What s New in DataStax Enterprise 3.0? A Guide for Developers, Architects and IT Managers. White Paper
|
|
- Irma Cain
- 5 years ago
- Views:
Transcription
1 What s New in DataStax Enterprise 3.0? A Guide for Developers, Architects and IT Managers White Paper BY DATASTAX CORPORATION FEBRUARY 2013
2 Contents Introduction 3 Why DataStax Enterprise? 3 Use Cases Handled by DataStax Enterprise 4 What s New in DataStax Enterprise Edition 3.0? 4 Security 4 Internal Authentication 4 External Authentication 4 Permission Management 5 Transparent Data Encryption 5 Data Auditing 5 Client to Node Encryption 6 External Security Firm Validation 6 Enterprise Manageability 6 Visual Cluster Provisioning 6 Visual Restore and Custom Backup Management 7 Enhanced Visual Object Management 8 Automated Problem Diagnostic Collection 8 Off Cluster Metadata Repository 8 Solr Upgrade 8 Conclusion 8 About DataStax 8
3 Introduction DataStax Enterprise Edition is a complete big data platform, built on a production-certified version of Apache Cassandra, that is architected to manage real-time, batch analytic, and enterprise search data all in the same database cluster. DataStax Enterprise consists of three components: 1. DataStax Enterprise Server, which is a big data management platform that uses Apache Cassandra for real-time data management, Hadoop for batch analytics, and Apache Solr for enterprise search operations. 2. OpsCenter Enterprise, which is a visual, browser-based management tool that allows administrators to manage all database clusters, whether they are on premise, across multiple data centers, or in the cloud, from a single interface. 3. Expert support, which is delivered by the big data professionals at DataStax and includes around-the-clock coverage. This paper discusses the enhancements included in version 3.0 of DataStax Enterprise Edition, which is targeted at addressing the areas of security and enterprise manageability. Introduction Modern businesses are using data and specifically big data to transform the way they do business. Their line-of-business (LOB) applications are evolving to meet the need of providing greater capabilities and data insights than ever before, and this necessitates a new kind of technology aimed at handling big data in a technically efficient and cost effective way. Abstract DataStax Enterprise Edition is a complete big data platform, built on a production-certified version of Apache Cassandra. It manages real-time, batch analytics, and enterprise search data all in the same database cluster, and offers visual administration capabilities as well as around-the-clock expert support. The release of DataStax Enterprise Edition 3.0 offers the most comprehensive security of any NoSQL solution provider: internal and external authentication, permissions management, transparent data encryption, contextual data auditing, and confidence that data in flight is secure. It also delivers the enterprise manageability that modern businesses need. Industry experts state with one voice that legacy databases are not designed or equipped to handle the big data use cases for today s new LOB applications. For example, IDC says: Big data technologies describe a new generation of technologies and architectures, designed to economically extract value from very large volumes of a wide variety of data, by enabling high-velocity capture, discovery, and/or analysis. 1 DataStax Enterprise provides the type of technology and architecture that enables what IDC describes. Moreover, DataStax Enterprise is unique in the big data marketplace in that it smartly handles all key data dimensions real time, batch analytic, and enterprise search all in one easily managed database cluster. The benefits delivered by DataStax Enterprise can be summarized as follows: Feature Production-Certified Cassandra Continuously Available Hadoop for Analytics Benefit Apache Cassandra is a massively scalable NoSQL database that is an acknowledged industry leader at handling real time big data. DataStax certifies a version of Cassandra for its big data platform via rigorous testing, benchmarking, validation with 3rd party software, and defect resolution to ensure a chosen version is ready for production environments. The integrated Hadoop distribution is built on top of Cassandra and therefore contains no single points of failure, offers location-independent read/write capabilities, is extremely easy to use and setup, and can easily span multiple data centers and the cloud. Fault-Tolerant Solr for Search Solr, the most popular open source search platform, is enhanced by running on top of Cassandra so that it is completely fault-tolerant, scales well, and runs across multiple data centers with ease. 1 Extracting Value from Chaos, IDC, June 2011: 3
4 The benefits delivered by DataStax Enterprise (continued): Feature Workload Separation/Isolation No Need for ETL Easy Data Migration Simple Log Integration Benefit The mixed workload problem is solved in the platform as no workload (real time, analytics, search) competes with any other for compute resources; all are isolated and yet integrated together. The need to extract-transform-load data from real time to analytic to search systems goes away as built-in replication keeps all data domains in sync. Migrating data from existing RDBMS systems is easy via built-in migration utilities. Third party migration tools also support the platform. Application logging data is easily consumed via logging interfaces, and then can be analyzed with Hadoop or searched via Solr. Use Cases Handled by DataStax Enterprise Because DataStax Enterprise is a comprehensive and integrated big data platform, it can handle use cases that have real-time, batch analytics, and enterprise search requirements. Use cases like these can be managed by DataStax Enterprise: Enterprise Management Control Expert Support Administrators are instantly productive and save time with OpsCenter Enterprise, which allows management of all database clusters within a single interface. Professional, around-the-clock support ensures questions get quickly answered and help is available so applications stay online. Cost Efficient Cost reductions over typical RDBMS vendors routinely run 80%. What s New in DataStax Enterprise Edition 3.0? The following are new enhancements included with DataStax Enterprise Edition 3.0. Security An April 2012 InformationWeek special report entitled Why NoSQL Equals No Security 2 began by stating: If it seems security is an afterthought at best in the big data ecosystem, you re right. DataStax Enterprise 3.0 overcomes this perception and is the first big data platform in the NoSQL industry to bring the type of enterprise security used in traditional RDBMS s to secure systems and important data to the big data/nosql market. The following describe each aspect of DataStax Enterprise 3.0 s security feature set in more detail. Note that all security features are optional; the administrator can decide to use none, some, or all of them depending on the specific application. Internal Authentication Version 3.0 of DataStax Enterprise supports internal-based authentication, which allows administrators to easily create users who can be authenticated to Cassandra database clusters. Those migrating to DataStax Enterprise from RDBMS s will find the authentication framework extremely familiar. Administrators can use the CREATE USER command to create new users with passwords that will then be internally managed by Cassandra and used to authenticate into a database cluster. User accounts may also easily be altered and dropped. A default superuser, cassandra, is supplied by default to initially enable the security authentication definition process. Client drivers and libraries that support the passing of credentials (e.g. Hector) will all work with internal authentication. Real-Time: Time series data Device/Sensor/Data exhaust systems Distributed applications Media streaming Online Web retail (transactional, shopping carts, etc.) Real-time data analytics Social media capture and analysis Web click-stream analysis Write-intensive transactional systems Batch Analytics: Buyer behavior analytics Compliance/regulatory analysis Customer recommendation output Fraud detection Risk analysis Sales program campaign analysis Supply chain analytics Batch Web clickstream analysis Enterprise Search: General Web search Web retail faceted (categorization) search Search/hit prioritization and highlighting Application log search and analysis Document (PDF, MS Word, etc.) search and analysis Geospatial search Real estate location and property search Social media match ups 2 4
5 External Authentication Corporations and organizations that use external, 3rd party security packages to manage security in their environment can easily integrate DataStax Enterprise 3.0 into their infrastructure. The most widely used and trusted external security software Kerberos is supported in version 3.0. Authentication with Kerberos covers Cassandra, Hadoop, and Solr, and primary DataStax Enterprise utilities and client drivers are also supported. LDAP may also be used to supply Kerberos with user data. For more information on how to configure Kerberos and LDAP to work with DataStax Enterprise 3.0, please reference the DataStax online documentation. Permission Management Once authenticated into a database cluster using either internal or external authentication the next security issue to be tackled is permission management; i.e. what can the user do inside the database? DataStax Enterprise 3.0 supplies easy-to-use authorization capabilities for Cassandra that use the very familiar GRANT/REVOKE security paradigm. Control over DDL, DML, and SELECT operations are all handled via the granting and revoking of user privileges. The permissions that each user account possesses as well as what rights have been granted to certain objects may easily be determined by LIST CQL commands. For example, if an administrator wants to grant read privileges on a table name EMP to a user named LAURA04, they would execute the following CQL command: GRANT SELECT ON EMP TO LAURA04 Note that a GRANT may be done with or without the GRANT OPTION, which allows the user receiving the grant to provide the same privileges on that object to other users. Transparent Data Encryption Transparent Data Encryption (TDE) in version 3.0 of DataStax Enterprise protects data at rest from being stolen and used in an authorized manner. TDE may be a good option for objects containing sensitive information such as social security numbers, credit card information, etc. Administrators can encrypt tables / column families via a CQL command with AES 128 being the default, although other encryption algorithms can be used. Column families / tables may also be decrypted via the same CQL command. Encryption is transparent to all end user activities; data may be read, inserted, updated, etc., with nothing having to change from the application end. In addition to data in Cassandra, Hadoop data may also be encrypted. As Hadoop data is stored in the Cassandra File System (CFS), which is made up of several column families, encrypting those tables in effect allows all Hadoop data to be encrypted and protected. Data Auditing DataStax Enterprise 3.0 supports the ability to configure data auditing so an administrator can understand what user activities took place on a particular node or entire cluster. Data auditing allows for a who looked at what/when, who changed what/when type of documentation that many large-scale enterprises need to have to comply with various internal or external security policies. The data auditing contained in version 3.0 of DataStax Enterprise is not some afterthought implementation that is inflexible and not practically usable as some supposed auditing subsystems are in various databases. Instead, an administrator has flexibility and total control over what gets audited and where the audit information is written and stored. The granularity of activities that can be audited include: All activity (DDL, DML, queries, errors) DML only DDL only Security changes (assigning/revoking privileges, dropping users, etc.) Queries only Errors only (e.g. login failures, etc.) 5
6 An administrator can also omit certain keyspaces from being audited if they choose and only focus on keyspaces that are in production or are of particular interest. Auditing is configured and written using DataStax Enterprise s log4j interface, which ensures resource efficient auditing operations. Audit data can also be inserted into Cassandra tables and easily queried via CQL. Client to Node Encryption DataStax Enterprise 3.0 includes an optional secure form of communication from a client machine to a database cluster. Client to server SSL ensures data in flight is not compromised and is securely transferred back/forth from client machines. External Security Firm Validation DataStax contracted with the security industry expert group isecpartners to perform a review of the security implementation and feature set in DataStax Enterprise to ensure no key security holes existed in the platform. The conclusion of isecpartner s review was that no major security concerns exist in the DataStax Enterprise 3.0 platform. Enterprise Manageability DataStax Enterprise 3.0 makes it easier than ever to create and manage database clusters that manage big data, whether on premise, across multiple data centers, or in the cloud. Enhancements made to OpsCenter Enterprise, the visual, browser-based management solution that s bundled as part of DataStax Enterprise, increase the enterprise-wide capabilities of the tool and make administrators more productive in carrying out operations such as creating new clusters, handling restore operations, and more. Visual Cluster Provisioning OpsCenter Enterprise 3.0 makes it very easy for administrators to create and stand up new clusters, both in their own IT environment and in the cloud. OpsCenter s new provisioning interface supplies point-and-click management of what used to be a manual, command line driven process: Figure 1: OpsCenter Provisioning Interface for Creating a Cloud Database Cluster 6
7 With OpsCenter 3.0, administrators can simply select the software they want installed on their new cluster, specify the make up of the cluster (e.g. how many real-time, analytic, and search nodes), massage any configuration parameters, and then OpsCenter will do the rest. The operations OpsCenter carries out includes: Downloading the specified software onto each target machine in the cluster. Configuring the nodes as Cassandra, Hadoop, or Solr machines. Setting the data distribution parameters and other properties for the cluster. Starting the cluster. Installing OpsCenter agents on each node. Setting up the new cluster to be monitored by OpsCenter. The new provisioning functionality in OpsCenter 3.0 makes it possible to create a new, multi-node cluster that is fully monitored in just minutes. Further, version 3.0 of OpsCenter also includes new functionality to visually add new nodes to a cluster, modify configuration files on each node, and more. All of the new provisioning and management capabilities make the administrator much more productive and cut down on errors that might be made through manual processes. Visual Restore and Custom Backup Management Version 3.0 of OpsCenter Enterprise includes a visual restore feature for restoring database clusters from prior backups that have been taken. Previous versions of OpsCenter contain backup capabilities, but restore functionality has been absent until now. The restore utility allows an administrator to visually click through restoring a cluster from a snapshot that they select. Full snapshot restores bring a cluster back from the full backup that was taken, with all keyspaces being restored. Figure 2: OpsCenter running a cluster restore operation OpsCenter also offers more granular restore functionality than just full snapshot restore. Object-level restore is also possible within OpsCenter. This allows an administrator to select only the objects they want to restore from one or more keyspaces. This helps in cases where only one table / column families data has been deleted or changed in error. 7
8 In addition to new restore capabilities, OpsCenter now provides the ability to customize backup operations. Users have the ability to specify scripts in the backup interface that can run before and after a backup job. This allows an administrator to easily specify prerequisite tasks that need to run before a backup as well as perform various operations (e.g. moving snapshot files to other physical locations) after a backup. Enhanced Visual Object Management OpsCenter 3.0 contains enhanced object management capabilities that allow users to visually create, edit, and drop keyspaces, tables / column families and indexes. This means that developers and administrators don t have to know the CQL syntax needed to create and alter objects, but rather they can point and click their way through building and maintaining database objects, and do so without worrying about syntax errors. Automated Problem Diagnostic Collection To help troubleshoot issues in a database cluster more quickly, OpsCenter 3.0 supplies a single button that a user can click on that collects all relevant system logs and other diagnostic information into a single package that is then sent to DataStax support engineers for analysis. The automatic collection and presentation of all needed diagnostic data helps DataStax support staff more quickly identify and resolve database issues, and gets a cluster operating back in the way a customer desires. Off Cluster Metadata Repository By default, OpsCenter stores the metadata it collects about a cluster on the cluster itself. However, in version 3.0 of OpsCenter, administrators can move OpsCenter s information off the managed cluster and onto a different cluster. This helps reduce any I/O overhead on busy and resource intensive clusters where every drop of performance is needed. Solr Upgrade DataStax Enterprise 3.0 contains a major update for Solr, which is used for enterprise search operations. Included in version 3.0 is an upgrade to Solr 4.0, which contains many new features and maintenance fixes. About DataStax DataStax provides a massively scalable big data platform to run mission-critical business applications for some of the world s most innovative and data-intensive enterprises. Powered by the open source Apache Cassandra database, DataStax delivers a fully distributed, continuously available platform that is faster to deploy and less expensive to maintain than other database platforms. DataStax has more than 250 customers including leaders such as Netflix, Rackspace, Pearson Education, and Constant Contact, and spans verticals including web, financial services, telecommunications, logistics, and government. Based in San Mateo, Calif., DataStax is backed by industry-leading investors including Lightspeed Venture Partners, Meritech Capital, and Crosslink Capital. For more information, visit Conclusion DataStax Enterprise Edition 3.0 supplies the most comprehensive security feature set of any NoSQL solution provider and also delivers the type of enterprise manageability that modern businesses need to efficiently manage their big data systems. For more information on DataStax Enterprise Edition 3.0, visit for downloads, online documentation, and more. Note that DataStax Enterprise Edition 3.0 may be downloaded and used free of charge in development environments with no restrictions (e.g. data size, RAM, CPU, etc.), however production deployments do require a subscription be purchased. For information on subscription pricing, please send an to DataStax at info@datastax.com. 777 Mariners Island Blvd #510 San Mateo, CA DataStax powers the big data apps that transform business for more than 200 customers, including startups and 20 of the Fortune 100. DataStax delivers a massively scalable, flexible and continuously available big data platform built on Apache Cassandra. DataStax integrates enterprise-ready Cassandra, Apache Hadoop for analytics and Apache Solr for search across multi-datacenters and in the cloud. Companies such as Adobe, Healthcare Anytime, ebay and Netflix rely on DataStax to transform their businesses. Based in San Mateo, Calif., DataStax is backed by industry-leading investors: Lightspeed Venture Partners, Crosslink Capital and Meritech Capital Partners. For more information, visit DataStax.com or follow us on
What s New in DataStax Enterprise 3.1? A Guide for Developers, Architects and IT Managers. White Paper BY DATASTAX CORPORATION November 2013
What s New in DataStax Enterprise 3.1? A Guide for Developers, Architects and IT Managers White Paper BY DATASTAX CORPORATION November 2013 1 Table of Contents Abstract 3 Introduction 3 What s New in DataStax
More informationEvaluating Cloud Databases for ecommerce Applications. What you need to grow your ecommerce business
Evaluating Cloud Databases for ecommerce Applications What you need to grow your ecommerce business EXECUTIVE SUMMARY ecommerce is the future of not just retail but myriad industries from telecommunications
More informationTable of Contents... 2
5 Steps to Apache Cassandra Success with DataStax 1 2 4 3 5 Table of Contents Table of Contents... 2 Abstract... 3 Choosing the Right Database Technology... 3 Implementing a System on DataStax Enterprise...
More informationDataStax Enterprise 4.0 In-Memory Option A look at performance, use cases, and anti-patterns. White Paper
DataStax Enterprise 4.0 In-Memory Option A look at performance, use cases, and anti-patterns White Paper Table of Contents Abstract... 3 Introduction... 3 Performance Implications of In-Memory Tables...
More informationSimplifying Data Management. With DataStax Enterprise (DSE) OpsCenter
Simplifying Data Management With DataStax Enterprise (DSE) OpsCenter CONTENTS Abstract3 Introduction 3 DSE OpsCenter 4 How Does DSE OpsCenter Work? 4 The OpsCenter Interface 4 OpsCenter Security 6 Creating
More informationEvaluating Apache CassandraTM as a Cloud Database
Evaluating Apache CassandraTM as a Cloud Database Table of Contents Table of Contents... 2 Abstract... 3 Introduction... 3 Why a Cloud Database?... 3 Transparent Elasticity... 3 Transparent Scalability...
More informationNoSQL in the Enterprise. A Guide for Technology Leaders and Decision-Makers. White Paper
NoSQL in the Enterprise A Guide for Technology Leaders and Decision-Makers White Paper BY DATASTAX CORPORATION FEBRUARY 2013 Contents Introduction 3 An Overview of NoSQL 4 The Rise and Momentum of NoSQL
More informationCassandra Database Security
Cassandra Database Security Author: Mohit Bagria NoSQL Database A NoSQL database (sometimes called as Not Only SQL) is a database that provides a mechanism to store and retrieve data other than the tabular
More informationWhen, Where & Why to Use NoSQL?
When, Where & Why to Use NoSQL? 1 Big data is becoming a big challenge for enterprises. Many organizations have built environments for transactional data with Relational Database Management Systems (RDBMS),
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationPervasive Insight. Mission Critical Platform
Empowered IT Pervasive Insight Mission Critical Platform Dynamic Development Desktop & Mobile Server & Datacenter Cloud Over 7 Million Downloads of SQL Server 2008 Over 30,000 partners are offering solutions
More informationBUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card
OVERVIEW SALES OPPORTUNITY Lenovo Database Solutions for Microsoft SQL Server bring together the right mix of hardware infrastructure, software, and services to optimize a wide range of data warehouse
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationIntroduction to the Active Everywhere Database
Introduction to the Active Everywhere Database INTRODUCTION For almost half a century, the relational database management system (RDBMS) has been the dominant model for database management. This more than
More informationMigrating Oracle Databases To Cassandra
BY UMAIR MANSOOB Why Cassandra Lower Cost of ownership makes it #1 choice for Big Data OLTP Applications. Unlike Oracle, Cassandra can store structured, semi-structured, and unstructured data. Cassandra
More informationMicrosoft SQL Server on Stratus ftserver Systems
W H I T E P A P E R Microsoft SQL Server on Stratus ftserver Systems Security, scalability and reliability at its best Uptime that approaches six nines Significant cost savings for your business Only from
More informationSECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS
WHITE PAPER SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS The Challenges Of Securing AWS Access and How To Address Them In The Modern Enterprise Executive Summary When operating in Amazon Web Services
More informationArchiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention
Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationMicrosoft Core Solutions of Microsoft SharePoint Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the
More informationExam Preparation Planning p. 11 Introduction p. 16 Developing a Security Strategy for Microsoft SQL Server 7 p. 17 SQL Server Authentication Methods
Exam Preparation Planning p. 11 Introduction p. 16 Developing a Security Strategy for Microsoft SQL Server 7 p. 17 SQL Server Authentication Methods p. 18 Planning the Use of Windows NT Groups for Security
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER
Side Bar Copy Header Title Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER Introduction Due to the complexity of protecting ever-changing infrastructures and the
More informationThe Data Explosion. A Guide to Oracle s Data-Management Cloud Services
The Data Explosion A Guide to Oracle s Data-Management Cloud Services More Data, More Data Everyone knows about the data explosion. 1 And the challenges it presents to businesses large and small. No wonder,
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationConquer New Digital Frontiers with leading Public Cloud Platforms.
Singtel Business Product Factsheet Brochure Managed Defense Public Cloud Services Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Managed Public Cloud supports enterprises in
More information. International Journal of Advance Research in Engineering, Science & Technology. Identifying Vulnerabilities in Apache Cassandra
Impact Factor (SJIF): 4.542. International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 Identifying Vulnerabilities
More informationWhat s New in VMware vsphere 5.1 VMware vcenter Server
What s New in VMware vsphere 5.1 VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 1.0/UPDATED JULY 2012 Table of Contents Introduction... 3 Key Components... 3 vcenter Single Sign-On Server.... 3
More informationWHITEPAPER. MemSQL Enterprise Feature List
WHITEPAPER MemSQL Enterprise Feature List 2017 MemSQL Enterprise Feature List DEPLOYMENT Provision and deploy MemSQL anywhere according to your desired cluster configuration. On-Premises: Maximize infrastructure
More informationComposite Software Data Virtualization The Five Most Popular Uses of Data Virtualization
Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization Composite Software, Inc. June 2011 TABLE OF CONTENTS INTRODUCTION... 3 DATA FEDERATION... 4 PROBLEM DATA CONSOLIDATION
More informationUsing Cohesity with Amazon Web Services (AWS)
Using Cohesity with Amazon Web Services (AWS) Achieve your long-term retention and archival objectives for secondary data Cohesity DataPlatform is a hyperconverged secondary data and application solution
More informationJavaentwicklung in der Oracle Cloud
Javaentwicklung in der Oracle Cloud Sören Halter Principal Sales Consultant 2016-11-17 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
More informationGET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business
More informationDell EMC ScaleIO Ready Node
Essentials Pre-validated, tested and optimized servers to provide the best performance possible Single vendor for the purchase and support of your SDS software and hardware All-Flash configurations provide
More informationTraining 24x7 DBA Support Staffing. Administering a SQL Database Infrastructure (40 Hours) Exam
Administering a SQL Database Infrastructure (40 Hours) Exam 70-764 Prerequisites Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge of Transact-SQL.
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationby Cisco Intercloud Fabric and the Cisco
Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted
More informationSD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast
SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for
More informationDell EMC Isilon with Cohesity DataProtect
Dell EMC Isilon with Cohesity DataProtect Abstract This guide outlines the Cohesity DataProtect deployment guide for Dell EMC Isilon Data Protection. Table of Contents About This Guide...2 Intended Audience...2
More informationDuration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced)
Administering a SQL Database Infrastructure Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Overview: This five-day instructor-led course provides students who administer
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationVMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager
VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager 1 VMware By the Numbers Year Founded Employees R&D Engineers with Advanced Degrees Technology Partners Channel
More informationIBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati
LHC2432BU IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud #VMworld IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR
More informationWHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD
WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD 2 A CONVERSATION WITH DAVID GOULDEN Hybrid clouds are rapidly coming of age as the platforms for managing the extended computing environments of innovative
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationHyper-Converged Infrastructure: Providing New Opportunities for Improved Availability
Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationDelivering Desktop Resources to Any Device As a Service
Beyond VDI: Delivering Desktop Resources to Any Device As a Service Garry Owen EUC Product Marketing VMware EMEA 11 th June 2014 2014 VMware Inc. All rights reserved. Agenda 1 The Move to the Mobile Cloud
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationHybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018
V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding
More informationModern Data Warehouse The New Approach to Azure BI
Modern Data Warehouse The New Approach to Azure BI History On-Premise SQL Server Big Data Solutions Technical Barriers Modern Analytics Platform On-Premise SQL Server Big Data Solutions Modern Analytics
More informationFast Innovation requires Fast IT
Fast Innovation requires Fast IT Cisco Data Virtualization Puneet Kumar Bhugra Business Solutions Manager 1 Challenge In Data, Big Data & Analytics Siloed, Multiple Sources Business Outcomes Business Opportunity:
More informationEmbedded Technosolutions
Hadoop Big Data An Important technology in IT Sector Hadoop - Big Data Oerie 90% of the worlds data was generated in the last few years. Due to the advent of new technologies, devices, and communication
More informationMicrosoft Administering a SQL Database Infrastructure
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20764 - Administering a SQL Database Infrastructure Length 5 days Price $4290.00 (inc GST) Version C Overview This five-day instructor-led course provides
More informationData Center Management and Automation Strategic Briefing
Data Center and Automation Strategic Briefing Contents Why is Data Center and Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges
More informationOffice 365 Business The Microsoft Office you know, powered by the cloud.
Office 365 Business The Microsoft Office you know, powered by the cloud. Power your business with the best-in-class productivity tools from Microsoft the applications you know, always up-to-date and accessible
More information20331B: Core Solutions of Microsoft SharePoint Server 2013
20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump
ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops
More informationEnterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst
Enterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst Change is constant in IT.But some changes alter forever the way we do things Inflections & Architectures Solid State
More informationDeployment Guide For Microsoft Exchange With Cohesity DataProtect
Deployment Guide For Microsoft Exchange With Cohesity DataProtect This white paper outlines the Cohesity DataProtect deployment guide for Microsoft Exchange Server Data Protection. Table of Contents About
More informationHP Solutions for SAP HANA
Powered by Intel HP Solutions for SAP HANA Vladan Stevanovic BCS Sales Manager, South East Europe June 2014. Copyright Copyright 2014 2014 Hewlett-Packard Development Company, Company, L.P. The L.P. information
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationIBM Spectrum Control. Monitoring, automation and analytics for data and storage infrastructure optimization
IBM Spectrum Control Highlights Take control with integrated monitoring, automation and analytics Consolidate management for file, block, object, software-defined storage Improve performance and reduce
More informationWindocks Technical Backgrounder
Windocks Technical Backgrounder Windocks is a port of Docker s open source to Windows used to modernize SQL Server workflows. Windocks is also an open, modern, data delivery solution that sources data
More informationDiscover the all-flash storage company for the on-demand world
Discover the all-flash storage company for the on-demand world STORAGE FOR WHAT S NEXT The applications we use in our personal lives have raised the level of expectations for the user experience in enterprise
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationBest Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate
White Paper PlateSpin Transformation Manager PlateSpin Migrate Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate Updated for PlateSpin Transformation Manager 1.1 and PlateSpin
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationHP Simply StoreIT: Cut through the confusion of storage
: Cut through the confusion of storage Kenny Chu Category Manager of Entry Storage HPSD, Asia Pacific & Japan Copyright Copyright 2014 2014 Hewlett-Packard Development Development Company, Company, L.P.
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationTHE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER
WHITE PAPER THE ZADARA CLOUD An overview of the Zadara Storage Cloud and VPSA Storage Array technology Zadara 6 Venture, Suite 140, Irvine, CA 92618, USA www.zadarastorage.com EXECUTIVE SUMMARY The IT
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationBringing Business Value to Object Oriented Storage
Bringing Business Value to Object Oriented John Hufferd Senior Director of Technology May 15, 2007 Legal Disclaimer All or some of the products detailed in this presentation may still be under development
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationTHE FUTURE OF BUSINESS DEPENDS ON SOFTWARE DEFINED STORAGE (SDS)
THE FUTURE OF BUSINESS DEPENDS ON SOFTWARE DEFINED STORAGE (SDS) How SSDs can fit into and accelerate an SDS strategy SPONSORED BY TABLE OF CONTENTS Introduction 3 An Overview of SDS 4 Achieving the Goals
More informationEnergy Management with AWS
Energy Management with AWS Kyle Hart and Nandakumar Sreenivasan Amazon Web Services August [XX], 2017 Tampa Convention Center Tampa, Florida What is Cloud? The NIST Definition Broad Network Access On-Demand
More informationSQL Server 2017 on Linux: Top Six Reasons Companies Make the Move
SQL Server 2017 on Linux: Top Six Reasons Companies Make the Move 1 Table of Contents Introduction Flexibility Any language, any platform, any cloud Interoperability you can rely on Performance Quicker
More informationEnterpriseLink Benefits
EnterpriseLink Benefits GGY a Moody s Analytics Company 5001 Yonge Street Suite 1300 Toronto, ON M2N 6P6 Phone: 416-250-6777 Toll free: 1-877-GGY-AXIS Fax: 416-250-6776 Email: axis@ggy.com Web: www.ggy.com
More informationSynergetics-Standard-SQL Server 2012-DBA-7 day Contents
Workshop Name Duration Objective Participants Entry Profile Training Methodology Setup Requirements Hardware and Software Requirements Training Lab Requirements Synergetics-Standard-SQL Server 2012-DBA-7
More informationAzure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk
Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate
More informationModernize Your IT with Dell EMC Storage and Data Protection Solutions
Modernize Your IT with Dell EMC Storage and Data Protection Solutions Steve Willson Modern Infrastructure Team GLOBAL SPONSORS Last 15 years IT-centric Systems of record Traditional applications Transactional
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationOracle Database 18c and Autonomous Database
Oracle Database 18c and Autonomous Database Maria Colgan Oracle Database Product Management March 2018 @SQLMaria Safe Harbor Statement The following is intended to outline our general product direction.
More informationMaximizing Availability With Hyper-Converged Infrastructure
Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here
More informationGet more out of technology starting day one. ProDeploy Enterprise Suite
Enterprise Suite Get more out of technology starting day one 1 Secure the path to a future-ready data center The landscape faced by IT managers and business leaders today can be daunting to navigate. Continually
More informationCIB Session 12th NoSQL Databases Structures
CIB Session 12th NoSQL Databases Structures By: Shahab Safaee & Morteza Zahedi Software Engineering PhD Email: safaee.shx@gmail.com, morteza.zahedi.a@gmail.com cibtrc.ir cibtrc cibtrc 2 Agenda What is
More informationThe Emerging Data Lake IT Strategy
The Emerging Data Lake IT Strategy An Evolving Approach for Dealing with Big Data & Changing Environments bit.ly/datalake SPEAKERS: Thomas Kelly, Practice Director Cognizant Technology Solutions Sean Martin,
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationSQL Azure. Abhay Parekh Microsoft Corporation
SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure
More informationMaaS360 Secure Productivity Suite
MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity
More informationHortonworks and The Internet of Things
Hortonworks and The Internet of Things Dr. Bernhard Walter Solutions Engineer About Hortonworks Customer Momentum ~700 customers (as of November 4, 2015) 152 customers added in Q3 2015 Publicly traded
More informationThe Need for Big Data Governance
The Need for Big Data Governance A Whitepaper By Collibra and MapR Collibra Inc 25 Broadway, 9th Floor New York, NY 10004 USA ( t ) +1 646 963 6513 Contact@collibra.com MapR Technologies 350 Holger Way
More information