Database Popularity Index

Have a look at Red9’s Database Popularity Index, which is updated now on a monthly basis.  Last year I blogged about a similar study.

One thing that is still mind-boggling to me is the total number of different database engines – over 300!  I know there is a constant need for better and more powerful databases, but 300?  Sounds like too much to choose from.

One other thing that I find slightly surprising is the popularity of the Microsoft Access.  Really?  With so much to choose from, people still stay with Access?  What am I not getting here?

Is VPN Legal in Your Country?

TheBestVPN.com published a study of whether or not VPNs are legal in 196 countries around the world.  There is a summary for each, and some links to details of the research.

VPNs are legal, generally.

It depends largely on the country you’re physically sitting in while using a VPN. But even then, their laws and restrictions are often opaque.  What’s legal vs. illegal is not always clear.  Some activities, while frowned upon, are still shrouded in grey area.  In this research we fact-checked 196 countries laws and their opinions on VPNs.

VPNs are illegal in: China, Turkey, Iraq, United Arab Emirates, Belarus, Oman.

VPNs are some-what illegal in: Iran, North-Korea, Turkmenistan.

P.S.: If you can’t access the links above, VPN is probably illegal (or at least blocked) in your country or region.

Domain names and web hosting research

Web Hosting Geeks published a very extensive research into domain names and web hosting provider options.  It includes the analysis of domain name trends by TLD, as well as over 24,000 hosting companies and how they are doing.

Complete with reviews, and detailed stats about each and every company, I think, this is one of the most complete and in-depth data I’ve seen for a long time.

Docker Image Vulnerability Research

Federacy has an interesting research in Docker image vulnerabilities.  The bottom line is:

24% of latest Docker images have significant vulnerabilities

This can and should be improved, especially given the whole hierarchical structure of Docker images.  It’s not like improving security of all those random GitHub repositories.

World’s Biggest Data Breaches

Here’s an interactive collection of the world’s biggest data breaches.  It goes back to 2004, where about 92,000,000 email addresses and screen names were stolen by an AOL employee, and covers most of the major events up until and including 2016.  There are a few ways to filter the data and change the representation.

Overall, should give you a pretty good idea of how safe and secure your online data is. Oh, and how private it is too.

Getting started with workflows in PHP

For a large project at work, we need to integrate or develop a workflow engine.  I worked a little bit with workflow engines in the past, but the subject is way to big and complex for me to claim any expertise in it.

So, I am looking at what’s available these days and what are our options.  This post is a collection of initial links and thoughts, and it’s goal is mostly to document my research process and findings, and not to provide any answers or solutions yet.

Continue reading “Getting started with workflows in PHP”

Social Media Research Toolkit

Social Media Research Toolkita list of 50+ social media research tools curated by researchers at the Social Media Lab at Ted Rogers School of Management, Ryerson University. The kit features tools that have been used in peer-reviewed academic studies. Many tools are free to use and require little or no programming. Some are simple data collectors such as tweepy, a Python library for collecting Tweets, and others are a bit more robust, such as Netlytic, a multi-platform (Twitter, Facebook, and Instagram) data collector and analyzer, developed by our lab. All of the tools are confirmed available and operational.

Via Four short links: 14 Feb 2017.