Talk Outline. Software as a Service. Software as a Service. Lecture 17: Providing Database as a Service. Professor Chen Li

Size: px
Start display at page:

Download "Talk Outline. Software as a Service. Software as a Service. Lecture 17: Providing Database as a Service. Professor Chen Li"

Transcription

1 ICS 4B: Transaction Processing and Distributed Data Management Lecture 7: Providing Database as a Service Talk Outline Software as a Service Database as a Service NetDB System Professor Chen Li Challenges for Database as a Service User Interface Issues Performance Issues Data Privacy Issues Based on slides developed by Data Encryption in DBMSs for Data Privacy Hakan Hacigumus, Bala Iyer, and Sharad Mehrotra ICDE, San Jose, CA, USA Conclusion ICS4B Notes 7 Software as a Service Software as a Service Driving forces to paradigm shift Get what you need when you need Faster, cheaper, more accessible networks Rise of distributed architectures Virtualization in server and storage technologies Established e-business infrastructures Pay what you use Don t worry how to deploy, implement, maintain, upgrade Hardware/Software is not the largest in total cost of ownership User Operations 46% Technical Support 4% Capital Cost (HW/SW) % (Source: Gartner Group) Hardware, software, network costs have been decreasing more sharply than personnel cost ICS4B Notes 7 ICS4B Notes 7 4

2 Software as a Service Database as a Service - Why? Organizations need data management Already in the market as DBMSs are complex systems to deploy, setup, maintain requires highly skilled people (DBAs etc.) with high cost storage services, disaster recovery services, services, renta-spreadsheet services etc. Ease of Administration Most Significant DB Execution Problems 58% Sun ONE, Oracle Online Services, Microsoft.NET My Services etc. Qualified Administrators 57% Compatibility 5% Qualified Programmers 5% Why not Database as a Service? ICS4B Notes 7 5 Platform Independence 4% % of respondents (Source: InfoWeek Research) ICS4B Notes 7 6 Database as a Service - Offerings NetDB - Database Service Provision Inherits all advantages of software as a service, plus Service provider allows mechanisms to create, store, access databases DB management transferred to service provider for backup, administration, restoration, space management, upgrades Developed in collaboration with University of California, Irvine and IBM Deployed on the Internet over a year ago Been used by 5 universities and more than 5 students to help teaching database classes Clients use the services providers HW, SW, personnel instead of their own Currently offered through IBM Scholars Program ICS4B Notes 7 7 ICS4B Notes 7 8

3 NetDB System Architecture Database as a Service - Issues Internet User HTTP Server Servlet Engine Database (Web Browser) (User Data) Warm Standby Standby System Backup/Recovery Three tier architecture Client - as thin as possible - just a browser Java based implementation Backed by fail-over solutions Allows expansions and user driven integration for application development ICS4B Notes 7 9 Issues to address: User Interface Performance Data Privacy ICS4B Notes 7 User Interface Performance ICS4B Notes 7 Simple yet powerful supports SQL queries, scripts, UDFs, stored procedures, metadata, data upload 4 Consistent Region-based composition Expansion/Integration User defined interfaces Interaction in a different medium - network Performance should -at least- match what we have already Experimented with TPC-H database and queries Performance DB vs NetDB Performance Ratio Scale Factor. DB NetDB ICS4B Notes 7

4 myencryption{ asdas dadsasd asdd; asdas d ad ; asfsfffsddas dadsasd asdd; asdas dad asdd; asdas dadsasd asdd; asdadsasd asdd; } Data Privacy Encryption Alternatives Users give control of their data to service provider Attacks on stored data is a well known problem So, they need data security in place Implementation Level Software v.s. Hardware encryption? Security of data over the network is well studied SSL,TSL Granularity of Data Field (Attribute) level Row (Record) level (Disk) Page level ID NAME DEPTID SALARY $Sfsdf@_))#$dw?~$@<?.%*##!@<<&&=+ Fg4$$xX@<+- John White 4 Establish security for stored data even it is stolen should not make sense Encryption! iiiiiiiiiiiiiiiiiiii %&*((@sfddw?~$@<?.%d(*##!@<<&&=+ <?.%d(*##!@%&*((@ 4 %5>LWe?#@ Linda Cone <<&&=+sfddw?~$@ 9?~$<&&=+@<?.% 4 We??#@$&& Bob Drake %&*((@sfddwd(*##!@< 85 %&*((@sfddw? 5 Dadsf$&%!Aq Sarah 7 ((@sfd 95 ICS4B Notes 7 ICS4B Notes 7 4 Encryption Alternatives () Encryption Alternatives () Field level encryption Row level encryption Pros: Easier to implement and integrate Flexible Allows selective encryption, reduces number of bytes to encrypt/decrypt Pros: Reduces the data size expansion problem Reduces invocation cost Better security because of total encryption Cons: Increases encryption overhead significantly due to invocation cost Data size expansion (for block cipher algorithms) Current optimization technologies do not handle foreign functions well Cons: Does not allow selective encryption, increases the number of bytes to encrypt/decrypt Implementation and integration can be hard when row functions are not supported ICS4B Notes 7 5 ICS4B Notes 7 6 4

5 Encryption Alternatives (4) Encryption Alternatives Experiments Page level encryption Pros: Significantly reduces encryption/decryption overhead due to reduced invocation cost Eliminates data size expansion problem (for block ciphers) Better security because of total encryption Cons: Implementation and integration is not straightforward Increases the number of bytes to encrypt/decrypt each time Higher update/delete cost, requires re-encryption of all affected pages Experimented with TPC-H database and queries Data Granularity Implementation Field Level Row Level Page Level Software Encryption V Hardware Encryption V V Encryption scheme alternatives (V: evaluated, : not evaluated) ICS4B Notes 7 7 ICS4B Notes 7 8 Software - Field Level Encryption Software - Field Level Encryption () Block Cipher Algorithm - Blowfish Implemented as foreign function (UDF) Sample insert insert into lineitem (discount) values (encrypt(,key)); Sample select select decrypt(discount,key) from lineitem where custid = ; Creator supplies the key Unauthorized person can not get hold of the key protection even from the service provider at some level User can easily implement different encryption algorithm and check that into the system different encryption algorithm/key can be used for different fields ICS4B Notes 7 9 ICS4B Notes 7 5

6 Software - Field Level Encryption () NetDB vs NetDB* with encryption Performance Ratio Scale Factor NetDB TPC-H queries, except Q# * Only one field (l_discount of lineitem table) encrypted Introduced very large overhead NetDB* with encryption ICS4B Notes 7 TPC-H Query # Problem: Multiple decryption on same field select l_returnflag, l_linestatus, sum(l_quantity) as sum_qty, sum(l_extendedprice) as sum_base_price, sum(l_extendedprice * ( - l_discount)) as sum_disc_price, sum(l_extendedprice * ( - l_discount) * ( + l_tax)) as sum_charge, avg(l_quantity) as avg_qty, avg(l_extendedprice) as avg_price, avg(l_discount) as avg_disc, count(*) as count_order from tpcd.lineitem where l_shipdate <= date ('998--') - 9 day group by l_returnflag, l_linestatus order by l_returnflag, l_linestatus; ICS4B Notes 7 Query Rewrite to Improve Performance Hardware - Row Level Encryption Problem: Multiple decryption on same field (e.g., TPC-H Q#) CSE based algorithm to eliminate redundant decryptions Use temporary view Improvement due to rewrite Response Time Improvement Ratio Scale Factor Specialized hardware IBM S/9 Cryptographic Coprocessor under IBM OS/9 editproc facility invoked for whole row upon read/write request, encrypt/decrypt is invoked from hardware for the row ICS4B Notes 7 ICS4B Notes 7 4 6

7 SW Field Level v.s. HW Row Level Query Response Time Software vs Hardware Encryption ICS4B Notes Number of Rows Experimented on TPC-H Q# Software Field Level: Only one field is encrypted Hardware Row Level: All fields are encrypted SW HW Hardware - Page Level Encryption Relative CPU Time 5 4 Encryption Alternatives 4. ICS4B Notes 7 6. No Row Level Page Level Encryption Page level encryption is simulated It gives significant improvement due to reduction in start-up cost Conclusion Database as a Service is a new model to alleviates the need to hire professionals purchase expensive hardware/software deal with administrative and maintenance tasks It is viable model and can emerge as a successful offering Encryption is a solution for privacy -the most important issue- Hardware encryption has a clear superiority over software Hardware makes encryption practical for databases There are trade-offs for granularity of data ICS4B Notes 7 7 7

Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases

Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases This guide gives you an introduction to conducting DSS (Decision Support System)

More information

Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases

Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases This guide gives you an introduction to conducting DSS (Decision Support System)

More information

Data Management Model and Trends in NetDB2

Data Management Model and Trends in NetDB2 Providing Database as a Service Hakan Hacıgümüş Department of Information and Computer Science University of California Irvine, CA 92697, USA hakanh@acm.org Bala Iyer IBM Silicon Valley Lab. San Jose,

More information

Dell Microsoft SQL Server 2008 Fast Track Data Warehouse Performance Characterization

Dell Microsoft SQL Server 2008 Fast Track Data Warehouse Performance Characterization Dell Microsoft SQL Server 2008 Fast Track Data Warehouse Performance Characterization A Dell Technical White Paper Database Solutions Engineering Dell Product Group Anthony Fernandez Jisha J Executive

More information

Executive Summary. Introduction. WHITE PAPER Proof of Concept: Data Encryption

Executive Summary. Introduction. WHITE PAPER Proof of Concept: Data Encryption WHITE PAPER Proof of Concept: Data Encryption Increasing Security by Accelerating Data Encryption with Intel Advanced Encryption Standard New Instructions (Intel AES-NI): Testing by DuPont and Intel Corporation

More information

An Introduction to System Sizing for Data Warehousing Workloads

An Introduction to System Sizing for Data Warehousing Workloads An Introduction to System Sizing for Data Warehousing Workloads An Example Sizing Method for Optimal System Performance Tony Petrossian, pseries Performance, IBM, Austin Ann Matzou, Cluster Software Performance,

More information

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EMC DATA DOMAIN ENCRYPTION A Detailed Review White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

Running Successful Disaster Recovery Tests

Running Successful Disaster Recovery Tests Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,

More information

RUN BETTER. 2013 SAP AG. All rights reserved. 1

RUN BETTER. 2013 SAP AG. All rights reserved. 1 RUN BETTER 2013 SAP AG. All rights reserved. 1 Project SEEED Processing of Encrypted Data in SAP HANA Internal Outsourcing Data to the Cloud What do you think are the problems? 2013 SAP AG. All rights

More information

SQL Server Parallel Data Warehouse: Architecture Overview. José Blakeley Database Systems Group, Microsoft Corporation

SQL Server Parallel Data Warehouse: Architecture Overview. José Blakeley Database Systems Group, Microsoft Corporation SQL Server Parallel Data Warehouse: Architecture Overview José Blakeley Database Systems Group, Microsoft Corporation Outline Motivation MPP DBMS system architecture HW and SW Key components Query processing

More information

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT Dr. Alexander Pons, University of Miami, apons@miami.edu ABSTRACT The deployment of Web applications consisting of dynamic content requires the selection

More information

SQL Server Training Course Content

SQL Server Training Course Content SQL Server Training Course Content SQL Server Training Objectives Installing Microsoft SQL Server Upgrading to SQL Server Management Studio Monitoring the Database Server Database and Index Maintenance

More information

Eliminate SQL Server Downtime Even for maintenance

Eliminate SQL Server Downtime Even for maintenance Eliminate SQL Server Downtime Even for maintenance Eliminate Outages Enable Continuous Availability of Data (zero downtime) Enable Geographic Disaster Recovery - NO crash recovery 2009 xkoto, Inc. All

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

SAP HANA SAP s In-Memory Database. Dr. Martin Kittel, SAP HANA Development January 16, 2013

SAP HANA SAP s In-Memory Database. Dr. Martin Kittel, SAP HANA Development January 16, 2013 SAP HANA SAP s In-Memory Database Dr. Martin Kittel, SAP HANA Development January 16, 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase

More information

High Availability Databases based on Oracle 10g RAC on Linux

High Availability Databases based on Oracle 10g RAC on Linux High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database

More information

High Availability Implementation for JD Edwards EnterpriseOne

High Availability Implementation for JD Edwards EnterpriseOne High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

<Insert Picture Here> Considerations for Enterprise Cloud Computing

<Insert Picture Here> Considerations for Enterprise Cloud Computing Considerations for Enterprise Cloud Computing Kew Yoke Ling Cloud Computing and Oracle EC2 Cloud Computing today: Developers are the primary users Infrastructure not enterprise ready

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator TSM (Tivoli Storage Manager) Backup and Recovery Richard Whybrow Hertz Australia System Network Administrator 2 Preparation meets success 3 Hertz Service Delivery Hertz has over 220 car hire locations

More information

WINDOWS AZURE EXECUTION MODELS

WINDOWS AZURE EXECUTION MODELS WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,

More information

Comparing MySQL and Postgres 9.0 Replication

Comparing MySQL and Postgres 9.0 Replication Comparing MySQL and Postgres 9.0 Replication An EnterpriseDB White Paper For DBAs, Application Developers, and Enterprise Architects March 2010 Table of Contents Introduction... 3 A Look at the Replication

More information

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,

More information

Upgrading to Microsoft SQL Server 2008 R2 from Microsoft SQL Server 2008, SQL Server 2005, and SQL Server 2000

Upgrading to Microsoft SQL Server 2008 R2 from Microsoft SQL Server 2008, SQL Server 2005, and SQL Server 2000 Upgrading to Microsoft SQL Server 2008 R2 from Microsoft SQL Server 2008, SQL Server 2005, and SQL Server 2000 Your Data, Any Place, Any Time Executive Summary: More than ever, organizations rely on data

More information

Small Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing

Small Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing Reihe Informatik 1 1998 Small Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing Guido Moerkotte ' 1 Small Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing

More information

Deployment Topologies

Deployment Topologies , page 1 Multinode Cluster with Unified Nodes, page 2 Clustering Considerations, page 3 Cisco Unified Communications Domain Manager 10.6(x) Redundancy and Disaster Recovery, page 4 Capacity Considerations,

More information

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved. Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009

More information

Administering a Microsoft SQL Server 2000 Database

Administering a Microsoft SQL Server 2000 Database Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,

More information

CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA

CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

DEDUPLICATION NOW AND WHERE IT S HEADING. Lauren Whitehouse Senior Analyst, Enterprise Strategy Group

DEDUPLICATION NOW AND WHERE IT S HEADING. Lauren Whitehouse Senior Analyst, Enterprise Strategy Group DEDUPLICATION NOW AND WHERE IT S HEADING Lauren Whitehouse Senior Analyst, Enterprise Strategy Group Need Dedupe? Before/After Dedupe Deduplication Production Data Deduplication In Backup Process Backup

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Automating Data Warehouse Conceptual Schema Design and Evaluation

Automating Data Warehouse Conceptual Schema Design and Evaluation Automating Data Warehouse Conceptual Schema Design and Evaluation Cassandra Phipps Karen C. Davis ABB Inc. ECECS Dept. 650 Ackerman Rd. University of Cincinnati Columbus, OH 43202 Cincinnati, OH 45221-0030

More information

Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform

Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform Copyright Xythos Software, Inc. 2006 All Rights Reserved TABLE

More information

Administering a Microsoft SQL Server 2000 Database

Administering a Microsoft SQL Server 2000 Database Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge

More information

Redundancy Options. Presented By: Chris Williams

Redundancy Options. Presented By: Chris Williams Redundancy Options Presented By: Chris Williams Table of Contents Redundancy Overview... 3 Redundancy Benefits... 3 Introduction to Backup and Restore Strategies... 3 Recovery Models... 4 Cold Backup...

More information

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

Session 11 : (additional) Cloud Computing Advantages and Disadvantages INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud

More information

Investor Newsletter. Storage Made Easy Cloud Appliance High Availability Options WHAT IS THE CLOUD APPLIANCE?

Investor Newsletter. Storage Made Easy Cloud Appliance High Availability Options WHAT IS THE CLOUD APPLIANCE? Investor Newsletter Storage Made Easy Cloud Appliance High Availability Options WHAT IS THE CLOUD APPLIANCE? The SME Cloud Appliance is a software platform that enables companies to enhance their existing

More information

A Total Cost of Ownership Comparison of MongoDB & Oracle

A Total Cost of Ownership Comparison of MongoDB & Oracle A MongoDB White Paper A Total Cost of Ownership Comparison of MongoDB & Oracle August 2015 Table of Contents Executive Summary Cost Categories TCO for Example Projects Upfront Costs Initial Developer Effort

More information

Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/-

Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/- Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/- Senior Soft ware Developer 2 Posts Junior Soft ware Developer 4 Posts Database Administrator

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

SEP Disaster Recovery and Backup Restore: Best

SEP Disaster Recovery and Backup Restore: Best SEP Disaster Recovery and Backup Restore: Best Practices Who We Are Established, HW Development Development of Logistics SW Logistic Software Relag Develop Backup and Data Protection Software -- VMS (92)

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

Internet Services. CERN IT Department CH-1211 Genève 23 Switzerland www.cern.ch/it

Internet Services. CERN IT Department CH-1211 Genève 23 Switzerland www.cern.ch/it Monitoring best practices & tools for running highly available databases Miguel Anjo & Dawid Wojcik DM meeting 20.May.2008 Oracle Real Application Clusters Architecture RAC1 RAC2 RAC5 RAC3 RAC6 RAC4 Highly

More information

A Framework for Efficient Storage Security in RDBMS

A Framework for Efficient Storage Security in RDBMS A Framework for Efficient Storage Security in RDBMS Bala Iyer 1, Sharad Mehrotra 2, Einar Mykletun 2, Gene Tsudik 2, and Yonghua Wu 2 1 IBM Silicon Valley Lab balaiyer@us.ibm.com 2 University of California,

More information

ESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009

ESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009 ESG REPORT : Evaluating Software- vs. Hardware-Based Approaches By Lauren Whitehouse April, 2009 Table of Contents ESG REPORT Table of Contents... i Introduction... 1 External Forces Contribute to IT Challenges...

More information

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can

More information

TapeWare THE ONE SOLUTION FOR BACKUP

TapeWare THE ONE SOLUTION FOR BACKUP TapeWare THE ONE SOLUTION FOR BACKUP The ONE solution for backup When it comes to data protection for the small-to-medium enterprise, Yosemite TapeWare is the only solution you need. With platform support

More information

Extreme Java G22.3033-007

Extreme Java G22.3033-007 Extreme Java G22.3033-007 Session 13 - Sub-Topic 1 Designing Databases for ebusiness Solutions Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical

More information

Backup Strategies for Small Business

Backup Strategies for Small Business Backup Strategies for Small Business StarTech Group, Inc. Jim Scalise 11.15.2014 1 StarTech Group, Inc. 2771-29 Monument Rd. PMB 232 Jacksonville, FL 32225 CONTENTS BACKUP STRATEGIES.. 1 CLOUD BACKUP 2

More information

Copyright www.agileload.com 1

Copyright www.agileload.com 1 Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate

More information

WHITE PAPER USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES

WHITE PAPER USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES See how offering cloud and hybrid backup solutions drives business and leads customers to adopt other cloud services. If you re an IT provider, you know

More information

All Things Oracle Database Encryption

All Things Oracle Database Encryption All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption

More information

Tushar Joshi Turtle Networks Ltd

Tushar Joshi Turtle Networks Ltd MySQL Database for High Availability Web Applications Tushar Joshi Turtle Networks Ltd www.turtle.net Overview What is High Availability? Web/Network Architecture Applications MySQL Replication MySQL Clustering

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

IdP Clustering. You want to prevent service outages. High Availability and Load Balancing. Possible problems: HW failures

IdP Clustering. You want to prevent service outages. High Availability and Load Balancing. Possible problems: HW failures Clustering High Availability and Load Balancing SWITCHaai Team aai@switch.ch You want to prevent service outages Possible problems: HW failures Server component failure power failure. Network failure Software

More information

How Our Cloud Backup Solution Protects Your Network

How Our Cloud Backup Solution Protects Your Network How Our Cloud Backup Solution Protects Your Network Cloud Backup for Healthcare Key Cloud Backup Features Protection for your Whole Network The 3 Levels of Backup Intelligence 2 Our backup solution powered

More information

Eloquence Training What s new in Eloquence B.08.00

Eloquence Training What s new in Eloquence B.08.00 Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium

More information

Encrypted File Systems. Don Porter CSE 506

Encrypted File Systems. Don Porter CSE 506 Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue

More information

TARRANT COUNTY PURCHASING DEPARTMENT

TARRANT COUNTY PURCHASING DEPARTMENT JACK BEACHAM, C.P.M., A.P.P. PURCHASING AGENT TARRANT COUNTY PURCHASING DEPARTMENT AUGUST 4, 2010 RFP NO. 2010-103 ROB COX, C.P.M., A.P.P. ASSISTANT PURCHASING AGENT RFP FOR DIGITAL ASSET MANAGEMENT SYSTEM

More information

SQL 2016 and SQL Azure

SQL 2016 and SQL Azure and SQL Azure Robin Cable Robin.Cable@TCSC.com BI Consultant AGENDA Azure SQL What's New in SQL 2016 Azure SQL Azure SQL Azure is a cloud based SQL service, provided to subscribers, to host their databases.

More information

LinuxWorld Conference & Expo Server Farms and XML Web Services

LinuxWorld Conference & Expo Server Farms and XML Web Services LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware

More information

Evaluation Guide. Software vs. Appliance Deduplication

Evaluation Guide. Software vs. Appliance Deduplication Evaluation Guide Software vs. Appliance Deduplication Table of Contents Introduction... 2 Data Deduplication Overview... 3 Backup Requirements... 6 Backup Application Client Side Deduplication... 7 Backup

More information

Department of Technology Services UNIX SERVICE OFFERING

Department of Technology Services UNIX SERVICE OFFERING Department of Technology Services UNIX SERVICE OFFERING BACKGROUND The Department of Technology Services (DTS) operates dozens of UNIX-based systems to meet the business needs of its customers. The services

More information

IBM PureData System for Transactions. Technical Deep Dive. Jonathan Rossi, PureSystems Specialist rossij@us.ibm.com

IBM PureData System for Transactions. Technical Deep Dive. Jonathan Rossi, PureSystems Specialist rossij@us.ibm.com IBM expert integrated system Technical Deep Dive Maria N. Schwenger, PureSystems Specialist schwenge@us.ibm.com Jonathan Rossi, PureSystems Specialist rossij@us.ibm.com IBM PureData System for Transactions

More information

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability

More information

Database Services for Physics @ CERN

Database Services for Physics @ CERN Database Services for Physics @ CERN Deployment and Monitoring Radovan Chytracek CERN IT Department Outline Database services for physics Status today How we do the services tomorrow? Performance tuning

More information

ScaleArc for SQL Server

ScaleArc for SQL Server Solution Brief ScaleArc for SQL Server Overview Organizations around the world depend on SQL Server for their revenuegenerating, customer-facing applications, running their most business-critical operations

More information

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...

More information

TOP TEN CONSIDERATIONS

TOP TEN CONSIDERATIONS White Paper TOP TEN CONSIDERATIONS FOR CHOOSING A SERVER VIRTUALIZATION TECHNOLOGY Learn more at www.swsoft.com/virtuozzo Published: July 2006 Revised: July 2006 Table of Contents Introduction... 3 Technology

More information

Backup/Recovery Strategy and Impact on Applications. Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005

Backup/Recovery Strategy and Impact on Applications. Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005 Backup/Recovery Strategy and Impact on Applications Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005 Outline Backup and recovery overwiew Current backup strategy overview

More information

Cloud Models and Platforms

Cloud Models and Platforms Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model

More information

Online Backup by Mozy. Common Questions

Online Backup by Mozy. Common Questions Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup

More information

Automatic Encryption With V7R1 Townsend Security

Automatic Encryption With V7R1 Townsend Security Automatic Encryption With V7R1 Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 THE ENCRYPTION COMPANY 25 years experience data communication and data security Recognized

More information

<Insert Picture Here> RMAN Configuration and Performance Tuning Best Practices

<Insert Picture Here> RMAN Configuration and Performance Tuning Best Practices 1 RMAN Configuration and Performance Tuning Best Practices Timothy Chien Principal Product Manager Oracle Database High Availability Timothy.Chien@oracle.com Agenda Recovery Manager

More information

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database

More information

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Platforms High end solutions Microsoft.Net Java technology 1 Enterprise

More information

Active-Active and High Availability

Active-Active and High Availability Active-Active and High Availability Advanced Design and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: July 2015 2015 Perceptive Software. All rights reserved. Lexmark

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

IBM Tivoli Storage Manager for Microsoft SharePoint

IBM Tivoli Storage Manager for Microsoft SharePoint IBM Tivoli Storage Manager for Microsoft SharePoint 2007 IBM Corporation What is SharePoint? 2007 IBM Corporation What is SharePoint? What is SharePoint? Web-based workplace for online collaboration MS

More information

Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014

Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Topics Auditing a Geospatial Server Solution Web Server Strategies and Configuration Database Server Strategy and Configuration

More information

Oracle MulBtenant Customer Success Stories

Oracle MulBtenant Customer Success Stories Oracle MulBtenant Customer Success Stories Mul1tenant Customer Sessions at Customer Session Venue Title SAS Cigna CON6328 Mon 2:45pm SAS SoluBons OnDemand: A MulBtenant Cloud Offering CON6379 Mon 5:15pm

More information

Designing a Microsoft SQL Server 2005 Infrastructure

Designing a Microsoft SQL Server 2005 Infrastructure Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction

More information

Database Decisions: Performance, manageability and availability considerations in choosing a database

Database Decisions: Performance, manageability and availability considerations in choosing a database Database Decisions: Performance, manageability and availability considerations in choosing a database Reviewing offerings from Oracle, IBM and Microsoft 2012 Oracle and TechTarget Table of Contents Defining

More information

Database Encryption - How to Balance Security with Performance

Database Encryption - How to Balance Security with Performance Database Encryption - How to Balance Security with Performance Ulf T. Mattsson Protegrity Corp. Abstract Encryption can provide strong security for data at rest, but developing a database encryption strategy

More information

An Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

An Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security An Oracle White Paper June 2013 Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security Introduction... 1 Preventing Database Bypass with Encryption... 2 Oracle Advanced Security

More information

Looking Ahead The Path to Moving Security into the Cloud

Looking Ahead The Path to Moving Security into the Cloud Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application

More information

Management of Hardware Passwords in Think PCs.

Management of Hardware Passwords in Think PCs. Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction

More information

Spotlight - SQL LiteSpeed Return on Investment

Spotlight - SQL LiteSpeed Return on Investment Spotlight - SQL Return on Investment March 12, 2003 Written by: Greg Robidoux Edgewood Solutions www.edgewoodsolutions.com 888.788.2444 2 Introduction When evaluating a product in the IT industry some

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

Cisco Unified Contact Center Express and Cisco Unified IP IVR - Best Practices

Cisco Unified Contact Center Express and Cisco Unified IP IVR - Best Practices Cisco Unified Contact Center Express and Cisco Unified IP IVR - Best Practices Cisco Unified Contact Center Express product is a fairly open product which is programmed by the customer or partner to run

More information

What are the benefits of Cloud Computing for Small Business?

What are the benefits of Cloud Computing for Small Business? Cloud Computing A Small Business Guide. Whilst more and more small businesses are adopting Cloud Computing services, it is fair to say that most small businesses are still unsure of what Cloud Computing

More information

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system. DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows

More information

Secure Database Backups with SecureZIP

Secure Database Backups with SecureZIP Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the

More information

Leveraging the Cloud. September 22, 2011. Digital Government Institute Cloud-Enabled Government Conference Washington, DC

Leveraging the Cloud. September 22, 2011. Digital Government Institute Cloud-Enabled Government Conference Washington, DC Leveraging the Cloud September 22, 2011 Digital Government Institute Cloud-Enabled Government Conference Washington, DC General Dynamics Information Technology Aerospace Combat Systems $29.3 billion in

More information