I’m 98% confident if you ask three data scientists to define Artificial Intelligence (AI), you will get five different answers. The field of AI research dates to the mid-1950s, and…
The hype around blockchain technology is reaching a fever pitch these days. Visit any tech conference and you’ll find more than a handful of vendors offering it in one form…
There are two sayings you can find in virtually every article about data protection: “If your data doesn’t exist in at least two places, then it doesn’t exist,” and “If…
Did you miss us at PostgresConf Silicon Valley in San Jose? Have no fear! Here’s a sneak peek video of Baron Schwartz delivering his talk on database indexing: How to Index…
Data protection has traditionally involved an on-prem storage vault, but as data protection solutions evolve, this requirement is becoming increasingly optional. On-prem storage vaults exist because if you do away…
Baselines are one of my favorite topics, as setting them is one of the most important things you can do when measuring data. It should underpin everything that you do,…
Data protection is a complicated endeavor. This is largely because IT is a complicated endeavor, and data protection involves backing up all the data from existing IT deployments while maintaining…
The collection of operational and and analytics information can be an addictive habit, especially in the case of an interesting and active network. However, this information can quickly and easily…
If you use ACID transactional databases, you’ve probably heard of lock wait timeouts and deadlocks. What are these? And how are they different? Inevitably, many of us will come across…
In part one of this series, we discussed the different types of databases available on the market today. In part two, we discussed how to choose the right database for…