Quantcast
Channel: Morpheus Blog
Browsing all 1101 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Alternative Approaches to Assigning User Privileges in MySQL

Until more sophisticated User Role-type controls are added to MySQL, developers will have to use GRANT and REVOKE statements to manage user privileges, or the Administrative Roles options provided in...

View Article


Image may be NSFW.
Clik here to view.

Is MySQL the Right Tool for Your Job?

When searching for the right database to use for a particular application, you have a number of determinations to make. Depending on the structure of your data, how much data you have, how fast queries...

View Article


Image may be NSFW.
Clik here to view.

How to Ensure Peak Performance When Using Hash-based Sharding in MongoDB

Striking the perfect balance between write and query performance in a MongoDB database distributed between clustered servers depends on choosing an appropriate hash-based shard key. Conversely,...

View Article

Image may be NSFW.
Clik here to view.

When is MongoDB the Right Tool for Your Job?

With many tools available for information storage, sometimes it can be difficult to determine the best one to use for a particular case. Find out when MongoDB may be the right tool for the job.TL;DR:...

View Article

Image may be NSFW.
Clik here to view.

The Most Important Takeaways from MySQL Prepared Statements

Since MySQL both sends queries to the server and returns data in text format, the query must be fully parsed and the result set must be converted to a string before being sent to the client. This...

View Article


Image may be NSFW.
Clik here to view.

Diagnose and Optimize MySQL Performance Bottlenecks

A common source of MySQL performance problems is tables with outdated, redundant, and otherwise-useless data. Slow queries can be fixed by optimizing one or all tables in your database in a way that...

View Article

Image may be NSFW.
Clik here to view.

Overcoming Barriers to Adoption of Network Functions Virtualization

IT managers are equally intrigued by the promise of network functions virtualization, and leery of handing over control of their critical networks to unproven software, much of which will be managed...

View Article

Image may be NSFW.
Clik here to view.

When Do You Need ACID Compliance?

ACID compliance can be very beneficial in some situations, while others may not require it. Find out where you need ACID compliance and where you don't.TL;DR: One decision that must be made when...

View Article


Image may be NSFW.
Clik here to view.

How to Ensure Your SSL-TLS Connections Are Secure

Encryption is becoming an essential component of nearly all applications, but managing the Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates that are at the heart of most protected...

View Article


Image may be NSFW.
Clik here to view.

The Benefits of Virtual Appliances Expand to Encompass Nearly All Data Center...

Virtual appliances deliver the potential to enhance data security and operational efficiency in IT departments of all shapes, sizes, and types. As the technology expands to encompass ever more...

View Article

Image may be NSFW.
Clik here to view.

When One Data Model Just Won't Do: Database Design that Supports Polyglot...

The demands of modern database development mandate an approach that matches the model (structured or unstructured) to the nature of the underlying data, as well as the way the data will be used. Choice...

View Article

Image may be NSFW.
Clik here to view.

ETL: Teaching an Old Data Cleanup Tool New Tricks

The role of the traditional data-warehouse extract, transform, load function has broadened to become the foundation for a new breed of graphical business-intelligence tools. It has also spawned a...

View Article

Image may be NSFW.
Clik here to view.

The Best Database for Storing Cached Web Sites

If you need to store cached web sites, it is a good idea to begin with a database that is optimized for caching. What database is built to perform this sort of task?TL;DR: If you need to store cached...

View Article


Image may be NSFW.
Clik here to view.

Security Focus Shifts from Physical Servers to Cloud Services

Tying security to the data itself allows IT to defend against internal and external threats, and avoid never-ending patch cycles.TL;DR: Do you know where your organization's critical data is? As cloud...

View Article

Image may be NSFW.
Clik here to view.

How to Use MySQL Performance Schema to Fine-tune Your Database

Simple queries of Performance Schema tables can boost MySQL database performance without the heavy lifting.TL;DR: Identify indexes that are no longer being used, spot the queries that take longest to...

View Article


Image may be NSFW.
Clik here to view.

Java vs. JavaScript: And the Winner Is... Both?

The two popular development environments are expected to benefit from long-awaited new features in their upcoming releases.TL;DR: Long seen as rivals -- and often considered outdated -- Java and...

View Article

Image may be NSFW.
Clik here to view.

When to Replace a Database Column with an ID

Sometimes database tables grow and require some columns to be moved to a separate table. Find out when this may be a good idea!TL;DR: As a database table grows, certain columns can become candidates...

View Article


Image may be NSFW.
Clik here to view.

Pros and Cons of Database Normalization

To normalize or not to normalize? Find out when normalization of a database is helpful and when it is not.TL;DR: When using a relational database, normalization can help keep the data free of errors...

View Article

Image may be NSFW.
Clik here to view.

Is Scala the Development Environment of the Future, or a Programming Dead End?

The Scala development environment seems to have as many naysayers as it has ardent supporters. Yet the language's combination of object-oriented and functional programming features is being emulated in...

View Article

Image may be NSFW.
Clik here to view.

How the Internet of Things Will Affect Database Management

There's no denying the rise of the Internet of Things will challenge existing database systems to adapt to accommodate huge volumes of unstructured data from diverse sources. Some analysts question...

View Article
Browsing all 1101 articles
Browse latest View live