credativ® Blog

Here you will find interesting news about industry-specific topics and us.

Categories
Category
Tags

Categories

Tags

Beiträge von: credativ Redaktion

30 April 2020

tmate - Efficient remote maintenance and data sovereignty

Editor’s note, as of 2025-08-27: tmate.io and the tmate project have not been updated since fall 2019, so security vulnerabilities that may have arisen since then may not have been addressed. The tool is no longer recommended. Especially in the current situation surrounding COVID-19, a functioning remote maintenance/remote control solution is extremely important. It has […]

Read more

16 April 2020

Recover Data from Corrupt Tables in PostgreSQL®

PostgreSQL® is an extremely robust database, to which most of our clients also entrust their data. However, if errors do occur, they are usually due to the storage system, where individual bits or bytes flip, or entire blocks become corrupted. We demonstrate how to recover data from corrupt tables. In case of an error, the […]

Read more

12 February 2020

credativ helps establishing database track at Open Source Summit

Open Source Summit is the world’s largest, all-encompassing open source conference. Topics such as the latest infrastructure software, development on the Linux kernel and current works in open source communities are discussed. Until now, open source databases were a missing part of the conference program. However, databases such as PostgreSQL® or Apache Cassandra are one […]

Read more

07 November 2019

20 years - credativ celebrates anniversary

In November 1999, 20 years ago, credativ GmbH was founded in Germany, and thus laid the first foundation for the current credativ group. At that time, Dr. Michael Meskes and Jörg Folz started the business operations in the Technology Centre of Jülich, Germany. Our mission has always been to not only work to live, but […]

Read more

01 October 2019

Client certificates for Icinga2 API authentication

There are two ways to authenticate yourself as a client to Icinga2. On the one hand there is the possibility to authenticate yourself by username and password. The other option is authentication using client certificates. With the automated query of the Icinga2 API, the setup of client certificates is not only safety-technically advantageous, but also […]

Read more