HomeDatabase

Database

Carbon Black Software Review

Carbon Black (security through big data and analytics in the cloud). Company description: Carbon Black, headquartered in Waltham, Mass., is a provider of next-generation endpoint...

Microsoft Sharpens SQL Operations Studio’s Job Management Tools

Microsoft has released a new version of SQL Operations Studio, borrowing key features from SQL Server Management Studio (SSMS), including the ability to track...

How Compuware is Bringing Agile, DevOps to Mainframe Development

Compuware is intent upon bringing the new-gen discipline of continuous iteration of software development to the old-school mainframe world, and it isn’t afraid to...

New MarkLogic Service Automates DB Query Capacity in Cloud

MarkLogic, the NoSQL database that helped solve the online registration snafu of Healthcare.gov, the Affordable Care Act website, in 2014, on July 17 launched...

Oracle Launches Its Blockchain Cloud Service to GA

Oracle, in its latest step to move its franchise to cloud services, launched its Oracle Blockchain Cloud Service July 16 to general availability. It...

Microsoft Azure SQL Data Warehouse Gets a Speed Boost

Businesses that have placed their big data and analytics workloads on Azure SQL Data Warehouse should observe improved performance courtesy of a recent enhancements...

Microsoft SQL Server 2008 Support Extended for Cloud Migrations

In a little less than a year, Microsoft will end support for SQL Server 2008 and 2008 R2. But businesses looking to eke a...

Snowflake Launches Data Warehouse on Azure, Despite MS’s Own DW

Here’s a business situation to think about: What if on a hot summer day your kid had a lemonade stand on a busy corner...

IT Science Case Study: How Tommy Hilfiger Created Its Digital Showroom

Here is the latest article in a new eWEEK feature series called IT Science, in which we look at what actually happens at the intersection...

Startup Hopzero Launches Distance-Based Packet Security Service

Most IT people don’t know anything about this, but there is yet another way to approach enterprise security outside of network-centric, workload-centric, file-centric, VM-centric...