Scaling multiple databases with a single legacy storage system works well from a cost perspective, but workload conflicts and hardware contention make these solutions an unattractive choice for anything but low-performance applications.
Attend the webinar to learn about:
- How SolidFire’s all-flash storage system provides high performance at massive scale for mixed workload processing while simultaneously controlling costs and guaranteeing performance
- How to deploy four or more database copies using SolidFire’s Oracle Validated Configuration, at a price point at or below the cost of traditional storage systems
- SolidFire’s Quality of Service (QoS) guarantee; every copy receives dedicated all-flash performance, so IT admins can deliver solutions with confidence and maximize business efficiency
Interested in Azure SQL Database training? Be sure to watch this session! Azure SQL Database is a robust relational database platform for developing, deploying, and managing the data tier in a wide range of cloud-based applications. Join us to explore the latest investments in the Azure SQL Database in the areas of service tiers, performance, scale out, business continuity, security, and experiences for data developers and data management.Read more >
Part 1: 60 Seconds to Infiltrate, Months to Discover
According to leading industry reports, 98% of breached data originates from unsecured database servers and nearly half are compromised in less than a minute! Almost all victims are not aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join (ISC)2 and Oracle on January 31, 2013 for Part 1 of our next Security Briefings series that will focus on database security and the detective, preventive, and administrative controls that can be put in place to mitigate the risk to your databases. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline.
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere—not to mention ensuring regulatory compliance. However, many organizations still rely on security solutions with inherent limitations. Given the complexities of today’s database platforms and the sophistication of today’s cybercriminals, deploying a comprehensive and dedicated database security solution is a must. Here are five reasons why.
Join this in-depth discussion on enterprise database security and learn how to (1) Overcome inherent limitations of perimeter security and DBMS security features (2) Circumvent major costs and operation challenges in taking your 'reactive' database security to an optimized practice and (3) establish real-time protection and continous compliance with ZERO downtime.
Today, businesses leverage confidential and mission critical data that is often stored in traditional, relational databases or more modern, big data platforms. Understanding the key threats to database security and how attackers use vulnerabilities to gain access to your sensitive information is critical to deterring a database attack.
Join this webinar to learn about the latest threats and how to remediate them.
The structured and relational application stack is undergoing a disruptive change to be real-time, high-volume and schema-less. In this webinar with Sr. Analyst Nik Rouda from the ESG Group, we will discuss why next-gen applications and distributed databases need a new type of data protection.Read more >
Inside or outside, which is better? You know that embedding analytics in databases offer several benefits including security, performance, and enabling users to take advantage of the analytics more readily. But how do you do it?
In this installment of our embedded analytics series we discuss embedding analytics using stored external procedures – an option provided by all major commercial RDBMS providers. These procedures are invoked in the same manner as internal stored SQL procedures but they run in a process space separate from that of the database itself. This separation can be advantageous in certain scenarios. In particular, if a data set is selected for analysis that pushes the limits of physical memory then the database is isolated from any issues that arise in running the analytics on this problematic data.
In this webinar, you will see detailed steps on how to implement the analytics as a shared library using IMSL Libraries for C for illustration.
If you missed part one of the series, watch the recording here: https://www.brighttalk.com/webcast/12285/164525
In this webcast, Redcentric's Len Sumner gives an overview to Managed Database Support. Over the course of the presentation, Len discusses what MDBS is, what the benefits are and, most importantly, how it can help your business.Read more >
IT organizations face many challenges when trying to apply patches due to the complexity and scale of their environment. In addition, IT teams are required to apply patches within a limited time frame from the release date to be considered compliant which can pose additional IT challenges. HP Database and Middleware out-of-box workflows are specially designed to simplify the patching process to Oracle and Microsoft SQL.
Register for this session and learn how to simplify the effort of applying patches while staying compliant.
When it comes to your database environments, do you have some applications that go "whole hog" on data and consume all your resources -- while other applications are starving? You are not alone. IT Managers choose Tegile flash storage solutions so they can easily drive multiple applications and multiple workloads -- and make sure no workload goes hungry.
We will examine how to accelerate transactional workloads running on an Oracle DB, while reducing IO wait times.
We will look at how organizations implement Quality of Service (QOS) standards to ensure that one application does not end up consuming all the available resources.
We will share how to architect a storage infrastructure that delivers effective data protection without impacting business performance.
Join us for this live webinar hosted by database experts.
Although it may sound like an oxymoron, the key to scaling a MySQL platform truly lies in consolidation of the physical storage layer. Whether you are running a dozen or a thousand MySQL instances, SolidFire provides a pathway to horizontally scale the storage layer, enabling capital and operational cost reductions, while virtually eliminating maintenance and replica deployment windows.
Attend the Webinar to Learn
- How SolidFire can guarantee storage performance, dynamically adjust storage resources on the fly, and linearly and non-disruptively scale your MySQL database storage infrastructure.
- How you can reduce deployment times for MySQL replication slaves and reporting copies from hours to seconds.
Join us in the discussion on the benefits of consolidating MySQL workloads on the storage industry’s only all-flash, scale-out, QoS-enabled storage system. With SolidFire you can provision, manage and clone production, reporting, dev/test and QA environments safely, all on the same array.
Join us for this next segment of “Under the Hood” that focuses on the database designer feature of HPE Vertica.
Learn how the schema designs created by Database Designer provide optimal query performance for your most challenging analytic workloads. Database Designer uses smart strategies to create efficient schema designs that can be deployed, changed and re-deployed by almost anyone, even those without advanced database knowledge.
Data thieves are opportunistic, looking for unprotected databases in the forgotten digital corners of your company. They are content to steal any data that lies within easy reach.
Large companies are especially vulnerable. With hundreds or even thousands of databases spread throughout business units and across multiple geographies, it is only a matter of time until your unprotected data is accessed and stolen.
Fortunately, it doesn’t have to be complicated, tedious or expensive to protect all of your sensitive data with a database monitoring solution. The right database monitoring solution can also provide visibility into data usage and simplify compliance audits.
Join us for this webinar to learn:
•Benefits of database monitoring over native audit tools
•Factors to consider before investing in database audit and protection
•3 specific ways to leverage database monitoring for improved security
Discover the complexities of licensing database technologies such as Oracle, SQL Server and PostgreSQL on VMware, with particular emphasis on modern converged and hyper-converged platforms. It's vital to ensure your virtual machines stay compliant with your database vendor’s license requirements. Join us to learn about the business and financial risks involved if you don't have a solid plan in place for compliance, as well as explore strategies for controlling and/or reducing costs and limiting organizational risk.Read more >
HyperConverge like a Pro - part 2
Regardless of your industry, databases form the core of your profitability. Whether online transaction processing systems, Big Data analytics systems, or reporting systems, databases manage your most important information – the kind of data that directly supports decisions and provides immediate feedback on business actions and results. The performance of databases has a direct bearing on the profitability of your organization, so smart IT planners are always looking for ways to improve the performance of databases and the apps that use them.
Join Augie Gonzalez, Subject Matter Expert, DataCore to see if hyper covergence holds an answer to reducing latency and driving performance in database operations. But be careful, not all hyper converged solutions show dramatic improvements across the I/O path.
Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates the various reports available for SQL Server database security and compliance, both scheduled and automated. During the webinar, Rodney will be showing how to:
- Monitor changes to activity as the schema/table, code, database and instance level
- Review user and role security and reporting (meets SOX compliance needs)
- Capture and report on user access and modification of data down to the column level
- Uncover security weaknesses
While databases are an essential part of any application, database changes and updates are often handled in separate, manual workflows, creating greater chance for error and delays in the continuous delivery pipeline.
With CA Release Automation and DBmaestro you can now easily orchestrate a comprehensive continuous delivery toolchain from development through production while seamlessly automating database changes directly within your application deployment workflow. With DBmaestro’s new Action Pack for CA Release Automation, you can:
•Eliminate error prone manual scripting for database changes
•Detect configuration drift visibility and conflicts
•Package, verify, deploy and promote database changes
Join Yaniv Yehuda, Co-founder and CTO DBmaestro, and Tim Mueting, Product Marketing Manager at CA Technologies, to learn how this exciting new integration with CA Release Automation helps you speed delivery and provide new levels of governance and tracking for your continuous delivery pipeline.
Reduce costs for storage and licensing, run a database per developer through a self-service portal, QA new code at light speed and speed up your whole organization. Bart Sjerps shows you what it can do for any business that depends on databases.Read more >