Blog

Latest Posts

Key Rotation for SQL Server TDE in an Always On Availability Group Environment

Introduction: Managing data security in SQL Server goes beyond enabling Transparent Data Encryption (TDE)—it also requires proper lifecycle management of encryption keys,..

Read More

EXACS Standby - ORA-12154: TNS (Disable RFS Client)

Introduction In today’s data-driven world, safeguarding data is crucial. Organizations must be equipped to handle potential failures by implementing strong disaster recovery (DR)..

Read More

Safeguarding Data in the Age of AI: Why Oracle Key Vault Multi Master Matters

Introduction In today’s data-driven and AI-accelerated world, data security risks are growing faster than ever. As artificial intelligence continues to evolve, so do the..

Read More

SQL Server Always On Across Two Data Centers with Dual Witnesses and DNS CNAME – Part 1

Introduction In our existing SQL Server Always On configuration, we had a two-node setup, with each node hosted in a separate data center, and a single witness located in the..

Read More

Set Up Oracle ASM on an Azure Linux Virtual Machine: Challenges I Encountered and Their Solutions

Setting up an Oracle ASM-based database on an Azure Linux virtual machine can come with some challenges. While Microsoft provides a comprehensive official guide (Set Up Oracle ASM..

Read More

How Managed Services Keeps Your Business Running

Working as a Managed Services Administrator responsible for databases and cloud infrastructure is both challenging and rewarding. Each day presents a unique set of tasks—from..

Read More

Reasons to Use Oracle 23ai Vector Search for RAG Applications

RAG (Retrieval-augmented generation) is a technique that can provide more accurate results to queries than a generative LLM on its own because RAG uses knowledge external to data..

Read More

Managed Services That Prevent Downtime

I have been the Managed Services Team Lead at DSP-Eclipsys for over three years. Today, I would like to share my journey, as well as my roles and responsibilities in this position.

Read More

Protecting Your Encryption Keys: Lessons from the Oracle Cloud Security Breach (OKV - Part 1 )

Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..

Read More

Protecting Your Encryption Keys: (OKV - Part 2)

Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..

Read More