PODCAST:
In this week's episode we discuss the about 7,000 leaked facebook documentes. It reveals how Facebook used and abused developers, cut off data to competitors, gave privileged access to its friends and used a "pivot to privacy" as camouflage. The team also talks about party manifestos in wake of the upcoming election.
PODCAST:
In this podcast, learn how Apache Hive is impacting the Hadoop community. Discover Hive's components and capabilities, whether Hive is a viable substitute for the existing warehouse infrastructure, the limitations of this tool, and more.
VIDEO:
As the volume and variety of data increases, it becomes harder to ensure trustworthiness, and placing confidence in this information becomes risker. In order to effectively leverage analytics to glean actionable insights from big data, you need to be able to trust that information -- in other words, it must be properly integrated and governed.
WEBCAST:
In this fascinating video, learn about a high capacity, high speed, energy efficient storage solution that's capable of reducing the cost of storage capacity and can also be used to improve enterprise computing.
WEBCAST:
Tune in to this fascinating webcast, in which Paul Zikopoulos and Chris Eaton talk about DB2 with BLU Acceleration, chip-level register tweaks, optimization of data pipelines, and SIMD processing for DB2 10.5 on Power. Discover how to de-stress your database and find out why DB2 has been the top performing system for power since 2005.
WEBCAST:
The following webcast outlines how to gain the most from your BI and goes over an all-inclusive and intuitive approach to get a firm grasp on the "big picture."
WEBCAST:
This webcast takes an in-depth look at IBM Power Systems as an advanced virtualization platform for streamlined cloud deployment. Learn more about the RAS features scalability and performance capabilities.
PODCAST:
In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.