Remove Best Practices Remove Servers Remove Software Remove White Paper
article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as well as MongoDB data modeling. A setting of 100 determines it to swap aggressively to disk.

article thumbnail

Setting Up and Deploying PostgreSQL for High Availability

Percona

Unfortunately, using certain open source database software as part of an HA architecture can present significant challenges. Despite all its upside, PostgreSQL software presents such challenges. PostgreSQL software supports synchronous streaming replication, asynchronous streaming replication, and logical replication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Total Cost of Ownership and the Return on Agility - All Things.

All Things Distributed

The best practices that we are collecting in the AWS Economics Center are there to help our customers get a total view on their IT cost such that they can accurately compare on-premise and cloud. 3-Year Heavy Utilization Reserved Instances offer the maximum savings over equivalent servers deployed in an on-premises environment.

AWS 118
article thumbnail

SQL Server I/O Basics Chapter #2

SQL Server According to Bob

This White Paper is for informational purposes only. Copyright The information ​​ that is contained ​​ in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.

Servers 40
article thumbnail

C++ safety, in context

Sutter's Mill

To talk about C++’s current safety problems and solutions well, I need to include the context of the broad landscape of security and safety threats facing all software. Software security ” (or “cybersecurity” or similar) means making software able to protect its assets from a malicious attacker. Let’s dig in.

C++ 139