477 Results for:DB
- Sort by:
Podcast: Why DBaaS and what problems does it solve?
10 Mar 2023We talk to Tobias Ternström of Nutanix about how the enterprise landscape has seen thousands of databases from multiple vendors mushroom and how database as a service can help manage that complexity Read More
Compare AWS Cloudtrail vs. Config for resource monitoring
07 Sep 2021When your IT team needs more detailed info about resource activity in AWS, they have options. See how AWS Cloudtrail and Config resource monitoring tools compare. Read More
Working with Docker Compose? Use environmental variables
14 Sep 2021Docker Compose streamlines container application deployments. Dig into the tool and see how the use of environment variables can hone the process further. Read More
How to conduct Linux privilege escalations
27 Apr 2022Learn how to conduct Linux kernel exploitation with Metasploit and manually, as well as how to identify vulnerabilities on Linux using enumeration scripts. Read More
RisingWave Labs raises $36M for stream processing database
19 Oct 2022Open source-based streaming database vendor looks to expand into the cloud with a database-as-a-service platform written in the Rust programming language. Read More
Et nubes ad astra: DataStax Astra Streaming
15 Jun 2021Clouds talk, it’s a fact. More specifically, individual application components, services and data commodities need to exchange information with each other in order to form the DNA of live ... Read More
IPv4 vs. IPv6: What's the difference?
09 Nov 2022IPv4 and IPv6 are two forms of IP addresses, but they differ in length and style. Compare the two, and find out why organizations might implement one over the other. Read More
New high-volume agent connectors highlight Fivetran update
06 Mar 2023The data ingestion specialist's latest platform update focuses on enabling users to ingest high volumes of data to fuel real-time analysis and adds a new private deployment option. Read More
Security Think Tank: A brief history of (secure) coding
31 May 2023From controlling who was allowed to work with IBM mainframes to present-day DevSecOps techniques, the concept of secure coding has a longer history than you might think Read More