Big Data Deployment Models: Open v. Proprietary, Commodity v. Built

In an earlier blog post, I discussed some architectural options in deploying a big data environment, including cloud vs. on-premises, and dedicated vs. shared infrastructure. In this post, I'll examine topics that may be even more divisive: open vs. proprietary software and commodity vs. purpose-built hardware. These choices seem to reflect personal philosophies as much as technological differences.

Topics: Analytics Big Data Hadoop Apache open source

Oracle Strikes Back

IT is a global game of king of the mountain. The view is lovely from the top, but everyone else is looking to pull you down with new innovations in products, better services, and disruptive go-to-market strategies. Oracle has long held the crown for databases and a number of related business applications, yet is surely feeling some pressure from the ravenous hordes below. Two popular angles of attack have been in-memory and/or NoSQL databases. The goal of players such as Amazon (with DynamoDB), Apache Cassandra, MemSQL, MarkLogic, MongoDB, NuoDB, and many others has been to differentiate on the capabilities of their newer platforms to hopefully displace, or more likely find a niche alongside, the popular Oracle database. Even other industry titans like IBM (with DB2 BLU Acceleration) and Microsoft (with SQL Server 2014) have brought in-memory options to market with great fanfare.

Topics: IBM Microsoft Big Data Data Management & Analytics Hadoop Enterprise Software Oracle Amazon NoSQL Cloudera Apache MemSQL MongoDB

The Emerging Cybersecurity Software Architecture

It’s been a busy week for the information cybersecurity industry. FireEye announced the acquisition of nPulse which adds network forensics to its advanced malware detection/response portfolio. IBM chimed in with a new Threat Prevention System that includes an endpoint security client, threat intelligence feeds, and integration with its network security, and analytics platforms. Finally, Symantec unveiled its Advanced Threat Protection strategy that combines existing products, future deliverables, and services.

It’s no coincidence that these three infosec security leaders are moving in this direction as the whole industry is on the same path. I’ve written about this trend a few times. I wrote a security-vendors-are-racing-toward-a-new-anti-malware-technology-model/index.html" target="_blank">blog about the integrated anti-malware technology model in March, and this the-new-cybersecurity-technology-reality-the-whole-is-greater-than-the-sum-of-its-parts/index.html">one in April about the new cybersecurity technology reality. Other vendors such as Blue Coat, Cisco, McAfee, Palo Alto Networks, and Trend Micro are also on board.

Topics: IBM Microsoft Check Point Palo Alto Networks Cisco Information and Risk Management FireEye HP McAfee Oracle Security and Privacy Security Apache SIEM Mitre Kaspersky ERP Raytheon Proofpoint Lockheed IDS E&Y Leidos Booz Allen Accenture Blue Coat AV CSC Anti-malware