In-Memory Queries

In-Memory Queries Explained   Traditionally relational databased used disk to process data for a query operation. In effect, this meant that if a query was run against a large database, the...

Insider Threats Explained

Insider threats are security threats to business information systems that come from people within their own organisation. The source of an insider threat comes from existing employees, former...

Integrated Systems

Integrated Systems , is a generic term which is used to describe the close physical grouping of the core elements of a datacentre in a software-centric architecture. Integrated systems bring...

IT Vendor Lock-In Explained

Vendor lock-in is a situation in which IT departments are unable to easily switch or migrate to different/newer technologies or services provided by a different vendor due to various reasons, such...

© Asia Online Publishing Group Sdn Bhd 2017
Powered by