The Evolving Open Source Database Landscape

October 2017
Database Trends & Applications;Oct/Nov2017, Vol. 31 Issue 5, p21
The article discusses the evolution of open source deployments in the database landscapes in order to ensure mobility and flexibility in maintaining application and web use. It mentions various developing areas in the database landscape which includes cloud based solutions, full machine virtualization of containers and data security and encryption. It also states the adoption of automation in order to optimize performance for dashboarding, implement data analytics and manage metadata.


Related Articles

  • How The Heartbleed Bug Cut Through The Web. Crookes, David // Micro Mart;4/24/2014, Issue 1308, p6 

    The article provides information on the data encryption flaw called Heartbleed that was linked to the encryption software OpenSSL. Topics discussed include how the bug in the secure sockets layer (SSL) software jeopardizes data security, the establishment of the website www.heartbleed.com to...

  • How to fix internet security now the Heartbleed genie is out of the bottle. Ashford, Warwick // Computer Weekly;4/22/2014, p4 

    The article focuses on the internet security vulnerability Heartbleed in the open-source secure sockets layer (SSL) OpenSSL and what businesses should do to restore internet security on their websites. It explains which versions of OpenSSL are affected by the Heartbleed vulnerability with...

  • 5 CLOUD SECURITY COMPANIES TO WATCH. Burns, Christine // Network World;10/10/2011, Vol. 28 Issue 18, p30 

    The article presents companies related to cloud computing security along with their product offering, product costs, and head of the company. It reports that these companies exist to address the issues such as the protection of virtual machine and encryption of data. It features companies...

  • TREAD CAREFULLY. Shackleford, Dave // Information Security;Jun2012, Vol. 14 Issue 5, p29 

    The article presents information on data protection in cloud computing. It mentions the challenges faced by organizations while dealing with the virtual systems and ways to protect data in cloud computing including data encryption, data loss prevention (DLP) technology and approaches to data...

  • Remote Attestation Based on CP-ABE Algorithm. Yong Zhao; Junxi Zhuang; Yanxue Zhang // Journal of Applied Sciences;2013, Vol. 13 Issue 22, p5516 

    Remote attestation and CP-ABE (ciphertext policy-attribute based encryption) algorithm are Independent of each other. In this study, by the analysis and comparison of existing remote attestation technology and CP-ABE algorithm, we propose a remote attestation scheme based on the CP-ABE...

  • CRYPTOGRAPHIC KEY MANAGEMENT IN CLOUD COMPUTING. OGÎGĂU-NEAMŢIU, Florin // Proceedings of the Conference on Defense Resources Management in;2015, p225 

    Cloud security has gained increasingly emphasis in the research community, with much focus primary concentrated on how to secure the operation system and virtual machine on which cloud system runs on. Companies considering moving to a cloud based infrastructure need to understand various aspects...

  • Secure Data Access control in Cloud Environment. Praveen Babu, G.; Sushma Rao, B. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p1734 

    Cloud computing is most prevalent technology used in various organizations. It provides wide range of applications that are useful for various business needs. It provides the facility to store and access the data from any place around the world across distributed network environment. Data stored...

  • Encryption Techniques for Cloud Data Confidentiality. Soofi, Aized Amin; Khan, M. Irfan; Fazal-e-Amin // International Journal of Grid & Distributed Computing;2014, Vol. 7 Issue 4, p11 

    Cloud computing is one of the fastest growing internet based technology that facilitates users to utilize services by making use of large poll of resources without installation of any software. Adoption of this technology is increasing rapidly because of many advantages including reduction of...

  • Performance Evaluation of Private Clouds Eucalyptus versus CloudStack. Ali AL-Mukhtar, Mumtaz M.; Ali Mardan, Asraa Abdulrazak // International Journal of Advanced Computer Science & Application;May2014, Vol. 5 Issue 5, p108 

    the number of open source cloud management platforms is increasing day-by-day. The features of these software vary significantly and this creates a difficulty for the cloud consumers to choose the software based on their business and scientific requirements. This paper evaluates Eucalyptus and...

  • Will Open-Source Docker Revolutionize Cloud Virtualization? Kerner, Sean Michael // eWeek;3/21/2014, p5 

    The article looks at the potential of Docker open-source virtualization container technology project to revolutionize cloud virtualization. It cites the project's celebration of its one-year anniversary on March 20 and the expected significant growth of the project in 2014. It also notes the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics