Database

CRUD – the most important database operations
CRUD: the basis for data management
  • Web development

It won’t take long for those looking to get into to software development to encounter the term CRUD. The acronym stands for the typical operations used for communicating with database systems; these normally form the basis of database management. But just how are these access functions for data management actually set up? And how much of role does CRUD play when it comes to the databases’...

CRUD: the basis for data management
Database normalization
Less redundancy thanks to database normalization
  • Technical matters

Redundancies occur when various details are combined in a single database table. These redundancies use up storage capacity and prevent efficient data processing. The relational database model offers strategies for splitting datasets among several linked tables, in a process called database normalization. Find out what it’s all about with practical examples.

Less redundancy thanks to database normalization
SQL OUTER JOIN
SQL OUTER JOIN
  • Technical matters

OUTER JOINs are queries that take place across several database tables. There are LEFT OUTER JOINs, RIGHT OUTER JOINs and FULL OUTER JOINs. Each of these JOIN types has a larger result set than the INNER JOIN. But what exactly is the difference between the individual types? Here, we will distinguish OUTER JOINs from INNER JOINs, compare the different subtypes of OUTER JOINs and explain how they...

SQL OUTER JOIN
SQL JOIN
SQL JOIN – queries across multiple data tables
  • Technical matters

A major strength of the relational database model is that information is stored in separate database tables structured according to semantic relationships. This concept, known as normalization, is the basis for data storage that is as redundancy-free as possible, but requires a mechanism with which data from different tables can be merged for queries. The different JOIN types provide users with...

SQL JOIN – queries across multiple data tables
Information Retrieval: how Search Engines retrieve Data
Information Retrieval: the Great Search for Knowledge
  • Search engine marketing

In our everyday life, we search for and receive a lot of information. Through the Internet, the searching for data and facts has changed tremendously. Search engines help us find the information we need from the vast amount available. But how do Google and other search engines actually gather the information? Behind both large search engines and smaller library databases, there are so-called...

Information Retrieval: the Great Search for Knowledge
Managed cloud hosting: customized servers
Managed cloud hosting: flexible server structures at the click of a button
  • Know-how

More and more website operators are turning to managed cloud hosting as a solution for their server environment. This option promises flexible scalability of required resources in real time, along with a wide range of services offered by the provider including the installation, maintenance, and protection of the hosting platform. So how does managed cloud hosting work? Find out what services...

Managed cloud hosting: flexible server structures at the click of a button
What are quotas?
Quotas – storage for web space and e-mail
  • Technical matters

Did you encounter the word 'quota' from your web space provider or as part of mail hosting and wonder what is it? When does this storage limit come into play? We show you when and why quotas are used and how to differentiate between the different types.

Quotas – storage for web space and e-mail
Your own knowledge base with wiki software
Your own knowledge base wiki software
  • CMS

Do you ever find yourself grabbing your smartphone mid-conversation to look something up on Wikipedia? Since the boom in mobile technology, instant access to information has become a part of everyday life, and Wikipedia is the most prominent knowledge bank of all, demonstrating the possibilities of this slimmed down CMS. But how exactly do you go about creating a wiki?

Your own knowledge base wiki software
Securing servers with Fail2ban
Securing your server with Fail2ban
  • Security

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...

Securing your server with Fail2ban
How does data backup work for databases?
Backing up your database
  • Security

Backing up your data is a popular option for securing your database. In order to create backup copies, you need additional hardware and to install a suitable backup structure. How do you secure your own network and web server against attacks and proceed to protect your databases?

Backing up your database