Fujitsu PostgreSQL blog | PostgreSQL (original) (raw)
Fujitsu has participated in the PostgreSQL community for over 20 years and has contributed to PostgreSQL development by developing new features, as well as creating and reviewing correction patches. And last year we took our team contributions to a whole new level.
PostgreSQL has released a new version, with a host of updates and improvement to the world’s most advanced open-source database. In this blog post, I want to take you through the key new features implemented in PostgreSQL 17.
Fujitsu Enterprise Postgres proudly sponsored FOSSASIA Summit 2024, an enthusiastic gathering of innovators and collaborators in open source technology held in Hanoi, Vietnam, engaging 5,000+ participants from 50 countries.
PostgreSQL, or Postgres as it is often known, is an advanced open source database with a long development history. Fujitsu has been one of the key contributors to its success.
I am constantly impressed by the talent and commitment of the Fujitsu engineers that work hard to make PostgreSQL the best database in the market. So, I thought that more people should know these passionate professionals, and what a day in their life is like.
Hey there, Database Administrators! After our dive into the 'Protect' pillar, it's time to shift gears to another crucial aspect of the NIST Cybersecurity Framework – the 'Detect' pillar. This is where our skills and vigilance come into play to identify potential cybersecurity events. Think of yourself as a digital detective in the vast landscape of data.
Hello, database dynamos! As we continue our look into Database Administrator security tasks and how they relate to the NIST Cybersecurity Framework, let’s follow on from risk management and talk about Governance and Data Security.
Hello, dedicated database gurus! As Database Administrators (DBAs), navigating the complex landscape of cybersecurity is crucial. The first pillar of the National Institute of Standards and Technology's (NIST) Cybersecurity Framework – Identify – provides a robust foundation for understanding and managing cybersecurity risks to systems, people, assets, data, and capabilities.