October 01, 2013

Transactions and SQL Server 2014’s In-Memory OLTP
Transactions in SQL Server’s In-Memory OLTP rely on a timestamp-like construct known as a Transaction ID. A transaction uses two timestamps, one for the beginning of the operation and one that is assigned when the transaction is committed. While multiple transactions can share the same start value. Likewise each version of a row in memory has a starting and ending transaction id. The basic rule is that a transaction can only read data when RowVersion.StartingId <= Transaction.StartingId < RowVersion.EndingId.

Free eBook: Graph Databases
Graph Databases, published by O’Reilly Media, discusses the problems that are well aligned with graph databases, with examples drawn from practical, real-world use cases. This book also looks at the ecosystem of complementary technologies, highlighting what differentiates graph databases from other database technologies, both relational and NOSQL. Graph Databases is written by Ian Robinson, Jim Webber, and Emil Eifrém, graph experts and enthusiasts at Neo Technology, creators of Neo4j.

Govt. Shutdown would hit tech industry
In the last shutdown, in the 1990s, government employees received backpay, but Hettinger said contracting companies aren't expecting to get back lost revenue from a shutdown. Even a short agreement to fund the government would be disruptive, Hettinger said, because companies need to be able to make decisions based on a predictable revenue stream. He urged companies to communicate with their contract employees to prevent "mass confusion" when federal agencies start closing.

Cisco, Intel push 'trusted geolocation in the cloud'
This idea of “trusted geolocation in the cloud” is of growing importance because many countries have laws about how can data about their citizens can be moved outside the country if at all, and businesses have their own reasons to restrict movement of data to certain places. Cisco solutions architect Kenneth Stavinoha and Intel senior enterprise technologist Paul Yates recently spoke on the topic during a panel discussion at the ISC2 Conference in Chicago, along with HyTrust CTO Hemma Prafullchandra.

Nokia Hits Snag in India
Nokia India's assets were frozen on Wednesday, the Finnish company said in a written statement on Monday. The Delhi High Court on Thursday freed up Nokia India's bank accounts, but its immovable assets, including its buildings and facilities in India, remain frozen. "We went to court, and got a ruling in our favor on Thursday—the bank accounts were unfrozen," Nokia spokesman Brett Young said. He declined to elaborate.

Cloud PCI Compliance: The Checklist
If your business stores, processes, or transmits payment cardholder data in the cloud, you are bound by PCI DSS. But unlike “brick and mortar” data centers that must also adhere to PCI DSS, those operating in the cloud have additional needs. For example, 6 of the 12 steps outlined by PCI DSS either require or are assisted by encryption of data. However, to securely encrypt in the cloud and comply with PCI DSS, you must keep control of the encryption keys. But as a cloud operation, can you keep your encryption keys in the cloud and at the same time keep them safe?

MoD plots new ‘laptop army' to combat cybercrime
"In response to the growing cyberthreat, we are developing a full-spectrum military cyber capability, including a strike capability, to enhance the UK's range of military capabilities," he said. "Increasingly, our defence budget is being invested in high-end capabilities such as cyber and intelligence and surveillance assets to ensure we can keep the country safe."

Redefining traceability in Enterprise Architecture
Traceable is an adjective; capable of being traced. Trying to find a definition even from a dictionary is a challenge and the most relevant one I found on Wikipedia which may be used as a reference could be “The formal definition of traceability is the ability to chronologically interrelate uniquely identifiable entities in a way that is verifiable.” In Enterprise Architecture, traceability may mean different things to different people.

7 sneak attacks used by today's most devious hackers
Today's most ingenious malware and hackers are just as stealthy and conniving. Here are some of the latest techniques of note that have piqued my interest as a security researcher and the lessons learned. Some stand on the shoulders of past malicious innovators, but all are very much in vogue today as ways to rip off even the savviest users.

Closing the IT communication gap with enterprise stakeholders
Investors look at rapid returns on investment, and IT looks for systemic changes, particularly for efficiency, but both groups have different expectations for each. David Linthicum and his guest Lisa Noon, vice president of Cloud Technology Partners, discuss how to close this cloud chasm. You'll also hear about announcements from Amazon Web Services (AWS) and Joyent.

Quote for the day:

"Determination gives you the resolve to keep going in spite of the roadblocks that lay before you." -- Denis Waitley

No comments:

Post a Comment