D A T A B A S E. Pervasive PSQL The Right Decision. A Pervasive Software White Paper
|
|
- Emil Dickerson
- 5 years ago
- Views:
Transcription
1 D A T A B A S E A Pervasive Software White Paper May 2006
2 Table of Contents EXECUTIVE SUMMARY FINDING VALUE IN THE RIGHT DATABASE SOLUTION RELIABLE, LOW MAINTENEANCE SOLUTIONS VARIETY OF DEPLOYMENT OPTIONS DATA ACCESS AND RECOVERABILITY COMPARING DATABASES PERFORMANCE THE BEST OF BOTH WORLDS THE BTRIEVE API ADDED PERFORMANCE FEATURES EASY SETUP AND LOW MAINTENANCE KEY FEATURES OF AN EMBEDDED DATABASE SOLUTION TOOLS FOR INSTALLATION AND EMBEDDING MAINTENANCE-FREE DATABASE OPERATIONS DEVELOPMENT FLEXIBILITY PERVASIVE PSQL SOFTWARE DEVELOPER KIT PERVASIVE DEVELOPER CENTER DEPLOYMENT FLEXIBILITY OPERATING SYSTEMS PLATFORMS CONFIGURATION AND LICENSING PERVASIVE PSQL WORKGROUP PERVASIVE PSQL SERVER DATA SECURITY AND RECOVERABILITY PERVASIVE PSQL SECURITY ADDITIONAL DATA SECURITY AND RECOVERY PRODUCTS BACKUP AGENT DATAEXCHANGE AUDITMASTER SUMMARY: THE OPTIMAL DATABASE SOLUTION CONTACT/TRADEMARK INFORMATION
3 EXECUTIVE SUMMARY The purpose of this paper is to provide software developers and ISVs information that will assist in the process of selecting a database for packaged application customers in the small to midsized business market. These customers have many of the same concerns as enterprise database users such as security, performance, and standards support. However, there is one characteristic that sets SMB customers apart and defines many of the criteria they require for database applications SMB customers have limited or no IT or database administration staff. Because of the lack of IT resources, databases for SMB customers must be extremely reliable and require little or no maintenance. Ideally, an embedded database is invisible to the end user it simply installs and operates as part of the ISV application. This means that the database should include features for embedding and easy installations and upgrades, with APIs to allow for management of the database directly from the ISV application. Finally, because of the variety (and age) of computing infrastructure typical to most small businesses, the database needs to support a wide range of development and deployment choices, and be backwards compatible with several years of previous versions. FINDING VALUE IN THE RIGHT DATABASE SOLUTION When picking applications, most companies focus first on finding a solution to meet their business needs; the technology behind the application is secondary. Is the database that powers the solution important? Absolutely. The ultimate goal of a database designed for small to medium businesses is to be affordable and unobtrusive. With this goal in mind, a database must meet some basic requirements, such as speed, ease-of-use, scalability, and security. For the SMB, the ideal database delivers high performance and flexibility with the lowest possible cost of ownership. Reliable, Low Maintenance Solutions For companies without IT staff, the need for reliable, low-maintenance solutions is critical. These businesses typically rely on integrators to help install and deploy turnkey solutions. Ongoing maintenance of the application or database is often ad hoc, and usually involves nothing more than a scheduled backup of the data. The prices of applications targeted at small to mid-sized companies can t support ongoing maintenance contracts, and unscheduled emergency support work can quickly turn a profitable software sale into a losing proposition for the integrator. So, in addition to low maintenance requirements, long-term reliability uninterrupted ongoing operation of the customer application is essential. The ideal database must be easy to install, require little to no maintenance, and never be a gating factor in a customer s business performance, or worse, cause operations to halt. It must be simple, fast, and robust. Variety of Deployment Options In addition to simplicity, speed, and stability, end users need applications that offer a variety of deployment options, ensuring that the business has the widest latitude to leverage its application investment and that it is not locked into a potentially obsolete technology. End users also need both upward and downward scalability, with an easy way to deploy applications to larger or smaller numbers of users. Application developers need to be able to rely on the availability of industry standards and a variety of development tools and access methods to have the best chance of delivering exactly what the customer wants. Development and deployment flexibility are key ingredients to success. 3
4 Data Access and Recoverability Security, particularly data access and recoverability, must be planned and implemented to minimize business downtime due to data loss or corruption. Even the best application infrastructure can be the victim of either natural or man-made disasters. Businesses need to be able to secure their data by controlling access for authorized users, eliminating (or limiting) unauthorized access, and reducing the effects of security breaches when they do happen. Data backup and recovery, and file and network encryption, are all key components of a well-thought security plan. Even with a security plan in place there is still risk of damage by authorized users, either through honest mistakes or direct attacks. Businesses need a way to audit activity in the database, provide alerts for identified events, and if necessary provide an audit trail to discover what happened after the fact. Depending on the business regulatory environment (healthcare, for example), audit capability may even be required. Comparing Databases When comparing Pervasive PSQL (PSQL) vs. Brand X, we would suggest that you map your business criteria to the database features you need. Ask whether the database will perform as required, with minimal repair and maintenance. Once you break it down into this simple equation, you can make a logical decision. Key factors to consider are: FEATURE DESCRIPTION BENEFIT Performance The ability to perform major operations of your application quickly. Faster application and more productive customers. Easy Setup The database installs as part of the application. Easy installs and upgrades. Low Maintenance Does not require a database administrator. Minimal support expense and high customer satisfaction. Reliability Run uninterrupted for years without data corruption or application downtime. Happy customers, no business downtime, no data loss Development Flexibility Deployment Flexibility Scalability Data Security and Recoverability Choice of languages, development environments and support for data access standards such as ODBC, JDBC, OLE DB, and.net. Large number of platform, licensing, and configuration options. From single user workstations to servers with thousands of clients. Provide multiple levels of security, with robust replication, backup and recovery tools. Developer freedom of choice, resulting in better applications. Support wide range of clients with single database. Easy to grow the application with the business. Keep data safe and accessible. Pervasive Software database products are successful because they improve customer applications by being easy to embed, extremely fast, incredibly reliable, as well as calling for only minimal or no maintenance. PSQL is designed to be included as an integral and seamless part of the applications that it powers, transparent to the end user. With improved security features and the added capabilities of Pervasive Software s other data management products for audit, data backup and recovery, PSQL provides a very secure application platform. This paper will review the features that make PSQL a success: performance, flexibility, low maintenance, easy embedding, scalability, and security. PERFORMANCE The Best of Both Worlds PSQL s approach gives developers a unique advantage in application development: they can build applications that provide relational access where flexibility is needed and transactional access where performance is a priority. By combining a high-speed transactional interface with 4
5 a highly flexible and powerful relational interface in a single package, Pervasive PSQL enables developers to provide the best business solutions for their customers. Relational access uses standard SQL query and data manipulation operations. SQL queries are broken down and analyzed by the database engine to determine the optimal method for executing the query. Relational access is best suited to ad hoc querying and user-defined reports. Transactional access provides great performance when the database operations (and record locations) can be charted in advance and is ideal for high-volume transactions where the speed of individual I/O operations is of utmost importance. Pervasive provides transactional access through the Btrieve API. The combination of transactional and relational access enables developers to target database performance to the application s specific requirements standards and flexibility for areas of the application, such as reporting and ad hoc queries, that are difficult to define in advance, and exceptional performance for known (and frequently repeated) application functions. The Btrieve API The Btrieve API is the heart of Pervasive PSQL s transactional data access. Btrieve has been in existence for over 20 years and is the underlying API for thousands of applications and millions of users. A low-level API that interacts directly with the database engine, Btrieve provides complete control over how the database engine accesses the data store. While relational data access is a convenient, flexible programming model that is appropriate for many situations, it can result in additional overhead when performance is a driving factor. The Btrieve API eliminates this overhead. With Btrieve, the work traditionally assumed by the query cost optimizer is performed by the application, directly accessing the database at the lowest entry point. The Btrieve API is callable from a long list of popular programming environments and allows the developer control of the file/table layout and the indexes. Although control of file/table layout is a typical part of database design, Btrieve enables developers to control how the files are accessed by the application. Added Performance Features In addition to providing the developer with a choice of access methods for performance tuning, Pervasive has included several patented performance enhancements for minimizing disk and network I/O. Turbo Write Accelerator (TWA) improves the performance of applications that update, delete, or insert records frequently. TWA improves performance by grouping disk write operations together and writing data to the hard disk in large sequential blocks. Self-tuning Dynamic Cache manages both static and dynamic cache to increase memory utilization on the server, dramatically improving read performance. Client Cache greatly improves data access performance by using local caching of pages to reduce network requests. 5
6 EASY SETUP AND LOW MAINTENANCE Key Features of an Embedded Database Solution Software vendors like to build great applications and application users like to focus on managing their business. Neither group prioritizes database maintenance over these other activities, but it often consumes significant time and effort. Pervasive PSQL has been designed as an embedded database for customers who have no database administrator (and often no IT staff), with features to enable automatic installation and ongoing operation without tuning or maintenance. Embedding the database engine in the application also provides developers the control over which version of the database their customers use, resulting in more manageable configurations, lowered support costs, and increased customer satisfaction. Pervasive s goal has always been to deliver a database that requires the least possible effort to install, configure, and maintain over time, and still meet requirements for performance and flexibility. Pervasive PSQL v9 is the result of over 20 years of product development focused on delivering the industry s best-packaged application database engine. Concentrating on the SMB customer, and not expanding into the enterprise database market, Pervasive has avoided adding complex features to PSQL that would make it more difficult to deploy and maintain. PSQL epitomizes two key characteristics of an embedded database: simple installation and maintenance-free operations. Tools for Installation and Embedding Pervasive PSQL has several features to make it easy to embed into an application and easy to install: an Installation Toolkit, Pervasive System Analyzer, an online Component Wizard to help developers embed PSQL into their application, backward compatibility with a large number of previous versions, and the Distributed Tuning Interface. Installation Toolkit The Installation Toolkit makes the task of including PSQL in an application s installation faster and easier with less coding. With the Toolkit, a developer can seamlessly include PSQL in their application s installation without requiring the end user to learn the steps required to configure the database. The toolkit allows developers to encapsulate a complete PSQL installation as part of the application s install program. The database install can be run silently so that the only GUI presented to the user is the application installation GUI. The installation can also be customized to include location, license keys, testing for conflicting components, and installation validation. For more information on the Installation Toolkit, please refer to the Installation Toolkit Handbook. PSQL Component Wizard The Component Wizard is an online tool that delivers the exact file set needed to embed the Pervasive PSQL database engine and utility components with the developer s application. When running the wizard, developers select items that describe their application in terms of engines, interfaces, and utility usage. At the end of the process, the wizard delivers a list of files to be included and step-by-step instructions for embedding them in the application. To use the Component Wizard, click here. Pervasive System Analyzer The Pervasive System Analyzer (PSA), bundled with every version of PSQL, runs during installation to optimize the system, determining if there are any duplicate versions of the database running on the system and archiving the older components. PSA also verifies all communication between the client PC and the database engine. 6
7 Backward Compatibility PSQL v9 can read and write to files from Btrieve 6.15 (released in 1996) and every PSQL database in between. Ten years of full backward compatibility means that upgrading the database in your application is a simple process because it won t require a rebuild to support a newer file format. Distributed Tuning Interface DTI is an extension of the same APIs that are used to develop tools and utilities for Pervasive PSQL databases. DTI is invaluable to developers because it provides access to low-level database engine functions, giving them control of the database from within their application. In essence, developers can create tools and utilities that interact directly with the database engine, and can embed them into their application. Using the DTI API, developers can embed code to: Connect Start and stop Pervasive PSQL services on remote servers. Configure Set database engine settings either locally or on remote servers. Monitor Retrieve engine statistics and resource usage (open files, connected users, etc.). Catalog Manage database schema and dictionary information such as database names, table names, table properties, and data dictionary information; drop and create tables and dictionaries. The benefit of these tools is that Pervasive PSQL installation and configuration is easy, quick, and often completely hidden to the end user. End users require no support to install the database because it happens automatically with the installation of the application. This dramatically reduces ISV costs associated with application installations and upgrades. Maintenance-Free Database Operations Pervasive PSQL has several features that make it nearly maintenance-free: auto reconnect, dynamic caching, dynamic file allocation, and index balancing. These features ensure that users don t have to worry about monitoring and managing the database to continually optimize performance or avoid application crashes. Auto-reconnect allows client-server or workgroup applications to endure temporary network interruptions without canceling the current database operation. Dynamic caching reduces reads from disk and improves application performance over time. Dynamic file allocation and index balancing help minimize disk usage requirements. Pervasive has been focused for over 20 years on delivering high-performance databases that can be embedded into applications and made transparent to the end user. The result is that Pervasive PSQL enables developers to deliver great applications and end users to focus on running their businesses, without devoting significant resources to installing, tuning, and maintaining a database. 7
8 DEVELOPMENT FLEXIBILITY Pervasive PSQL gives developers the freedom to create applications in their preferred language, their development environment of choice, such as Visual Studio, Delphi and C++ Builder, and with the access method that best suits needs of the application. In addition, using either direct access to Btrieve, or the high-performance JDBC, ODBC and PDAC interfaces, developers can choose the right combination of access methods to perfectly meet customer requirements. Pervasive PSQL offers the best development interface for your application and the performance required for any situation. The transactional interface enables extremely fast, robust applications, while the relational engine, accessed through OLE DB, ODBC, JDBC and PDAC, optimizes queries for fast results. Development Environments MS Visual Studio, Delphi, Crystal Reports, Data Access, Accucorp, etc. Languages C, C++, Java, COBOL, Visual Basic, Visual C++, Pascal, PHP, Perl, etc. Java Class Library (JCL) ADO OLE DB JDBC ODBC PDAC Pervasive Data Access Components ActiveX Btrieve Relational Engine Microkernel Pervasive PSQL Software Kit The Software Developer Kit (SDK) offers a full suite of interfaces, components, and data access methods combined with sample applications, documentation and tutorials for programmers of every skill level. You can download components of the Pervasive PSQL SDK at The Pervasive PSQL SDK includes everything a developer needs for application development including: Full Text Search developer tool to enable applications to search for data in a PSQL table DDF Builder to create and maintain DDFs for any Pervasive PSQL database Code samples and snippets Tutorials Pervasive PSQL Engine for development and testing Support from the Pervasive Developer Resource Center 8
9 Pervasive Developer Center PSQL developers can navigate available downloads, documentation, product updates, sample code, and tutorials using the Developer Center. In addition to the SDK components, the Developer Center provides access to documentation, technical white papers, DevTalk (a Pervasive Developer forum), and training. The Developer Center can be found at DEPLOYMENT FLEXIBILITY Operating Systems Platforms Pervasive supports versions of PSQL on three different operating systems: Windows, NetWare, and Linux. Configuring the database for each of these platforms is identical, eliminating the need for platform-specific DBMS knowledge. In the simplest cases, all that is required to run your database on a new OS is to install the database on the new platform, copy the files, and point your application to the new server. Pervasive also provides reduced price licensing to move from one OS to another, allowing customers to leverage their current investment in the database across multiple platforms. For more details on operating system support, please review the Pervasive PSQL product sheet. Pervasive PSQL OS Deployment Options PERVASIVE PSQL DEPLOYMENT Server Workgroup Client OPERATING SYSTEM NetWare, Windows Server 2003, Windows 2000, Linux Windows Server 2003, Windows 98/Me/2000/XP DOS, Windows 98/Me/2000/XP/NT, Linux Configuration and Licensing Pervasive offers configuration and licensing options suitable for installations ranging from single-user PCs to thousand-user servers, and Web-served applications supporting tens of thousands of users. Pervasive PSQL is licensed in two base configurations, Workgroup and Server, allowing users to easily grow and migrate their applications. The key is to not limit flexibility or the ability to change because of the choice of database, and with Pervasive PSQL customers get exactly what they need. Pervasive PSQL Workgroup The Pervasive PSQL v9 Workgroup is the ideal solution for applications deployed in single-user and small multi-user environments. The Workgroup edition is designed to deliver client-server multi-user performance, dependability, reliability, and data integrity to environments with no network server. Workgroup shares a common architecture with the PSQL Server engine and is fully compatible with all PSQL Server applications, so migration between the two products requires nothing but a license change. The Workgroup engine supports up to five concurrent connections. Single-user add-on licenses can be applied to increase the concurrent user count. To add concurrent users, simply install the Workgroup engine on the new system requiring access to the database and apply the addon user license. 9
10 Pervasive PSQL Server Pervasive PSQL Server edition is Pervasive s solution for high-volume environments that require the power, performance, and administration of a true client-server solution. Pervasive PSQL Server offers licensing from six to an unlimited number of concurrent users, and is designed to handle the heaviest loads in terms of number of users or transactions. With an Internet license, vendors can provide an unlimited number of connections to Internet customers for less than the cost of a 100 user license. DATA SECURITY AND RECOVERABILITY Pervasive PSQL Security PSQL provides a full set of utilities and security features, including database-administratordefined user access controls at the database and table level, and encryption for database files and database-related traffic. Once access policies have been defined, the administrator has several ways in which to implement them. Database access rights can be defined at: a) the operating system level, b) at the database but using access and authentication mechanisms in the OS (the database passes username and login information to the operating system), c) independent of the operating system (separate users, groups, and access rights). Flexibility is the key to delivering a solution that fits, and the key to simplifying the changes dictated by shifting business conditions. For more details on implementing these security models, please refer to the PSQL v9 Advanced Operations Guide. Additional Data Security and Recovery Products Even though Pervasive PSQL is an incredibly robust database (some customers have gone literally years without any problems), it s important to provide data security and recovery features in the event disaster strikes. PSQL includes several key security features, whose capabilities can be extended with Pervasive s other data management products: Backup Agent, DataExchange and AuditMaster. Backup Agent One of the biggest challenges that administrators face in implementing a backup plan is that database applications must be shut down to commit changes before a backup to ensure data and file integrity in order that the backup won t be corrupted. Pervasive s Backup Agent works with your existing backup software such as ARCserve and Backup Exec to enable backups with continuously operating applications. Backup Agent keeps track of which files are open, records changes, and commits them after the backup is complete (ensuring that no partially completed transactions are included in the backup). DataExchange Backup Agent is an excellent add-on product to make your tape backups easier, but there are times when backing up data to local tape drive may not be enough protection. For additional safety, data can be backed up to a remote location. DataExchange captures and replicates database changes (inserts, updates, and deletes) from a production to a backup server. DataExchange can be configured to operate several different ways for a backup procedure 10
11 either continuously, at scheduled intervals, or on demand. To catch potential problems before they occur, DataExchange can also send an notification if a replication failure occurs (such as an inability to communicate with the remote backup server or a missed schedule for a particular replication event). In the event of a primary server outage, clients can be redirected to the up-to-date backup. With DataExchange, data loss and down time due to system crashes, hardware failures, or site disasters are minimized. DataExchange can be used to recover from a catastrophic failure at the primary site where no data is recoverable, or from a partial failure in which data is recoverable but not current. AuditMaster Planning backups and ensuring data is synchronized across multiple remote sites provides good protection against natural disasters, and access controls and encryption will help protect data from unauthorized access. Something is still needed, however, to help protect applications from problems caused by authorized users inadvertent or deliberate actions. AuditMaster monitors and records all data access at the database level inserts, deletes, modifications (recording database state both before and after the modification), logins/logouts, and reads. It also tracks database errors, such as denial of file access or failed login attempts, and provides detailed records for a thorough audit trail. For each occurrence, the event record includes date, time, network address, IP address, user name, database name, database event, application versions, process, and much more. AuditMaster also provides an alert capability, enabling system administrators to be notified of potential security problems as they are happening. Developers can define alerts for specific events in the database. AuditMaster checks each new audit record for the alert condition and executes an action (for example, sending an ) when the alert condition is found. For more information on Backup Agent, DataExchange and AuditMaster, please visit the Pervasive website at 11
12 SUMMARY: THE OPTIMAL DATABASE SOLUTION Getting the most value from an application requires an underlying database that delivers the best combination of: Performance Easy installation and low maintenance Development Deployment options and scalability Data security and recoverability With Pervasive PSQL, developers can selectively tune their applications performance by choosing development tools and access methods that best suit the application requirements. Applications can be delivered on a wide variety of operating systems, and data can be readily shared among different applications. Embedding and installation tools allow the developer to automate and simplify database installation and configuration, reducing both setup and ongoing support costs. Performance PSQL provides Btrieve access for exceptionally quick transactions and SQL access for flexibility in meeting user reporting or ad hoc query requirements. Development Options A wide range of development environments, languages, and data access methods combined with great developer support provides developers with all the tools they need to meet customer requirements. Deployment Options and Scalability Developers can deploy applications on three different operating systems with configurations and licensing options that span from single-user workstation to an unlimited number of users accessing a database through the Internet. Easy Installation and Low Maintenance PSQL has been designed for over 20 years as an embedded database installed as part of the application and capable of running with little or no ongoing maintenance. Installation and embedding tools let the developer make the PSQL database setup and installation process invisible to the end user. The Distributed Tuning Interface provides an API to manage the database programmatically from the application, and features such as auto-reconnect and dynamic cache management reduce maintenance requirements. Data Security and Recoverability Pervasive PSQL and the add-on data management products Backup Agent, DataExchange, and AuditMaster provide an excellent suite of tools for ensuring that data is secure from both natural and man-made hazards. These security features can be added without changing existing application code, further proof of Pervasive s commitment to deliver high-value, low-overhead solutions to both developers and end users. For more information about Pervasive PSQL, pricing or support, please visit our Web site at or locate one of our sales offices worldwide at 12
13 Contact Information Pervasive Software Inc B Riata Trace Parkway Austin, Texas United States Fax: EMEAA Pervasive Software Inc. All rights reserved. All Pervasive brand and product names are trademarks or registered trademarks of Pervasive Software Inc. in the United States and other countries. All other marks are the property of their respective owners. 13 WP0506A05
Real-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationHitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage
O V E R V I E W Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Adaptable Modular Storage and Hitachi Workgroup
More informationHitachi Adaptable Modular Storage and Workgroup Modular Storage
O V E R V I E W Hitachi Adaptable Modular Storage and Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Data Systems Hitachi Adaptable Modular Storage and Workgroup
More informationMaximum Availability Architecture: Overview. An Oracle White Paper July 2002
Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network
More informationVERITAS Volume Replicator. Successful Replication and Disaster Recovery
VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationITTIA DB SQL Em bedded Dat abase and VxWorks
ITTIA DB SQL Em bedded Dat abase and VxWorks Copyright 2017 ITTIA L.L.C. An ITTIA White Paper, August 2017 ITTIA DB SQL TM is a small-footprint, high-performance relational database engine for embedded
More informationATEMPO UNITED BACKUP EDITION DATA PROTECTION
ATEMPO UNITED BACKUP EDITION DATA PROTECTION ATEMPO UNITED BACKUP EDITION Atempo United Backup Edition (AUBE) offers your company an easy, hassle-free backup solution for all types of servers, applications
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationFlex2SQL. Contents. Mertech s ISAM to SQL Database Connectivity (ISDBC) Drivers For DataFlex
MERTECH DATA SYSTEMS, INC. 18503 Pines Boulevard, Suite 312 Pembroke Pines, Florida 33029 USA Tel: (954)585-9016 Fax: (866)228-1213 www.mertechdata.com Contents Overview Product Fact Sheet Interaction
More informationHigh Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.
High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationWhat's New in PSQL v13 SP2
PSQL v13 What's New in PSQL v13 SP2 An Overview of New Features and Changed Behavior disclaimer trademarks ACTIAN CORPORATION LICENSES THE SOFTWARE AND DOCUMENTATION PRODUCT TO YOU OR YOUR COMPANY SOLELY
More informationRandy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED
Randy Pagels Sr. Developer Technology Specialist DX US Team rpagels@microsoft.com AZURE PRIMED 2016.04.11 Interactive Data Analytics Discover the root cause of any app performance behavior almost instantaneously
More informationMicro Focus Desktop Containers
White Paper Security Micro Focus Desktop Containers Whether it s extending the life of your legacy applications, making applications more accessible, or simplifying your application deployment and management,
More informationAdvantage. Advantage. Database Server 8.0
Database Server 8.0 is a complete, high performance client/server data management solution for stand-alone, networked, Internet, and mobile database applications. allows application developers the flexibility
More informationDesigning Data Protection Strategies for Oracle Databases
WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.1 for Windows Servers Agent for Oracle 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Oracle Backup Basics...3
More informationStorage Access Network Design Using the Cisco MDS 9124 Multilayer Fabric Switch
Storage Access Network Design Using the Cisco MDS 9124 Multilayer Fabric Switch Executive Summary Commercial customers are experiencing rapid storage growth which is primarily being fuelled by E- Mail,
More informationTitan SiliconServer for Oracle 9i
Titan SiliconServer for 9i Abstract Challenges facing deployment include the ever-growing size of the database and performance scalability. Enterprise businesses rely heavily on databases for day-to-day
More informationINTRODUCING VERITAS BACKUP EXEC SUITE
INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...
More informationMicrosoft SQL Server on Stratus ftserver Systems
W H I T E P A P E R Microsoft SQL Server on Stratus ftserver Systems Security, scalability and reliability at its best Uptime that approaches six nines Significant cost savings for your business Only from
More informationEasy VMware Disaster Recovery & Business Continuity in Amazon Web Services
White Paper White Paper Managing Public Cloud Computing in the Enterprise Easy VMware Disaster Recovery & Business Continuity in Amazon Web Services A Quick Start Guide For the Price of Basic Backup By
More informationDossier. Version 6.2 IT Planning Manual ARSENAULT. Associates. Fleet Asset Maintenance Management Software. Since
Dossier Fleet Asset Maintenance Management Software Version 6.2 IT Planning Manual ARSENAULT Associates Since 1979 www.arsenault.com Fleet Maintenance Software Dossier IT Planning Manual Version 6.2 By
More informationVeritas Volume Replicator Option by Symantec
Veritas Volume Replicator Option by Symantec Data replication for disaster recovery The provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable
More informationVirtual Disaster Recovery
The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...
More informationActian Hybrid Data Conference 2018 London
Disclaimer This document is for informational purposes only and is subject to change at any time without notice. The information in this document is proprietary to Actian and no part of this document may
More informationData Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION
Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1
More informationFour Essential Steps for Removing Risk and Downtime from Your POWER9 Migration
Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Syncsort Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration With the introduction of IBM s POWER9
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationDesigning Data Protection Strategies for Oracle Databases
WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.0 for Windows Servers Agent for Oracle VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management
More informationSmarterMail v. Exchange: Admin Comparison
SmarterMail v. Exchange: Admin Comparison Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. SmarterMail and Microsoft
More informationIBM TS7700 grid solutions for business continuity
IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features
More informationRocket UniData. Deliver Fast, Flexible, and Secure Applications with Low Overhead
DATASHEET Rocket UniData Deliver Fast, Flexible, and Secure Applications with Low Overhead Create, deploy, and maintain high-performing business applications with short time to value Organizations worldwide
More informationSage MAS 200 SQL Server Edition Introduction and Overview
Sage MAS 200 SQL Server Edition Introduction and Overview February 2006 1 TABLE OF CONTENTS Introduction... 3 Business Applications and Appropriate Technology... 3 Industry Standard...3 Rapid Deployment...4
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationActian PSQL Price List. Integrated Quality Networks Bruelenhof 28 B-2830 Tisselt - Belgium Tel: +32(0)
Actian PSQL Price List Effective November 25, 2015 B- Tel: +32(0)3 5028155 Notes Actian PSQL Vx Server v12 Actian PSQL Vx Server 12 Engines Actian PSQL Vx Server 12 Data in Use Increase Actian PSQL Vx
More informationGuide to Mitigating Risk in Industrial Automation with Database
Guide to Mitigating Risk in Industrial Automation with Database Table of Contents 1.Industrial Automation and Data Management...2 2.Mitigating the Risks of Industrial Automation...3 2.1.Power failure and
More informationBackup and Restore Strategies
Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything
More informationHybrid Backup & Disaster Recovery. Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam
Hybrid Backup & Disaster Recovery Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam 1 Table of Contents 1. Introduction and Overview... 3 2. Solution Components... 3 3. SAP HANA: Data Protection...
More information5 Things Small Businesses Need to Know About Disaster Recovery
5 Things Small Businesses Need to Know About Disaster Recovery WHY WORRY ABOUT DISASTER RECOVERY? THERE WOULD BE NO NEED TO THINK ABOUT DISASTER RECOVERY IF ANY OF THE FOLLOWING WERE TRUE: Your chance
More informationCarbonite Availability. Technical overview
Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably
More informationSimplify Backups. Dell PowerVault DL2000 Family
Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationFirst Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations
Customer Profile First Financial Bank Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations A midsize community bank with a service
More informationDatacenter replication solution with quasardb
Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationVERITAS Volume Replicator Successful Replication and Disaster Recovery
VERITAS Replicator Successful Replication and Disaster Recovery Introduction Companies today rely to an unprecedented extent on online, frequently accessed, constantly changing data to run their businesses.
More informationECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump
ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops
More informationEnterpriseLink Benefits
EnterpriseLink Benefits GGY a Moody s Analytics Company 5001 Yonge Street Suite 1300 Toronto, ON M2N 6P6 Phone: 416-250-6777 Toll free: 1-877-GGY-AXIS Fax: 416-250-6776 Email: axis@ggy.com Web: www.ggy.com
More informationIBM Tivoli Directory Server
Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationWhite paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth
White paper: less Backup is Not a Myth less Backup is Not a Myth White paper: less Backup is Not a Myth Executive Summary Backup and recovery software typically requires agents that are installed onto
More informationComplete Data Protection & Disaster Recovery Solution
Complete Data Protection & Disaster Recovery Solution Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After
More information3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007
3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers
More informationAchieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX
Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational
More informationCommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems Reliable Data Protection for Exchange Systems and their Environments
More informationProvide Real-Time Data To Financial Applications
Provide Real-Time Data To Financial Applications DATA SHEET Introduction Companies typically build numerous internal applications and complex APIs for enterprise data access. These APIs are often engineered
More informationDowntime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications
Downtime Prevention Buyer s Guide 6 QUESTIONS to help you choose the right availability protection for your applications Question 6 questions to help you choose the right availability protection for your
More informationISAM TO SQL MIGRATION
ISAM TO SQL MIGRATION Enabling ISAM-based Applications to work with relational databases without source level changes Contents Introduction A Case for Relational Databases Dilemma for Developers and Users
More informationActive Server Pages Architecture
Active Server Pages Architecture Li Yi South Bank University Contents 1. Introduction... 2 1.1 Host-based databases... 2 1.2 Client/server databases... 2 1.3 Web databases... 3 2. Active Server Pages...
More informationPervasive PSQL v10.10
Pervasive PSQL v10.10 Getting Started with Pervasive PSQL Pervasive Software Inc. 12365 Riata Trace Parkway Building B Austin, TX 78727 USA Telephone: 512 231 6000 or 800 287 4383 Fax: 512 231 6010 Email:
More informationWhitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. Copyright 2014 SEP
Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 SOLUTION COMPONENTS... 4-5 SAP HANA... 6 SEP
More informationProtect enterprise data, achieve long-term data retention
Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce
More informationDatabases and ERP Selection: Oracle vs SQL Server
DATABASES AND ERP ORACLE VS SQL SELECTION: SERVER Databases and ERP Selection: Oracle vs SQL Server By Rick Veague, Chief Technology Officer, IFS North America An enterprise application like enterprise
More informationDesktop DNA r11.1. PC DNA Management Challenges
Data Sheet Unicenter Desktop DNA r11.1 Unicenter Desktop DNA is a scalable migration solution for the management, movement and maintenance of a PC s DNA (including user settings, preferences and data).
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationA Guide to Architecting the Active/Active Data Center
White Paper A Guide to Architecting the Active/Active Data Center 2015 ScaleArc. All Rights Reserved. White Paper The New Imperative: Architecting the Active/Active Data Center Introduction With the average
More informationFUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide
FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide Non-stop storage is a high-availability solution that combines ETERNUS SF products
More informationEMC Celerra CNS with CLARiiON Storage
DATA SHEET EMC Celerra CNS with CLARiiON Storage Reach new heights of availability and scalability with EMC Celerra Clustered Network Server (CNS) and CLARiiON storage Consolidating and sharing information
More informationRealizing the Value of Standardized and Automated Database Management SOLUTION WHITE PAPER
Realizing the Value of Standardized and Automated Database Management SOLUTION WHITE PAPER Table of Contents The Challenge of Managing Today s Databases 1 automating Your Database Operations 1 lather,
More informationFor Australia January 2018
For Australia January 2018 www.sysaid.com SysAid Cloud Architecture Including Security and Disaster Recovery Plan 2 This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and
More informationHow to Lift-and-Shift a Line of Business Application onto Google Cloud Platform
How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform by Andy Wu, Solutions Architect, Magenic White Paper How to Lift-and-Shift a Line of Business Application onto Google Cloud
More informationProgress DataDirect For Business Intelligence And Analytics Vendors
Progress DataDirect For Business Intelligence And Analytics Vendors DATA SHEET FEATURES: Direction connection to a variety of SaaS and on-premises data sources via Progress DataDirect Hybrid Data Pipeline
More informationA Practical Guide to Cost-Effective Disaster Recovery Planning
White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the
More informationActiveScale Erasure Coding and Self Protecting Technologies
NOVEMBER 2017 ActiveScale Erasure Coding and Self Protecting Technologies BitSpread Erasure Coding and BitDynamics Data Integrity and Repair Technologies within The ActiveScale Object Storage System Software
More informationInformation management software White paper. IBM Informix portfolio: executive overview.
Information management software White paper IBM Informix portfolio: executive overview. July 2004 Page 1 Contents 2 Introduction 2 IBM Informix Dynamic Server 3 IBM Informix 4GL 4 IBM Informix Client Software
More informationPreserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS
Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS We are the only company to integrate disk, tape, and replication in a single solution set for better near-term
More informationMigrationWiz Security Overview
MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database
More informationOracle E-Business Availability Options. Solution Series for Oracle: 2 of 5
Oracle E-Business Availability Options Solution Series for Oracle: 2 of 5 Table of Contents Coping with E-Business Hours Oracle E-Business Availability Options.....1 Understanding Challenges to Availability...........................2
More informationEmpowering DBA's with IBM Data Studio. Deb Jenson, Data Studio Product Manager,
Empowering DBA's with IBM Data Studio Deb Jenson, Data Studio Product Manager, dejenson@us.ibm.com Disclaimer Copyright IBM Corporation [current year]. All rights reserved. U.S. Government Users Restricted
More informationWhite Paper. How to select a cloud disaster recovery method that meets your requirements.
How to select a cloud disaster recovery method that meets your requirements. VS Table of contents Table of contents Page 2 Executive Summary Page 3 Introduction Page 3 Disaster Recovery Methodologies Page
More informationStep into the future. HP Storage Summit Converged storage for the next era of IT
HP Storage Summit 2013 Step into the future Converged storage for the next era of IT 1 HP Storage Summit 2013 Step into the future Converged storage for the next era of IT Karen van Warmerdam HP XP Product
More information7 Ways Compellent Optimizes VMware Server Virtualization WHITE PAPER FEBRUARY 2009
7 Ways Compellent Optimizes ware Virtualization WHITE PAPER FEBRUARY 2009 Introduction Increasingly, enterprises are turning to server virtualization to enhance IT flexibility while reducing costs. virtualization
More informationUsing Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager
White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract
More informationSimplifying Downtime Prevention for Industrial Plants. A Guide to the Five Most Common Deployment Approaches
Simplifying Downtime Prevention for Industrial Plants A Guide to the Five Most Common Deployment Approaches Simplifying Downtime Prevention for Industrial Plants: A Guide to the Five Most Common Deployment
More informationCreating Enterprise and WorkGroup Applications with 4D ODBC
Creating Enterprise and WorkGroup Applications with 4D ODBC Page 1 EXECUTIVE SUMMARY 4D ODBC is an application development tool specifically designed to address the unique requirements of the client/server
More informationBRINGING YOUR DOCUMENTS INTO THE DIGITAL AGE REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER
BRINGING YOUR DOCUMENTS INTO THE DIGITAL AGE REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER Written by: Image Advantage Solutions Inc. Addresss: 1-1354
More informationManaging Oracle Real Application Clusters. An Oracle White Paper January 2002
Managing Oracle Real Application Clusters An Oracle White Paper January 2002 Managing Oracle Real Application Clusters Overview...3 Installation and Configuration...3 Oracle Software Installation on a
More informationSWsoft ADVANCED VIRTUALIZATION AND WORKLOAD MANAGEMENT ON ITANIUM 2-BASED SERVERS
SWsoft ADVANCED VIRTUALIZATION AND WORKLOAD MANAGEMENT ON ITANIUM 2-BASED SERVERS Abstract Virtualization and workload management are essential technologies for maximizing scalability, availability and
More informationIBM Spectrum NAS. Easy-to-manage software-defined file storage for the enterprise. Overview. Highlights
IBM Spectrum NAS Easy-to-manage software-defined file storage for the enterprise Highlights Reduce capital expenditures with storage software on commodity servers Improve efficiency by consolidating all
More informationGuide. A small business guide to data storage and backup
Guide A small business guide to data storage and backup 0345 600 3936 www.sfbcornwall.co.uk Contents Introduction... 3 Why is data storage and backup important?... 4 Benefits of cloud storage technology...
More information"Software-defined storage Crossing the right bridge"
Navigating the software-defined storage world shaping tomorrow with you René Huebel "Software-defined storage Crossing the right bridge" SDS the model and the promises Control Abstraction The promises
More informationA Cost-effective SAN for the Small-to-midsized Business
Enterprise Storage A Cost-effective SAN for the Small-to-midsized Business Hitachi Data Systems and QLogic Deliver the First Microsoft-designated Simple SAN Solution for Windows Server Environments An
More informationSeagate Info Architecture Planning and Deployment for ASPs
Seagate Info Architecture Planning and Deployment for ASPs Overview Contents This document is a guide to help customers prepare for their implementation of Seagate Info. It helps you to successfully implement
More informationRethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.
Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now
More informationDELL POWERVAULT MD FAMILY MODULAR STORAGE THE DELL POWERVAULT MD STORAGE FAMILY
DELL MD FAMILY MODULAR STORAGE THE DELL MD STORAGE FAMILY Simplifying IT The Dell PowerVault MD family can simplify IT by optimizing your data storage architecture and ensuring the availability of your
More informationOptimizing and Managing File Storage in Windows Environments
Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)
More information