Deploy a Fast and Secure Database Architecture: Oracle Optimized Solution for Secure Oracle Database

Total Page:16

File Type:pdf, Size:1020Kb

Deploy a Fast and Secure Database Architecture: Oracle Optimized Solution for Secure Oracle Database Deploy a Fast and Secure Database Architecture: Oracle Optimized Solution for Secure Oracle Database ORACLE WHITE PAPER | MARCH 2016 Table of Contents Introduction 1 Oracle Optimized Solution for Secure Oracle Database 2 Oracle Infrastructure Choices for Oracle Database 3 Benefits of Deploying Oracle Optimized Solution for Secure Oracle Database 4 Pretested Solutions for Faster Deployment, Greater Security, Less Risk 4 Virtualized Architecture for Efficient and Secure Database Consolidation 4 Validated and Flexible Configurations 6 Oracle-Only Optimizations: An Overview 7 Oracle Optimized Solution Choices and Flexibility 8 A New Generation of SPARC Processors and Servers 9 Optimizing Oracle Database Deployments 10 Optimizing for Performance and Throughput 11 Oracle Database In-Memory Option 12 Accelerating Analytics in Mixed Workloads: An Example 14 Optimizing for Security 19 Optimizing for Availability 23 Oracle Best Practices for Highly Available Databases 25 Conclusion 27 Appendix A: Key Solution Components and Technologies 28 Oracle’s SPARC M7 Processor–Based Servers 28 Oracle Solaris 30 Virtualization Technologies 31 Oracle NAS and SAN Storage Options 33 DEPLOY A FAST AND SECURE DATABASE ARCHITECTURE: ORACLE OPTIMIZED SOLUTION FOR SECURE ORACLE DATABASE I/O Connectivity and Networking 36 System and Database Management 38 References 40 DEPLOY A FAST AND SECURE DATABASE ARCHITECTURE: ORACLE OPTIMIZED SOLUTION FOR SECURE ORACLE DATABASE Introduction Increasingly companies are turning to their database investments to analyze complex business problems and inform strategic business decisions. Initiatives such as cloud delivery and big data are fueling efforts to consolidate and leverage existing database assets. Analytics are becoming progressively entwined with Oracle Database applications that require traditional transaction processing, blurring the lines between online transaction processing (OLTP) systems and data warehousing solutions. At the same time, organizations face ongoing threats—malicious attacks and malware that make infrastructure security a paramount concern. Oracle is exceptionally positioned to help customers deliver superior database and decision-support solutions, because it merges engineering efforts for its flagship Oracle Database software with the development of state-of-the-art products and technologies at each tier of the solution stack, with an intense focus on how each layer protects data assets and applications. Oracle Optimized Solution for Secure Oracle Database unites the first converged infrastructure in silicon, the fastest microprocessor, and advanced security innovations with proven best practices for deployment. Configurations extend integration across the solution stack in a design that protects Oracle Database applications and data—including data in motion, in process, and at rest—while optimizing performance, security, and availability for both OLTP and analytical workloads. In addition to optimizing deployment architectures, Oracle Optimized Solutions are designed to shorten time-to-deployment as well as save money and reduce integration risk. Each solution acts as a blueprint to implement a secure and effective infrastructure solution, applying validated configurations and proven best practices to address critical business challenges. Oracle Optimized Solution for Secure Oracle Database can host multiple Oracle Database releases and many instances within a single system using less hardware, fewer licenses, and a smaller footprint. It is designed to lower cost and complexity, decreasing the total cost of ownership for Oracle Database while protecting applications, systems, and data. The solution creates a secure and flexible infrastructure to support rapid data analysis, high transaction throughput, and strategic decision-making. It takes advantage of Oracle investments in microprocessors, systems, software, and solution engineering to accelerate and secure Oracle Database analytical queries and transactional workloads. Recent Oracle-only innovations—such as Software in Silicon technology—bring significant benefits to database performance and security, helping businesses achieve faster intelligence and optimal compliance. 1 | DEPLOY A FAST AND SECURE DATABASE ARCHITECTURE: ORACLE OPTIMIZED SOLUTION FOR SECURE ORACLE DATABASE This paper describes the underlying solution architecture, technology components, optimizations, and security features, highlighting capabilities in the end-to-end Oracle converged infrastructure that add value to the overall solution. Oracle Optimized Solution for Secure Oracle Database Oracle Optimized Solutions follow an “Oracle-on-Oracle” approach that takes advantage of Oracle technologies and engineering expertise and supplies a single touch point for service and support. Oracle Optimized Solution for Secure Oracle Database is not a factory-built configuration. Instead, it is an architectural blueprint that combines Oracle technologies in proven, secure, and thoroughly tested configurations that simplify and speed deployment, allowing organizations to provision optimized database applications more rapidly. As shown in Figure 1, the solution leverages Oracle products and technologies at each tier of the Oracle technology stack—storage, networking, and compute system components; built-in virtualization technologies; the Oracle Solaris 11 operating system; and the Oracle Database software itself. In addition, database software options such as Oracle Real Application Clusters (Oracle RAC) and Oracle Database In-Memory are available. The Oracle Enterprise Manager 12c product family enables comprehensive management of the environment through an intuitive interface. Oracle Enterprise Manager Ops Center 12c, provided with all Oracle servers, supports management and monitoring for Oracle server hardware, firmware, operating systems, and virtual servers. It supplies a console that simplifies the process of applying updates, helping administrators patch and maintain systems. Applying security errata quickly, of course, helps to eliminate possible avenues of attack and reduce incidents of unplanned downtime. Figure 1. Oracle Optimized Solution for Secure Oracle Database integrates Oracle products and technologies at every tier. Oracle Optimized Solution for Secure Oracle Database supports Oracle Database 12c and Oracle Database 11g, making this solution ideal for sites to modernize and consolidate databases using cost-effective virtualized and multitenant database architectures. Oracle Database 12c supports a multitenant architecture that makes it easy to consolidate quickly and manage databases as cloud services, simplifying many traditional DBA pain points including provisioning, patching, and consolidation. The Oracle Multitenant option to Oracle Database 12c constructs a container database (CDB) that allows multiple pluggable databases (PDBs) to take advantage of shared database functionality, including a shared system global area (SGA), as well as Oracle RAC and Oracle Active Data Guard. Oracle Database 12c also offers an option for in-memory data processing—Oracle Database In-Memory—that can deliver breakthrough analytical performance on the newest generation of Oracle’s SPARC systems, the SPARC T7 and M7 servers. 2 | DEPLOY A FAST AND SECURE DATABASE ARCHITECTURE: ORACLE OPTIMIZED SOLUTION FOR SECURE ORACLE DATABASE Because innovations in hardware and software bring advances in performance, security, and availability, deploying databases based on Oracle Database 12c in this Oracle Optimized Solution is strongly recommended. If legacy applications exist that require earlier Oracle Database versions, Oracle consultants can help to migrate or modernize applications; see Migration, Upgrade, and Optimization Services for Oracle Database. Oracle Optimized Solution for Secure Oracle Database offers tremendous flexibility through configuration choices and its ability to adapt to existing environments. Customers that already have a significant investment in enterprise SAN storage, for example, can configure the solution to complement and leverage those resources. However, using Oracle storage can yield additional performance and management advantages, because Oracle Database is specifically optimized for Oracle storage (a later section explains how these optimizations boost performance and ease data management operations). Oracle Infrastructure Choices for Oracle Database In addition to Oracle Optimized Solution for Secure Oracle Database, Oracle has a full complement of database infrastructure offerings. Oracle engineered systems are fully factory-integrated systems, in contrast to the configuration flexibility offered by Oracle Optimized Solution for Secure Oracle Database. The following engineered systems are targeted at database deployments: » Oracle Database Appliance. Oracle Database Appliance is an entry-level engineered system that integrates Oracle software, servers, storage, and networking to deliver highly available database services for a range of OLTP, decision-support (DSS), and data warehousing (DW) applications. It is a 4U rack-mountable appliance that combines Oracle servers and storage to create an off-the-shelf solution for small database requirements. » Oracle Exadata Database Machine. Oracle Exadata Database Machine (also called Oracle Exadata) is an Oracle engineered system that factory-integrates Oracle hardware and software and supplies integral optimizations for Oracle Database workloads. Oracle Exadata is designed for one task and one task
Recommended publications
  • Qualys Policy Compliance Getting Started Guide
    Policy Compliance Getting Started Guide July 28, 2021 Verity Confidential Copyright 2011-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd Foster City, CA 94404 1 (650) 801 6100 Table of Contents Get Started ........................................................................................................ 5 Set Up Assets............................................................................................................................ 6 Start Collecting Compliance Data ............................................................... 8 Configure Authentication....................................................................................................... 8 Launch Compliance Scans ................................................................................................... 10 We recommend you schedule scans to run automatically .............................................. 12 How to configure scan settings............................................................................................ 12 Install Cloud Agents.............................................................................................................. 17 Evaluate Middleware Assets by Using Cloud Agent .......................................................... 17 Define Policies ................................................................................................. 21
    [Show full text]
  • Command-Line Sound Editing Wednesday, December 7, 2016
    21m.380 Music and Technology Recording Techniques & Audio Production Workshop: Command-line sound editing Wednesday, December 7, 2016 1 Student presentation (pa1) • 2 Subject evaluation 3 Group picture 4 Why edit sound on the command line? Figure 1. Graphical representation of sound • We are used to editing sound graphically. • But for many operations, we do not actually need to see the waveform! 4.1 Potential applications • • • • • • • • • • • • • • • • 1 of 11 21m.380 · Workshop: Command-line sound editing · Wed, 12/7/2016 4.2 Advantages • No visual belief system (what you hear is what you hear) • Faster (no need to load guis or waveforms) • Efficient batch-processing (applying editing sequence to multiple files) • Self-documenting (simply save an editing sequence to a script) • Imaginative (might give you different ideas of what’s possible) • Way cooler (let’s face it) © 4.3 Software packages On Debian-based gnu/Linux systems (e.g., Ubuntu), install any of the below packages via apt, e.g., sudo apt-get install mplayer. Program .deb package Function mplayer mplayer Play any media file Table 1. Command-line programs for sndfile-info sndfile-programs playing, converting, and editing me- Metadata retrieval dia files sndfile-convert sndfile-programs Bit depth conversion sndfile-resample samplerate-programs Resampling lame lame Mp3 encoder flac flac Flac encoder oggenc vorbis-tools Ogg Vorbis encoder ffmpeg ffmpeg Media conversion tool mencoder mencoder Media conversion tool sox sox Sound editor ecasound ecasound Sound editor 4.4 Real-world
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Oracle Optimized Solution for Oracle E-Business Suite a High-Performance, Flexible Architecture on SPARC T5-2 Servers and Oracle Exadata
    Oracle Optimized Solution for Oracle E-Business Suite A High-Performance, Flexible Architecture on SPARC T5-2 Servers and Oracle Exadata ORACLE WHITE P A P E R | OCTOBER 2015 Table of Contents Introduction 1 Solution Overview 2 Oracle Technologies—Everything Needed for Oracle E-Business Suite Deployment 2 Platform Infrastructure 3 Network Infrastructure and Remote Management 4 Built-in Virtualization for Simplified Oracle E-Business Suite Application Consolidation 4 High Availability Features to Keep Oracle E-Business Suite Running 6 Backup, Restore, and Disaster Recovery Solutions 6 Built-in Security Technology and Comprehensive Tools for Secure Deployment 7 Cryptographic Acceleration for Oracle E-Business Suite 7 Secure Isolation 9 Secure Access Control 9 Data Protection 9 Compliance 10 Security Best Practices for Oracle E-Business Suite Deployments 10 Security Technical Implementation Guides 11 My Oracle Support Documents 11 Component-Level Security Recommendations 12 Mapping an Oracle E-Business Suite Deployment to SPARC T5 Servers and Oracle Exadata 13 Consolidating to Oracle Systems 14 ORACLE OPTIMIZED SOLUTION FOR ORACLE E-BUSINESS SUITE A Basic Production System 15 Test Systems, Disaster Recovery Systems, and Other Systems 17 Solution Scalability 18 Consolidation of Quality Assurance, Disaster Recovery, and Other Systems 18 Consolidating onto a Single Oracle System 18 Cloud-Based Deployments 19 Additional Oracle Optimized Solutions for Oracle E-Business Suite Deployments 20 Oracle Optimized Solution for Secure Backup and Recovery
    [Show full text]
  • Trustworthy Whole-System Provenance for the Linux Kernel
    Trustworthy Whole-System Provenance for the Linux Kernel Adam Bates, Dave (Jing) Tian, Thomas Moyer Kevin R.B. Butler University of Florida MIT Lincoln Laboratory {adammbates,daveti,butler}@ufl.edu [email protected] Abstract is presently of enormous interest in a variety of dis- In a provenance-aware system, mechanisms gather parate communities including scientific data processing, and report metadata that describes the history of each ob- databases, software development, and storage [43, 53]. ject being processed on the system, allowing users to un- Provenance has also been demonstrated to be of great derstand how data objects came to exist in their present value to security by identifying malicious activity in data state. However, while past work has demonstrated the centers [5, 27, 56, 65, 66], improving Mandatory Access usefulness of provenance, less attention has been given Control (MAC) labels [45, 46, 47], and assuring regula- to securing provenance-aware systems. Provenance it- tory compliance [3]. self is a ripe attack vector, and its authenticity and in- Unfortunately, most provenance collection mecha- tegrity must be guaranteed before it can be put to use. nisms in the literature exist as fully-trusted user space We present Linux Provenance Modules (LPM), applications [28, 27, 41, 56]. Even kernel-based prove- the first general framework for the development of nance mechanisms [43, 48] and sketches for trusted provenance-aware systems. We demonstrate that LPM provenance architectures [40, 42] fall short of providing creates a trusted provenance-aware execution environ- a provenance-aware system for malicious environments. ment, collecting complete whole-system provenance The problem of whether or not to trust provenance is fur- while imposing as little as 2.7% performance overhead ther exacerbated in distributed environments, or in lay- on normal system operation.
    [Show full text]
  • April 2006 Volume 31 Number 2
    APRIL 2006 VOLUME 31 NUMBER 2 THE USENIX MAGAZINE OPINION Musings RIK FARROW OpenSolaris:The Model TOM HAYNES PROGRAMMING Code Testing and Its Role in Teaching BRIAN KERNIGHAN Modular System Programming in MINIX 3 JORRIT N. HERDER, HERBERT BOS, BEN GRAS, PHILIP HOMBURG, AND ANDREW S. TANENBAUM Some Types of Memory Are More Equal Than Others DIOMEDIS SPINELLIS Simple Software Flow Analysis Using GNU Cflow CHAOS GOLUBITSKY Why You Should Use Ruby LU KE KANIES SYSADMIN Unwanted HTTP:Who Has the Time? DAVI D MALONE Auditing Superuser Usage RANDOLPH LANGLEY C OLUMNS Practical Perl Tools:Programming, Ho Hum DAVID BLANK-EDELMAN VoIP Watch HEISON CHAK /dev/random ROBERT G. FERRELL STANDARDS USENIX Standards Activities NICHOLAS M. STOUGHTON B O OK REVIEWS Book Reviews ELIZABETH ZWICKY, WITH SAM STOVER AND RI K FARROW USENIX NOTES Letter to the Editor TED DOLOTTA Fund to Establish the John Lions Chair C ONFERENCES LISA ’05:The 19th Large Installation System Administration Conference WORLDS ’05: Second Workshop on Real, Large Distributed Systems FAST ’05: 4th USENIX Conference on File and Storage Technologies The Advanced Computing Systems Association Upcoming Events 3RD SYMPOSIUM ON NETWORKED SYSTEMS 2ND STEPS TO REDUCING UNWANTED TRAFFIC ON DESIGN AND IMPLEMENTATION (NSDI ’06) THE INTERNET WORKSHOP (SRUTI ’06) Sponsored by USENIX, in cooperation with ACM SIGCOMM JULY 6–7, 2006, SAN JOSE, CA, USA and ACM SIGOPS http://www.usenix.org/sruti06 MAY 8–10, 2006, SAN JOSE, CA, USA Paper submissions due: April 20, 2006 http://www.usenix.org/nsdi06 2006
    [Show full text]
  • Linux-Database-Bible.Pdf
    Table of Contents Linux Database Bible..........................................................................................................................................1 Preface..................................................................................................................................................................4 The Importance of This Book.................................................................................................................4 Getting Started........................................................................................................................................4 Icons in This Book..................................................................................................................................5 How This Book Is Organized.................................................................................................................5 Part ILinux and Databases................................................................................................................5 Part IIInstallation and Configuration................................................................................................5 Part IIIInteraction and Usage...........................................................................................................5 Part IVProgramming Applications...................................................................................................6 Part VAdministrivia.........................................................................................................................6
    [Show full text]
  • Trustworthy Whole-System Provenance for the Linux Kernel Adam Bates, Dave (Jing) Tian, and Kevin R.B
    Trustworthy Whole-System Provenance for the Linux Kernel Adam Bates, Dave (Jing) Tian, and Kevin R.B. Butler, University of Florida; Thomas Moyer, MIT Lincoln Laboratory https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/bates This paper is included in the Proceedings of the 24th USENIX Security Symposium August 12–14, 2015 • Washington, D.C. ISBN 978-1-939133-11-3 Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Trustworthy Whole-System Provenance for the Linux Kernel Adam Bates, Dave (Jing) Tian, Thomas Moyer Kevin R.B. Butler University of Florida MIT Lincoln Laboratory {adammbates,daveti,butler}@ufl.edu [email protected] Abstract is presently of enormous interest in a variety of dis- In a provenance-aware system, mechanisms gather parate communities including scientific data processing, and report metadata that describes the history of each ob- databases, software development, and storage [43, 53]. ject being processed on the system, allowing users to un- Provenance has also been demonstrated to be of great derstand how data objects came to exist in their present value to security by identifying malicious activity in data state. However, while past work has demonstrated the centers [5, 27, 56, 65, 66], improving Mandatory Access usefulness of provenance, less attention has been given Control (MAC) labels [45, 46, 47], and assuring regula- to securing provenance-aware systems. Provenance it- tory compliance [3]. self is a ripe attack vector, and its authenticity and in- Unfortunately, most provenance collection mecha- tegrity must be guaranteed before it can be put to use.
    [Show full text]
  • Oracle Supercluster—Secure Private Cloud Archiecture
    Oracle SuperCluster—Secure Private Cloud Architecture Overview O R A C L E T E C H N I C A L WHITE P A P E R | NOVEMBER 2015 Table of Contents Introduction 1 Oracle SuperCluster: A Secure Private Cloud Architecture 2 Oracle SuperCluster: Typical Deployment Scenario 2 Secure Isolation 3 Data Protection 6 Access Control 9 Monitoring and Logging 12 Compliance Guidance and Verification 13 Secure Multitenancy on Oracle SuperCluster: A Cloud Provider Perspective 14 Summary 15 References 15 ORACLE SUPERCLUSTER—SECURE PRIVATE CLOUD ARCHITECTURE OVERVIEW Introduction IT infrastructure operators and service providers are under increasing pressure to be more agile and to dynamically align their business goals with cloud-centric operating models. This typically requires that they provide on-demand self-service, elastic growth and contraction of provisioned application or database environments and fine-grained infrastructure (compute, storage, and network) resource sharing. Security becomes a paramount concern when hosting multiple such business user tenants, each with many individual applications and databases, all using the shared resources of a cloud. The Oracle SuperCluster system features a defense-in-depth security architecture for hosting multiple tenants in a single platform using a layered set of security controls such as secure isolation, comprehensive data protection, end-to-end access control, and comprehensive logging and compliance auditing automation. This technical white paper presents a high-level architectural overview of the available technical security controls for supporting a secure cloud architecture on the Oracle SuperCluster system, including the Oracle SuperCluster T5, M6, and M7 models. However, the specific architecture presented in this white paper is intended to be a high-level representation.
    [Show full text]
  • Name Synopsis Description
    SoX(1) Sound eXchange SoX(1) NAME SoX − Sound eXchange, the Swiss Army knife of audio manipulation SYNOPSIS sox [global-options][format-options] infile1 [[format-options] infile2]... [format-options] outfile [effect [effect-options]] ... play [global-options][format-options] infile1 [[format-options] infile2]... [format-options] [effect [effect-options]] ... rec [global-options][format-options] outfile [effect [effect-options]] ... DESCRIPTION Introduction SoX reads and writes audio files in most popular formats and can optionally apply effects to them. It can combine multiple input sources, synthesise audio, and, on manysystems, act as a general purpose audio player or a multi-track audio recorder.Italso has limited ability to split the input into multiple output files. All SoX functionality is available using just the sox command. Tosimplify playing and recording audio, if SoX is invokedas play,the output file is automatically set to be the default sound device, and if invokedas rec,the default sound device is used as an input source. Additionally,the soxi(1) command provides a con- venient way to just query audio file header information. The heart of SoX is a library called libSoX. Those interested in extending SoX or using it in other pro- grams should refer to the libSoX manual page: libsox(3). SoX is a command-line audio processing tool, particularly suited to making quick, simple edits and to batch processing. If you need an interactive,graphical audio editor,use audacity(1). *** The overall SoX processing chain can be summarised as follows: Input(s) → Combiner → Effects → Output(s) Note however, that on the SoX command line, the positions of the Output(s) and the Effects are swapped w.r.t.
    [Show full text]
  • Oracle Minicluster S7-2 Security Guide
    Oracle MiniCluster S7-2 Security Guide Part No: E69475-12 March 2021 Oracle MiniCluster S7-2 Security Guide Part No: E69475-12 Copyright © 2018, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Rapid Adoption of Cloud Data Warehouse Technology Using Datometry Hyper-Q
    Technical White Paper Copyright (C) 2019 Datometry Inc. Rapid Adoption of Cloud Data Warehouse Technology Using Datometry Hyper-Q L. Antova, D. Bryant, T. Cao, M. Duller, M. A. Soliman, F. M. Waas Datometry Inc. 300 Brannan St #610, San Francisco, CA 94107, U.S.A. www.datometry.com ABSTRACT query or manipulate data freely, yet shield them from the The database industry is about to undergo a fundamen- burden and headaches of having to maintain and operate tal transformation of unprecedented magnitude as enter- their own database. prises start trading their well-established database stacks The prospect of this new paradigm of data management for cloud-native database technology in order to take ad- is extremely powerful and well-received by IT departments vantage of the economics cloud service providers promise. across all industries [2]. However, it comes with signifi- Industry experts and analysts expect 2017 to become the cant adoption challenges. Through applications that de- watershed moment in this transformation as cloud-native pend on the specific databases they were originally written databases finally reached critical mass and maturity. Enter- for, database technology has over time established some of prises eager to move to the cloud face a significant dilemma: the strongest vendor lock-in in all of IT. Moving to a cloud- moving the content of their databases to the cloud is rela- native database requires adjusting or even rewriting of ex- tively easy. However making existing applications work with isting applications and migrations may take up to several new database platforms is an enormously costly undertaking years, cost millions, and are heavily fraught with risk.
    [Show full text]