author:


Database Systems

The Unifying Force of Data

November 27, 2017

Someday, we may look back on IT as a subset of social science as much as a technological discipline. Because it sits at the intersection of business and technology, visibility and information are at a premium within organizations. In another social science, economics, there …





author:


Database

Monitoring and Observability With USE and RED

October 5, 2017

Modern systems can emit thousands or millions of metrics, and modern monitoring tools can collect them all. Faced with such an abundance of data, it can be difficult to know where to start looking when trying to diagnose a problem. And when you’re not …


author:


Database

Monitoring Isn’t Observability

September 14, 2017

Observability is all the rage, an emerging term that’s trending up very quickly in certain circles even while it remains unknown in others. As such, there isn’t a single widely understood meaning for the term, and much confusion is inevitably following. What is observability? …


author:


Database

The Basics of Sharding in MongoDB

September 6, 2017

Sharding is a mechanism widely used in today’s most popular database systems, an effective way to divide, categorize, and organize data into manageable chunks. In some database types, such as MySQL, the use of sharding is an architectural decision, while in other databases, such …


author:


Database

An Introduction to MongoDB Replication and Replica Sets

August 25, 2017

Replication is a process common to virtually all modern-day database systems. As you very likely know, it can be a complex subject, especially when dealing with nuances that vary from database type to database type. In this post we’d like to offer an introduction …


author:


Database Security

How We Encrypt Data in MySQL With Go

July 31, 2017

A SaaS product needs to use security measures you might not ordinarily use in an on-premises solution. In particular, it’s important for all sensitive data to be secured. Encryption plays an important role in information security. We encrypt data in-flight and at-rest, so your …