Skip to content

Eclipsys Blog

Latest Posts

SQL Server Always On Across Two Data Centers with Dual Witnesses and DNS CNAME – Part 1

Introduction In our existing SQL Server Always On configuration, we had a two-node setup, with each node hosted in a separate data center, and a single witness located in the..

Read More

Set Up Oracle ASM on an Azure Linux Virtual Machine: Challenges I Encountered and Their Solutions

Setting up an Oracle ASM-based database on an Azure Linux virtual machine can come with some challenges. While Microsoft provides a comprehensive official guide (Set Up Oracle ASM..

Read More

Inside Eclipsys Managed Services: How DBAs Optimize Multi-Platform Environments

In today’s fast-paced IT landscape, managing databases isn’t just about keeping them online—it’s about ensuring performance, availability, security, and scalability across a wide..

Read More

How Managed Services Keeps Your Business Running

Working as a Managed Services Administrator responsible for databases and cloud infrastructure is both challenging and rewarding. Each day presents a unique set of tasks—from..

Read More

Reasons to Use Oracle 23ai Vector Search for RAG Applications

RAG (Retrieval-augmented generation) is a technique that can provide more accurate results to queries than a generative LLM on its own because RAG uses knowledge external to data..

Read More

Managed Services That Prevent Downtime

I have been the Managed Services Team Lead at Eclipsys Solutions Inc. for over three years. Today, I would like to share my journey, as well as my roles and responsibilities in..

Read More

Protecting Your Encryption Keys: (OKV - Part 2)

Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..

Read More

Protecting Your Encryption Keys: Lessons from the Oracle Cloud Security Breach (OKV - Part 1 )

Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..

Read More

Secure the Shift: Migrating TDE from Oracle 11g to 19c with Auto-Login

Introduction We live in an era defined by data and artificial intelligence (AI), where organizations invest heavily in securing their IT infrastructures. As AI continues to..

Read More