In this article, you will be learning how you can set up RedixDB on an Alibaba Cloud ECS instance as well as learn about some of the basic commands and features of RedixDB.
In this post, we will explore the importance of data encryption for backups, and introduce the services that Alibaba Cloud provides that allow us to do so.
In this blog, we'll show you how you can use the PostgreSQL INSERT ON CONFLICT syntax and the RULE and TRIGGER functions to implement real-time data statistics.
This article uses Swinging Door Trending (SDT) as an example to provide a design suggestion and demo for this type of stream computing in PostgreSQL.
In this article, we'll introduce the PipelineDB cluster architecture and discuss how it maintains high availability for read/write operations amid shard failures.
This article walks you through five different probabilistic data types as well as the related data structures and algorithms in Pipeline and looks these them in detail.
This article looks at the pivotal analysis of multiple streams-with both human and robot service channels-and shows how you can conduct this kind of pivotal analysis.
In this blog, Senior Technical Expert Yuan Haisheng explained the differences and similarities between MaxCompute and Massively Parallel Processing (MPP) query engines.
In this blog, Cheng Yiding, CTO of YCLOSET, describes the data architecture of YCLOSET and explained the steps needed to build smart O&M tools based on MaxCompute.
In this article, we will look at how you can use BottledWater-pg and Confluent to create a real-time data exchange platform.
This article looks at the advantages and disadvantages of using stream computing, Lambda, and synchronous real-time (or triggered) data analysis.
In this tutorial, you will learn how to implement data access control solutions using the new Row Level Security feature introduced by SQL Server 2016.
In this tutorial, you will learn how to use the dynamic data masking feature of SQL Server 2016 to mask privacy data.
In this tutorial, you will learn how to enable SSL encryption for the network transport layer of your SQL Server.
In this tutorial, you will learn how to enable Always Encrypted to ensure that the data stored in your SQL databases on the cloud is continually encrypted.
In this tutorial, you have learned how to use certificates to implement database backup encryption in SQL Server 2014 and later.
In this article, we will explore how you can refine ranking algorithms for PostgreSQL through using tsvector or a multi-dimensional array.
The recent update of PostgreSQL 9.6 has made many enhancements in full-text search and has also brought us RUM plug-in support.
This article goes over how you can use PostgreSQL to create an efficient search engine for full-text searches and other query types including fuzzy and similarity queries.