Talk Outline. Software as a Service. Software as a Service. Lecture 17: Providing Database as a Service. Professor Chen Li
|
|
- Ashley Henry
- 8 years ago
- Views:
Transcription
1 ICS 4B: Transaction Processing and Distributed Data Management Lecture 7: Providing Database as a Service Talk Outline Software as a Service Database as a Service NetDB System Professor Chen Li Challenges for Database as a Service User Interface Issues Performance Issues Data Privacy Issues Based on slides developed by Data Encryption in DBMSs for Data Privacy Hakan Hacigumus, Bala Iyer, and Sharad Mehrotra ICDE, San Jose, CA, USA Conclusion ICS4B Notes 7 Software as a Service Software as a Service Driving forces to paradigm shift Get what you need when you need Faster, cheaper, more accessible networks Rise of distributed architectures Virtualization in server and storage technologies Established e-business infrastructures Pay what you use Don t worry how to deploy, implement, maintain, upgrade Hardware/Software is not the largest in total cost of ownership User Operations 46% Technical Support 4% Capital Cost (HW/SW) % (Source: Gartner Group) Hardware, software, network costs have been decreasing more sharply than personnel cost ICS4B Notes 7 ICS4B Notes 7 4
2 Software as a Service Database as a Service - Why? Organizations need data management Already in the market as DBMSs are complex systems to deploy, setup, maintain requires highly skilled people (DBAs etc.) with high cost storage services, disaster recovery services, services, renta-spreadsheet services etc. Ease of Administration Most Significant DB Execution Problems 58% Sun ONE, Oracle Online Services, Microsoft.NET My Services etc. Qualified Administrators 57% Compatibility 5% Qualified Programmers 5% Why not Database as a Service? ICS4B Notes 7 5 Platform Independence 4% % of respondents (Source: InfoWeek Research) ICS4B Notes 7 6 Database as a Service - Offerings NetDB - Database Service Provision Inherits all advantages of software as a service, plus Service provider allows mechanisms to create, store, access databases DB management transferred to service provider for backup, administration, restoration, space management, upgrades Developed in collaboration with University of California, Irvine and IBM Deployed on the Internet over a year ago Been used by 5 universities and more than 5 students to help teaching database classes Clients use the services providers HW, SW, personnel instead of their own Currently offered through IBM Scholars Program ICS4B Notes 7 7 ICS4B Notes 7 8
3 NetDB System Architecture Database as a Service - Issues Internet User HTTP Server Servlet Engine Database (Web Browser) (User Data) Warm Standby Standby System Backup/Recovery Three tier architecture Client - as thin as possible - just a browser Java based implementation Backed by fail-over solutions Allows expansions and user driven integration for application development ICS4B Notes 7 9 Issues to address: User Interface Performance Data Privacy ICS4B Notes 7 User Interface Performance ICS4B Notes 7 Simple yet powerful supports SQL queries, scripts, UDFs, stored procedures, metadata, data upload 4 Consistent Region-based composition Expansion/Integration User defined interfaces Interaction in a different medium - network Performance should -at least- match what we have already Experimented with TPC-H database and queries Performance DB vs NetDB Performance Ratio Scale Factor. DB NetDB ICS4B Notes 7
4 myencryption{ asdas dadsasd asdd; asdas d ad ; asfsfffsddas dadsasd asdd; asdas dad asdd; asdas dadsasd asdd; asdadsasd asdd; } Data Privacy Encryption Alternatives Users give control of their data to service provider Attacks on stored data is a well known problem So, they need data security in place Implementation Level Software v.s. Hardware encryption? Security of data over the network is well studied SSL,TSL Granularity of Data Field (Attribute) level Row (Record) level (Disk) Page level ID NAME DEPTID SALARY $Sfsdf@_))#$dw?~$@<?.%*##!@<<&&=+ Fg4$$xX@<+- John White 4 Establish security for stored data even it is stolen should not make sense Encryption! iiiiiiiiiiiiiiiiiiii %&*((@sfddw?~$@<?.%d(*##!@<<&&=+ <?.%d(*##!@%&*((@ 4 %5>LWe?#@ Linda Cone <<&&=+sfddw?~$@ 9?~$<&&=+@<?.% 4 We??#@$&& Bob Drake %&*((@sfddwd(*##!@< 85 %&*((@sfddw? 5 Dadsf$&%!Aq Sarah 7 ((@sfd 95 ICS4B Notes 7 ICS4B Notes 7 4 Encryption Alternatives () Encryption Alternatives () Field level encryption Row level encryption Pros: Easier to implement and integrate Flexible Allows selective encryption, reduces number of bytes to encrypt/decrypt Pros: Reduces the data size expansion problem Reduces invocation cost Better security because of total encryption Cons: Increases encryption overhead significantly due to invocation cost Data size expansion (for block cipher algorithms) Current optimization technologies do not handle foreign functions well Cons: Does not allow selective encryption, increases the number of bytes to encrypt/decrypt Implementation and integration can be hard when row functions are not supported ICS4B Notes 7 5 ICS4B Notes 7 6 4
5 Encryption Alternatives (4) Encryption Alternatives Experiments Page level encryption Pros: Significantly reduces encryption/decryption overhead due to reduced invocation cost Eliminates data size expansion problem (for block ciphers) Better security because of total encryption Cons: Implementation and integration is not straightforward Increases the number of bytes to encrypt/decrypt each time Higher update/delete cost, requires re-encryption of all affected pages Experimented with TPC-H database and queries Data Granularity Implementation Field Level Row Level Page Level Software Encryption V Hardware Encryption V V Encryption scheme alternatives (V: evaluated, : not evaluated) ICS4B Notes 7 7 ICS4B Notes 7 8 Software - Field Level Encryption Software - Field Level Encryption () Block Cipher Algorithm - Blowfish Implemented as foreign function (UDF) Sample insert insert into lineitem (discount) values (encrypt(,key)); Sample select select decrypt(discount,key) from lineitem where custid = ; Creator supplies the key Unauthorized person can not get hold of the key protection even from the service provider at some level User can easily implement different encryption algorithm and check that into the system different encryption algorithm/key can be used for different fields ICS4B Notes 7 9 ICS4B Notes 7 5
6 Software - Field Level Encryption () NetDB vs NetDB* with encryption Performance Ratio Scale Factor NetDB TPC-H queries, except Q# * Only one field (l_discount of lineitem table) encrypted Introduced very large overhead NetDB* with encryption ICS4B Notes 7 TPC-H Query # Problem: Multiple decryption on same field select l_returnflag, l_linestatus, sum(l_quantity) as sum_qty, sum(l_extendedprice) as sum_base_price, sum(l_extendedprice * ( - l_discount)) as sum_disc_price, sum(l_extendedprice * ( - l_discount) * ( + l_tax)) as sum_charge, avg(l_quantity) as avg_qty, avg(l_extendedprice) as avg_price, avg(l_discount) as avg_disc, count(*) as count_order from tpcd.lineitem where l_shipdate <= date ('998--') - 9 day group by l_returnflag, l_linestatus order by l_returnflag, l_linestatus; ICS4B Notes 7 Query Rewrite to Improve Performance Hardware - Row Level Encryption Problem: Multiple decryption on same field (e.g., TPC-H Q#) CSE based algorithm to eliminate redundant decryptions Use temporary view Improvement due to rewrite Response Time Improvement Ratio Scale Factor Specialized hardware IBM S/9 Cryptographic Coprocessor under IBM OS/9 editproc facility invoked for whole row upon read/write request, encrypt/decrypt is invoked from hardware for the row ICS4B Notes 7 ICS4B Notes 7 4 6
7 SW Field Level v.s. HW Row Level Query Response Time Software vs Hardware Encryption ICS4B Notes Number of Rows Experimented on TPC-H Q# Software Field Level: Only one field is encrypted Hardware Row Level: All fields are encrypted SW HW Hardware - Page Level Encryption Relative CPU Time 5 4 Encryption Alternatives 4. ICS4B Notes 7 6. No Row Level Page Level Encryption Page level encryption is simulated It gives significant improvement due to reduction in start-up cost Conclusion Database as a Service is a new model to alleviates the need to hire professionals purchase expensive hardware/software deal with administrative and maintenance tasks It is viable model and can emerge as a successful offering Encryption is a solution for privacy -the most important issue- Hardware encryption has a clear superiority over software Hardware makes encryption practical for databases There are trade-offs for granularity of data ICS4B Notes 7 7 7
Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases
Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases This guide gives you an introduction to conducting DSS (Decision Support System)
More informationIntroduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases
Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases This guide gives you an introduction to conducting DSS (Decision Support System)
More informationData Management Model and Trends in NetDB2
Providing Database as a Service Hakan Hacıgümüş Department of Information and Computer Science University of California Irvine, CA 92697, USA hakanh@acm.org Bala Iyer IBM Silicon Valley Lab. San Jose,
More informationDell Microsoft SQL Server 2008 Fast Track Data Warehouse Performance Characterization
Dell Microsoft SQL Server 2008 Fast Track Data Warehouse Performance Characterization A Dell Technical White Paper Database Solutions Engineering Dell Product Group Anthony Fernandez Jisha J Executive
More informationExecutive Summary. Introduction. WHITE PAPER Proof of Concept: Data Encryption
WHITE PAPER Proof of Concept: Data Encryption Increasing Security by Accelerating Data Encryption with Intel Advanced Encryption Standard New Instructions (Intel AES-NI): Testing by DuPont and Intel Corporation
More informationAn Introduction to System Sizing for Data Warehousing Workloads
An Introduction to System Sizing for Data Warehousing Workloads An Example Sizing Method for Optimal System Performance Tony Petrossian, pseries Performance, IBM, Austin Ann Matzou, Cluster Software Performance,
More informationEMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
More informationAlliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
More informationRunning Successful Disaster Recovery Tests
Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,
More informationRUN BETTER. 2013 SAP AG. All rights reserved. 1
RUN BETTER 2013 SAP AG. All rights reserved. 1 Project SEEED Processing of Encrypted Data in SAP HANA Internal Outsourcing Data to the Cloud What do you think are the problems? 2013 SAP AG. All rights
More informationSQL Server Parallel Data Warehouse: Architecture Overview. José Blakeley Database Systems Group, Microsoft Corporation
SQL Server Parallel Data Warehouse: Architecture Overview José Blakeley Database Systems Group, Microsoft Corporation Outline Motivation MPP DBMS system architecture HW and SW Key components Query processing
More informationEVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT
EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT Dr. Alexander Pons, University of Miami, apons@miami.edu ABSTRACT The deployment of Web applications consisting of dynamic content requires the selection
More informationSQL Server Training Course Content
SQL Server Training Course Content SQL Server Training Objectives Installing Microsoft SQL Server Upgrading to SQL Server Management Studio Monitoring the Database Server Database and Index Maintenance
More informationEliminate SQL Server Downtime Even for maintenance
Eliminate SQL Server Downtime Even for maintenance Eliminate Outages Enable Continuous Availability of Data (zero downtime) Enable Geographic Disaster Recovery - NO crash recovery 2009 xkoto, Inc. All
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
More informationSAP HANA SAP s In-Memory Database. Dr. Martin Kittel, SAP HANA Development January 16, 2013
SAP HANA SAP s In-Memory Database Dr. Martin Kittel, SAP HANA Development January 16, 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase
More informationHigh Availability Databases based on Oracle 10g RAC on Linux
High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database
More informationHigh Availability Implementation for JD Edwards EnterpriseOne
High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More information<Insert Picture Here> Considerations for Enterprise Cloud Computing
Considerations for Enterprise Cloud Computing Kew Yoke Ling Cloud Computing and Oracle EC2 Cloud Computing today: Developers are the primary users Infrastructure not enterprise ready
More informationERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
More informationTSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator
TSM (Tivoli Storage Manager) Backup and Recovery Richard Whybrow Hertz Australia System Network Administrator 2 Preparation meets success 3 Hertz Service Delivery Hertz has over 220 car hire locations
More informationWINDOWS AZURE EXECUTION MODELS
WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,
More informationComparing MySQL and Postgres 9.0 Replication
Comparing MySQL and Postgres 9.0 Replication An EnterpriseDB White Paper For DBAs, Application Developers, and Enterprise Architects March 2010 Table of Contents Introduction... 3 A Look at the Replication
More informationOptimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
More informationUpgrading to Microsoft SQL Server 2008 R2 from Microsoft SQL Server 2008, SQL Server 2005, and SQL Server 2000
Upgrading to Microsoft SQL Server 2008 R2 from Microsoft SQL Server 2008, SQL Server 2005, and SQL Server 2000 Your Data, Any Place, Any Time Executive Summary: More than ever, organizations rely on data
More informationSmall Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing
Reihe Informatik 1 1998 Small Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing Guido Moerkotte ' 1 Small Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing
More informationDeployment Topologies
, page 1 Multinode Cluster with Unified Nodes, page 2 Clustering Considerations, page 3 Cisco Unified Communications Domain Manager 10.6(x) Redundancy and Disaster Recovery, page 4 Capacity Considerations,
More informationRedefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.
Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009
More informationAdministering a Microsoft SQL Server 2000 Database
Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,
More informationCLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
More informationBM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
More informationHow To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationDEDUPLICATION NOW AND WHERE IT S HEADING. Lauren Whitehouse Senior Analyst, Enterprise Strategy Group
DEDUPLICATION NOW AND WHERE IT S HEADING Lauren Whitehouse Senior Analyst, Enterprise Strategy Group Need Dedupe? Before/After Dedupe Deduplication Production Data Deduplication In Backup Process Backup
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationAutomating Data Warehouse Conceptual Schema Design and Evaluation
Automating Data Warehouse Conceptual Schema Design and Evaluation Cassandra Phipps Karen C. Davis ABB Inc. ECECS Dept. 650 Ackerman Rd. University of Cincinnati Columbus, OH 43202 Cincinnati, OH 45221-0030
More informationXythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform
Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform Copyright Xythos Software, Inc. 2006 All Rights Reserved TABLE
More informationAdministering a Microsoft SQL Server 2000 Database
Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge
More informationRedundancy Options. Presented By: Chris Williams
Redundancy Options Presented By: Chris Williams Table of Contents Redundancy Overview... 3 Redundancy Benefits... 3 Introduction to Backup and Restore Strategies... 3 Recovery Models... 4 Cold Backup...
More informationSession 11 : (additional) Cloud Computing Advantages and Disadvantages
INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud
More informationInvestor Newsletter. Storage Made Easy Cloud Appliance High Availability Options WHAT IS THE CLOUD APPLIANCE?
Investor Newsletter Storage Made Easy Cloud Appliance High Availability Options WHAT IS THE CLOUD APPLIANCE? The SME Cloud Appliance is a software platform that enables companies to enhance their existing
More informationA Total Cost of Ownership Comparison of MongoDB & Oracle
A MongoDB White Paper A Total Cost of Ownership Comparison of MongoDB & Oracle August 2015 Table of Contents Executive Summary Cost Categories TCO for Example Projects Upfront Costs Initial Developer Effort
More informationProject Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/-
Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/- Senior Soft ware Developer 2 Posts Junior Soft ware Developer 4 Posts Database Administrator
More informationORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
More informationSEP Disaster Recovery and Backup Restore: Best
SEP Disaster Recovery and Backup Restore: Best Practices Who We Are Established, HW Development Development of Logistics SW Logistic Software Relag Develop Backup and Data Protection Software -- VMS (92)
More informationBackup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
More informationInternet Services. CERN IT Department CH-1211 Genève 23 Switzerland www.cern.ch/it
Monitoring best practices & tools for running highly available databases Miguel Anjo & Dawid Wojcik DM meeting 20.May.2008 Oracle Real Application Clusters Architecture RAC1 RAC2 RAC5 RAC3 RAC6 RAC4 Highly
More informationA Framework for Efficient Storage Security in RDBMS
A Framework for Efficient Storage Security in RDBMS Bala Iyer 1, Sharad Mehrotra 2, Einar Mykletun 2, Gene Tsudik 2, and Yonghua Wu 2 1 IBM Silicon Valley Lab balaiyer@us.ibm.com 2 University of California,
More informationESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009
ESG REPORT : Evaluating Software- vs. Hardware-Based Approaches By Lauren Whitehouse April, 2009 Table of Contents ESG REPORT Table of Contents... i Introduction... 1 External Forces Contribute to IT Challenges...
More informationSAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation
A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can
More informationTapeWare THE ONE SOLUTION FOR BACKUP
TapeWare THE ONE SOLUTION FOR BACKUP The ONE solution for backup When it comes to data protection for the small-to-medium enterprise, Yosemite TapeWare is the only solution you need. With platform support
More informationExtreme Java G22.3033-007
Extreme Java G22.3033-007 Session 13 - Sub-Topic 1 Designing Databases for ebusiness Solutions Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical
More informationBackup Strategies for Small Business
Backup Strategies for Small Business StarTech Group, Inc. Jim Scalise 11.15.2014 1 StarTech Group, Inc. 2771-29 Monument Rd. PMB 232 Jacksonville, FL 32225 CONTENTS BACKUP STRATEGIES.. 1 CLOUD BACKUP 2
More informationCopyright www.agileload.com 1
Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate
More informationWHITE PAPER USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES
USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES See how offering cloud and hybrid backup solutions drives business and leads customers to adopt other cloud services. If you re an IT provider, you know
More informationAll Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
More informationTushar Joshi Turtle Networks Ltd
MySQL Database for High Availability Web Applications Tushar Joshi Turtle Networks Ltd www.turtle.net Overview What is High Availability? Web/Network Architecture Applications MySQL Replication MySQL Clustering
More informationDesigning, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationIdP Clustering. You want to prevent service outages. High Availability and Load Balancing. Possible problems: HW failures
Clustering High Availability and Load Balancing SWITCHaai Team aai@switch.ch You want to prevent service outages Possible problems: HW failures Server component failure power failure. Network failure Software
More informationHow Our Cloud Backup Solution Protects Your Network
How Our Cloud Backup Solution Protects Your Network Cloud Backup for Healthcare Key Cloud Backup Features Protection for your Whole Network The 3 Levels of Backup Intelligence 2 Our backup solution powered
More informationEloquence Training What s new in Eloquence B.08.00
Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium
More informationEncrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
More informationTARRANT COUNTY PURCHASING DEPARTMENT
JACK BEACHAM, C.P.M., A.P.P. PURCHASING AGENT TARRANT COUNTY PURCHASING DEPARTMENT AUGUST 4, 2010 RFP NO. 2010-103 ROB COX, C.P.M., A.P.P. ASSISTANT PURCHASING AGENT RFP FOR DIGITAL ASSET MANAGEMENT SYSTEM
More informationSQL 2016 and SQL Azure
and SQL Azure Robin Cable Robin.Cable@TCSC.com BI Consultant AGENDA Azure SQL What's New in SQL 2016 Azure SQL Azure SQL Azure is a cloud based SQL service, provided to subscribers, to host their databases.
More informationLinuxWorld Conference & Expo Server Farms and XML Web Services
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
More informationEvaluation Guide. Software vs. Appliance Deduplication
Evaluation Guide Software vs. Appliance Deduplication Table of Contents Introduction... 2 Data Deduplication Overview... 3 Backup Requirements... 6 Backup Application Client Side Deduplication... 7 Backup
More informationDepartment of Technology Services UNIX SERVICE OFFERING
Department of Technology Services UNIX SERVICE OFFERING BACKGROUND The Department of Technology Services (DTS) operates dozens of UNIX-based systems to meet the business needs of its customers. The services
More informationIBM PureData System for Transactions. Technical Deep Dive. Jonathan Rossi, PureSystems Specialist rossij@us.ibm.com
IBM expert integrated system Technical Deep Dive Maria N. Schwenger, PureSystems Specialist schwenge@us.ibm.com Jonathan Rossi, PureSystems Specialist rossij@us.ibm.com IBM PureData System for Transactions
More informationSecuring Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
More informationDatabase Services for Physics @ CERN
Database Services for Physics @ CERN Deployment and Monitoring Radovan Chytracek CERN IT Department Outline Database services for physics Status today How we do the services tomorrow? Performance tuning
More informationScaleArc for SQL Server
Solution Brief ScaleArc for SQL Server Overview Organizations around the world depend on SQL Server for their revenuegenerating, customer-facing applications, running their most business-critical operations
More informationAn Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices
An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...
More informationTOP TEN CONSIDERATIONS
White Paper TOP TEN CONSIDERATIONS FOR CHOOSING A SERVER VIRTUALIZATION TECHNOLOGY Learn more at www.swsoft.com/virtuozzo Published: July 2006 Revised: July 2006 Table of Contents Introduction... 3 Technology
More informationBackup/Recovery Strategy and Impact on Applications. Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005
Backup/Recovery Strategy and Impact on Applications Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005 Outline Backup and recovery overwiew Current backup strategy overview
More informationCloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
More informationOnline Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
More informationAutomatic Encryption With V7R1 Townsend Security
Automatic Encryption With V7R1 Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 THE ENCRYPTION COMPANY 25 years experience data communication and data security Recognized
More information<Insert Picture Here> RMAN Configuration and Performance Tuning Best Practices
1 RMAN Configuration and Performance Tuning Best Practices Timothy Chien Principal Product Manager Oracle Database High Availability Timothy.Chien@oracle.com Agenda Recovery Manager
More informationAn Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
More informationLecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.
Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Platforms High end solutions Microsoft.Net Java technology 1 Enterprise
More informationActive-Active and High Availability
Active-Active and High Availability Advanced Design and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: July 2015 2015 Perceptive Software. All rights reserved. Lexmark
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationMS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationIBM Tivoli Storage Manager for Microsoft SharePoint
IBM Tivoli Storage Manager for Microsoft SharePoint 2007 IBM Corporation What is SharePoint? 2007 IBM Corporation What is SharePoint? What is SharePoint? Web-based workplace for online collaboration MS
More informationGeospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014
Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Topics Auditing a Geospatial Server Solution Web Server Strategies and Configuration Database Server Strategy and Configuration
More informationOracle MulBtenant Customer Success Stories
Oracle MulBtenant Customer Success Stories Mul1tenant Customer Sessions at Customer Session Venue Title SAS Cigna CON6328 Mon 2:45pm SAS SoluBons OnDemand: A MulBtenant Cloud Offering CON6379 Mon 5:15pm
More informationDesigning a Microsoft SQL Server 2005 Infrastructure
Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction
More informationDatabase Decisions: Performance, manageability and availability considerations in choosing a database
Database Decisions: Performance, manageability and availability considerations in choosing a database Reviewing offerings from Oracle, IBM and Microsoft 2012 Oracle and TechTarget Table of Contents Defining
More informationDatabase Encryption - How to Balance Security with Performance
Database Encryption - How to Balance Security with Performance Ulf T. Mattsson Protegrity Corp. Abstract Encryption can provide strong security for data at rest, but developing a database encryption strategy
More informationAn Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security
An Oracle White Paper June 2013 Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security Introduction... 1 Preventing Database Bypass with Encryption... 2 Oracle Advanced Security
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationManagement of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
More informationSpotlight - SQL LiteSpeed Return on Investment
Spotlight - SQL Return on Investment March 12, 2003 Written by: Greg Robidoux Edgewood Solutions www.edgewoodsolutions.com 888.788.2444 2 Introduction When evaluating a product in the IT industry some
More informationCloud Based Application Architectures using Smart Computing
Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products
More informationCisco Unified Contact Center Express and Cisco Unified IP IVR - Best Practices
Cisco Unified Contact Center Express and Cisco Unified IP IVR - Best Practices Cisco Unified Contact Center Express product is a fairly open product which is programmed by the customer or partner to run
More informationWhat are the benefits of Cloud Computing for Small Business?
Cloud Computing A Small Business Guide. Whilst more and more small businesses are adopting Cloud Computing services, it is fair to say that most small businesses are still unsure of what Cloud Computing
More informationWould-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.
DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows
More informationSecure Database Backups with SecureZIP
Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the
More informationLeveraging the Cloud. September 22, 2011. Digital Government Institute Cloud-Enabled Government Conference Washington, DC
Leveraging the Cloud September 22, 2011 Digital Government Institute Cloud-Enabled Government Conference Washington, DC General Dynamics Information Technology Aerospace Combat Systems $29.3 billion in
More information