Software as a Service Multi-tenant Data Architecture. Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation
|
|
- Rose Sophia Little
- 5 years ago
- Views:
Transcription
1 Software as a Service Multi-tenant Data Architecture Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation
2 Agenda SIMT principles and considerations Database options for storing multi-tenant data Enabling virtual data isolation in a multitenant environment Customizing multi-tenant data model Scaling multi-tenant data
3 The SaaS Architecture Shift Single Instance Multi-tenant Scaleable Configurable Multi-tenant efficient
4 The Share vs. Isolate Continuum SLA per tenant Data Separation Economy of Scale Simpler Management Isolate Share Considerations: Business (Time to market, ROI over time) Technical (Skills, expected tenant size and load) Operation ( can I guarantee my SLA without isolating? ) Regulatory constraints ( data must be physically separate )
5 Where to store the data? Approaches: Separate database per tenant Same database, separate schemas Same database, shared schema Implications on approach for: Securing and isolating data Extending data model Scaling and partitioning data
6 Separate Database per Tenant Approach: Meta data identifies database instance for each tenant Advantages: Easy to implement data model extension Easy to restore tenant data More security isolation Tradeoff: Number of tenants per database server is low Higher management, backup cost and database server infrastructure costs When to use: When tenant has specific database isolation requirements Tenant 1Tenant 2Tenant 3
7 Same Database, Separate Schema Approach: Each tenant gets their own group of tables in the same database. Advantages: Easy to implement data model extension Moderate security isolation Better tenant scale per server Tradeoff: More difficult to restore tenant data When to use: Number of tables for the app is small (100s) Scale per server is important OK to co-locate tenant data in same database Tenant B Tenant A Tenant C
8 Same Database, Same Schema Approach: All tenants use the same set of tables in the same database. Advantages: Better tenant scale per server Cost of management and backup is lower Tradeoff: Difficult to restore tenant data Harder to implement data model extension When to use: Scale per server is important OK to co-mingle tenant data in same database Tenant B Tenant C Tenant A
9 Securing and Isolating Tenant Data
10 Virtual Data Isolation Patterns Filters Permissions Database Table SQL Command View Stored Procedure View Encryption Crypto Key
11 Current Database Access Models Impersonation + Kerberos delegation Connection is established using end user security context No database connection pooling, security vs. performance tradeoff Trusted Subsystem Use application identity to establish database connection Better scale and performance Web Server Business Logic Server SQL Server Alice App ID = Bob Impersonate/Delegate App ID = Charlie Trusted Subsystem Access Access as as Alice Charlie Security Service (e.g. Windows KDC)
12 Multi-tenant database access requires a hybrid model Database access performed using a tenant security context Facilitates locking down database objects at the tenant level Databases, tables, stored procedures, views Facilitates database auditing Enables tenant specific encryption keys Costs: Additional provisioning task for creating and deactivating tenant TS accounts Added complexity in maintaining database connections pools
13 Multi-Tenant Trusted Subsystem Model Create trusted subsystem account for every tenant Application service process starts with a generic application identity Switch to a tenant account when connecting and accessing database: Kerberos SFU, or Security credential service Application Service Request from Acme Corporation Database Service Kerberos protocol transition into Acme account Request and send Acme Kerberos credential ticket Connect as Acme security context Security Credential Service Microsoft KDC
14 Securing Access to Database Separate database connection pool for each tenant Every application server can maintain one or more connection pool Database Access Group Shared DB Dedicated DB
15 Securing Tenant Specific Tables Database access group contains application identities with database access. Create different groups of tables for each new tenant. Create a different database access identity for each new tenant. Grant table access permissions to tenant s database access account. Create database access account for each tenant Database Access Group Grant account permissions to tables Assign account to group
16 Tenant View Filter Pattern Queries and Stored Procedures Tenant- Safe Views Shared Tables TenantCustomers View SELECT * from TenantCustomers WHERE Zipcode = Customers Table CREATE VIEW TenantCustomers AS SELECT * from Customers WHERE Tenant_ID = SUSER_SID()
17 Tenant Encryption Pattern Tenant A s Public/Private Keys Database s Master Key Encrypted Private Keys Tenant B s Public/Private Keys CREATE ASYMMETRIC KEY TenantAAsymmetricKey AUTHORIZATION TenantA WITH ALGORITHM = RSA_2048 CREATE SYMMETRIC KEY TenantASymmetricKey AUTHORIZATION TenantA WITH ALGORITHM = DESX ENCRYPTION BY ASYMMETRIC KEY TenantAAsymmetricKey Encrypted Symmetric Keys OPEN SYMMETRIC KEY TenantASymmetricKey DECRYPTION BY ASYMMETRIC KEY TenantAAsymmetricKey Tenant A s Symmetric Key Encrypted Tenant Data Tenant B s Symmetric Key INSERT INTO CustomersCreditCardView VALUES( 1234, EncryptByKey(Key_GUID(TenantA SymmetricKey), ))
18 Customizing Data Models
19 Data Model Extension Tenant A Tenant B Catalog Item Product ID Description Category ID Catalog Item Product ID Description Classification Code Challenges: Defining custom fields and storing custom data for each tenant. Business logic that can handle custom fields Presentation logic that can handle custom fields Enabling queries on custom fields
20 Defining and Storing Custom Data Fields Requires meta-data/data dictionary Straight forward when storing data in: Separate Database per Tenant Same Database with Separate Schema 2 approaches when storing data in Same Database with Same Schema: Fixed set of extended fields Extensions-value pairs
21 Fixed set of extensions Approach: All tenants data in one database. Pre-defined set of custom fields Advantages: Easy to implement Maximize number of tenants per database server Tradeoff: Tendency to results in sparse table When to use: When data co-mingling is OK Easy to anticipate pre-defined custom fields Tenant ID F1 F2 C1 C2 C3 345 Ted 53 Null paid Null 777 Kay Null Null 784 Mary 45 Null Null Null 345 Ned 21 Null owe Null 438 Pat 26 Null Null yes
22 Metadata for Fixed Extensions Tenant ID C1-Label C1-Datatype C2-Label C2-Datatype C3-Label C3-Datatype 345 Null Null Payment Status ntext Null Null 777 Age tinyint Null Null Null Null 438 Null Null Null Null Paid ntext OR (Space and Time Tradeoff) Tenant ID C1-Label C1-Datatype 777 Age tinyint Tenant ID C3-Label C3-Datatype 438 Paid ntext Tenant ID C2-Label C2-Datatype 345 Payment Status ntext
23 Extension-Value Pairs Approach Offers Unlimited number/option for custom fields Extension-value pairs in separate tables Metadata table keeps track of data labels and data types for extensions Metadata Table Data Tables Tenant ID F1 F2 Record ID 764 Ted $ John $32 Null 783 Sal $ Tenant ID Extension ID Extension Label Datatype Record ID Extension ID Value Status ntext Expire datetime Affiliation ntext Gold Acme
24 Extension-value pairs Advantage Unlimited number/option for custom fields Tradeoff Increase index/query/update complexity and delay When to use OK to co-mingle tenant data Custom fields are high value features Difficult to predict custom fields
25 Scaling Multi-tenant Data
26 2 Level Data Scaling Strategy Multi-Tenant Database Multi-Tenant Database Multi-Tenant Data Scaling Strategy Single Tenant Database Single Tenant Data Scaling Strategy Databases for one tenant
27 Horizontal Tenant Partitioning Too many concurrent users or / and Too many rows Redistribute tenant user load against baseline Redistribute tenant data load against baseline
28 Single Tenant Scaling Architecture Guidance: Scaling Out SQL Server 2005 paper by Roger Wolter Replicated reference data Requires deep application introspection: Revisit data model Study reference, resource and activity data dependency, frequency of change. Identify candidates for horizontal and vertical partitioning, replication, scaleup Replicated reference data Reference data Replicated reference data Some best practices: Replicate reference data Replicated reference data replica Keep related data near replica Write Master replica Less related Use scaleup for data that cannot be partitioned (resource data) replica More related Use single master replication rather than synchronize write
29 Conclusions Single instance, multi-tenancy is hard work Without the architecture patterns, we ll be limited to the isolation option
30
Multi Tenant Data Architecture
Multi Tenant Data Architecture June 2006 Frederick Chong, Gianpaolo Carraro, and Roger Wolter Microsoft Corporation Applies to: Application Architecture Software as a Service (SaaS) Summary: The second
More informationCIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries
CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative
More informationAzure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk
Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate
More informationJavier Villegas. Azure SQL Server Managed Instance
Javier Villegas Azure SQL Server Managed Instance Javier Villegas DBA Manager at Mediterranean Shipping Company Involved with the Microsoft SQL Server since SQL Server 6.5 Specialization in SQL Server
More informationTrusted Intermediaries
AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)
More informationIntroduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.
Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:
More informationMulti-Tenant SQL. Presented by Eddy Kleinjan. How to handle multi-tenancy in applications. Are you ready to take your application to the next level?
Multi-Tenant SQL Presented by Eddy Kleinjan How to handle multi-tenancy in applications. Are you ready to take your application to the next level? SaaS: Software as a Service "Software deployed as a hosted
More informationConsolidate and Prepare for Cloud Efficiencies Oracle Database 12c Oracle Multitenant Option
Consolidate and Prepare for Cloud Efficiencies Oracle Database 12c Oracle Multitenant Option Eric Rudie Master Principal Sales Consultant Oracle Public Sector 27 September 2016 Safe Harbor Statement The
More informationThe Freedom to Choose
Anat Dror The Freedom to Choose Choosing between SQL Server offerings Anat Dror SQL Server Expert, Quest SQL Server and DB2 domain expert with over 20 years of experience in a long list of IT related roles.
More informationSQL Server Security. Marek
SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel
More informationBuilding Multi-tenant Applications with Pervasive PSQL
Building Multi-tenant Applications with Pervasive PSQL Pervasive PSQL White Paper August 2012 This white paper is the first in a series of three designed to show how easily Pervasive PSQL can provide all
More informationDesigning Database Solutions for Microsoft SQL Server (465)
Designing Database Solutions for Microsoft SQL Server (465) Design a database structure Design for business requirements Translate business needs to data structures; de-normalize a database by using SQL
More informationIntroduction to Multi-tenancy. Gus Bjorklund October 2013
Introduction to Multi-tenancy Gus Bjorklund October 2013 Introduction The session explores the upcoming inbuilt multi-tenancy capabilities included in the OpenEdge 11 RDBMS. Learn how multi-tenant support
More informationModernizing Business Intelligence and Analytics
Modernizing Business Intelligence and Analytics Justin Erickson Senior Director, Product Management 1 Agenda What benefits can I achieve from modernizing my analytic DB? When and how do I migrate from
More informationCryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1
Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography CS555 Spring 2012/Topic 16 1 Outline and Readings Outline Private key management between two parties Key management
More informationSQL Azure. Abhay Parekh Microsoft Corporation
SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure
More information70-647: Windows Server Enterprise Administration Course 01 Planning for Active Directory
70-647: Windows Server Enterprise Administration Course 01 Planning for Active Directory Slide 1 Course 1 Planning for Active Directory Planning the Domains and Forest Structure Planning for Sites and
More informationDistributed Systems. Fall 2017 Exam 3 Review. Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems Fall 2017 Exam 3 Review Paul Krzyzanowski Rutgers University Fall 2017 December 11, 2017 CS 417 2017 Paul Krzyzanowski 1 Question 1 The core task of the user s map function within a
More informationMOC 6232A: Implementing a Microsoft SQL Server 2008 Database
MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More information70-459: Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform
70-459: Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform The following tables show where changes to exam 70-459 have been made to include updates
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationDistributed KIDS Labs 1
Distributed Databases @ KIDS Labs 1 Distributed Database System A distributed database system consists of loosely coupled sites that share no physical component Appears to user as a single system Database
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Designing Database Solutions for Microsoft SQL Server 2012 Course 20465B 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available
More informationCreate a DBaaS Catalog in an Hour with a PaaS-Ready Infrastructure
Create a DBaaS Catalog in an Hour with a PaaS-Ready Infrastructure Ken Kutzer, Ramin Maozeni Systems Engineering Systems Division September 30, 2014 CON5748 Moscone South 301 Safe Harbor Statement The
More informationIn-Memory Data Management Jens Krueger
In-Memory Data Management Jens Krueger Enterprise Platform and Integration Concepts Hasso Plattner Intitute OLTP vs. OLAP 2 Online Transaction Processing (OLTP) Organized in rows Online Analytical Processing
More informationManual Trigger Sql Server 2008 Insert Multiple Rows At Once
Manual Trigger Sql Server 2008 Insert Multiple Rows At Once Adding SQL Trigger to update field on INSERT (multiple rows) However, if there are multiple records inserted (as in the user creates several
More informationKerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos
Kerberos and Public-Key Infrastructure Key Points Kerberos is an authentication service designed for use in a distributed environment. Kerberos makes use of a thrusted third-part authentication service
More informationIBM Compose Managed Platform for Multiple Open Source Databases
IBM Compose Managed Platform for Multiple Source Databases Source for Source for Data Layer Blueprint with Compose Source for Comprehensive Catalogue for Simplified Scoping Scalable Platform for FutureProof
More informationHOW SNOWFLAKE SETS THE STANDARD WHITEPAPER
Cloud Data Warehouse Security HOW SNOWFLAKE SETS THE STANDARD The threat of a data security breach, someone gaining unauthorized access to an organization s data, is what keeps CEOs and CIOs awake at night.
More informationSingle Sign-On Showdown
Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013
More informationOn Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor
On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com
More informationData Protection Everywhere
Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support
More informationImplementing Microsoft Azure Infrastructure Solutions
Implementing Microsoft Azure Infrastructure Solutions OD20533C; On-Demand, Video-based Course Description This course is intended for IT professionals who are familiar with managing on-premises IT deployments
More informationWelcome to the. Migrating SQL Server Databases to Azure
Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine
More informationAurora, RDS, or On-Prem, Which is right for you
Aurora, RDS, or On-Prem, Which is right for you Kathy Gibbs Database Specialist TAM Katgibbs@amazon.com Santa Clara, California April 23th 25th, 2018 Agenda RDS Aurora EC2 On-Premise Wrap-up/Recommendation
More informationMongoDB Security (Users & Roles) MongoDB User Group 22 March 2017, Madrid
MongoDB Security (Users & Roles) MongoDB User Group 22 March 2017, Madrid Who am I Juan Roy Twitter: @juanroycouto Email: juanroycouto@gmail.com MongoDB DBA at Grupo Undanet 2 MongoDB - Characters The
More informationMOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
MOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Course Overview This 5 day course instills students with the knowledge and skills to configure and troubleshoot Windows
More informationSQL Server Course Administering a SQL 2016 Database Infrastructure. Length. Prerequisites. Audience. Course Outline.
SQL Server Course - 20764 Administering a SQL 2016 Database Infrastructure Length 5 days Prerequisites Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge
More informationRandy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED
Randy Pagels Sr. Developer Technology Specialist DX US Team rpagels@microsoft.com AZURE PRIMED 2016.04.11 Interactive Data Analytics Discover the root cause of any app performance behavior almost instantaneously
More informationSecurity on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance
Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Agenda: Overview AWS Regions Availability Zones Shared Responsibility Security Features Best Practices
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationEuropean General Data Protection Regulation is active in 2018! How to master the challenge of Data Protection and Security?
European General Data Protection Regulation is active in 2018! How to master the challenge of Data Protection and Security? Considerations for Your Progress OpenEdge Application Conor Patten, Laurent Kieffer
More informationDemystifying the Cloud With a Look at Hybrid Hosting and OpenStack
Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90
More informationNative Support of Multi-tenancy in RDBMS for Software as a Service
Native Support of Multi-tenancy in RDBMS for Software as a Service Oliver Schiller Benjamin Schiller Andreas Brodt Bernhard Mitschang Applications of Parallel and Distributed Systems Universität Stuttgart
More information70-742: Identity in Windows Server Course Overview
70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure
More informationKerberos V5. Raj Jain. Washington University in St. Louis
Kerberos V5 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/ 11-1
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationITS. MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA)
MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA) Prerequisites Have some experience with relational databases and SQL What will you learn? The MySQL for Database Administrators
More informationAdministering a SQL Database Infrastructure (M20764)
Administering a SQL Database Infrastructure (M20764) COURSE OVERVIEW: In this Microsoft online training course, you will learn the skills required to maintain a Microsoft SQL Server 2012 or 2014 database
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationINFO-H-415 Project Overview- Security Database and SQL Server
INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way
More informationMicrosoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps
Microsoft 70-535 Dumps with Valid 70-535 Exam Questions PDF [2018] The Microsoft 70-535 Microsoft Architecting Microsoft Azure Solutions Exam exam is an ultimate source for professionals to retain their
More informationManaging External Identity Sources
CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationSQL Server DBA Course Details
SQL Server DBA Course Details By Besant Technologies Course Name Category Venue SQL Server DBA Database Administration Besant Technologies No.24, Nagendra Nagar, Velachery Main Road, Address Velachery,
More informationActive Directory Attacks and Detection
Active Directory Attacks and Detection #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos This talk is Based on Tim Madin
More informationto know how and when to apply which Microsoft technology. In many cases, you can combine multiple
Overview of Microsoft Virtualization Microsoft offers a number of virtualization technologies that administrators and infrastructure architects can use to create and administer a virtual environment. To
More informationData Source Kerberos / oauth On the Wire Explaining Kerberos Constrained Delegation with Protocol Transition and Oauth for Data Source Single Sign On
Welcome 1 8 B I - 11 3 Data Source Kerberos / oauth On the Wire Explaining Kerberos Constrained Delegation with Protocol Transition and Oauth for Data Source Single Sign On John Kew Manager / Connectivity
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Designing Database Solutions for Microsoft SQL Server 2012 Course 20465A 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available
More informationSQL Server SQL Server 2008 and 2008 R2. SQL Server SQL Server 2014 Currently supporting all versions July 9, 2019 July 9, 2024
Current support level End Mainstream End Extended SQL Server 2005 SQL Server 2008 and 2008 R2 SQL Server 2012 SQL Server 2005 SP4 is in extended support, which ends on April 12, 2016 SQL Server 2008 and
More informationOracle Hyperion Profitability and Cost Management
Oracle Hyperion Profitability and Cost Management Configuration Guidelines for Detailed Profitability Applications November 2015 Contents About these Guidelines... 1 Setup and Configuration Guidelines...
More informationKeep your fingers off my keys today & tomorrow
SIGS SE February 2017 Keep your fingers off my keys today & tomorrow Marcel Dasen VP Engineering Securosys SA Keys? Encryption keys asymmetric e.g. RSA, ECC public/private key pairs for wrapping symmetric
More informationANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT
ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT Maram Hassan AlAlwan Alalwan.maram@gmail.com Soha S. Zaghloul smekki@ksu.edu.sa College of Computer and Information Science Department of Computer
More informationTHE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY
THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly
More informationAgenda. AWS Database Services Traditional vs AWS Data services model Amazon RDS Redshift DynamoDB ElastiCache
Databases on AWS 2017 Amazon Web Services, Inc. and its affiliates. All rights served. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon Web Services,
More informationCOURSE 20462C: ADMINISTERING MICROSOFT SQL SERVER DATABASES
Page 1 of 11 ABOUT THIS COURSE This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The course focuses on teaching individuals
More informationData-intensive Storage Services on Clouds: The VISION Cloud Project Simona Rabinovici-Cohen, Hillel Kolodner IBM Research - Haifa
Data-intensive Storage Services on Clouds: The VISION Cloud Project Simona Rabinovici-Cohen, Hillel Kolodner IBM Research - Haifa 2011 SNIA Cloud Burst Summit. Insert Your Company Name. All Rights Reserved.
More informationCA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.
CA ERwin Data Modeler s Role in the Relational Cloud Nuccio Piscopo Table of Contents Abstract.....3 Introduction........3 Daas requirements through CA ERwin Data Modeler..3 CA ERwin in the Relational
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationMaintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led
Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led Introduction This three-day instructor-led course provides students with product knowledge and skills needed to
More information2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005
2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005 Introduction Elements of this syllabus are subject to change. This three-day instructor-led course provides students
More informationKerberos5 1. Kerberos V5
Kerberos5 1 Kerberos V5 Kerberos5 2 ASN.1 data representation language: data structure (ß definition C struct, union), but variable length-arrays, optional elements, labeling,... data representation on
More informationTHE COMPLETE GUIDE HADOOP BACKUP & RECOVERY
THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly
More informationMS-20462: Administering Microsoft SQL Server Databases
MS-20462: Administering Microsoft SQL Server Databases Description This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database.
More informationMongoDB An Overview. 21-Oct Socrates
MongoDB An Overview 21-Oct-2016 Socrates Agenda What is NoSQL DB? Types of NoSQL DBs DBMS and MongoDB Comparison Why MongoDB? MongoDB Architecture Storage Engines Data Model Query Language Security Data
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationMigrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson
Migrating Enterprise Applications to the Cloud Session 672 Leighton L. Nelson Leighton L. Nelson Instructional Technology Principal Oracle ACE & Oracle Certified Expert Oracle Database Administrator Author/blogger
More informationThe Pathway to the Cloud Using Azure SQL Managed Instance
1 Sales Order Management Product Manuals 2 Agility Assurance (Security) Efficiency Experience (Apps) Business Growth 3 Catalog Existing application Define criteria for moving to or starting applications
More information02/11/2015. This is a slide for graphics (It has a white background)
This is a slide for graphics (It has a white background) 1 2 Now & Future Password 1 Password 2 Password 3 Password 4 GAfE, AzureAD, onprem AD. ChromeOS, PC, ios. Various web apps. Distributed. Last 10
More informationORACLE 11gR2 DBA. by Mr. Akal Singh ( Oracle Certified Master ) COURSE CONTENT. INTRODUCTION to ORACLE
ORACLE 11gR2 DBA by Mr. Akal Singh ( Oracle Certified Master ) INTRODUCTION to ORACLE COURSE CONTENT Exploring the Oracle Database Architecture List the major architectural components of Oracle Database
More informationImplementing a Storage Pattern in the OR Mapping Framework
, pp.29-38 http://dx.doi.org/10.14257/ijgdc.2013.6.5.03 Implementing a Storage Pattern in the OR Mapping Framework Muhammad Naeem Ahmed Khan, Arsalan Shahid and Sarah Shafqat Shaheed Zulfikar Ali Bhutto
More information20533B: Implementing Microsoft Azure Infrastructure Solutions
20533B: Implementing Microsoft Azure Infrastructure Solutions Course Details Course Code: Duration: Notes: 20533B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationAn Oracle White Paper September Security and the Oracle Database Cloud Service
An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
More informationThis course provides students with the knowledge and skills to administer Windows Server 2012.
MOC 20411C: Administering Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer Windows Server 2012. Course Introduction Course Introduction 6m Module
More informationDBAs can use Oracle Application Express? Why?
DBAs can use Oracle Application Express? Why? 20. Jubilarna HROUG Konferencija October 15, 2015 Joel R. Kallman Director, Software Development Oracle Application Express, Server Technologies Division Copyright
More informationOverview of Authentication Systems
Overview of Authentication Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
More informationGSI Online Credential Retrieval Requirements. Jim Basney
GSI Online Credential Retrieval Requirements Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Online Credential Retrieval Defined Client Server Authenticate Request Credential Verify
More informationFile system, 199 file trove-guestagent.conf, 40 flavor-create command, 108 flavor-related APIs list, 280 show details, 281 Flavors, 107
Index A Amazon AWS, 7, 10 Amazon RDS DBaaS solutions, 10 service vs. platform, 8 single-tenant DBaaS solution, 6 Amazon RedShift DBaaS solutions, 10 single-tenant DBaaS solution, 6 AMD-V, 17 AMQP server
More informationOracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge
Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge atul.goyal@oracle.com Principal Product Manager,
More informationBusiness Technology Briefing: Fear of Flying, And How You Can Overcome It
Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May
More informationSharePoint Online for Administrators
Course 55238: SharePoint Online for Administrators Page 1 of 6 SharePoint Online for Administrators Course 55238: 2 days; Instructor-Led Introduction This course will introduce the audience to SharePoint
More informationCMB-207-1I Citrix Desktop Virtualization Fast Track
Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 20339-1; 5 Days; Instructor-led Course Description This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint
More informationDyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof
Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection
More informationService Description Managed Applications for SAP
Service Description Managed Applications for SAP Table of contents 1 DEFINITIONS... 2 2 PURPOSE OF THE DOCUMENT... 2 3 OVERVIEW OF THE SERVICE... 2 3.1 OVERALL DESCRIPTION... 2 3.2 GEOGRAPHICAL FOOTPRINT...
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?
DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided
More informationCommon Database Deployment Gotchas
Common Database Deployment Gotchas Simon D Morias SQL Server Consultant @ Sabin.io Microsoft Certified Master: SQL Server MCSE: Data Platform & Business Intelligence simon.dmorias@sabin.io Why database
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More information