May 14, 2024

Improving LLM Fidelity with Retrieval Augmented Generation using pgvector

Large language models (LLMs) have taken the world by storm, wowing us with their ability to generate remarkably human-like text. But for all their prowess, these AI marvels still face major roadblocks – especially when...

August 16, 2023

10 Considerations for Architecting a Multi-Cloud Database

Thinking about architecting a multi-cloud database? It’s an increasingly common topology nowadays. The adoption rate of a multi-cloud approach has been growing fast for years. It’s a solid option for a disaster recovery plan (DRP)...

October 6, 2023

Best Practices for Scaling A Multi-Cloud Database Infrastructure

Scaling a multi-cloud database infrastructure can be a complex and challenging task, but it's essential for businesses that require high scalability, availability, and reliability. With multi-cloud becoming increasingly popular, organizations are leveraging the benefits of...

December 8, 2023

What’s new in SQL Server 2022

SQL Server 2022 is the latest database version released by Microsoft in November 2022. The release builds upon previous versions to add more choice for SQL Server users when it comes to development languages, data...

Categories
Products
Technologies
Top Rated docs

March 23, 2021

Tips and Tricks for Implementing Database Role-Based Access Controls for MariaDB

In a database management system (DBMS), role-based access controls (RBAC), is a restriction on database resources based on a set of pre-defined groups of privileges and has become one of the main methods for advanced...

March 22, 2021

Architecting for Security: A Guide for MySQL

Security is paramount today across the whole of IT. From time to time we hear about ransomware attacks or data leaks that have their origin in not secured databases or IT infrastructure. You may wonder:...

March 17, 2021

Database Encryption: Why and Where You Need to Have Data Encryption

Database encryption provides enhanced security for your at-rest and in-transit data. Many organizations have started to look at data encryption seriously with recent security breach cases. In most cases, database servers are a common target...

March 16, 2021

The DevOps Open-Source Database Audit Manual – Everything You Should Know

Auditing is the monitoring and recording of selected user database actions. It is typically used to investigate suspicious activity or monitor and gather data about specific database activities. For example, the database administrator can gather...

March 12, 2021

Database Security 101: Security in Open Source Databases

Data security is one of the most significant aspects of administering a database. Depending on the organizational structure, if you are managing the production database, you must monitor for unauthorized access and usage. This also...

March 11, 2021

Database Security 101: Understanding Database Access Privileges

Data is the new gold for big companies and organizations It's considered as the lifeblood of most modern businesses and there's a bonanza of opportunities to sell or to market to the large audience of...

March 10, 2021

COVID-19 Cyber Attacks Call for you to Backup Securely

The COVID-19 pandemic has had its fair share of influence on world media but of interest is the sheer amount of cyber attacks that have escalated since it began. Interestingly enough, is news of a...

March 9, 2021

Standardizing PostgreSQL Security Across Multi-Cloud Environments

Multi-Cloud Environment is a common topology and even recommended for a Disaster Recovery Plan (DRP), but the security could be a risk here as you need to add to the common security checks an extra...

March 8, 2021

Security Considerations for MariaDB Deployments on Hybrid Cloud Environment

Hybrid cloud can be a great way of adding flexibility to your existing on-prem deployments. As we discussed in several blogs, public cloud can be a great addition to your own datacenter, ensuring you can...

March 3, 2021

How to Encrypt Hybrid Cloud Database Traffic

A secure database environment is hard to achieve, but extremely important in order to avoid data breaches, ransomware and other malicious activity. Security of data is a top priority from a business standpoint. When running...

February 24, 2021

Hybrid Cloud vs Full Public Cloud – Pros & Cons

Technology consumers and users have embraced cloud computing ever since its boom.  It implicates a very beneficial part nowadays to the technology on how humans use and interact with technology, especially the advent of IoT...

February 23, 2021

How to Keep a Hybrid Cloud Environment Secure

Having a Hybrid Cloud Environment is a common topology for a Disaster Recovery Plan (DRP), or even to have redundancy on your systems, but there are some security considerations to take into account before implementing...

Subscribe below to be notified of fresh posts