▼ Scroll to Site ▼

Information Management News

Sponsors

Operational Analytics: Real-Time Intelligence for Digital Transformation 2.0

Think about the last time you filled out a paper form and contrast that with how many times you've filled out forms online. We live in an era where everything is digital. Forms are online, every click is captured, and even personal lives are documented on social media. The first wave of digitization led to more BI and better data-driven decisions. But, as we head into 2020, the focus has shifted from BI to operational analytics. Traditional BI was focused on enabling executives to make decisions using historical data. It was accelerated by technologies such as Hadoop, which were built for scale but could not deliver results. Read More

Trend-Setting Products in Data and Information Management for 2020

Key data management trends have emerged that are shaping the capabilities of IT products and services for 2020 and beyond. To help showcase innovative products and services each year, Database Trends and Applications magazine looks for offerings that promise to help organizations derive greater benefit from their data, make decisions faster, and do so with higher levels of security. Read More

How to Plan for High Availability in the New Hybrid Cloud World

The IT industry is going through a major shift from centralized data centers to dispersed deployments across a variety of cloud and on-premise platforms. At the same time, availability is becoming more critical. Recently, Dave Bermingham, technical evangelist of SIOS Technology, shared his views on the current state of high availability in the cloud, and what organizations need to do to ensure continuity of service. "When moving to the cloud, the first thing you will discover is that the traditional SAN-based failover cluster for HA is no longer an option," he noted. Read More

Hope is Not a Strategy: Protecting Critical Cloud Data from a Zero-Day Attack

Businesses have a great deal of experience developing and implementing data protection strategies that allow them to recover from attacks on their on-premise IT environments. However, increasingly, enterprises need to begin considering a new threat to their IT environments. This threat is malicious actors using "zero-day" vulnerabilities—vulnerabilities that are so new, they cannot be patched before they are exploited—to attack and bring down the major cloud providers that organizations are increasingly relying on to host critical applications and data. Read More

Newsletters


Columnists

Todd Schraml

Database Elaborations

Todd Schraml

  • Churn: A Destructive Force for Any IT Project When applied implementation efforts are not efficient, more often than not, the inefficiencies are due to the interference of an imp known as "churn," i.e., implementation wheels spinning away and not actually making progress. Churn is bad. Churn is one of the most destructive circumstances for any IT project. Churn may raise its ugly head at any point where a project requirement or need is left unclear.
Recent articles by Todd Schraml
Craig S. Mullins

DBA Corner

Craig S. Mullins

  • SQL Performance Testing and DevOps Application developers typically do not spend a lot of time on optimizing performance. Their focus is on writing code that matches the project specifications and delivers the expected results. So, it makes sense that SQL performance testing should be conducted on all programs before they are migrated to a production environment, or you will likely experience performance problems
Recent articles by Craig S. Mullins
Kevin Kline

SQL Server Drill Down

Kevin Kline

  • A New Chapter of Business Intelligence Begins with Azure Synapse In late 2019, Microsoft brought forth its latest iteration of their business intelligence tools, Azure Synapse Analytics. With this release, Microsoft further aligns and clarifies its capabilities for handling data warehousing, data lakes, data pipelines, and machine learning.
Recent articles by Kevin Kline
Guy Harrison

MongoDB Matters

Guy Harrison

  • MongoDB Field-Level Encryption Enhances MongoDB’s Security Story When I was a young man—a long, long time ago now—I worked as an Oracle DBA (Oracle version 6, if you must know). I remember my astonishment at finding out that information in the database was stored in plain text within the database files. That meant if I could gain read access just to those files, I could read all the information in the database. It didn't matter what security controls I, as the DBA implemented at the database level—an attacker who could gain read access to the files on disk could read everything.
Recent articles by Guy Harrison
  • The Future of Databases Looks Cloudy Remember when standing up a new database instance involved modeling the application using the underlying database to figure out what hardware (server, storage, etc.) was needed to support the new instance? And, since most organizations did capacity planning on a spreadsheet using linear metrics, there was a lot of estimating involved, thus over-provisioning the hardware was standard procedure.
Recent articles by  

Trends and Applications