<
>

In-Memory Queries Explained

In-Memory Queries Explained   Traditionally relational databases use disk to process data for a query operation. In effect, this meant that if a query was run against a large database, the data that needed to be pulled...

Don’t rely on the router provided by your internet provider

Described as a networking device that forwards data packets between computer networks, the routers of today needs more than just those basic functions to assist the small to medium businesses. Security and reliability is just as,...

Cybercrime: an unprecedented threat to society?

Author: Raymond Goh, Head of Systems Engineering, Asia & Japan, Veeam   2017 has brought to the surface an astonishing number of cybercrime – these incidences have been dominating media headlines with high...

Unlocking Asean Connectivity Via Hybrid Cloud

Author: Ron Goh is President, Southeast Asia and Korea at VMware Back when the Asean Economic Community (AEC) unveiled its 2015 targets, it was music to all of us. Free flow of services and skilled labor, free flow of...

Provenance and Blockchain

Author: Hu Yoshida, Chief Technology Office, Hitachi Data Systems Recently, two Harvard researchers stunned the experts with the discovery of a second parchment copy of the United States Declaration of Independence in the...

10 Lessons from The Equifax Breach

Author: Rick McElroy, Security Strategist, Carbon Black When we see a car wreck it’s very easy to slow down and gawk. The first thing we think is “Wow, that’s awful,” quickly followed by...