Backup and Recovery

How to Use Immutable Backups to Fight Ransomware

June 17, 2021

Immutable backups prevent ransomware attacks or accidental data deletions and modifications. Learn their key features and how to use them to protect your data.

Read more

What Is Data Replication? {Replication Types and Schemes Explained}


Database replication is used to improve data security, increase availability and performance, and make the database more robust. This tutorial covers different methods for database replication.

Read more

OLTP vs. OLAP: A Comprehensive Comparison

June 8, 2021

With massive amounts of data, different processing techniques are used depending on whether you need to add information to a database or retrieve it for analytical purposes. Learn how OLTP and OLAP apply to real examples and how each process applies.

Read more

What Is Database Denormalization?

June 3, 2021

You've normalized a database, but now it's too complicated to analyze data. Database denormalization is a commonly used process in data analytics to simplify reports. Learn about the various methods to denormalize a database and when to apply it.

Read more

How to Provision and Secure Tokens and Secrets in phoenixNAP EMP


Learn how to provision and secure tokens, secrets, and other security objects in phoenixNAP EMP.

Read more

What is Database Normalization?

May 26, 2021

Database normalization is a key concept in database design. Learn how to organize the data and divide it into optimal tables for maximized efficiency.

Read more

phoenixNAP EMP Account Provisioning and Overview

May 6, 2021

Get acquainted with phoenxNAP’s EMP and learn how to create, manage, and maintain accounts and users.

Read more

How To Use MySQL Triggers

April 12, 2021

MySQL triggers provide control over data validation when inserting, updating or deleting data from a database. Learn how to use triggers through an example database and when to use each type of trigger.

Read more

How VMware Tenants Apply the Fortanix Encryption Policy

January 14, 2021

The Fortanix Key Management Service (KMS) provides enhanced privacy compliance in multi-tenant cloud environments. Learn how to expose the policy as a service provider, and apply it as a tenant on PhoenixNAP's Data Security Cloud.

Read more

Crontab Reboot: How to Execute a Job Automatically at Boot

October 28, 2020

Cron jobs are a built-in Linux utility that allow you to automate and schedule recurring tasks. We go over different ways you can schedule jobs to run at system boot.

Read more