acid base

Results 1 - 5 of 5Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Dec 27, 2013
There are actually many elements of such a vision that are working together. ACID and NoSQL are not the antagonists they were once thought to be; NoSQL works well under a BASE model, but also some of the innovative NoSQL systems fully conform to ACID requirements. Database engineers have puzzled out how to get non-relational systems to work within an environment that demands high availability, scalability, with differing levels of recovery and partition tolerance. BASE is still a leading innovation that is wedded to the NoSQL model, and the evolution of both together is harmonious. But that doesn’t mean they always have to be in partnership; there are several options. So while the opening anecdote is true in many cases, organizations that need more diverse possibilities can move into the commercial arena and get the specific option that works best for them. This paper is sponsored by: MarkLogic.
Tags : 
nosql, database, acid v base, white paper
    
DATAVERSITY
Published By: MarkLogic     Published Date: Jun 16, 2013
The primary issue discussed within this paper boils down to two disparate database reliability models: ACID vs BASE. The first (ACID) has been around for some 30+ years, is a proven industry standard for SQL-centric and other relational databases, and works remarkably well in the older, yet still extant, world of vertical scaling. The second (BASE) has only recently gained popularity over the past 10 years or so, especially with the rise of social networking, Big Data, NoSQL, and other leviathans in the new world of Data Management. BASE requirements rose out of a need for ever-expanding horizontally scaled distributed networks, with non-relational data stores, and the real-time availability constraints of web-based transaction processing. While there are now more crossovers and negotiations between the two models, they essentially represent two competing groups, with Brewer’s CAP Theorem acting as the referee in the middle forcing tough decisions on each team.
Tags : 
data, data management, unstructured data, nosql, database, acid, base, database transactioning
    
MarkLogic
Published By: MarkLogic     Published Date: Nov 07, 2017
Business demands a single view of data, and IT strains to cobble together data from multiple data stores to present that view. Multi-model databases, however, can help you integrate data from multiple sources and formats in a simplified way. This eBook explains how organizations use multi-model databases to reduce complexity, save money, lessen risk, and shorten time to value, and includes practical examples. Read this eBook to discover how to: Get unified views across disparate data models and formats within a single database Learn how multi-model databases leverage the inherent structure of data being stored Load as is and harmonize unstructured and semi-structured data Provide agility in data access and delivery through APIs, interfaces, and indexes Learn how to scale a multi-model database, and provide ACID capabilities and security Examine how a multi-model database would fit into your existing architecture
Tags : 
    
MarkLogic
Published By: McAfee     Published Date: May 19, 2014
A medida que la tecnología de firewall de próxima generación (NGFW - next-generation firewall) se convierte en más convencional, es el momento de revisar las capacidades y funciones avanzadas que separan a los líderes de los rezagados. En su forma más básica, el consenso de una definición de NGFW incluiría estas capacidades: funciones estándares de firewall como la inspección de estado y la traducción de direcciones de red, prevención de intrusiones integrada, control de aplicaciones y un cierto nivel de inteligencia e integración con bases de datos de vulnerabilidad y reputación.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusos, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti, security, it management
    
McAfee
Published By: Vertica     Published Date: Mar 15, 2010
Revenue assurance analysts at a top-tier US-based carrier studied this every day. Primarily focused on detecting fraud, revenue sharing contract violations and incomplete revenue collections, they had the need to query and analyze call detail record (CDR) databases that grow by millions of new CDRs every day.
Tags : 
vertica, ec2, cdr, elastic, saas, dbms, sql, acid transactions, jdbc, odbc, etl, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms
    
Vertica
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept