How does data backup work for databases?

Backing up your database

Backing up your data is a popular option for securing your database. In order to create backup copies, you need additional hardware and to install a suitable backup structure. How do you secure your own network and web server against attacks and proceed to protect your databases?

CRUD – the most important database operations

CRUD: the basis for data management

It won’t take long for those looking to get into to software development to encounter the term CRUD. The acronym stands for the typical operations used for communicating with database systems; these normally form the basis of database management. But just how are these access functions for data management actually set up? And how much of role does CRUD play when it comes to the databases’...

MariaDB vs. MySQL

MariaDB vs. MySQL

MySQL is the most used database management system in the world. This open source software has been available for productive use since 1995 and is generally considered a standard solution for users of relational databases. This could change in the near future. MariaDB, a community-developed fork of MySQL is catching up on its predecessor and is consequently becoming an increasingly attractive...

Relational databases

The relational database model

With relational database systems, you use tables to store and manage information. This sounds simple but involves quite complex concepts such as normal forms, key relationships, and JOINs. This article will introduce the basics of the relational database model, compare its advantages and disadvantages, and delimit this type of data storage from alternative approaches, like object databases,...


Databases – why do you need them and what kinds are there?

Databases are a fundamental part of our information society today. They organise electronic data and regulate access to it. Databases have a wide range of applications, both commercial and private. Each database system has a database management system based on a specific database model. Whilst the history of the database began with the hierarchical model, today the relational database model is the...

Data mining: analysis methods for big data

Data mining: analysis methods for big data

The total amount of data generated worldwide increases by 40% every year. Many companies seek to make use of the constantly increasing mountain of data in order to increase their e-commerce business. But making use of such Big Data alone doesn’t add any value — enter data mining. Below you can find a discussion of the various analysis approaches involved in data mining, to give you an idea of how...

UML: activity diagram

Activity diagrams: clearly present chronological activity processes with UML

UML activity diagrams help you to graphically illustrate the chronological sequence of system processes in object-oriented programming. They show which actions take place in which order to execute an activity. With a finished diagram, you can create code frames using XML transfer. Or do you want to map business processes? We show examples of how to create an activity diagram, which symbols belong...

MongoDB: an introduction and comparison to MySQL

MongoDB — the flexible and scalable NoSQL database

NoSQL databases have long since been serious competitors to classic relational database systems, like MySQL. They replace the strictly-defined storage structures of traditional models through flexible saving procedures. This allows data pools to be easily distributed onto multiple servers in order to guarantee high availability of web applications. But are these new systems really all that they’re...

Raspberry Pi projects

Explore the possibilities with these 17 Raspberry Pi projects

Raspberry Pi is an inexpensive small form factor PC that can behave like a standard computer in many respects. Users can use this innovative mini-computer for all kinds of functions, from setting up an operating system to surfing the web, to using it as a server or a media center, and much more besides. Discover 10 interesting Raspberry Pi projects to try out at home.

Securing servers with Fail2ban

Securing your server with Fail2ban

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defence strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out the essential details on...