Tutorial – Chapter 4 – Error Handling

Tutorial Chapter 4 - Error Handling

Chapter-4 explores how error handling is implemented using DbTwig and the patterns promoted by AsterionDB. You also learn about hard data-types and parameter checking.

Tutorial Chapter 3 – Data Layer APIs

Chapter-3 Poster

Chapter-3 will show you how to create a procedure in a package and call the procedure from Postman. We will also cover some API design highlights and considerations.

Tutorial Chapter 1 – Getting Started

Tutorial - Chapter1 Poster

Get started quickly and easily with AsterionDB by watching this video.
In this video we will introduce the AsterionDB Digital Bunker and show you how to start writing applications following the patterns and techniques that power AsterionDB.

The NoFS Initiative by Tim Robertson, V.P. of Technology

CIO Magazine Article

The contemporary file system’s organization traces its roots back to the early days of electronic computing, organized similar to the physical filing system it was intended to replace. The physical location of a file is a leaf in a hierarchical tree structure. Security is applied at the level of the container and enforced, typically, through the honor system.

Ingesting Content From Object Storage

AsterionDB Generic Video Banner

What do you do when you have a bunch of content in an archive file that you need to ingest into AsterionDB? Simple, just unpack the archive file into AsterionDB’s drop directory!

This short video shows you how easy it is to ingest content directly into AsterionDB. One of the useful features in AsterionDB is our ‘drop directory’. Any file that you copy to the drop directory gets ingested directly into the database. We even capture metadata such as the full pathname, creation date etc.

Using a Scanner with AsterionDB

AsterionDB Generic Video Banner

AsterionDB was recently asked by a technology partner to investigate adding AI/ML capabilities into our product.

This short video provides some insight into how AsterionDB can be leveraged in your AI/ML environment.

With AsterionDB, we can secure your entire AI/ML workflow and all the assets that are worked upon.

Steve Guilford, CEO of AsterionDB Quoted in CIO Magazine

“Evolve and adapt or die. It’s that simple. Your legacy applications and IT infrastructure will not be easily retrofitted to match today’s security requirements,” he said. “Having a unified approach to IT asset management and security for both cloud and on-premises systems is where you need to be headed.”

Steve Guilford, CEO of AsterionDB Quoted in CIO Magazine

According to Steve Guilford (LinkedIn: Steven Guilford), CEO of AsterionDB, “Offloading network and security services to a dedicated DPU has distinct advantages in the AsterionDB architecture. We turn middle-tier devices into elastic security isolation components that focus specifically on networking requirements without any concern for data or business logic. This allows for the implementation of a generic API interface to centralized resources in the AsterionDB architecture. Generic APIs typically reveal a single entry-point. This single entry point thusly does not reveal any information to an infiltrator, which obviously greatly enhances security.”