We’re Excited About SQL Server 2019, Here’s Why

By | Azure
Microsoft SQL Server 2019 is out in preview and it’s got some exciting new features. When Microsoft announced the release at their Ignite 2018 conference on Sept 24th, we couldn’t wait to see what was in store. This newest offering will continue to build on the solid foundation of SQL servers while expanding offerings of flexibility and further embracing big data by adding support for Kubernetes, Apache Spark, and Hadoop clusters. Embraces Big Data – Probably the biggest change to SQL 2019 is the ability to manage big data clusters. Big data has always been a bit of a gap in the arsenal of Microsoft’s SQL servers, but not anymore. With SQL 2019, Microsoft is fully embracing big data with Kubernetes. Kubernetes is an open-source container-based platform that represents exciting new possibilities for this SQL engine. With SQL on Kubernetes you will be able to can create high availability solutions with Linux containers and manage multiple data sources all in one place. Manage Relational and Non-Relational Data – The new engine can query data from a number of different sources, including relational and non-relational data storage. Microsoft has built in native support of Apache Spark and Hadoop Distributed File System (more…)
Backup Recovery

Improving your Database Security with Microsoft Azure

By | Azure
If you are interested in migrating to a cloud database but concerned about security issues, look no further. Hybrid and cloud native databases do have their own set of security concerns, but if you go with a trusted company and maintain it appropriately, you have nothing to fear. In fact, cloud databases can be more secure since they have access to the most advanced security protocols and automatic updates. Cloud native databases, or DBaaS (Database as a Service) platforms are databases hosted and maintained by third party providers. Operating a DBaaS means that your company will access data through the internet instead of through your internal network. DBaaS solutions offer great benefits for organizations in today’s “Big Data” arena. DBaaS is more scalable and flexible than traditional VM databases. It also eliminates the hardware requirements of maintain a database system. It is crucial to understand and trust the security protocols of your cloud provider before making the switch. Microsoft Azure is at the top of the list when it comes to cloud database offerings. It is a particularly good choice for the security conscious client. Microsoft in general, and particularly Azure, have a long history of prioritizing security for its (more…)
Database Support

What’s the Deal with Oracle 18c? (part 2)

By | Oracle
Last week we introduced Oracle’s database 18c, and focused on the new release structure and its increased accessibility on cloud environments.  If you missed this article, here’s a link to go check it out now before heading back over for part 2.  – What’s the Deal with Oracle 18c (part 1) This week we are focusing on more specific feature enhancements to those areas you have come to expect in an Oracle product.  Starting with security and moving on to platform architecture we are looking at how this newest release helps simplify your data management.  We will discuss key features from Database 12c that get exciting upgrades in this new release. Stability – Several new features increase the platform stability, including Real Application Clusters, Recovery Manager and Flashback.  Oracle takes advantage of the multi-server architecture to deliver enhanced backup and recovery features, and reduced downtime for scheduled activities. Security Enhancements – Oracle has always prioritized security and this newest version builds upon that foundation.  With simplified and optimized security protocols, this database will help you prepare for more stringent security requirements coming up in the General Data Protection Regulation (GDPR).  Here are just a few ways Oracle emphasizes security in (more…)

Protecting Your Database from Ransomware like WannaCry

By | Blog | No Comments
You may have heard about the recent WannaCry cyberattack that infected hundreds of thousands of computers worldwide. The ransomware holds a computer hostage until the user pays some amount of money (ransom) to the hacker or until a patch is made and installed. Why did it spread so quickly and how can you prepare for the next one, especially if you are a DBA? It’s not a matter of if, it’s a matter of when. Why were the attacks so effective? When this particular ransomware emerged on May 12th 2017, it had used an exploit on Windows systems that had been addressed by a critical patch two months earlier in March 2017. So, if end users kept up to date with receiving the latest critical security patches as they became available, they would have avoided being infected. Unfortunately, many businesses were not adequately prepared for an attack like this because maintain updates and they did not have the right security processes in place. It’s critical that companies are proactive in the measures they take to mitigate the risks involved with today’s cyber threats or they will become vulnerable. Lack of preparedness is one of the biggest factors why this cyber (more…)

Database Emergency Center

By | Blog, Preserved Content Pages | No Comments
Your primary production database has just crashed and you are losing business by the minute! Have you calculated the cost? It could be staggering! A non-functioning database could cause your business to come to a screeching halt. Poor performance, corrupt databases, and broken SQL Server processes are just a few of the potentially detrimental challenges that could unexpectedly arise in your database environment. These issues could have a major effect on the performance of your system and on your business as a whole – this is why the deployment of a rapid response team is so critical in these situations. Now, What Do You Do? The first thing to do is call Dobler Consulting Services at (813) 322-3240. We have experts ready to take your call and help you with your database problems. If you have a current service agreement in place with us, your call will take priority and be routed to an expert standing by ready to assist you. You don’t have an emergency support program in place? It’s not a problem! Without an emergency program in place, it may take some time and will likely cost you more, but we are available to help. What Is Your (more…)

SAP IQ Roadmap Webinar Replay

By | Webinar Replays | No Comments

This is a recording of the Webcast “SAP IQ Roadmap – What To Expect″ we held February 27th 2014.


SAP IQ has been a leader in analytics, with a large customer base and high level of customer satisfaction. SAP IQ has achieved excellent results in certified benchmarks and recognition as a market leader by Gartner and Forrester.

In this webinar you learned more about the SAP IQ Roadmap ahead and what to expect from new innovations and most importantly SAP IQ’s future in the HANA framework.

In case you missed it, we invite you to learn about what SAP has planned for IQ – enhanced foundation, new features, and exciting new roles in temperature sensitive data management for big data applications.  SAP is leading the pack in mobility, analytics, applications, and real-time data processing.  You will want to tune in to this informative learning session, to keep abreast of the latest developments at one of the world’s largest and most exciting technology companies.

Watch the recording of the webinar from 2/27/2014


Read More

SAP Sybase ASE – Keeping Private Data Private With Data Encryption

By | Database Technology Trends, Security, Sybase | One Comment

Data security is one of the hot topics when you ask top executives about what keeps them up at night. Keeping private data private is a never-ending challenge that needs constant attention and dedication. Data encryption is your best defense for protecting sensitive data. Common access control mechanisms and limiting the power of database administrators will make it harder to access the sensitive data, but once this hurdle is overcome the data is freely accessible. Data encryption will supplement and enhance these security measures by protecting sensitive data at rest in backup files and database files that could be exploited by powerful OS users. Read More