Eliminating Redundant Indexes

Reclaiming Space

Recently I was called into a shop that had a 4 terabyte database, who claimed they didn’t have anywhere near that much data. Upon investigation, they were correct. They had about 100 gig of data, and about 3.9 T of indexes. Is this too much? Well, in order to make that kind of judgement call […]

READ MORE

On-Prem vs Cloud – Where Should You Put Your Data?

For many businesses, it is hard to determine whether online or on-premises storage is the right choice. There are many considerations to take into account, including their benefits and challenges. Let’s analyze both options to help companies decide on the correct option. What is Cloud Software? Cloud solutions allow companies to manage, store and access […]

READ MORE
database management systems durability

What is Durability in Databases Management Systems?

Durability is the property that makes sure that transactions are permanently stored and do not disappear or are erased by accident, even during a database crash. It is accomplished by storing all transactions into a non-volatile storage medium. Durability is part of the ACID acronym, which was popularized by Theo Harder and Andreas Reuter in […]

READ MORE
what-is-data-obfuscation

Data Obfuscation – what is it?

Data obfuscation consists of changing sensitive data or personally identifying information (PII), intending to protect confidential information in non-productive databases. A successful obfuscation is when the data maintains referential integrity, as well as its original characteristics, which guarantees that the development, testing, and installation of the applications are successful. This technique is used in non-productive […]

READ MORE
cyber-security-and-you-how-working-from-home-affects-your-network

Cyber Security and You: How Working from Home Affects Your Network

Cyber Security must keep up. The increasing technology of our time has led to an explosion in different types of work that can be done from the comfort of home. One can write, edit, and proofread articles, curating content in their pajamas if they wish! Some modern technology companies allow employees to work remotely on […]

READ MORE
detecting Data Breach

Data Breach, Types & Detection Learn Before It’s Too Late

Types of Data Breaches Exploit is a kind of data breach attack that benefits from software bugs or vulnerabilities, which cybercriminals use to obtain illegal access to a network and its data. Such vulnerabilities are hidden within the code of the system, and it’s just a matter of time to know who will find them […]

READ MORE
Business Intelligence

Business Intelligence (BI) What is it?

Business intelligence refers to the use of data in businesses to make the decision-making process easier. It is a set of strategies and tools focused on the analysis of data of a company through the study of existing data. Generally speaking, Business Intelligence tries to extract company data from different sources using tools or ELT […]

READ MORE
Database VS Data Warehouse

Database VS Data Warehouse

Often, database and data warehouse are used interchangably.  We’re here to clean up the confusion!, What is a Database? A database is a group of data stored in tables, which consists of rows and columns that represent attributes. Each one of the rows in the database represents a single entity. A Database Management System is […]

READ MORE
Spreadsheet vs Database

Database VS Spreadsheet? What’s the difference?

Understanding the difference between a database and a spreadsheet plays an essential role in the daily operations of many companies, and it is vital to make better use of these technologies. Although different technologies are involved, the databases and spreadsheets share some characteristics. Spreadsheet applications are user-friendly, ubiquitous, and flexible. They are used to merge […]

READ MORE
ransomware vulnerability

How a Ransomware Attack Can Happen to You

Ransomware is a kind of malicious code that uses mechanisms to make the data inaccessible to the user, to demand the payment of an amount of money to restore access to the information. Users visualize on-screen instructions for how to pay a fee to get the decryption key. The costs vary from a few hundred […]

READ MORE