Articles related to the Teradata Database.

Expand All The Latest
Defense in Depth: Best Practices for Securing a Teradata Data Warehouse

“The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.”

The Art of War - General Sun Tzu

If you lived in a house that was located in a neighborhood that had a high level of crime, you would take steps to secure your home in a manner that would deter a break in, prevent future attempts and track those who have trespassed to collect evidence for prosecution. This would require multiple layers of security as only one system would not be effective in thwarting additional break ins and identifying criminals. The first level of added security might be signs or decals on the windows that communicate that the house has a security system. Additional layers might include glass-break sensors, motion and heat detectors and cameras. Lastly sirens and flashing lights would be set off if certain events transpired. This would all be tied into a central system that would collect, analyze and send data to specified authorities. In a similar manner, defense in depth is a strategy that involves implementing multiple layers of security defense mechanisms to protect critical business data.  The idea is that if a single layer or mechanism fails or is compromised,  there will be other layers and mechanisms in place to ensure the security of the data.

Exploring Teradata 13's PERIOD Data Type

The PERIOD data type was introduced in Teradata 13.0. This first article will use examples to dig into the concepts that are part of this new feature. The second article will use examples to examine all the functions available in version 13.0.

Workload Toolkit - Summary

The purpose of this series was to give you some basic queries that I use to provide me with a quick snapshot of how well tuned an EDW is from a workload analysis and database tuning perspective.

The four topics were (direct links are provided at the end of the article):

  • Part 1 - Excessive Use of String Manipulation Verbs
  • Part 2 - Analyze Secondary Index Usage
  • Part 3 - Statistics Analysis
  • Part 4 - Compression Analysis

Have you tried them yet??

Workload Toolkit – Part 4 – Compression Analysis

Ok, so I shouldn’t even need to broach this topic, as I’m sure you have all heard it before: compress, compress, and compress.

However, for some reason, some sites are still not getting it, or, they have not adequately incorporated this pertinent step in their development process, leading to tables still being implemented without adequate compression. Perhaps, the tables were compressed a long time ago, but are not taking advantage of the advances in compression. like multi-value.

Workload Toolkit - Part 3 - Statistics Analysis

In Part 3 of this series, we will take a quick look at how statistics are implemented and maintained at your site.

Statistics Collection can be a complicated and very deep-dive topic, with discussions on the frequency of collection, whether to use sampled stats, automation strategies, etc. This analysis is not going to go that deep, it is a high-level look at the statistics on the tables, and I am looking for just two things:

  • Are statistics applied to the tables or missing?
  • For those that are applied, is there consistency in the application and collection process?
Basic Teradata Admin Tools - 2 Minute Guide

For those new to Teradata, Teradata Express for VMware Player and Teradata Express for Amazon EC2 are great ways to get started with our database. These preconfigured, ready to go virtual images make getting started quick and painless. All that's left to do is fire up a query tool and write some SQL, right? Well, that is mostly true, but what if something doesn't seem to be working properly? What do you do then?

Workload Toolkit – Part 2 – Analyze Secondary Index Usage

In Part 1 of this series, we looked at the Excessive use of String Manipulation Verbs in a query. Here is that link in case you missed it:

http://developer.teradata.com/database/articles/workload-toolkit-part-i-excessive-use-of-string-manipulation-verbs

For Part 2 of this series, we will look at the implementation of secondary indexes and what impact (or lack of) they may be having.

Teradata Express Network Configuration

When first installing Teradata Express for your VMware or Amazon EC2 environment, there are some basic configuration steps that we need to make based on the IP addresses that are given to the instance when it is started.

Getting data to Teradata Express for VMware

Let's see how to make the Teradata Express for VMware (TDE-V) image easily accessible for moving flat files to and from the image.

Removing Multi-Column Statistics – A Process for Identification of Redundant Statistics

This article delves into the potential excessive use of Multi-Column (MC) Statistics and a process for identifying those that are not providing benefit and should be removed. This will reduce complexity and save resources on the re-collection of these redundant statistics.

Pages