Your databases are hosted in the cloud – either in VMs or in a database-as-a-service – and you’re having a performance emergency that’s lasted for more than a day. Queries are slow, customers are getting frustrated, and you’re just not able to get a fix in quickly. Just ask management if they want to throw hardware at it.
While architecting cloud native applications, you need to ensure that your system is highly available, performant, scalable, fault tolerant, and has the capability to recover from a disaster scenario. In this article, Samir Behara discusses the options available when designing the database architecture to achieve scalability.
Data analytics has become one of the powerful domains in the world of data science. An enormous amount of data is being generated by each organization in every sector. Computer science has found solutions to store and process this data in a smart way through a distributed file system. One such example is Azure Data Lake. It uses the Hadoop Distributed File System, and to perform analytics on this data, Azure Data Lake storage is integrated with Azure Data Analytics Service and HDInsight. In this article, Suhas Pande will explain how to store data using Azure Data Lake and how to perform data analysis on it using U-SQL, a big data SQL and C# language.
Are you thinking about the cloud yet? Redgate is conducting some research into cloud adoption to better understand both the drivers and the blockers. Whether or not you’ve taken the plunge yet, they would love to hear from you. Participate in the survey and be entered into a draw to win an Amazon gift card worth $100.
Cloud computing is on the move. Slowly but surely, businesses are transitioning more and more key pieces of infrastructure to the cloud in order to take advantage of cost, flexibility and agility benefits. And databases, the heart and soul of all applications, are the most critical component of this transition. Gerardo Dada explores the topic.
As more and more companies look to the cloud for their data storage needs, the same questions are being asked over and over again: if a security breech were to occur, who would be responsible and how much of a guarantee could the provider give us that our data would be safe from prying eyes.