News from Vendors

How to Build a Cloud Data Lake You Can Trust

Informatica Blog - Tue, 08/21/2018 - 19:15
When I was at Informatica World 2018 in May, I had the chance to talk to a lot of our customers. Whether I was speaking with IT leaders, business leaders, or both, one of the most common challenges that came up was how to build a cloud-based data lake the right way. In short, the problem was, “How do I stop a data lake from turning into a data swamp?” As enterprise IT has geared up to grapple with big data in the last few years, many have embraced the idea of a cloud data lake: a theoretically e...
Categories: News from Vendors

AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA

Syncsort Blog - Tue, 08/21/2018 - 13:30
Syncsort recently acquired the IBM i encryption and security products of Townsend Security. The article below is an update to their popular blog post comparing AES and DES encryption. Every so often, we encounter someone still using antiquated DES for encryption.  If your organization hasn’t switched to the Advanced Encryption Standard (AES), it’s time for an upgrade. To better understand why: let’s compare DES and AES encryption: Data Encryption Standard (DES) What is DES encryption? DES is a s...
Categories: News from Vendors

IBM POWER vs. x86: The Key Differences

Syncsort Blog - Mon, 08/20/2018 - 13:30
What makes System i different from other platforms? A large part of the answer lies in the CPU architectures that System i servers use: System i relies on IBM POWER microprocessors, whereas most other modern computers and servers use the x86 architecture. And just what does System i’s use of POWER chips mean? Let’s take a look at the major factors that distinguish the POWER architecture from x86. History: IBM POWER vs. x86 Although the origins of the POWER architecture and x86 CPUs b...
Categories: News from Vendors


Subscribe to Data Integration Info aggregator - News from Vendors