Quantcast
Channel: Morpheus Blog
Browsing all 1101 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Redis Replication vs Sharding

With Redis, you can use replication, sharding, or both. Find out how each one can help your database.TL;DR: When running a Redis database (or any database for that matter), it is a good idea to have...

View Article


Image may be NSFW.
Clik here to view.

Code Sharing Services Keep Pace with Application Development Trends

 Code sharing reaches new levels with these services that flatten the app-development flow chart via reusability to the nth.TL;DR: Go beyond copying and pasting chunks of code by using these services...

View Article


Image may be NSFW.
Clik here to view.

Three Ways to Search Smarter in MySQL

 Add relevant search results, expand your search to all fields in a database, and run "fuzzy" searches in MySQL.TL;DR: The bigger and more complicated the database, the more talented its search...

View Article

Image may be NSFW.
Clik here to view.

Make Sure to Do these Things Before Going Into Production with MongoDB

When using MongoDB in production, there are a number of recommendations to consider that can be quite helpful with issues such as performance, availability, and security. Some of the key considerations...

View Article

Image may be NSFW.
Clik here to view.

Happy Apps - How to Prevent a Heroku Dyno from Idling

When one of your Heroku apps is accessed infrequently, it can take more than 20 seconds for it to spin out of idle mode. Keep the apps active by automatically pinging their servers, either by using a...

View Article


Image may be NSFW.
Clik here to view.

Upcoming OpenSSL Security Overhaul Is Long Overdue

The many OpenSSL vulnerabilities coming to light in recent months have motivated a thorough audit of the open system's code. But this hasn't prevented companies from implementing proprietary SSL...

View Article

Image may be NSFW.
Clik here to view.

MySQL vs. MongoDB: The Pros and Cons When Building a Social Network

Choosing the right database for a project is an extremely important step in planning and development. Picking the wrong setup can cost quite a bit of time and money, and can leave you with numerous...

View Article

Image may be NSFW.
Clik here to view.

New Compilers Streamline Optimization and Enhance Code Conversion

Researchers are developing compiler technologies that optimize and regenerate code in multiple languages and for many different platforms in only one or a handful of steps. While much of their work...

View Article


How Three Companies Improved Performance and Saved Money with MongoDB

Too often the increased efficiencies and performance improvements promised by new data technologies seem to vanish into thin air when the systems hit the production floor. Not so for these three...

View Article


Image may be NSFW.
Clik here to view.

The Key to Selecting a Programming Language: Focus

There isn't a single best programming language. Rather than flitting from one language to the next as each comes into fashion, determine the platform you want to develop apps for -- the web, mobile,...

View Article

Image may be NSFW.
Clik here to view.

MongoDB Poised to Play a Key Role in Managing the Internet of Things

Rather than out-and-out replacing their relational counterparts, MongoDB and other NoSQL databases will coexist with traditional RDBMSs. However, as more -- and more varied -- data swamps companies,...

View Article

Image may be NSFW.
Clik here to view.

MongoDB 3.0 First Look: Faster, More Storage Efficient, Multi-model

Document-level locking and pluggable storage APIs top the list of new features in MongoDB 3.0, but the big-picture view points to a more prominent role for NoSQL databases in companies of all types and...

View Article

Image may be NSFW.
Clik here to view.

Preparing Developers for a Multi-language Multi-paradigm Future

Tried-and-true languages such as Java, C++, Python, and JavaScript continue to dominate the most popular lists, but modern app development requires a multi-language approach to support diverse...

View Article


Image may be NSFW.
Clik here to view.

Don't Go Into Elasticsearch Production without this Checklist

Elasticsearch is a great tool to provide fast and powerful search services to your web sites or applications, but care should be taken when moving from development to production. By following the...

View Article

Image may be NSFW.
Clik here to view.

Troubleshoot Lost MySQL Remote Connections

There aren't many MySQL databases that don't need to support users' remote connections. While many failed remote connections can be traced to a misconfigured my.cnf file, the many nuances of MySQL...

View Article


Image may be NSFW.
Clik here to view.

Troubleshooting Problems with MySQL Replication

One of the most common MySQL operations is replicating databases between master and slave servers. While most such connections are straightforward to establish and maintain, on occasion something goes...

View Article

Image may be NSFW.
Clik here to view.

Avoid Being Locked into Your Cloud Services

Before you sign on the dotted line for a cloud service supporting your application development or other core IT operation, make sure you have an easy, seamless exit strategy in place. Just because an...

View Article


Image may be NSFW.
Clik here to view.

Don't Go Into Elasticsearch Production without this Checklist

Elasticsearch is a great tool to provide fast and powerful search services to your web sites or applications, but care should be taken when moving from development to production. By following the...

View Article

Image may be NSFW.
Clik here to view.

Avoid Being Locked into Your Cloud Services

Before you sign on the dotted line for a cloud service supporting your application development or other core IT operation, make sure you have an easy, seamless exit strategy in place. Just because an...

View Article

Image may be NSFW.
Clik here to view.

Three Different Approaches to Hardening MySQL Security

The new MySQL 5.7.6 developer milestone 16 features noteworthy security upgrades, but others propose more radical approaches to database security. One method puts applications in charge of testing and...

View Article
Browsing all 1101 articles
Browse latest View live