This article gives a step by step guide to utilizing Machine Learning capabilities with 2UDA. In this article, we’ll use examples of Animals to predict whether they are Mammals, Birds, Fish or Insects. Software versions We’re going to use 2UDA version 11.6-1 to implement the Machine Learning model. This version 11.6-1 combines: PostgreSQL 11.6 Orange […]
Identity Columns, initially rolled out in PostgreSQL 10, offer a standard-conforming and robust way to dynamically create auto-incrementing fields in tables. Generated Columns, computed from other columns, were first introduced in PostgreSQL 12. They enable more flexible schema design and performance benefits for your database. To cover the topic of “Identity Columns and Generated Columns […]
Let’s wrap this up. In part 1 of this blog series, I explained the different Windows build targets supported by PostgreSQL. In part 2, I showed how to test patches for Windows compatibility and how to easily spin up a Windows environment for testing and simple development. Now, in this third and final part, we’ll […]
This example will just be focusing on returning data from user defined functions, specifically returning a value as opposed to using OUT parameters. The full code is on Github. To quickly review, PL/Julia calls jl_eval_string() to execute Julia code and captures the returning jl_value_t data structure, which contains the result of the Julia code executed. […]
Increasing robustness of Full Text Search in PostgreSQL allows applications like Search Engines and Text Editing Software to utilize native support without the need for 3rd party search tools. The release of PostgreSQL 12 added new capabilities to Full Text Search in terms of rich features, performance improvements, efficiency and more. 2ndQuadrant hosted a webinar […]
The title is not clickbait or hyperbole. I intend to prove that by virtue of both design and implementation that PostgreSQL is objectively and measurably a better database1 than anything currently available, with or without money considerations.
How in the world can I claim and justify such a lofty statement? Read on, gentle nerd. I promise that your time will not be wasted.
In today’s world, organizations increasingly face an unprecedented level of threat of cyberattacks against their information assets. Cyberattacks can come in many forms. One such attack is called SQL injection. With SQL injection, rogue players target the backend database of any system. Usually, these systems are public-facing. Hackers try to send seemingly innocuous and regular […]
Ensuring high availability for our clients’ PostgreSQL databases is our primary business objective. We are able to achieve that by ensuring availability of our PostgreSQL experts round the clock and around the world. Just like we plan failover and switchover contingencies for our clients, we plan for backups and backups-of-backups for business continuity so our […]
Discover in this article and video how BDR can be easily and quickly deployed on Kubernetes thanks to our Cloud Native BDR Operator.
One method to handle input parameters with PL/Julia is to rewrite the body of the user defined function or stored procedure on the fly with the values declared as global variables. In order to do that, we need to create a new buffer big enough to hold the new global variable declarations in addition to […]