credativ® Blog

Here you will find interesting news about industry-specific topics and us.

Categories
Category
Tags

Categories

Tags

05 July 2018

PostgreSQL® 11: Checksums and base backups

The second beta release of PostgreSQL 11 (which is now feature frozen) has been released recently. Time to look at some of the improvements that credativ has contributed in the area of checksums and backups. Checksum verification during base backups Since version 9.3 it is possible to enable checksums for the underlying storage of tables […]

Read more

30 May 2018

RabbitMQ - Message Oriented Middleware (MOM)

The message broker RabbitMQ is highly popular in business environments. Our customers often use the software to bridge different systems, departments, or data pools. Similarly, a message broker like RabbitMQ can be used to absorb short-term load peaks and pass them on normalized to backend systems. Operating the Erlang-written message broker is straightforward to seamless […]

Read more

26 February 2018

Elephant Shed - Roadmap published

The credativ PostgreSQL® Competence Center has released a project roadmap for the PostgreSQL® Appliance Elephant Shed. Elephant Shed is a freely available PostgreSQL® solution developed by credativ, which combines management, monitoring and administration into one system. The project roadmap for 2018 includes following points: Q2 2018: Support for Ubuntu 18.04 Q3 2018: Support for CentOS […]

Read more

14 February 2018

Elephant Shed in a Vagrant box

Elephant Shed is now available as a Vagrant box. This makes it very easy to test and try out the PostgreSQL® appliance. Vagrant is an Open Source tool for creating portable virtual software environments. By being fully script controlled Vagrant makes it easy to generate virtual machines, in which a software component is installed for […]

Read more

04 January 2018

The Processor as a Security Vulnerability

At the beginning of 2018, issues with memory management and Intel processors became public. According to these reports, it is apparently possible to read arbitrary areas of the kernel and userspace memory regions and thus potentially gain access to sensitive areas. Over the past few days, there have been rumors and speculations about the direction […]

Read more