Category Archives: Uncategorized

What’s new in MongoDB – 2.6

MongoDB recently released version 2.6. This is a major release with significant improvements in performance, manageability, security and availability areas. As per the vendor, this release also builds the foundation of the much-talked MongoDB concurrency to be available in the next 2.8 release.

Here I’ve mentioned some areas that interested me. Please refer the complete release note from vendor’s website for more details.

  • Aggregation related enhancements – Now there is no restriction on the size of result set returned by the aggregation pipeline. Aggregation now can return cursor or write output to a collection. Aggregation framework now also started supporting variables.
  • Query optimizer improvements – This may be the most noticeable improvement in the 2.6 release. Query planner engine is completely rewritten to improve performance and scalability. New features like index intersection are introduced that now can use more than one index to determine the best query execution plan. Index filters and query plan cache methods add more sophistication to the query plan engine.
  • Index related enhancements – Now, secondaries can build indexes in the background. With this enhancement, now you can build indexes (in the background) in the secondaries – letting the indexing operation available to be used for other operations. Previously, this was possible only for primaries. Another improvement is the ability to resume interrupted index builds.
  • Storage related – This version uses PowerOf2Sizes as default allocation strategy for all new collections. Though this strategy will take more storage space, this will result in lower levels of storage fragmentation and more predictable storage capacity planning.
  • Security related – MongoDB 2.6 claims several security related enhancements including improved SSL support, improved authorization system with more granular controls, centralized credential storage and improved user management tool.
  • Search related – Text search is enabled by default in 2.6. The new operator $text in the aggregation framework will search the text data on the content of fields indexed on a text index.

 

Additional Read / Reference

MongoDB Blog

http://blog.parse.com/2014/03/25/mongodb-2-6-production-release-highlights/

 

 

 

 

 

 

 

Advertisements

The NoSQL Question

How the NoSQL technologies are shaping up in 2014?NoSQL Question

Few weeks before, I’ve provided an overview on NoSQL databases mentioning the key features, classifications and use cases. Coming back to this topic today, I’m summarizing the key trends that Pundits are noticing with respect to the NoSQL technologies in 2014 and beyond.

  • NoSQL is racing – The NoSQL database market is expected to grow at a compound annual growth rate of nearly 60% till 2017*. Major enterprises are already putting NoSQL datastores in key line of business applications.
  • It’s about use case  – NoSQL technology is filling the gap for many applications where transaction consistency concern is secondary to scalability, agility, variability and performance gains. There is no one-size-fits-all approach here. Each NoSQL database is fit to serve a particular business case.
  • Hybrid ecosystem – Now it is about managing all data, not only Big Data. Enterprise is looking for a data hub – a hybrid ecosystems where all data will be stored from everywhere. In this hybrid ecosystem both relational and non-relational data stores coexist, correlate and complement each other (called polyglot persistence).
  • Renewed focus on security – Customers are demanding tighter security and data protection. To address this, database vendors are offering features like Transparent data encryption (TDE), file/block level encryption, de-identification techniques for data masking, and process-based access control lists (ACLs).
  • Marrying with cloud – Pushing databases into the cloud is going to be mainstream. NoSQL databases are perfect fit for the cloud, relational databases are catching up too.
  • Bridge the gap with SQL – You cannot ignore SQL language! Many vendors are trying to bridge the gap between SQL and NoSQL code – offering ways to write SQL syntax on the top and giving cross-node scalability with support for SQL queries and even providing ACID capabilities. Example: FoundationDB.
  • Focus on data virtualization – Data Virtualization is expected to gain more importance in the hybrid ecosystem where several disparate, multi-layered data sources physically coexist.
  • Consolidations on the way – More M&A are expected to consolidate the NoSQL market.

What you are thinking? Let me know and I’ll add to the list.

Further reading / related articles:

  • Top Trends in Database Management – White Paper By Patric Gates (datAvail)- Feb 2013
  • Trends in Big Data a Forecast for 2014 –  CSC : http://goo.gl/lReYzb
  • 5 Big Business Intelligence Trends For 2014 – InformationWeek : http://goo.gl/kUzn5B

* source: Silicon Angle 2013

Life after the Target breach – 5 Proactive steps we should take Now!

Identity theftLast month’s Target data breach has put about 100 million people at risk, and unsettled rest of us, too.

This has included credit and debit card information of 40 million customers, along with personal details of 70 million people.

In response, Target has sent an email to all potentially affected customers offering a year’s worth of free credit monitoring and identity theft insurance.

Whether you accept this offer or not (in case you have received the email from Target), you should definitely take some proactive steps right now – if you have not taken already. Here are the five steps that will give you peace of mind and will not cost you a dime!

  1. Cancel your affected credit card – You can definitely cancel your credit or debit card (if you still have not done so!) that you have used in the Target store during the holiday season. While this is definitely a huge inconvenience, the good news is doing so shouldn’t hurt your credit score!
  2. Beware of frauds – Scammers will definitely use this incidence to take advantage. This will sound no-brainer but please do not give your credit card or debit card information to anyone who calls you on the phone or to a site you don’t know. Be extra suspicious on any phone call or email claiming that your card has been compromised and you need to provide all your information again. I’ve got a similar phone call last week ! Always communicate directly with the bank using the contact information on their website.
  3. Get your free Credit report – Federal law allows you to access your credit reports for free from each of the three main credit reporting agencies (Equifax, Experian and TransUnion). You can get one from each, every rolling 12 months. Go to AnnualCreditReport.com or call 877-322-8228 to request for your free credit reports. Once received, carefully review each of them. If you notice any fraudulent activity, immediately call the agency to get this corrected.
  4. Get free credit monitoring – Credit monitoring checks your credit reports daily and send you alert if any activity has occurred. Many providers charge $10-$20 a month but some offers the basic monitoring service for free. Examples:                                                                               Credit Sesame – You can get free daily credit monitoring based on your Experian credit report.     Credit Karma – Daily credit monitoring service based on the TransUnion credit report.
  5. Put a review system in place – Remember, this is not a one time fix and things will not stop with the Target breach. Putting a vigilance in place is a very important financial resolution we can take for this year (hey, this is still January!). Part of this is scheduling a time to carefully review each of our card statements every month. It may also be a good idea to set some alert using the bank’s mobile app for any card transaction exceeds a certain limit.

Note that under both the Fair Credit Billing Act (FCBA) and the Electronic Fund Transfer Act (EFTA), we have protections from situations like when credit cards and debit cards are stolen. While it’s Target that lost the data and we shouldn’t be liable for any fraudulent transactions, that doesn’t mean that it won’t be a headache to us if our accounts are compromised. The best course of action for us is to be proactive and put a regular review system in place.

What is waiting in 2014?

Happy New Year to all of you!

Being that this is my first blog post in 2014, I’d like to handpick few recent posts predicting the future of technology trends in the year 2014 and beyond.

IDC predicts that 2014 will be heavily influenced by the “3rd Platform” – the emerging platform for growth and innovation built on mobile computing, cloud services, big data analytics, and social networking. Read their 10 predictions here.

International Institute For Analytics (IIA) recaps the analytic landscape in 2013 and does nine analytic predictions for 2014. Go to the link of the webinar featuring those predictions.

From mashable, read this interesting post on 7 huge technology trends to be expected in 2014 here.

What do you expect to see in 2014? Let me know in the comment.