Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Databases and related technologies.

How to Rename a MySQL Database

When working with MySQL databases, you may encounter the need to change a database name. However, MySQL no longer supports a direct renaming option. The RENAME DATABASE command, available in earlier versions, was removed due to the risk of data loss. Despite this, renaming a database in MySQL is still possible. This article explores the available methods to accomplish this task safely and effectively.

Smarter handling of Flyway validation issues | The Tony and Tonie Show

In this video Tony and Tonie discuss the quick way to verify whether a Flyway validation error is a real cause for concern, due to retrospective metadata changes, or just the result of a developer valiantly adding formatting and documentation to improve the code. If the latter, developers can safely run Flyway repair to resume normal migrations.

EnterpriseDB vs. PostgreSQL

When it comes to choosing the right database management system (DBMS) for your enterprise needs, PostgreSQL—also known as Postgres—and EnterpriseDB (EDB) Postgres Advanced Server often top the list of contenders. While Postgres is a widely adopted open-source database known for its stability and feature-rich capabilities, EDB builds on this with additional tools and enterprise-focused features.

Optimizing Database Performance with MurmurHash and Atatus Monitoring

Atatus database monitoring takes you to the next level by offering comprehensive tools to track query performance, uncover bottlenecks, and optimize database efficiency. A core feature of our database monitoring is query signatures, where we leverage MurmurHash to generate unique, consistent identifiers for normalized SQL queries. This enables efficient aggregation and analysis of query metrics, even for complex workloads.

Protecting Against Ad-Hoc Query Exploits

Ad-hoc queries are temporary SQL queries created and executed to perform a specific task without prior preparation or to save as permanent procedures or functions. Usually, they can be used to analyze data, search for particular information, or solve temporary tasks. However, if user-defined input data generates the text in ad-hoc queries dynamically, they may be vulnerable to SQL injections. In the article, we’ll explore what ad-hoc queries are and what security and access risks they may cause.

How to Install and Connect ODBC Drivers in UNIX

Imagine you’re working in a UNIX-based environment, managing multiple databases like MariaDB, PostgreSQL, or Oracle, and you have to connect their data to different applications. Without UNIX ODBC drivers, you’d have to write custom code for each database, which would quickly turn into a nightmare — each database has its own way of handling queries, connections, and authentication. Luckily, ODBC drivers can save the day by acting as “translators”.

How to Install Components in Delphi IDE to Boost App Development

Components in Delphi save the essential time it often takes for developers to write code from scratch, providing pre-built options you can continuously reuse to assemble software, create a smooth user interface, and handle complex data connectivity tasks. Streamlined development, reduced number of errors, and consistency are only some of the advantages that you get when using components while you work with Delphi.