IDUG EU 2005 Leon Katsnelson: Extending DB2 Data to Mobile Devices

Total Page:16

File Type:pdf, Size:1020Kb

IDUG EU 2005 Leon Katsnelson: Extending DB2 Data to Mobile Devices Platform:DB2 Family Extending DB2 data to mobile devices Leon Katsnelson IBM Toronto Lab [email protected] Session: E04 Tuesday, October 25 8:30 AM - 9:30 AM Room 5 1 This session … … will not have marketing charts on why mobility is important … will tell you how to make things happen. No previous experience with mobile devices or programming is required. Materials are targeted to DB2 professionals. • Mobile application architectures and factors that drive selection of one architecture vs. another • Connectivity choices and criteria • Examples of application development tools and processes in simple language …will use demos to illustrate the concepts and to show how DB2 professionals can get started with mobile applications 2 2 What kind of mobile applications are we talking about? • Applications that utilize mobile devices as one of its components • Performs business function (Java games not included) • Allows user to perform business transactions • Goes beyond email, PIM and voice • Rely on enterprise data to achieve its objectives 3 3 Mobile Devices What really matters • Connectivity • Form factor • Battery life • Availability of peripherals • Barcode, RFID scanners • Printers • Cameras • Operating system • Provisioning and maintenance • Security 4 4 Mobile Devices Connectivity • On-premises: Wi-Fi • Wi-Fi is very inexpensive and is now considered secure • Most modern mobile devices have Wi-Fi capability built in or can be retrofitted with via cards etc. • Mobile Wireless • Lower speed wireless (GPRS, EDGE) is widely available • Higher speed rollouts picking up speed with UMTS, HSDPA and EV-DO • Newer devices are starting to come out with high speed data built in 5 Deploying on premises wireless is no longer a question for any organization. With the Wi-Fi network gear being very inexpensive and with the recent security protocols greatly improving Wi-Fi security reputation, Wi-Fi has become ubiquitous in the enterprises. Majority of business mobile devices come with Wi-Fi built in. Even BlackBerry has a device with Wi-Fi built in. Companies can often count on Wi-Fi for off premises connectivity for traveling workers. There is relative an abundance of public Wi-Fi hotspots where secure VPN communications can be obtained. However, coverage is not wide enough for off- premises mission critical applications. Wireless (cellular) data technologies is the natural choice for off-premises mission critical applications. There is reasonable coverage for low speed wireless data with GPRS and x1 RTT. The 3G wireless data technologies such as HSDPA and EV-DO are delivering speeds that approach broadband to wireless devices. Coverage is currently very sparse but it appears that we are on the verge of major rollouts by all of the network operators world wide. 5 Wireless Technologies High-Speed Downlink Packet Access • Mobile broadband at ADSL speed • HSDPA is an enhancement to WCDMA, a technology that is also referred to as UMTS (Universal Mobile Telecommunications System), the 3G path chosen by most GSM operators around the world. • Europe • T-Mobile trials start in Sept. 2005, roll out in 2006 in Germany, Netherlands, UK etc. • Vodafone Italy conducting demonstrations/trials • Austria: mobilkom, tele.ring • Russia: Mobile TeleSystems, MegaFon, VimpelCom • Israel: Partner Communications • mmO2, Orange • North America • Cingular Wireless began trials in US • Rogers “has plans” 6 High-Speed Downlink Packet Access (HSDPA) is an upcoming standard for data transmission over GSM networks. We can transmit data over the cellular network today, but it's considerably slower than Wi-Fi and not really much use for Internet access from a mobile computer. The first version of HSDPA will have a theoretical top speed of 1.8 megabit per second. In real-world usage on a busy cell, it will probably deliver more like 700 or 800 kilobits. That's not as fast as Wi-Fi, but it is as fast as many hotspots, because the bottleneck for hotspots is often the backhaul to the Internet. And it's also not the whole story, because future generations of HSDPA are expected to double the top speed at least twice, eventually reaching 7.2 megabits per second, which would outrun DSL and cable modems. HSDPA technology is an optional upgrade available for WCDMA/UMTS networks and terminals. It offers a seven-fold increase in theoretical data speeds (14Mbps) for the downlink compared to today's WCDMA networks (2Mbps). In real life, these theoretical maximum data rates are rarely achieved, but the practical performance of HSDPA can be compared with current ADSL broadband, whereas WCDMA is more comparable to basic ISDN. HSDPA not only offers higher raw data rates but also it is much better designed to handle IP traffic. Therefore, end-users will experience faster response times and shorter download times. They can also download packet-data over HSDPA at the same time as having a speech call. HSDPA is an enhancement to WCDMA, a technology that is also referred to as UMTS (Universal Mobile Telecommunications System), the 3G path chosen by most GSM operators around the world. Today, there are already some 75 UMTS networks in operation around the world. In the US, Cingular (via its purchase of AT&T Wireless) has UMTS available in six cities. However, the company is planning an aggressive deployment of HSDPA, with 15 to 20 cities planned by the end of 2005 and most major metropolitan areas by the end of 2006. The six cities with current UMTS service will be upgraded to HSDPA as well. 6 Wireless Technologies WiMax • Initially being deployed as a wireless backhaul solution • Will be deployed as a mobility application starting in 2007-2008 when the 802.16e standard is ratified and WiMax-capable devices are available. • WiMax has been greatly over hyped • There are many pre-certification deployments but certification has been delayed i.e. network rollouts are delayed • Intel is a major backer 7 WiMAX is initially being deployed as a wireless backhaul solution, but will be deployed as a mobility application starting in 2007-2008 once the 802.16e standard is ratified and WiMAX-capable devices enter the market. WiMax has been greatly over hyped and at the same time has been plagued by delays. Inability to meet these exaggerated expectations can put it on the endangered list. Intel has thrown its weight behind WiMax. Since Intel is a major provider of chipsets for mobile devices and carrier gear, this may prove to be the most important factor for the viability of WiMax. 7 Wireless Technologies OFDMA • Flarion’s Proprietary technology • Qualcomm is purchasing Flarion for $600 million • T-Mobile trials in the The Hague, the Netherlands: • Impressive speeds: • downstream speed 1.5Mbps, • upstream speed 500kbps, • latency 30ms • 18 cell cites • 200 Enterprise Customers • Other trials/deployments by Telstra, Vodafone, Digita (Finland), Citizen Wireless (USA) , Cellular-One (USA), Nextel (USA) • OFDMA variant of OFDM is considered by many to be one of the most promising 4G wireless technology • It is going to take a while before any of us can use OFDMA. Carriers are too busy with HSDPA deployments 8 The progress in wireless technologies is not stopping. Wireless equipment maker, Flarion, brought to market its proprietary Flash OFDM technology which is showing great promise. The basic OFDM technology is already used as the radio interface in fixed wireless for 802.11g and 802.11a, for digital TV broadcast systems such as Digital Video Broadcast (DVB), and for Fixed WiMax systems based on the 802.16-2004 standards. Qualcomm has entered in to an agreement to purchase Flarion and transaction is expected to close before the end of 2005. Many expect that Qualcomm will champion OFDM as the next iteration of its wireless technologies. OFDMA, 8 Mobile Devices Common form factors • Tablet PC • Function specific data terminals • PDA • Smart Phone 9 Mobile devices come in many form factors. Along with available connectivity, form factor is often the determining factor for choosing one device over another for an enterprise application. When it comes to mobile devices many people think of consumer devices and PDAs and smart phones are the first devices that come to mind. In commercial world, however, devices such as tablet PCs and mobile data terminals play an important role. Commercial deployments often value attributes of specific form factors that are not important in consumer devices. For example factors such as impact and vibration tolerance, water resistance, ability to function in harsh environmental conditions that include low or high temperatures etc. are all key to many applications. Other form factor attributes such as vehicle mounts, “wearability”, ability to perform operations with one hand, availability of keyboard and handwriting and voice input, ability to provide good visibility in low and bright light and so on all play a very important role. At the same time, many knowledge workers can be well served by consumer grade devices such as PDAs an smart phones, however, many IT considerations still apply. For example, guarding against device loss, over the wire device provisioning, support by the chosen carrier and ability to get support while out of the territory of the network carrier (roaming). 9 Mobile Devices Operating systems • Windows XP Tablet PC Edition • Windows CE: Windows Mobile 2003, Windows Pocket PC Phone Edition, Windows Mobile 2005 • RIM BlackBerry OS • Palm OS • Symbian • Linux 10 Unlike the world of the PCs and servers, the choice of the operating system for the device is not nearly as important. The choice of the OS is almost always made by the device manufacturer. Therefore device operating system is pretty much determined by the choice of he form factor. For example, choosing to use Tablet PC almost guarantees that Windows XP Tablet PC Edition will be the target device operating system. On the other hand, choosing a function specific data terminal will most likely mean that a variant of Windows CE will be running on the device.
Recommended publications
  • Use Case Guidance: Selecting the Best Apps for Mongodb, and When to Evaluate Other Options
    Use Case Guidance: Selecting the best apps for MongoDB, and when to evaluate other options June 2020 Table of Contents Introduction 2 When Should I Use MongoDB? 2 MongoDB Database & Atlas: Transactional and Real-Time Analytics 3 MongoDB Atlas Data Lake: Long-Running Analytics 3 The MongoDB Data Platform 3 Key Strategic Initiatives Supported by MongoDB 4 Legacy Modernization 5 Cloud Data Strategy 5 Data as a Service (DaaS) 6 Business Agility 7 Use Cases for MongoDB 7 Single View 7 Customer Data Management and Personalization 9 Internet of Things (IoT) and Time-Series Data 10 Product Catalogs and Content Management 11 Payment Processing 13 Mobile Apps 14 Mainframe Offload 16 Operational Analytics and AI 17 Data Lake Analytics 20 Is MongoDB Always the Right Solution? 22 Common Off-the-Shelf Software Built for Relational Databases 22 CURRENT COPY: Ad-Hoc Reporting in the MongoDB Server: Unindexed Queries 22 PROPOSED REPLACEMENT COPY Assessing Analytics and Data Warehousing Use-Cases 22 Data Warehouse Replacements with Atlas Data Lake 24 Conclusion 25 We Can Help 26 Resources 27 1 Introduction Data and software are today at the heart of every business, but for many organizations, realizing the full potential of the digital economy remains a significant challenge. Since the inception of MongoDB, we’ve believed that as companies embrace digital transformation, their developers’ biggest challenges come from working with data: ● Demands for higher developer productivity and faster time to market – where release cycles are compressed to days and weeks – are being held back by rigid relational data models and traditional waterfall development practices.
    [Show full text]
  • Mobile Application Architecture Guide
    Mobile Application Architecture Guide Application Architecture Pocket Guide Series Mobile Application Pocket Guide v1.1 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. 2008 Microsoft Corporation. All rights reserved. Microsoft, MS-DOS, Windows, Windows NT, Windows Server, Active Directory, MSDN, Visual Basic, Visual C++, Visual C#, Visual Studio, and Win32 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Microsoft patterns & practices 2 Mobile Application Pocket Guide v1.1 Mobile Application Architecture Guide patterns & practices J.D.
    [Show full text]
  • IBM Db2 Hosted Data Sheet
    IBM Analytics Data sheet IBM Db2 Hosted The power of IBM Db2 software combined with the agility of cloud deployment — all under your control IBM Db2 Hosted: Your fast, economical choice Highlights The IBM Db2 solution is a multi-workload relational database system that can improve business agility and reduce costs by helping • Get the full-featured capabilities of you better manage your company’s core asset: data. And now, this IBM® Db2® Workgroup or IBM Db2 Advanced Enterprise Server system is available on demand as a cloud service, which provides the following advantages: • Support both transactional and analytics workloads • Rapid provisioning for nearly instant productivity • Migrate applications more easily thanks Avoid the usual lengthy wait for procurement and data center setup. to compatibility with IBM Db2 software and Oracle Database SQL • Monthly subscription-based licensing Pay for what you use and avoid upfront capital database management • Retain control with full database system (DBMS) expenditures. administrator (DBA) access of IBM hosted instance • Simplified administration You have full administrative control. Automatic provisioning, • Help protect your data with this advanced configuration and facilitated high availability disaster recovery security and single-tenant cloud platform (HADR) setup help lighten your workload. • Deploy IBM Db2 Hosted rapidly to • Deployment location flexibility over 30 IBM Cloud data centers around the world Help meet your data locality requirements and push data closer to where users need it by deploying to dozens of IBM Cloud data • Budget predictably with monthly centers around the world. subscription-based licensing IBM Analytics Data sheet IBM Db2 Hosted use cases IBM Db2 Hosted features The IBM Db2 solution offers the same functionality as its and configurations on-premises equivalent, so it’s equally suitable for transaction Fixed monthly fee with no hidden charges processing and analytics data workloads.
    [Show full text]
  • Improving Mobile Database Access Over Wide-Area Networks Without Degrading Consistency∗
    Improving Mobile Database Access Over Wide-Area Networks Without Degrading Consistency∗ Niraj Tolia, M. Satyanarayanan, and Adam Wolbach Carnegie Mellon University {ntolia,satya,awolbach}@cs.cmu.edu ABSTRACT 1. INTRODUCTION We report on the design, implementation, and evaluation of a sys- Relational databases lie at the core of many business processes tem called Cedar that enables mobile database access with good such as inventory control, order entry, customer relationship man- performance over low-bandwidth networks. This is accomplished agement, asset tracking, and resource scheduling. A key contrib- without degrading consistency. Cedar exploits the disk storage and utor to this success is a database’s ability to provide a consistent processing power of a mobile client to compensate for weak con- view of shared data across many geographically dispersed users, nectivity. Its central organizing principle is that even a stale client even in the face of highly concurrent updates at fine granularity. replica can be used to reduce data transmission volume from a data- Transactional semantics are part of this consistency model. base server. The reduction is achieved by using content address- Preserving consistency with acceptable performance under con- able storage to discover and elide commonality between client and ditions of weak connectivity is a difficult challenge. Indeed, it has server results. This organizing principle allows Cedar to use an been widely accepted since the early days of mobile computing that optimistic approach to solving the difficult problem of database shared data access involves a fundamental tradeoff between con- replica control. For laptop-class clients, our experiments show that sistency, good performance, and tolerance of poor network qual- Cedar improves the throughput of read-write workloads by 39% to ity [14].
    [Show full text]
  • Mobile Databases by Niloofar Banivaheb
    Mobile Databases by Niloofar Banivaheb Powerpoint Templates Page 1 Why Mobile Databases? Number of smartphones in use around the world passed 1 billion in 2012. Next billion devices could be reached within less than three years. More businesses move toward employees mobility. Powerful lightweight computing devices and low cost mobile connectivity paved the way for data-driven applications. Powerpoint Templates Page 2 Why Mobile Databases? Mobile data-driven applications enable us to access any data from anywhere, anytime. Examples: Salespersons can update sales records on the move. Reporters can update news database anytime. Doctors can retrieve patient’s medical history from anywhere. Mobile DBMSs are needed to support these applications data processing capabilities. Powerpoint Templates Page 3 Mobile Database: A mobile database is a database that can be connected to by a mobile computing device over a wireless mobile network. Mobile databases: Physically separate from the central database server. Resided on mobile devices. Capable of communicating with a central database server or other mobile clients from remote sites. Handle local queries without connectivity. Powerpoint Templates Page 4 Client-Server Mobile Databases: Mobile Laptop DB Central Mobile DBMS Server Central Central ` Database DBMS Mobile DBMS Mobile Smartphone DB Powerpoint Templates Page 5 Client-Server Mobile Databases: Client-server model is the traditional model of information systems. It is the dominant model for existing mobile databases. The server can become a single point of failure and performance bottleneck. Even storing data on a cluster of machines to backup central database might cause performance bottleneck and data inconsistency. Powerpoint Templates Page 6 Peer-to-Peer Mobile Databases: Mobile Laptop DB Tablet Mobile Mobile DBMS DB ` Mobile DBMS Mobile DBMS Mobile Smartphone DB Powerpoint Templates Page 7 Peer-to-Peer Mobile Databases: In P2P mobile databases, the database maintenance activities are distributed among clients.
    [Show full text]
  • Sophos Mobile Installation Guide
    Sophos Mobile installation guide Product Version: 8.5 Contents About this guide....................................................................................................................................... 1 About Sophos Mobile...............................................................................................................................2 Sophos Mobile licenses........................................................................................................................... 3 Trial licenses..................................................................................................................................3 Upgrade trial licenses to full licenses........................................................................................... 3 Update licenses............................................................................................................................. 3 Set up Sophos Mobile............................................................................................................................. 4 Installation prerequisites................................................................................................................4 System environment requirements................................................................................................4 Request an SSL/TLS certificate....................................................................................................5 Install and set up the Sophos Mobile server...............................................................................
    [Show full text]
  • Oracle Database Mobile Server, Administration and Deployment Guide
    Oracle®[1] Database Mobile Server Administration and Deployment Guide Release 12.1.0 E58650-01 January 2015 Oracle Database Mobile Server Administration and Deployment Guide Release 12.1.0 E58650-01 Copyright © 2014, 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Sophos Mobile Installation Guide Product Version: 9.5 Contents About This Guide
    Sophos Mobile installation guide product version: 9.5 Contents About this guide....................................................................................................................................... 1 About Sophos Mobile...............................................................................................................................2 Sophos Mobile licenses........................................................................................................................... 3 Trial licenses..................................................................................................................................3 Upgrade trial licenses to full licenses........................................................................................... 3 Update licenses............................................................................................................................. 3 Set up Sophos Mobile............................................................................................................................. 4 Installation prerequisites................................................................................................................4 System environment requirements................................................................................................4 Request an SSL/TLS certificate....................................................................................................5 Install and set up the Sophos Mobile server...............................................................................
    [Show full text]
  • MC-08 Mobile Databases
    APPLICATION PROGRAMMING: MOBILE COMPUTING [ INEA00112W ] Marek Piasecki PhD Mobile Databases (W8/2013) Storing Data on Mobile Devices Most mobile applications require data to be stored, organized, and viewed. A simple application can simply persist data in a flat file or a record store in device’s onboard memory. More complex applications can benefit from using a database which supports: − organizing data in various tables, − providing fast searching using indexes, − representing relationships between data in different tables through foreign keys. Mobile Database Definition 1. Database that can be connected to by a mobile computing device over a mobile network 2. Local (small memory footprint) data repository stored in mobile device memory , which preferably should additionally: – download and store information from central/master server (replication) – propagate changes (made during the disconnected phase) to the central server so that the master database is updated (synchronization) Desired features of Mobile Databases Selective replication – should selectively download the data that maximizes the mobile users’ locality of access Should provide the user with the needed information readily available in a form that is accessible Small size – database size should be compact enough to fit in the limited storage space available Administration-less – they should not rely on database administrative tasks Operational Constraints Disconnected Mode of operation – disconnection is a norm rather than an exception in a mobile environment. This mode of operation is preferred to conserve expensive network bandwidth and batery life . Unreliable network – Access to the server should be minimized to cope up with the high error rate experienced in a mobile environment. Limited availability of memory – the processing requirements shouldn’t place a significant burden on the limited system resources.
    [Show full text]
  • Secure Mobile Database Applications: a Case Study
    Secure Mobile Database Applications: A Case Study Georgios C. Drosatos, Pavlos S. Efraimidis, and Alexander Karakos Department of Electrical and Computer Engineering, Democritus University of Thrace, Vas. Sophias 12, 67100 Xanthi, Greece {gdrosato,pefraimi,karakos}@ee.duth.gr Abstract. In this work, we present a case study of a secure mobile database application. In particular, we design, implement and evaluate a mobile database application for an electronic announcement board. We identify a set of security issues and apply appropriate techniques to sat- isfy the corresponding security requirements. Keywords: Security, Mobile Databases, Replication, Mobile Devices 1 Introduction Mobile devices are gradually becoming commonplace. The computational and networking power of mobile devices is constantly increasing and new technolo- gies are integrated into them to support new functionalities and services. On the other hand, the field of databases and more generally data management is also expanded with new services and applications. Several modern database manage- ment systems support small-footprint databases that can be executed on mobile devices and admit disconnected computing and synchronization with a central database. We call an application that comprises a server with a central database and a number of autonomous mobile clients with replicated parts of the database a mobile database application. One of the most important issues of modern computing systems is the pro- vision of sufficient security and privacy guarantees for the user data. Security issues of mobile devices are discussed in recent works like [7]. In the field of databases and database management systems, security is a well studied subject. See for example [8] and the related chapters in [6, 3, 10].
    [Show full text]
  • Oracle Database Mobile Server, Version 12.2
    ORACLE DATA SHEET Oracle Database Mobile Server, Version 12.2 Oracle Database Mobile Server 12c (ODMS) is a highly optimized, robust and secure way to connect mobile and embedded “Internet of Things” devices to Oracle Database or Oracle NoSQL Database. Any organization with a mobile workforce or a network of remote devices can benefit from using ODMS, with its built-in security, scalability, reliably, and an off-line data access support. ODMS works with devices that use Oracle Berkeley DB - Oracle’s high performance mobile data store as well as other open source relational database products like SQLite and Java DB. With the release of ODMS 12.2, the device storage options are further expanded to include JSON records. Oracle Database Mobile Server Overview Oracle Database Mobile Server 12c is well suited for mission-critical applications or any application where high performance and reliability are required. It extends the KEY BUSIN ESS BENEFITS application grid to mobile devices, allowing access to enterprise data and applications in • Secure, efficient, resilient mobile data the absence of a network connection. When a network connection is available, ODMS synchronization with Oracle RDBMS and Oracle NoSQL Database uses highly efficient data synchronization to allow reliable and secure data exchange • Remote application, user and device between a backend: Oracle RDBMS or Oracle NoSQL Database and a device data management storage. The three main components of Oracle Database Mobile Server are: • Standards-based encryption for device Mobile Client, deployed on a mobile platform to facilitate sync and remote data, at rest and in transit. management • Highly scalable server configuration, A middle tier, comprised of Synchronization, Device and Application support large and growing mobile or Management components, coupled with the Mobile Manager administrative IoT deployments console.
    [Show full text]
  • Database Mobile Server Datasheet
    ORACLE DATA SHEET ® ORACLE DATABASE MOBILE SERVER 11g KEY NEW FEATURES IN 11.1 • Support for Java SE, including Oracle Database Mobile Server 11g is the best way to securely connect SE Embedded embedded devices and mobile applications to Oracle Database. • Device Management for Android platforms Any organization with a mobile workforce or network of remote devices • Automatic sync for Android and can benefit from using Oracle Database Mobile Server to safely and Blackberry platforms reliably link them into their existing enterprise infrastructure. Oracle • Support for Oracle Glassfish Database Mobile Server is designed to work with Berkeley DB, Oracle’s • Support for Java 1.6 high performance mobile data store. It is also compatible with SQLite, • Better integration with Oracle Berkeley DB, including the popular open source project. encryption support Oracle Database Mobile Server Overview KEY BENEFITS Oracle Database Mobile Server 11g is a reliable, secure way to link mobile applications • Secure, efficient, resilient mobile data synchronization and embedded devices into existing enterprise infrastructure. It is well suited for mission with Oracle Database critical applications or any application where high performance and reliability are • Remote application, user, and device management required. It extends the application grid to mobile devices, allowing access to enterprise data and applications in the absence of a network connection. When a network • Standards-based encryption for remote data, in both storage connection is available,
    [Show full text]