{"id":6693,"date":"2013-03-27T12:45:00","date_gmt":"2013-03-27T12:45:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2593448"},"modified":"2013-03-27T12:45:00","modified_gmt":"2013-03-27T12:45:00","slug":"challenges-in-data-access-for-new-age-data-sources","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/challenges-in-data-access-for-new-age-data-sources\/","title":{"rendered":"Challenges in Data Access for New Age Data Sources"},"content":{"rendered":"<p>The Big Data and Cloud \u201cmovements\u201d have acted as catalysts for tremendous growth in fit-for-purpose databases. Along with this growth, we see a new set of challenges in how we access the data through our business-critical applications. Let\u2019s take a brief look at the evolution of these data access methods (and why we are in the mess we are in today).<br \/>\nBack in the \u201980s the development of relational databases brought with it a standardized SQL protocol that could be easily implemented within mainframe applications to query and manipulate the data. These relational database systems supported transactions in a very reliable fashion through what was called \u201cACID\u201d compliance (Atomicity, Consistency, Isolation, and Durability). These databases provided a very structured method of dealing with data and were very reliable. But ACID compliance also brought along lots of overheard process. Hence a downfall \u2013 they were not optimized to handle large transaction requests, nor could they handle huge volumes of transactions. To counteract this, we\u2019ve did some significant performance and throughput enhancements within data connectivity drivers that lit a fire under the SQL speeds and connectivity efficiencies.     <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2593448\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Big Data and Cloud \u201cmovements\u201d have acted as catalysts for tremendous growth in fit-for-purpose databases. Along with this growth, we see a new set of challenges in how we access the data through our business-critical applications. Let\u2019s take&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-6693","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=6693"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6693\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=6693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=6693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=6693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}