Ransomware attacks are nothing new. In fact, the first known ransomware virus was created in 1989! So why bring them up now? While the frequency of ransomware attacks has fluctuated over the years, recent statistics show that ransomware attacks rose significantly in frequency in 2019 and won't be letting up any time soon. For that reason, you should know what ransomware attacks are, how they work, and how best to deter malicious entities from targeting your organization. And that is exactly what you'll learn here today!
Months can be notoriously difficult to work with due to a variety of factors, including their variability in length. To make database developers' jobs easier, most relational databases (DBMS) offer functions such as MONTH() and MONTHNAME(). These two functions are great for grouping results by month and for displaying their values. In today's blog, we'll learn how to use specialized SQL functions for working with months.
Behind the slick User Interface (UI) of modern web applications, there are asynchronous services fetching data from the database with a multitude of objectives, including loading drop-downs, populating data tables, Synchronizing components, and many others. Any lagging of the back-end processes will be perceived by the user as a slow or even a non-responsive application. This in turn degrades the user experience and sours their opinion of your application. For that reason, it is imperative that you whittle down your query response time to the lowest feasible value. In many cases, this means measuring query turn-around in hundreds of a second, as opposed to seconds.
Needless to say, achieving sub-second response times takes some doing beyond defining indexes on searchable fields. In today's blog, we'll take a look at some techniques for making your queries maximally performant in MySQL 8.
It's fairly common to allow certain users to perform ad-hoc updates or deletions to tables. Data Manipulation Language (DML) operations such as these always come with risk, and incidents may occur where someone accidentally issues a Delete command without a WHERE clause, thereby deleting all rows in a table! Luckily, there are some simple steps you can take to prevent accidental (or deliberate!) destructive DML operations. We'll examine a couple of these in today's blog.
Certain relational databases, including MySQL and SQL Server, have an INFORMATION_SCHEMA system database. It contains database metadata, such as the names of databases, tables, the column data types, and even access privileges. It's also sometimes referred to as the data dictionary or system catalog. Regardless of how you refer to it, the INFORMATION_SCHEMA database is the ideal place to obtain details about table columns. In today's blog, we'll use the INFORMATION_SCHEMA database to find out whether or not a column exists and how many columns a particular table has.
- 2025 (1)
- June (1)
- The Rise of Embedded AI/ML Capabilities in Modern Databases
- Immutable Databases: the Evolution of Data Integrity?
- Seamless Information Access Through Data Virtualization and Federation
- Database DevOps Integration: Bridging the Gap Between Development and Operations
- Navicat Sponsors SQLBits 2025 – Supporting the Future of Data Platforms
- May (1)
- Edge Databases: Empowering Distributed Computing Environments
- The Rise of Low-Code/No-Code Database Interfaces: Democratizing Data Management
- Data Vault 2.0: A Modern Approach to Enterprise Data Modeling
- Streaming-First Architectures: Revolutionizing Real-Time Data Processing
- Navicat Proudly Sponsors PGConf.de 2025 as Silver Sponsor (Two Free Tickets Up for Grabs!)
- April (1)
- March (1)
- February (1)
- January (1)
- June (1)
- 2024 (1)
- 2023 (1)
- 2022 (1)
- 2021 (1)
- 2020 (1)
- 2019 (1)
- 2018 (1)
- 2017 (1)