Featured blog posts

Encrypting sensitive data in puppet using hiera-eyaml

Encrypting sensitive data in puppet using hiera-eyaml

May 27, 2016 12:00:00 AM 3 min read
SharePlex replication between two instances on the same host

SharePlex replication between two instances on the same host

May 25, 2016 12:00:00 AM 6 min read
Understanding the database options - AutoClose

Understanding the database options - AutoClose

May 20, 2016 12:00:00 AM 3 min read
An effective approach to migrate dynamic thrift data to CQL, part 1

An effective approach to migrate dynamic thrift data to CQL, part 1

May 17, 2016 12:00:00 AM 6 min read
MySQL encrypted streaming backups directly into AWS S3

MySQL encrypted streaming backups directly into AWS S3

May 13, 2016 12:00:00 AM 8 min read
Analyze index validate structure - the dark side

Analyze index validate structure - the dark side

May 13, 2016 12:00:00 AM 10 min read
Properly removing users in MySQL

Properly removing users in MySQL

May 12, 2016 12:00:00 AM 4 min read
An effective approach to migrate dynamic thrift data to CQL, part 3

An effective approach to migrate dynamic thrift data to CQL, part 3

May 12, 2016 12:00:00 AM 6 min read
GoldenGate 12.2 big data adapters: part 4 - HBASE

GoldenGate 12.2 big data adapters: part 4 - HBASE

May 11, 2016 12:00:00 AM 13 min read
MySQL InnoDB’s full text search overview

MySQL InnoDB’s full text search overview

May 6, 2016 12:00:00 AM 6 min read
InnoDB flushing and Linux I/O

InnoDB flushing and Linux I/O

May 5, 2016 12:00:00 AM 2 min read
How to deal with MetaData Lock

How to deal with MetaData Lock

May 5, 2016 12:00:00 AM 5 min read
Reserved words usage in MySQL

Reserved words usage in MySQL

May 2, 2016 12:00:00 AM 1 min read