Oracle predicts: 2015 will be the year of Big Data

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Oracle predicts: 2015 will be the year of Big Data[/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]SmartDataCollective gives us the Big Data predictions of Neil Mendelson, a VP at Oracle in charge of Big Data and Advanced Analytics.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]

Tips for moving to NoSQL

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Tips for moving to NoSQL[/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Data getting too big to manage? Considering NoSQL? Forbes gives 3 tips that can help inform your migration strategy.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]

Gird your Droid!

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Gird your Droid![/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Ars Technica reports on a newly discovered Android Hijacking bug.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]

There’s a fifth browser?

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]There’s a fifth browser?[/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Who knew? Power users did. Ars Technica reports on Vivaldi, the “other” browser.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]

How encrypted is encrypted?

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]How encrypted is encrypted?[/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Ars Technical reports on two new attacks that can grab passwords, credit card numbers and other sensitive data from some transmissions protected by secure sockets layer and transport layer security protocols.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]