Quantcast
Channel: Morpheus Blog
Browsing all 1101 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Happy Apps - How to Prevent a Heroku Dyno from Idling

When one of your Heroku apps is accessed infrequently, it can take more than 20 seconds for it to spin out of idle mode. Keep the apps active by automatically pinging their servers, either by using a...

View Article


Image may be NSFW.
Clik here to view.

Upcoming OpenSSL Security Overhaul Is Long Overdue

The many OpenSSL vulnerabilities coming to light in recent months have motivated a thorough audit of the open system's code. But this hasn't prevented companies from implementing proprietary SSL...

View Article


Image may be NSFW.
Clik here to view.

MySQL vs. MongoDB: The Pros and Cons When Building a Social Network

Choosing the right database for a project is an extremely important step in planning and development. Picking the wrong setup can cost quite a bit of time and money, and can leave you with numerous...

View Article

Image may be NSFW.
Clik here to view.

New Compilers Streamline Optimization and Enhance Code Conversion

Researchers are developing compiler technologies that optimize and regenerate code in multiple languages and for many different platforms in only one or a handful of steps. While much of their work...

View Article

How Three Companies Improved Performance and Saved Money with MongoDB

Too often the increased efficiencies and performance improvements promised by new data technologies seem to vanish into thin air when the systems hit the production floor. Not so for these three...

View Article


Image may be NSFW.
Clik here to view.

The Key to Selecting a Programming Language: Focus

There isn't a single best programming language. Rather than flitting from one language to the next as each comes into fashion, determine the platform you want to develop apps for -- the web, mobile,...

View Article

Image may be NSFW.
Clik here to view.

MongoDB Poised to Play a Key Role in Managing the Internet of Things

Rather than out-and-out replacing their relational counterparts, MongoDB and other NoSQL databases will coexist with traditional RDBMSs. However, as more -- and more varied -- data swamps companies,...

View Article

Image may be NSFW.
Clik here to view.

Troubleshoot Lost MySQL Remote Connections

There aren't many MySQL databases that don't need to support users' remote connections. While many failed remote connections can be traced to a misconfigured my.cnf file, the many nuances of MySQL...

View Article


Image may be NSFW.
Clik here to view.

MongoDB 3.0 First Look: Faster, More Storage Efficient, Multi-model

Document-level locking and pluggable storage APIs top the list of new features in MongoDB 3.0, but the big-picture view points to a more prominent role for NoSQL databases in companies of all types and...

View Article


Image may be NSFW.
Clik here to view.

Preparing Developers for a Multi-language Multi-paradigm Future

Tried-and-true languages such as Java, C++, Python, and JavaScript continue to dominate the most popular lists, but modern app development requires a multi-language approach to support diverse...

View Article

Image may be NSFW.
Clik here to view.

Don't Go Into Elasticsearch Production without this Checklist

Elasticsearch is a great tool to provide fast and powerful search services to your web sites or applications, but care should be taken when moving from development to production. By following the...

View Article

Image may be NSFW.
Clik here to view.

Troubleshooting Problems with MySQL Replication

One of the most common MySQL operations is replicating databases between master and slave servers. While most such connections are straightforward to establish and maintain, on occasion something goes...

View Article

Image may be NSFW.
Clik here to view.

Avoid Being Locked into Your Cloud Services

Before you sign on the dotted line for a cloud service supporting your application development or other core IT operation, make sure you have an easy, seamless exit strategy in place. Just because an...

View Article


Image may be NSFW.
Clik here to view.

Don't Go Into Elasticsearch Production without this Checklist

Elasticsearch is a great tool to provide fast and powerful search services to your web sites or applications, but care should be taken when moving from development to production. By following the...

View Article

Image may be NSFW.
Clik here to view.

Avoid Being Locked into Your Cloud Services

Before you sign on the dotted line for a cloud service supporting your application development or other core IT operation, make sure you have an easy, seamless exit strategy in place. Just because an...

View Article


Image may be NSFW.
Clik here to view.

Three Different Approaches to Hardening MySQL Security

The new MySQL 5.7.6 developer milestone 16 features noteworthy security upgrades, but others propose more radical approaches to database security. One method puts applications in charge of testing and...

View Article

Image may be NSFW.
Clik here to view.

How to Minimize Data Wrangling and Maximize Data Intelligence

It's not unusual for data analysts to spend more than half their time cleaning and converting data rather than extracting business intelligence from it. As data stores grow in size and data types...

View Article


Image may be NSFW.
Clik here to view.

Don't Fall Victim to One of These Common SQL Programming 'Gotchas'

TL;DR: Even experienced SQL programmers can sometimes be thrown for an infinite loop -- or other code failure -- by one of the many pitfalls of the popular development platform. Get the upper hand by...

View Article

Image may be NSFW.
Clik here to view.

Don't Drown Yourself With Big Data: Hadoop May Be Your Lifeline

   TL; DR: The tremendous growth predicted for the open-source Hadoop architecture for data analysis is driven by the mind-boggling increase in the amount of structured and unstructured data in...

View Article

Image may be NSFW.
Clik here to view.

The SQL Vulnerability Hackers Leverage to Steal Your IDs, Passwords, and More

[TL:DR] The theft of hundreds of millions of user IDs, passwords, and email addresses was made possible by a database programming technique called dynamic SQL, which makes it easy for hackers to use...

View Article
Browsing all 1101 articles
Browse latest View live