Skip navigation.

Chris Foot

Syndicate content
Remote DBA Experts Blog
Updated: 9 hours 24 min ago

Customizing a Database Activity Monitoring Solution: Database Activity Monitoring Series pt. 2 [VIDEO]

Sat, 2014-06-21 13:32

Real-time monitoring means constant protection from potential threats, and at RDX we customize database activity monitoring to fit our customers’ unique security requirements.

First, we hold fact finding meetings during the customer integration process to learn our customers’ database security requirements and internal practices. Then we educate our customers on the installation and configuration of the security monitoring architecture which utilizes an RDX supplied security appliance.

Next, we work with our customers to determine which event notifications and escalation procedures are best for their database environments. They can set notification rules about the time of day a database is accessed, certain users who access it, and the computers and programs used to access it, among hundreds of other customizable parameters.

After implementation, our team of dedicated professionals provide 24×7, 100% onshore monitoring of your database environments and will alert you to any activities that violate your predetermined security parameters.

We also provide our customers with ongoing database security services. Find out more about these in our next video!

The post Customizing a Database Activity Monitoring Solution: Database Activity Monitoring Series pt. 2 [VIDEO] appeared first on Remote DBA Experts.

What is Database Activity Monitoring?: Database Activity Monitoring Series Kick-off [VIDEO]

Fri, 2014-06-20 13:56

Today we're kicking off a series on Database Activity Monitoring. As your database administrators, safeguarding customer data is our highest priority. That’s why we offer 24×7 Database Activity Monitoring services, which allow organizations to gain full visibility into all database activity.

At RDX, we’ve partnered with McAfee, the world’s largest dedicated security company, to bring our customers the highest level of database activity monitoring. RDX has integrated the features and functionality provided by McAfee’s database security products into its support environment to give our clients visibility into all database activity, including local privileged access and sophisticated attacks from within the database itself.

Not only that, we help you save money on a security monitoring support architecture, because our Proactive Monitoring and Response Center provides 24X7, real-time security alert monitoring and support by around-the-clock staff members who are onsite, onshore, and 100 percent dedicated to protecting your organization's core assets..

This constant monitoring also helps us receive alerts of attacks in real time and terminate sessions that violate predetermined security policies.

We customer tailor a database activity monitoring solution to fit each customer’s unique needs – which we'll touch on in our next video!
 

The post What is Database Activity Monitoring?: Database Activity Monitoring Series Kick-off [VIDEO] appeared first on Remote DBA Experts.

What is Database Activity Monitoring?: Database Activity Monitoring Series Kick-off [VIDEO]

Fri, 2014-06-20 13:56

Today we're kicking off a series on Database Activity Monitoring. As your database administrators, safeguarding customer data is our highest priority. That’s why we offer 24×7 Database Activity Monitoring services, which allow organizations to gain full visibility into all database activity.

At RDX, we’ve partnered with McAfee, the world’s largest dedicated security company, to bring our customers the highest level of database activity monitoring. RDX has integrated the features and functionality provided by McAfee’s database security products into its support environment to give our clients visibility into all database activity, including local privileged access and sophisticated attacks from within the database itself.

Not only that, we help you save money on a security monitoring support architecture, because our Proactive Monitoring and Response Center provides 24X7, real-time security alert monitoring and support by around-the-clock staff members who are onsite, onshore, and 100 percent dedicated to protecting your organization's core assets.

This constant monitoring also helps us receive alerts of attacks in real time and terminate sessions that violate predetermined security policies.

We customer tailor a database activity monitoring solution to fit each customer’s unique needs – which we'll touch on in our next video!
 

The post What is Database Activity Monitoring?: Database Activity Monitoring Series Kick-off [VIDEO] appeared first on Remote DBA Experts.

Customizing a Database Activity Monitoring Solution: Database Activity Monitoring Series pt. 2 [VIDEO]

Fri, 2014-06-20 13:32

Real-time monitoring means constant protection from potential threats, and at RDX we customize database activity monitoring to fit our customers’ unique security requirements.

First, we hold fact finding meetings during the customer integration process to learn our customers’ database security requirements and internal practices. Then we educate our customers on the installation and configuration of the security monitoring architecture which utilizes an RDX supplied security appliance.

Next, we work with our customers to determine which event notifications and escalation procedures are best for their database environments. They can set notification rules about the time of day a database is accessed, certain users who access it, and the computers and programs used to access it, among hundreds of other customizable parameters.

After implementation, our team of dedicated professionals provide 24×7, 100% onshore monitoring of your database environments and will alert you to any activities that violate your predetermined security parameters.

We also provide our customers with ongoing database security services. Find out more about these in our next video! 

The post Customizing a Database Activity Monitoring Solution: Database Activity Monitoring Series pt. 2 [VIDEO] appeared first on Remote DBA Experts.

Mobile applications can be a boon for businesses

Thu, 2014-06-19 11:32

As there are thousands of unique businesses active today, each providing specific services or products to consumers, creating mobile applications directly related to their practices seems feasible.

The task is of course easier said than done. Platform-as-a-Service offers organizations the environment in which to create smartphone and tablet tools. However, monitoring such a system will likely require the expertise of database administration services that specialize in cloud deployments.

Why mobile matters
Although having a mobile application won't wholly determine whether a company is successful or not, it wouldn't hurt it to have one. Harvard Business Review referenced a 2012 survey of 1,051 U.S. smartphone users aged 13 to 54 conducted by AOL and advertising agency BBDO. The study discovered that:

  • Nearly half (48 percent) of all consumers spent an average 864 minutes using their smartphones to seek entertainment.
  • Just under 20 percent spent time socializing with other people using the devices.
  • Approximately 12 percent leveraged their machines to find a product or service

Because smartphone purchase rates have been increasingly steadily each year, the manner in which the units are used is becoming more diverse. It can only be expected that people will continue to shop more on their phones, or at least search for items.

Constructing ubiquitous brands
Developing and launching unique mobile applications can help organizations boost their prevalence in the market. According to Natasha Clark, a contributor to BusinessTechnology, around 30,000 such tools are implemented every month, meaning that more competitors are trying to gain stronger favor among consumers.

Where does the market lie?
What kinds of applications a business develops depends on its primary practices and which consumers it's targeting. Companies in the service industry have acquired positive return on investment from the endeavor. Clark referenced a tool created by Eccleston Square Hotel in London, which provides guests with:

  • Room service
  • A map and direction feature
  • A popular attractions section
  • Dining recommendations
  • General hotel information

"Nowadays, people use mobiles more than the website on a desktop," said Eccleston Square Hotel Company Director Olivia Byrne told Clark. "Our app has lots more functions, and the fact that it stays on the phone after checkout is a constant reminder of our hotel."

Providing a solid platform
Depending on how complex and flexible enterprises want their mobile applications to be, it could be in their best interests to seek consultation from DBA services. The environments needed to create modern smartphone tools can be quite complicated, so having a dedicated team monitor them is essential.

The post Mobile applications can be a boon for businesses appeared first on Remote DBA Experts.

Manufacturers: The Internet of Things is here

Tue, 2014-06-17 12:58

All too often, the Internet of Things is referred to as an anticipated technology that manufacturers haven't quite figured out how to handle yet. However, production companies distributed throughout the United States are leveraging IoT to improve operations and maintain an accurate, real-time record of all assets.

Implementing hundreds of data-producing sensors across an entire factory necessitates the development of an environment that can adequately handle the information. Database administration has become a valued asset to thousands of organizations running analytics programs. For a company that focuses on how to better produce goods, outsourcing to to professionals specializing in DBA appears to be a viable option.

Supporting a new industrial economy
Strategy and Business noted that many economists have expressed optimism regarding the U.S. manufacturing economy. Specialists have cited competitive wages, factory construction and enterprises' desires to reduce supply chain expenses as reasons to celebrate.

Although the positivity has some grounds for support, the news source maintained that software and automation will be the primary drivers of the U.S. production industry's rebound. This shift in large-scale fabrication isn't necessarily supported by routine improvement of conventional operations, but spearheaded by fundamental changes in how the 21st century factory organizes itself.

An elemental transformation
Many contemporary factories are already operating under the guidance of software specialists. The best way to perceive the situation is to imagine that all the machines in a facility are connected to a single command center. If a sensor identifies an issue – minor or major – with a particular instrument, a notification is automatically delivered to the hub, where engineers can assess the problem remotely.

The proper way to leverage IoT
Although many manufacturers are leveraging IoT, those that are new to the process may be left befuddled by the seemingly endless vat of data at their disposal. DBA services can provide guidance to enterprises before utilizing data analytics and state-of-the-art software. In addition, AutomationWorld contributor Dave Greenfield outlined four steps every production company should take to effectively operate the technology:

  • Initially, combine three or four data sources.
  • Utilize qualitative data analysis software to identify patterns and obtain insights regarding the information
  • Present those insights to decision-makers in an understandable format
  • Share findings of the analytics programs in a timely fashion.

By following the aforementioned protocol and having remote DBA professionals monitor all activity, manufacturers will be able to effectively harness IoT data without obstruction.

The post Manufacturers: The Internet of Things is here appeared first on Remote DBA Experts.

Cloud computing changes the way DBA services regard database design

Mon, 2014-06-16 07:53

Cloud technology is changing the way database administration services approach database design. Software produced by Microsoft and Oracle is allowing these professionals to construct scalable, protected servers for their clients. 

A burgeoning market 
Why has this practice become so popular? Cloud computing has allowed organizations to create flexible environments in which they can run complex data analytics platforms, collect larger stores of information and enable their employees to access files form nearly every device. 

MarketsandMarkets conducted a study that showed the cloud storage market is anticipated to grow at a compound annual growth rate of 33.1 percent over the next five years. In 2019, the sector is predicted to be worth $56.57 billion. The primary drivers of this activity will be wide area network optimization, a desire to reduce IT infrastructure intricacy and inline compression. 

A new approach to design 
Now that the limitations of on-premise data centers are being surpassed, database experts are beginning to leverage cloud technology to construct platforms based on application usage, the amount and type of data (unstructured, semi-structured and structured) and how the environment will be used to conduct tasks. 

David Linthicum, a contributor to Datamation, claimed that one of the key benefits of constructing a cloud-based database is that it can be remotely managed and constructed by a group of trained professionals. That means the environment can be customized to the specific needs of the organization that is paying for it to be built. 

​Benefits and rules
Linthicum also noted that one of the key benefits of a cloud database is that service orientation is more sound and productive than conventional servers. Because cloud processing collects and consumes information in the database catalog, the data services can be reused multiple times with no detrimental consequences for the company utilizing the system. Linthicum outlined three general rules DBA services should keep in mind when implementing such a solution: 

  1. Cloud-based environments operate best as singular entities, therefore coupling databases is counterproductive. 
  2. As with any IT implementation, it's important to construct a security module. That being said, protective features should be integrated into the atmosphere as it's being formulated. Building an entire cloud database and then applying defensive applications goes against best practices. 
  3. Make it easy to scale up storage space so that influxes of data can be adequately handled. 

Hiring outside experts who know how to use database administration language is a good idea for enterprises interested in building a private cloud, or managing a public offering. 

The post Cloud computing changes the way DBA services regard database design appeared first on Remote DBA Experts.

How database administration services can help tighten cybersecurity

Tue, 2014-06-10 15:18

As the frequency and sophistication of cyberattacks continues to rise, many companies are considering outsourcing to database administration services to provide them with more thorough, dedicated protection. Such professionals specialize in combating the kind of techniques commonly used by criminals to gain access to network servers, cloud environments and operating systems. 

According to Top Tech news, the Ponemon Institute, in conjunction with DB Networks, announced the results of its study, "The SQL Injection Threat and Recent Retail Breaches," which scrutinized responses from 595 IT security experts in the United States working across disparate industries within the country. 

Troubled findings 
The Ponemon Institute discovered that the majority of respondents believe the attacks against Target's databases involved SQL injection. Almost half of survey participants noted that the same intrusion technique poses a significant danger to their organizations. Worst of all, 64 percent maintained that their entity currently lacks the technology or tools to quickly detect SQL injection attacks. 

"It's well known that database breaches, including these high-profile attacks against the retailers, are devastating to merchants in terms of lost sales and damage to their reputation," said DB Network CEO Brett Helm, as quoted by the source.

Knowing the language 
PHP defined SQL Injection as a strategy in which a deviant creates or manipulates existing SQL commands to expose hidden data, override valuable information or carry out severely detrimental system level commands on the database host. Luckily, database support services are well versed in this technique, as many of them know popular operating systems such as Microsoft SQL Server 2013. 

What they do about it 
Upon hiring a DBA services provider to oversee all server communications and data warehousing needs, there are number of steps these experts take to ensure that no security faults exist when the operating system is up and running. The Register outlined a few of the tasks these professionals perform: 

  • Alter initialization parameters to construct standard, secure builds, which lets them protect the data dictionary and restrict OS access to authorized employees only. 
  • Grant privileges to users based upon their responsibilities and the tasks they need to perform on a daily basis. 
  • Delete default passwords and create strong, unique codes that are at least ten characters in length, containing miscellaneous symbols. 
  • Disallow illegitimate figures from gaining network access by restricting admittance to employees
  • Encrypt the data held in storage
  • Regularly audit the system

The aforementioned bullets are just a basic representation of the package an enterprise can expect to obtain by outsourcing to remote DBA professionals. 

The post How database administration services can help tighten cybersecurity appeared first on Remote DBA Experts.

Big Brother Monitoring Software: What’s it all about? [VIDEO]

Fri, 2014-06-06 12:44

One of the main reasons we succeed at reducing database downtime with our clients at RDX is our work towards proactive monitoring and notification tools.

Over the years, our experienced DBA experts have monitored client scripts and performance statistics daily by utilizing Dell’s Big Brother monitoring software.

With Big Brother, RDX can custom tailor a monitoring solution to meet each customer’s unique needs. Our DBAs receive automatic alerts when a monitored threshold is reached or a database error has occurred – meaning they can tackle issues before they become huge problems.

One of our healthcare clients was able to save much time and potential data loss when in the span of just 4 days, 3 different issues were caught early thanks to our alerts.

Big Brother also allows our DBAs to check on a number of other important database features regularly and even keeps historical data in the database, which means our DBAs can provide trending and planning information to avoid future problems based on past occurrences.

For more information on how Big Brother can help keep your organization’s databases secure, use the ‘Quick Connect’ button on the top right-hand corner of this page to contact us!
 

The post Big Brother Monitoring Software: What’s it all about? [VIDEO] appeared first on Remote DBA Experts.

Oracle answers mobile’s call to action

Thu, 2014-06-05 11:13

Compared to the cell phones that were released in the year 2000, smartphones seem like an entirely different animal.The capabilities of these devices, in addition to the information they're able to access, have prompted criminals to steal them.

Database administration services are often consulted to set up mobile network protection, but many communications services providers are trying to figure out ways to discourage such deviancy entirely. Oracle seems to have found an answer to the problem. 

Fly like an EAGLE 
The Redwood Shores, California-based database technology pioneer has announced the latest release of Oracle Communications EAGLE Equipment Identify Register, which supports mobile device booking for long-term evolution (LTE) smartphones and other LTE-connected mechanisms. EAGLE also empowers CSPs with the ability to communicate with the Central Equipment Identity Register, the global index of blacklisted devices maintained by the Groupe Speciale Mobile Association.

Oracle's press release noted that EAGLE is an efficient solution that enables CSPs to rely on a single deployment to meet functional and technical requirements for 2G, 3G and 4G/LTE networks. Database experts will be able to enter international mobile equipment identify codes – unique numbers that correlate to specific phones – into a blacklist, which prevents handsets from operating. 

Reducing complications 
Lanka Business Today acknowledged that, in the past, CSPs had to implement separate identity management equipment to authenticate devices and combat thievery. Now, EAGLE has simplified this measure by creating a database that can easily process new information and allow administrators to deploy solutions quickly. 

Most importantly, the program connects to the IMEI server, a centralized system through which network operators can share intelligence regarding stolen smartphones and other LTE gadgets. This process allows such information to be stored in the EAGLE platform, ensuring that queries submitted by database experts don't extend to other system elements. It also helps reduce signaling volume, meaning that less energy is need to support the network. 

What it means for enterprises 
Many workers are using their smartphones to communicate with enterprise databases. Being able to access and edit files on the go is a valuable privilege to have in a world that's built on reacting quickly to changing situations. However, these connections could be compromised if a smartphone falls into the wrong hands. 

Being able to shut down all operational capabilities in the event a mobile device is taken should be integrated into every company's best practices. This way, malicious figures won't be able to penetrate corporate networks and steal sensitive information. 

The post Oracle answers mobile’s call to action appeared first on Remote DBA Experts.

Internet of Things can bring manufacturers to the next stage

Wed, 2014-06-04 01:18

Manufacturers utilize numerous data-producing mechanisms on a day-to-day basis, but aggregating and analyzing that information is a daunting task. A number of them lack appropriate platforms capable of supporting collection and scrutiny processes as well as the personnel to manage the environment's functionality.

For these reasons, factory companies are hiring database administration services to install systems such as Hadoop that support data analytics and complex intelligence storage. In the age of the Internet of Things and big data, it is essential for production-focused enterprises to capitalize on the opportunity to make sense of it all.

A better view of the supply chain 
Manufacturers source materials from numerous entities, which means that they need to have comprehensive oversight of all incoming and outgoing assets. According to One Network Enterprises Executive Staff Member Joe Bellini, the information produced by Internet-connected devices distributed throughout the production supply chain as well as monetary transactions between two or more organizations could be scrutinized to figure out where processes could become more efficient and where new opportunities for growth reside. 

However, he asserted that modern data visualization methods are rudimentary. Most companies are conducting transactions, storing the results in a data warehouse and running basic analytics tools after an issue occurs. In other words, the tasks are carried out on a reactionary basis. 

Taking the next step 
Receiving orders and tasks from machines could be daunting, but speed of communications is everything for a manufacturer. Database experts can support platforms that sanction fast productivity, as well as the analytics tools that make it possible. Kylene Zenk-Batsford, a contributor to Manufacturing.net, maintained that wearable technology and distributed devices can vastly improve a factory's connectivity – it's simply a matter of having the appropriate tools available. 

For example, employees working in a bustling, noisy facility could come into work wearing a wrist watch or other device that clocks them in the instant they enter the compound. From there, the watch could give them a list of daily tasks to complete. How does the mechanism know which processes need to be conducted? By communicating with a sensor located next to a machine, the watch learns of a fault with the instrument and informs the worker, who has the skill set required to resolve the issue. 

Such technology is readily available for manufacturers to use, they simply need the support system to implement complex endeavors. DBA services are readily available to help the production economy progress to the next level of operability. 

The post Internet of Things can bring manufacturers to the next stage appeared first on Remote DBA Experts.

Full vs. Supplemental Remote Database Administration Services [VIDEO]

Mon, 2014-06-02 09:24

When outsourcing your database administration to RDX, you have options. We offer two main models for our remote administration services: Full Database Administration and Supplemental Database Administration outsourcing services.

This allows us to tailor our services to your company’s specific needs. With full remote DBA outsourcing, we provide 100% of your database administration needs. Your assigned Primary and Secondary DBAs assume total ownership of your environment and are responsible for your entire environment’s security, performance, and availability.

Supplemental outsourcing is ideal for companies experiencing hiring freezes, or that are simply looking for DBAs to augment their existing staff. With this option, you can choose which specific services you need our team to perform, allowing your in-house team to focus on more important, ROI building activities.

Either way, outsourcing part, or all, of your database administration support will save you time, money and energy your company needs to drive progress forward. Get in touch with us by using the QuickConnect button on the top right-hand corner of your screen, today to learn more.
 

The post Full vs. Supplemental Remote Database Administration Services [VIDEO] appeared first on Remote DBA Experts.

Hadoop: What it is, who can operate it

Fri, 2014-05-30 09:43

Many businesses often misunderstand what Hadoop is and how it applies to their business needs. Large enterprises collecting massive amounts of data often encounter database administration problems. In response, they typically hire outside experts who leverage Hadoop to help companies better manage information aggregation.  

Where did it come from? 
With the plethora of computing applications available today, it's easy for business-minded people to dismiss Hadoop as just another hype-infused solution without ever learning what it actually does. Cloudera CEO Mike Olson cleared the air with Strata blog contributor James Turner, claiming that Hadoop was created by a group of Google engineers trying to figure out how to catalog the textural and structural information the search engine was collecting and present it in a meaningful way. 

"Google's innovations were incorporated into Nutch, an open source project, and Hadoop was later spun-off from that," Olson told Turner. 

What it can do 
Olson proceeded to explain that Hadoop's platform is capable of indexing large stores of data – both unstructured and structured – and running intricate analytics programs that are computationally extensive. For example, financiers can leverage Hadoop's structure to conduct accurate portfolio evaluations, carry out risk scrutiny endeavors and construct sophisticated models. 

Database support services often find that utilizing Hadoop allows companies to perform incredibly complex collection and analysis tasks with a lot less computing power. Olson noted that the open source program was built to run on a large number of machines that don't share any memory or disks, enabling DBA to purchase number of disparate servers, assemble them in a rack, and run Hadoop on each one. 

"When you want to load all of you organization's data into Hadoop, what the software does is bust that data into pieces that it then spreads across your different servers," informed Olson. "There's no one place where you go to talk to all of your data; Hadoop keeps track of where the data resides." 

Where it's headed 
Use of the technology is skyrocketing. According to Cloud Times, a report published by Allied Market Research estimated that the worldwide market for Hadoop will grow at a compound annual growth rate of 58.2 percent between 2013 and 2020. The news source noted that burgeoning interest in the platform will be instigated primarily by the increasing volume of unstructured data most organizations are trying to process.

DBA services well versed in the technology can be a major boon to companies looking to make use out of Hadoop. Enterprises that choose to adopt it are sure to have a competitive advantage over those that do not. 

The post Hadoop: What it is, who can operate it appeared first on Remote DBA Experts.

Unstructured data marks shift to non-relational databases

Wed, 2014-05-28 13:44

The information collected by application developers, retailers and other organizations supersedes the basic, numeric form characteristic of an Excel spreadsheet. Documents containing written language hold a large amount of intelligence that can greatly assist businesses and public authorities looking to obtain insight into various situations. In order to harness this unstructured data, database experts have maintained that a switch to non-relational databases is imperative.

No easy task
CIO Magazine noted the problems Australian Crime Commission CIO Dr. Maria Milosavljevic have encountered when trying to scrutinize massive amounts of forms that include written language. Police reports, psychological evaluations and other documents are available for use, but assigning a team of employees to search for patterns among thousands of items seems illogical in the face of data analytics.

However, some of the more common programs aren't sophisticated enough to conduct such complex tasks. Milosavljevic noted that businesses can assign specific tasks to information scrutiny programs, but even these initiatives can become diluted by complications.

"My favorite example is a movie review that said a film was 'wonderfully horrid,'" noted Milosavljevic at the CeBIT conference in Sydney, Australia, as quoted by the source. "Wonderful is a positive word, horrid is a bad word. But 'wonderfully horrid', that's interesting. And a machine is not going to get all that right, but you all did because you laughed."

A constructive environment
Of course, this information comes from a number of distributed sources. Companies and individuals specializing in developing smartphone applications have experienced database administration woes because of the amount of text-based information that is exchanged between users. Maria Deutscher, a contributor to SiliconANGLE, noted that relational architectures – popularly known as conventional databases – were created with the intent of supporting transactions based on numeric intelligence.

Unstructured data expands workload density, making it difficult for information to be transferred between machines. Deutscher acknowledged that Couchbase, a startup focusing on open source database development, is currently seeking a solution to this problem. The organization's mobile suite is capable of running locally, eliminating the need to transmit data to a remote server. One would think that this process would result in decreased functionality, but the features application developers require on a daily basis still remain strong.

Organizations looking to make sense of the massive number of written documents at their disposal should take a page from Couchbase's philosophy and look for flexible environments capable of supporting analysis endeavors.

The post Unstructured data marks shift to non-relational databases appeared first on Remote DBA Experts.