Artificial intelligence (AI) is the simulation of human intelligence by machines and computer systems. It is accomplished by studying human brain patterns and analyzing the cognitive process. With cognitive AI...
Data masking is a data security technique used to protect sensitive information by replacing it with anonymized yet realistic-looking data. This approach helps prevent unauthorized access to confidential data while...
The 1.26 version of CloudNativePG introduces the declarative offline in-place major upgrades of PostgreSQL made possible through the use of the Postgres native tool pg_upgrade. In this blog post, we...
I've been talking about debugging memory leaks for more than a year now; covering Valgrind, AdressSanitizer, memleak, and heaptrack. But there are still a few more tools to explore 1...
PostgreSQL offers powerful physical and logical replication mechanisms for ensuring data availability. EDB's Postgres Distributed (PGD) builds on these by providing an advanced, flexible distributed database solution, offering active-active replication...
In this post we'll introduce two memory leaks into Postgres and debug them with heaptrack. Like almost every memory leak tool available to us (including memleak which I wrote about...
A Testament to Craft, Community, and the Future of Open Source At EDB, we believe the best way to predict the future of Postgres is to build it. We are...
Rubrik helps secure EDB deployments against cybersecurity threats This blog was co-authored by Neel Chopra, David Wagoner, and Dave Stone As databases grow larger and more complex, their vulnerability to...
Extensions have played a crucial role in PostgreSQL’s rise as the most popular and versatile database engine. Yet managing extensions is one of the biggest challenges when running PostgresQL on...
In this post we'll set up a 3-node EDB Postgres Distributed (PGD) cluster running community Postgres 16. Then we'll upgrade the entire cluster in place from Postgres 16 to Postgres...