoing practice. For maximum effect, you'll want to focus on three distinct times when you can do more: before, during, and after an interaction.

Why does my Java process consume more memory than Xmx?
Besides heap there are other regions in memory which your application is using under the hood – namely permgen and stack sizes. So in order to limit those you should also specify the -XX:MaxPermSize and -Xss options respectively. In a short, you can predict your application memory usage with the following formula

IT security spend up, but in the wrong places, Oracle says
Oracle chief security officer Mary Ann Davidson said in prepared remarks: "Organizations can't continue to spend on the wrong risks and secure themselves out of business. When attackers do break through the perimeter, they can take advantage of weak security controls against the core systems by exploiting privileged user access, vulnerable applications, and accounts with excessive access."

'Superman' crystals could store 360TB of data forever
The scientists used a femtosecond laser, which emits pulses of light in femtoseconds (one quadrillionth, or one millionth of one billionth of a second). The 5D read/write laser can record up to an estimated 360 TB/disc data capacity on nanostructured glass capable of thermal stability up to 1000°C -- and a practically unlimited lifetime.

The damaging cult of the hero leader
By all means, let’s have high expectations of leadership, but let’s distribute that leadership throughout the organization to the places where it’s best exercised. If we choose to centralize control with an individual “hero,” we are not building either a capable organization or a sustainable job.

Microsoft boosts HomeOS with a new Lab of Things
The latest new component is the addition of a new framework, called the Lab of Things (LOT), which allows researchers to better study connected device usage in homes and other physical spaces. Microsoft is fielding a first beta of the LOT software development kit (SDK), seemingly in conjunction with the opening day of the annual Microsoft Research Faculty Summit event in Redmond.

Will In-Chip Processing Supersede In-Memory?
Anyone who is intimately familiar with the x86 chip will know that it includes three layers of cache: L1, L2 and L3, each with its own capacity, and totaling up to roughly 20Mb. Now, no one is suggesting that all data be held in-chip, but we are suggesting that in-chip processing can be considered an additional super fast and entirely beneficial resource.

Quote for the day:

"Those who hate you don't win unless you hate them, and then you destroy yourself." -- Richard M. Nixon

No comments:

Post a Comment