Comparison of Red Hat Clusters with Openvms Clusters Keith Parris Thank You to Our Global, Platinum & Gold Sponsors! Global

Total Page:16

File Type:pdf, Size:1020Kb

Comparison of Red Hat Clusters with Openvms Clusters Keith Parris Thank You to Our Global, Platinum & Gold Sponsors! Global Comparison of Red Hat Clusters with OpenVMS Clusters Keith Parris Thank you to our Global, Platinum & Gold Sponsors! Global: Platinum: Gold: OpenVMS Cluster History – VAX/VMS Version 1.0, 1978 • Includes Record Management Services (RMS) – Version 2.0, 1980 • Ethernet networking added – Version 3.0, 1982 • Lock Manager • System Communications Services (SCS) and Mass Storage Control Protocol (MSCP) • 1983: Computer Interconnect (CI) & HSC controller based clusters – Limited sharing: could mount disks for read-write access on one node and also mount them read-only on other nodes – Version 4.0, 1984 • VAXclusters: Connection Manager, Distributed Lock Manager, Cluster-wide File System – Version 4.5, 1986 • Local Area VAXcluster (LAVC) using Ethernet as a cluster interconnect OpenVMS Cluster History – Version 5.0, 1988 • Mixed-Interconnect VAXclusters – Version 5.2, 1989 • Support for 96 nodes • Lock tree remastering, based on new LOCKDIRWT parameter – Version 5.4, 1989 • MSCP Load Balancing and preferred paths • 5.4-3: Multiple-NIC support for cluster interconnect – Version 5.5, 1991 • Host-Based Volume Shadowing (HBVS) for host-based mirroring (RAID-1) • Dynamic activity-based lock tree remastering • Tape MSCP Serving – Version 6.0, 1993 • Cluster-wide Virtual I/O Cache – Version 6.2, 1995 • SCSI clusters OpenVMS Cluster History – Version 7.0, 1995 • 64-bit addressing • Fast I/O and Fast Path for optimized I/O – Version 7.1, 1996 • Memory Channel cluster interconnect – Version 7.2, 1999 • Galaxy: Shared Memory cluster interconnect, and migrate CPUs between software partitions – Version 7.3, 2001 • Improved Multiple NIC performance (simultaneous transmission over multiple paths) • XFC cluster-wide file cache – Version 8.3, 2006 • Improved activity-based lock tree remastering with new LOCKRMWT parameter – Version 8.4, 2010 • IP networks as a cluster interconnect • 6-member HBVS shadowsets Red Hat Clusters History – Version 0.01 of Linux from Linus Torvalds, 1991 – First version of Red Hat Linux, 1994 – First Red Hat Cluster Suite, circa 1996 – Red Hat acquires Sistina and open-sources GFS file system, 2003-4 – GFS2 and DLM in RHEL 5.3, 2009 – Up through RHEL 5.x: product name is Red Hat Cluster Suite – RHEL 6, 2010: • RHEL 6 as base plus “Add-Ons” – High Availability Add-On – Resilient Storage Add-On – etc. Red Hat Cluster-related Products Add-Ons for Red Hat Enterprise Linux 6 – High Availability Add-On • Provides failover services between nodes within a cluster. – Resilient Storage Add-On • CLVM (Cluster Logical Volume Manager) and GFS2 (Global File System 2) cluster-wide file system for coordinated use of a shared block device using distributed lock manager (DLM) – Load Balancer Add-On • Directs network requests to nodes within a pool of servers providing identical services – Scalable File System Add-On • XFS for support of file systems up to 100 TB in size and/or with multi- threaded parallel I/O workloads – High Performance Network Add-On • Provided remote direct memory access over Converged Ethernet (RoCE) Red Hat Definition of Clusters • Cluster Types – Storage cluster – High availability cluster – Load balancing cluster – High performance cluster – Multi-Site cluster – Stretch cluster Red Hat Definition of Clusters • Cluster Types – Storage cluster • “Storage clusters provide a consistent file system image across servers in a cluster, allowing the servers to simultaneously read and write to a single shared file system. A storage cluster simplifies storage administration by limiting the installation and patching of applications to one file system. Also, with a cluster- wide file system, a storage cluster eliminates the need for redundant copies of application data and simplifies backup and disaster recovery. The High Availability Add-On provides storage clustering in conjunction with Red Hat GFS2 (part of the Resilient Storage Add-On).” – RHEL6 HA Add-On Overview, section 1.1 – High availability cluster – Load balancing cluster – High performance cluster – Multi-Site cluster – Stretch cluster Red Hat Definition of Clusters • Cluster Types – Storage cluster – High availability cluster • “High availability clusters provide highly available services by eliminating single points of failure and by failing over services from one cluster node to another in case a node becomes inoperative. Typically, services in a high availability cluster read and write data (via read-write mounted file systems). Therefore, a high availability cluster must maintain data integrity as one cluster node takes over control of a service from another cluster node. Node failures in a high availability cluster are not visible from clients outside the cluster. (High availability clusters are sometimes referred to as Failover clusters.) The High Availability Add-On provides high availability clustering through its High Availability Service Management component, rgmanager.” – RHEL6 HA Add-On Overview, section 1.1 – Load balancing cluster – High performance cluster – Multi-Site cluster – Stretch cluster Red Hat Definition of Clusters • Cluster Types – Storage cluster – High availability cluster – Load balancing cluster • “Load-balancing clusters dispatch network service requests to multiple cluster nodes to balance the request load among the cluster nodes. Load balancing provides cost-effective scalability because you can match the number of nodes according to load requirements. If a node in a load-balancing cluster becomes inoperative, the load-balancing software detects the failure and redirects requests to other cluster nodes. Node failures in a load-balancing cluster are not visible from clients outside the cluster. Load balancing is available with the Load Balancer Add-On.” – RHEL6 HA Add-On Overview, section 1.1 – High performance cluster – Multi-Site cluster – Stretch cluster Red Hat Definition of Clusters • Cluster Types – Storage cluster – High availability cluster – Load balancing cluster – High performance cluster • “High-performance clusters use cluster nodes to perform concurrent calculations. A high-performance cluster allows applications to work in parallel, therefore enhancing the performance of the applications. (High performance clusters are also referred to as computational clusters or grid computing.) … The Red Hat Enterprise Linux High Availability Add-On contains support for configuring and managing high availability servers only. It does not support high-performance clusters.” – RHEL6 HA Add-On Overview, section 1.1 – Multi-Site cluster – Stretch cluster Red Hat Definition of Clusters • Cluster Types – Storage cluster – High availability cluster – Load balancing cluster – High performance cluster – Multi-Site cluster • “Multi-site or disaster-tolerant clusters are separate clusters that run at different physical sites, typically using SAN-based storage replication to replicate data. Multi-site clusters are usually used in an active/passive manner for disaster recovery with manual failover of the active cluster to the passive cluster.” -- Red Hat Enterprise Linux Cluster, High Availability, and GFS Deployment Best Practices, Updated 22 Feb 2013, https://access.redhat.com/knowledge/articles/40051 – Stretch cluster Red Hat Definition of Clusters • Cluster Types – Storage cluster – High availability cluster – Load balancing cluster – High performance cluster – Multi-Site cluster – Stretch cluster • “Stretch clusters are single-cluster configurations that span multiple physical sites. Additional details on the supportability of multi-site and stretch clusters can be found in Support for Red Hat Enterprise Linux Cluster and High Availability Stretch Architectures and please note that all stretch clusters require an architecture review.” -- Red Hat Enterprise Linux Cluster, High Availability, and GFS Deployment Best Practices, Updated 22 Feb 2013, https://access.redhat.com/knowledge/articles/40051 Red Hat Definition of Clusters • Cluster Types • Red Hat Clusters focus on capabilities of these types: 1. High availability cluster 2. Load balancing cluster Red Hat High Availability Add-On • Overview Source: RedHat.com Red Hat High Availability Add-On • Components – Conga: User Interface for configuration & management • luci: Runs on management server and provides web-based GUI interface • ricci: Agent which runs on each cluster node – CCS: Cluster Configuration System • Provides CLI interface for cluster management – corosync: cluster executive • Implements the Totem Single Ring Ordering and Membership Protocol • Came from OpenAIS open cluster infrastructure project from the Service Availability Forum – rgmanager: Resource Group Manager for failover/relocation of services – CMAN: Cluster Manager -- handles quorum – fenced: Fencing system – CLVM: Cluster Logical Volume Manager (clustered version of LVM2) – GFS2: shared-disk cluster file system – DLM: Distributed Lock Manager – Load Balancer based on Piranha (Linux Virtual Server, LVS) OpenVMS Cluster • Limitations • Supported Limits – Number of nodes supported: 96 – Data sharing: As many as all cluster nodes at once – Number of geographical sites supported in a cluster: Unlimited • Synchronously-replicated identical copies of data in up to 6 sites at once with Volume Shadowing and OpenVMS Version 8.4 – Distance between sites: • 150 miles out-of-the-box • 500 miles with DTCS (Disaster Tolerant Continuity Services) • >500 miles supported with Product Manager approval Red Hat High Availability Add-On • Limitations • Supported Limits – Number of nodes supported: 16 – Data sharing: 1 node at a time
Recommended publications
  • Red Hat GFS 6.0 Administrator's Guide
    Red Hat GFS 6.0 Administrator's Guide Red Hat GFS 6.0: Administrator's Guide Copyright © 2004 and 2005 Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rh-gfsg(EN)-6.0-Print-RHI (2005-08-02T11:07-0400) Copyright © 2005 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction.......................................................................................................................................... i 1. Audience ................................................................................................................................ i 2. Document
    [Show full text]
  • Openvms Record Management Services Reference Manual
    OpenVMS Record Management Services Reference Manual Order Number: AA-PV6RD-TK April 2001 This reference manual contains general information intended for use in any OpenVMS programming language, as well as specific information on writing programs that use OpenVMS Record Management Services (OpenVMS RMS). Revision/Update Information: This manual supersedes the OpenVMS Record Management Services Reference Manual, OpenVMS Alpha Version 7.2 and OpenVMS VAX Version 7.2 Software Version: OpenVMS Alpha Version 7.3 OpenVMS VAX Version 7.3 Compaq Computer Corporation Houston, Texas © 2001 Compaq Computer Corporation Compaq, AlphaServer, VAX, VMS, the Compaq logo Registered in U.S. Patent and Trademark Office. Alpha, PATHWORKS, DECnet, DEC, and OpenVMS are trademarks of Compaq Information Technologies Group, L.P. in the United States and other countries. UNIX and X/Open are trademarks of The Open Group in the United States and other countries. All other product names mentioned herein may be the trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty.
    [Show full text]
  • Oracle Database Installation Guide 10G Release 2 (10.2)
    Oracle®[1] Database Installation Guide 11g Release 2 (11.2) for HP OpenVMS Itanium E56668-01 June 2015 Oracle Database Installation Guide, 11g Release 2 (11.2) for HP OpenVMS Itanium E56668-01 Copyright © 2008, 2015, Oracle and/or its affiliates. All rights reserved. Primary Author: Nisha Sridhar Contributors: Dave Hayter, Gary Huffman, Marc Noel, Chris Schuetz, David Miller, Kevin Duffy, Steve Holck, Grant Hayden, Gary Tate This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Product Appendix 1 Software and Support Subscriptions 产品附录1 软件和支持订阅
    PRODUCT APPENDIX 1 产品附录 1 SOFTWARE AND SUPPORT 软件和支持订阅 SUBSCRIPTIONS This Product Appendix (which includes Exhibits applicable to specific 本产品附录(包括具体红帽产品所适用的附件)包含参数描述条款及 Red Hat Products) contains terms that describe the parameters and govern your use of Software Subscriptions and Support 贵方使用软件订阅和支持订阅所适用的条款。红帽托管或在线订阅商 Subscriptions. This Product Appendix does not apply to Red Hat 品/服务不适用本产品附录。我们在本产品附录中使用但未在本产品 hosted or on-line subscription offerings. When we use a capitalized term in this Product Appendix without defining it in this Product 附 录 中 定 义 的 术 语 , 具有本产 品 附 录 适 用 的 协 议 ( 如 Appendix, the term has the meaning defined in the Agreement to http://www.redhat.com/agreements 上规定的红帽企业协议,或客户 which this Product Appendix applies, either the Red Hat Enterprise Agreement set forth at http://www.redhat.com/agreements or, if 与红帽之间共同签署的协议(如适用))中定义的含义。如果本产品 applicable, a mutually signed agreement between Client and Red 附录与本产品附录的附件有冲突、不一致或差异,以附件的条款 Hat. In the event of a conflict, inconsistency or difference between this Product Appendix and an Exhibit to this Product Appendix, the 为准。 terms of the Exhibit control. Red Hat may modify or update this Product Appendix either by 红帽可通过在 http://www.redhat.com/agreements 发布本产品附录 posting a revised version of this Product Appendix at http://www.redhat.com/agreements, or by providing notice using 的修订版或以其他合理的方式提供通知,对本产品附录进行修改或 other reasonable means. If you do not agree to the revised version 更新。如果贵方不同意经修改的版本,则 (a) 截至更新日期贵方已购 then, (a) the existing Product Appendix will continue to apply to Red Hat Products you have purchased as of the date of the update for the 买的红帽产品,将在当时的订阅期的剩余期限内继续适用现有的产 remainder of the then-current Subscription term(s); and (b) the 品附录;且 (b) 在经修改的版本的生效日期之后对红帽产品的任何新 revised version will apply to any new purchases or renewals of Red Hat Products made after the effective date of the revised version.
    [Show full text]
  • Software Product Description and Quickspecs
    VSI OpenVMS Alpha Version 8.4-2L2 Operating System DO-DVASPQ-01A Software Product Description and QuickSpecs PRODUCT NAME: VSI OpenVMS Alpha Version 8.4-2L2 DO-DVASPQ-01A This SPD and QuickSpecs describes the VSI OpenVMS Alpha Performance Release Operating System software, Version 8.4-2L2 (hereafter referred to as VSI OpenVMS Alpha V8.4-2L2). DESCRIPTION OpenVMS is a general purpose, multiuser operating system that runs in both production and development environments. VSI OpenVMS Alpha Version 8.4-2L2 is the latest release of the OpenVMS Alpha computing environment by VMS Software, Inc (VSI). VSI OpenVMS Alpha V8.4-2L2 is compiled to take advantage of architectural features such as byte and word memory reference instructions, and floating-point improvements, which are available only in HPE AlphaServer EV6 or later processors. This optimized release improves performance by taking advantage of faster hardware-based instructions that were previously emulated in software. NOTE: VSI OpenVMS Alpha V8.4-2L2 does not work on, and is not supported on, HPE AlphaServer pre-EV6 systems. OpenVMS Alpha supports HPE’s AlphaServer series computers. OpenVMS software supports industry standards, facilitating application portability and interoperability. OpenVMS provides symmetric multiprocessing (SMP) support for multiprocessing systems. The OpenVMS operating system can be tuned to perform well in a wide variety of environments. This includes combinations of compute-intensive, I/O-intensive, client/server, real-time, and other environments. Actual system performance depends on the type of computer, available physical memory, and the number and type of active disk and tape drives. The OpenVMS operating system has well-integrated networking, distributed computing, client/server, windowing, multi-processing, and authentication capabilities.
    [Show full text]
  • Openvms: an Introduction
    The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9
    [Show full text]
  • Openvms Security
    OpenVMS Security Presented by Paul Williams PARSEC Group 999 18th Street, Suite 1725 Denver, CO 80202 www.parsec.com | 888-4-PARSEC To Download this Presentation, please visit: http://www.parsec.com/public/openvmssecurity.pdf To E-mail Paul [email protected] www.parsec.com | 888-4-PARSEC Outline • OpenVMS Security Design • Physical Security • Object Security • UIC/ACL Security • User Access • Break-in Detection • Network and Internet Considerations • Encrypted Network Communication • Kerberos • Secure Socket Layer (SSL) Goals • Discuss the important points and consideration of OpenVMS Security • Concentrate on the mechanics and mechanisms of OpenVMS features. • Show how OpenVMS is one of the most secure operating systems on the market. OpenVMS Security Design • Security was designed into OpenVMS since V1.0 • Many different levels of security in OpenVMS Physical Security Object Security User Management Network Security • Has never had a virus Physical Security • System • System Console • Storage devices and media System Disk Data and Database Volumes Backups • Network devices and media Physical Security: System • Increase system reliability through restricted access Prevent intentional tampering and outage Prevent outage due to accidents • Prevent Front Panel Access Halts Reset/initializations Power switch/source Power on action settings (VAX) switch Physical Security: Console • Can be a big security hole for OpenVMS Anyone with physical access to the console can break into OpenVMS buy getting into the SYSBOOT utility. Then OpenVMS can be broken into: Buy redirecting startup Buy changing system parameters Physical Security: Getting to SYSBOOT on the Integrity Console Example • On the Integrity shutdown to the EFI Boot Manager and select the EFI Shell and create a alias.
    [Show full text]
  • Getting Even More Grip on Your Security with Pointsecure Or
    OpenVMS and Security getting even more grip on your security with Pointsecure or NDC Gerrit Woertman VSI Professional Services Alliance member VSI OpenVMS trainer EMEA & VSI OpenVMS Ambassador [email protected] www.vmsconsultancy.com Agenda • OpenVMS and Security • EU security laws to report security issues • Non‐HPE/VSI Security packages • Pointsecure – PointAudit – System Detective • Networking Dynamics Corporation (NDC) – Peek & Spy – KEY Capture – Assassin • Questions OpenVMS and Security ‐ 1 • OpenVMS – secure by design • No viruses • One of the first to become US DoD C2‐rating • Declared “Cool and Unhackable” at 2001 DefCon9 as described in 4AA0‐2896ENW.pdf (HP, 11/2005) Alpha OpenVMS with the help of Pointsecure System Detective OpenVMS and Security ‐ 2 • OpenVMS has got optional security solutions – OpenSSL (Secure Socket Layer) https://www.openssl.org/ – Common Data Security Architecture (CDSA) – Kerberos • Everything fine? Seems so, but there is still need for more and better implementation – On VSI’s research list OpenVMS and Security – 3 • OpenVMS ‐ Linux – Windows • With 100% OpenVMS no problems – fine – That’s not real; today’s softwarestacks complex – Splendid isolation? • OpenSource – is that safe? ? OpenVMS and Security – 4 • From http://vmssoftware.com/products.html Unmatched Security Compare OpenVMS' security vulnerability record against other operating systems at CVE Details: http://www.cvedetails.com. The following are direct links to reports for OpenVMS, Linux and Windows: • OpenVMS http://www.cvedetails.com/product/4990/HP‐Openvms.html?vendor_id=10
    [Show full text]
  • FORM 10−K RED HAT INC − RHT Filed: April 30, 2007 (Period: February 28, 2007)
    FORM 10−K RED HAT INC − RHT Filed: April 30, 2007 (period: February 28, 2007) Annual report which provides a comprehensive overview of the company for the past year Table of Contents PART I Item 1. Business 3 PART I ITEM 1. BUSINESS ITEM 1A. RISK FACTORS ITEM 1B. UNRESOLVED STAFF COMMENTS ITEM 2. PROPERTIES ITEM 3. LEGAL PROCEEDINGS ITEM 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS PART II ITEM 5. MARKET FOR REGISTRANT S COMMON EQUITY, RELATED STOCKHOLDER MATTERS AND ISSUER PURCHASES OF E ITEM 6. SELECTED FINANCIAL DATA ITEM 7. MANAGEMENT S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS ITEM 7A. QUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK ITEM 8. FINANCIAL STATEMENTS AND SUPPLEMENTARY DATA ITEM 9. CHANGES IN AND DISAGREEMENTS WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE ITEM 9A. CONTROLS AND PROCEDURES ITEM 9B. OTHER INFORMATION Part III ITEM 10. DIRECTORS, EXECUTIVE OFFICERS AND CORPORATE GOVERNANCE ITEM 11. EXECUTIVE COMPENSATION ITEM 12. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT AND RELATED STOCKHOLDER MATT ITEM 13. CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS, AND DIRECTOR INDEPENDENCE ITEM 14. PRINCIPAL ACCOUNTANT FEES AND SERVICES PART IV ITEM 15. EXHIBITS, FINANCIAL STATEMENT SCHEDULES SIGNATURES EX−21.1 (SUBSIDIARIES OF RED HAT) EX−23.1 (CONSENT PF PRICEWATERHOUSECOOPERS LLP) EX−31.1 (CERTIFICATION) EX−31.2 (CERTIFICATION) EX−32.1 (CERTIFICATION) Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10−K Annual Report Pursuant to Sections 13 or 15(d) of the Securities Exchange Act of 1934 (Mark One) x Annual Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 For the fiscal year ended February 28, 2007 OR ¨ Transition Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 For the transition period from to .
    [Show full text]
  • Oracle Rdb7™ Guide to Using the Oracle SQL/Services™ Client API
    Oracle Rdb7™ Guide to Using the Oracle SQL/Services™ Client API Release 7.0 Part No. A41981-1 ® Guide to Using the Oracle SQL/Services Client API Release 7.0 Part No. A41981-1 Copyright © 1993, 1996, Oracle Corporation. All rights reserved. This software contains proprietary information of Oracle Corporation; it is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. Oracle Corporation does not warrant that this document is error free. Restricted Rights Legend Programs delivered subject to the DOD FAR Supplement are ’commercial computer software’ and use, duplication and disclosure of the programs shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement. Otherwise, programs delivered subject to the Federal Acquisition Regulations are ’restricted computer software’ and use, duplication and disclosure of the programs shall be subject to the restrictions in FAR 52.227-14, Rights in Data—General, including Alternate III (June 1987). Oracle Corporation, 500 Oracle Parkway, Redwood City, CA 94065. The programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently dangerous applications. It shall be the licensee’s responsibility to take all appropriate fail-safe, back up, redundancy and other measures to ensure the safe use of such applications if the programs are used for such purposes, and Oracle disclaims liability for any damages caused by such use of the programs.
    [Show full text]
  • Red Hat Enterprise Linux 6 High Availability Add-On Overview 1 Red Hat Enterprise Linux 6
    Red Hat Enterprise Linux 6 High Availability Add-On Overview 1 Red Hat Enterprise Linux 6 High Availability Add-On Overview Overview of the High Availability Add-On for Red Hat Enterprise Linux Edition 2 2 Legal Notice Legal Notice Copyright © 2011 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 Red Hat Enterprise Linux 6 High Availability Add-On Overview 3 Abstract High Availability Add-On Overview provides an overview of the High Availability Add-On for Red Hat Enterprise Linux 6.
    [Show full text]
  • Red Hat Enterprise Linux 5 Overview and Technology Roadmap
    Red Hat Enterprise Linux 5 Overview and Technology Roadmap Seung-Do Yang, RHCA [email protected] Sales Engineer Red Hat Korea Agenda Red Hat Enterprise Linux Overview Market Overview Red Hat Linux Roadmap Update Red Hat Enterprise Linux 5 Q&A 2 What is the Market doing? Linux vs. Unix Linux vs. Unix - Installed Base (000's) Linux vs. Unix - Shipments (000's) 6,000 1,800 5,500 1,600 5,000 1,400 4,500 4,000 1,200 3,500 Linux 1,000 Linux 3,000 Unix Unix 800 2,500 2,000 600 1,500 400 1,000 200 500 0 0 2002 2003 2004 2005 2006 2007 2008 2009 2004 2005 2006 2007 2008 2009 Source: IDC: Worldwide Operating Environments Forecast, Source: IDC: Worldwide New License Revenue Shipments (SOE), December 2005, #34599 Forecast (SOE), December 2005, #34599 3 How is Linux being used? N-Tier Computational Management Clusters Infrastructures Applications Support Infrastructure Database Utility Infrastructure 4 TCO by the Numbers Average Saves ● Linux vs. Unix (37%) Examples ● Linux Web Server (54%) ● Linux Application Server (16-40%) ● Linux Database Server (12-67%) Proprietary Web Server $20.9K Proprietary v. $42.0K O! Servlet Container wer TC 40% Lo Proprietary Database Data Data 5 Top 200 Red Hat customers Transportation Services 1.0% Education 1.0% Pharmaceuticals Energy and Utilities 1.5% PhTaEdrramnuascpcaoetruiottnaic ta io lsn &S 1eM.r0ev%diciceasl 11..00%% & Medical 1.0% EneOOrttghye r a 2n2.0d.0% %Ut ilit ies 1.5% Financial Services 19.0% Retail & Distribution 3.5% Media 4.0% Manufacturing 4.5% Internet 5.0% Professional Services 6.5% High Tech
    [Show full text]