Newsletters




Trends and Applications



A member of the Oracle Applications Users Group (OAUG) since 1992, Mark C. Clark recently took over as president of the organization. He spoke with DBTA about what's in store for members at the annual Oracle users conference COLLABORATE as well as for the year ahead. Helping members prepare for an upgrade to Oracle Applications Release 12, providing additional smaller, more targeted regional events, and a continued emphasis on a return to the basics with networking and education are at the top of his to-do list for 2011.

Posted March 23, 2011

McAfee has announced its intention to acquire Sentrigo, a privately owned provider of database security and compliance, assessment, monitoring and intrusion prevention solutions. In addition, McAfee has also announced a comprehensive database security solution to protect business-critical databases without impacting performance and availability. McAfee's coordinated approach based on the Security Connected initiative launched in October 2010, involves protecting a company's most important data assets from network to server to the database itself, resulting in data being protected in every state (data in motion, data at rest, and data in use) via access controls, network security, server security, data protection and encryption - all centrally managed to minimize risk and maximize efficiency.

Posted March 23, 2011

Revolution Analytics, a commercial provider of software and services based on the open source R project for statistical computing, and IBM Netezza announced they are teaming up to integrate Revolution R Enterprise and the IBM Netezza TwinFin Data Warehouse Appliance. According to the vendors, this will enable customers to directly leverage the capabilities of the open source R statistics language as they run high-performance predictive analytics from within data warehouse platforms.

Posted March 23, 2011

Despite highly publicized data breaches, ranging from the loss of personally identifiable information such as credit card and Social Security numbers at major corporations to the WikiLeaks scandal involving sensitive U.S. Department of Defense and U.S. State Department information, and the "alphabet soup" of compliance regulations, data around the globe remains at grave risk, according to John Ottman, president and CEO of Application Security, Inc., who has written "Save the Database, Save the World" to focus attention on the problem and present steps to its solution. While super secure networks are important, that alone is far from enough and a layered data security strategy with a commitment to "protecting data where it lives - in the database" must be pursued to avoid risks posed by outside hackers as well as authorized users, says Ottman. A stronger government hand may be needed as well to defend "the critical infrastructure that operates in the private sector," he suggests.

Posted March 23, 2011

Data continues growing rapidly, flowing into enterprises from traditional sources as well as new pipelines fueled by web and social media. Often presented in a range of formats and structures, this data onslaught phenomenon has come to be known as "big data." Companies, educational institutions, and government agencies are striving to meet the management challenge of this data deluge as well as mine this wealth of information for business advantage. In this special section, DBTA asks key vendors to explain their strategies for enabling customers to better handle ever-increasing data stores.

Posted March 09, 2011

NoSQL Option: Triplestore Databases

Posted March 09, 2011

The recent public release of thousands of leaked U.S. State Department cables by WikiLeaks continues to shake up governments across the world. The information captured and sent out to the wild is not only an embarrassment to U.S. government officials whose candid assessments of foreign leaders were exposed but also to the fact that that the organization with the tightest and most comprehensive data security technologies, protocols, and policies in the world unknowingly fell victim to a massive data breach. Can private corporations or smaller government agencies with less-stringent security protocols and standards expect to do any better? Securing data is tough enough, and now, with the increase of initiatives such as virtualization and cloud computing, the odds of loss of control and proliferation of sensitive data become even greater.

Posted March 09, 2011

A new survey of database administrators and managers reveals that a pervasive culture of complacency hampers information security efforts, and as a result of lax practices and oversight, sensitive data is being left vulnerable to tampering and theft. While tools and technologies provide multiple layers of data security both inside and outside the firewall, organizations appear to lack the awareness and will to make security stick. The study, "Data in the Dark: Organizational Disconnect Hampers Information Security," was conducted by Unisphere Research among 761 members of PASS, the Professional Association for SQL Server, in September 2010. The survey was fielded in partnership with Application Security, Inc.

Posted March 09, 2011

A new survey of 430 members of the Oracle Applications Users Group (OAUG) reveals that organizations lack a sense of urgency about securing critical data, and the greatest challenges to securing application and data environments are primarily organizational and budget-related. The survey was conducted by Unisphere Research, a division of Information Today, Inc., in partnership with Application Security, Inc. (AppSec), a provider of database security, risk and compliance solutions, in December 2010. According to the OAUG's 2011 Data Security report, "Managing Information in Insecure Times," 53% of respondents stated that budget was the greatest impediment holding back information security efforts. Thirty-three percent claimed a lack of an understanding of the threats prevents them from rallying support for countermeasures. And more than one-quarter of respondents cited a disconnect between IT teams and executive management as a major impediment to implementing proper security measures. The study shows a serious lack of understanding and concern for data and application security in today's organizations, according to Thom VanHorn, vice president global marketing at AppSec. "My take-away from the study is that there is a lack of communication, there is a lack of buy-in at the highest levels, and there is not a focus on implementing best practices," VanHorn says.

Posted February 23, 2011

Cloud and Hadoop - Keys to a Perfect Marriage Explored in New DBTA Webcast On-Demand

Posted February 23, 2011

The market for data warehouse appliances - solutions consisting of integrated software and hardware - is heating up, with new twists emerging from both established and new appliance vendors. Netezza, an early proponent of the appliance approach, was acquired in November 2010 by IBM. Here, Phil Francisco, vice president, product management and product marketing for IBM Netezza, shares his views on what's changing and what's ahead for appliances. Going forward, he anticipates that there will be very specific, vertically-oriented solutions that are built on appliances, which will take into account the kinds of data models and the kind of functionality that is required for industries such as telco, retail, and financial services.

Posted February 23, 2011

The SHARE conference convenes on February 27th in Anaheim, with an agenda packed with industry initiatives and knowledge-sharing on the latest best practices and technology trends. In this Q&A, SHARE president Janet Sun provides her vision for the IBM users group in the coming years. "We see the mainframe as the center of the enterprise IT universe. If you don't think so, try unplugging it," says Sun. "Our organization focuses on enterprise IT, and that includes the mainframe. Today's SHARE membership continues to strive to leverage advances in information technology, and SHARE is a great place to do that."

Posted February 23, 2011

Data growth is driving the use of virtualization within data centers. The virtualization evolution from server to storage to desktop is catching on at many small-to-medium size businesses, as well as at large enterprises. Aimed at providing a better end-user and administrator experience than their physical counterparts, virtualized desktops promise lower cost of acquisition and management with a highly scalable, easy-to-deploy and fully protected environment. However, with virtualization desktop infrastructure (VDI) comes a set of new challenges. Chief among these are storage and server resource allocation and data protection and recovery.

Posted February 02, 2011

IBM announced the latest release of the Informix database server, version 11.7, in October 2010, thus marking the fourth major release since Informix joined the company. One of the most exciting features in Informix 11.7 is the "Flexible Grid." Wouldn't you like to administer multiple servers as easily as a single server? Wouldn't you like to mix different hardware, operating systems, and versions of software? The Informix Flexible Grid provides this capability.

Posted February 02, 2011

DBTA Webcast on How to Improve DB Security with Virtual Patching Now Available on Demand

Posted February 02, 2011

There is a wealth of information, connections and relationships within the terabytes and petabytes of data being collected by organizations on distributed cloud platforms. Utilizing these complex, multi-dimensional relationships will be the key to developing systems to perform advanced relationship analysis. From predictive analytics to the next generation of business intelligence, "walking" the social and professional graphs will be critical to the success of these endeavors.

Posted February 02, 2011

The exponentially increasing amounts of data being generated each year make getting useful information from that data more and more critical. The information frequently is stored in a data warehouse, a repository of data gathered from various sources, including corporate databases, summarized information from internal systems, and data from external sources. Analysis of the data includes simple query and reporting, statistical analysis, more complex multidimensional analysis, and data mining.

Posted January 07, 2011

Business Intelligence (BI) systems are used to improve an enterprise's decision making by combining tools for gathering, storing, accessing, and analyzing business data. While traditional features for querying, reporting, and analytics have long been the core focus of these tools, BI has evolved in recent years to become comprehensive, enterprise-wide platforms, and newer trends, such as self-service BI, have helped to continue interest in this technology.

Posted January 07, 2011

With its January 2010 acquisition of Sun Microsystems, Oracle gained the MySQL open source database management software (DBMS) platform for enterprise IT environments. MySQL is designed to let users design and manage complex applications and data sets, and has gained a substantial share of the overall DBMS market.

Posted January 07, 2011

DBTA Hadoop Webcast Now Available on Demand

Posted January 07, 2011

When designing a system an architect must conform to all three corners of the CIA (Confidentiality, Integrity and Accessibility) triangle. System requirements for data confidentiality are driven not only by business rules but also by legal and compliance requirements. As such, the data confidentiality (when required) must be preserved at any cost and irrespective of performance, availability or any other implications. Integrity and Accessibility, the other two sides of triangle, may have some flexibility in design.

Posted January 07, 2011

As security threats increase and become more sophisticated, organizations face pressure to implement strong processes and technology solutions to ensure compliance and the safety of critical assets. The risks associated with a data breach can be devastating, regardless of whether it is due to a simple mistake, or a stolen end-point device such as a laptop. The impact goes beyond fines and lost revenue, to negatively impacting an organization's brand identity and equity, or jeopardizing customers' trust. Providing greater clarity, as well as aligning with industry changes and best practices, Version 2.0 of the PCI DSS standard went into effect earlier this month.

Posted January 07, 2011

The idea of moving off IMS might seem compelling at first glance, but once you look at the whole picture, you might think otherwise. Most people think of cost as the primary reason to move off IMS. But if you look at all of the comparative costs of IMS on a mainframe against a WINDOWS/UNIX solution, you will find that running IMS is actually cost-effective. The obvious cost elements are hardware and software and the huge expense of converting hundreds of thousands of lines of code and hundreds of databases. However, these are only a small part of the story.

Posted January 07, 2011

These days, many companies recognize that there are severe repercussions to ignoring or undervaluing data security, and a sizable segment of organizations-at least one-third in many cases-have been taking additional measures to bolster their data security.

Posted November 30, 2010

When Data Virtualization?

Posted November 30, 2010

One common challenge I have observed during ITIL service catalog implementations pertains to the handling of out-of-band requests. That is, how should one manage a request for a service that is not in the catalog?

Posted November 30, 2010

The year 2010 brought many new challenges and opportunities to data managers' jobs everywhere. Companies, still recovering from a savage recession, increasingly turned to the power of analytics to turn data stores into actionable insights, and hopefully gain an edge over less data-savvy competitors. At the same time, data managers and administrators alike found themselves tasked with managing and maintaining the integrity of rapidly multiplying volumes of data, often presented in a dizzying array of formats and structures. New tools and approaches were sought; and the market churning with promising new offerings embracing virtualization, consolidation and information lifecycle management. Where will this lead in the year ahead? Can we expect an acceleration of these initiatives and more? DBTA looked at new industry research, and spoke with leading experts in the data management space, to identify the top trends for 2011.

Posted November 30, 2010

If data is the lifeblood of an enterprise, a robust master data management (MDM) solution may well be the heart, pumping purified data downstream to vital applications and databases while simultaneously accepting inaccurate and old data for cleansing and enrichment. This "bloodstream," as we know it, is comprised of a myriad of different subject areas, and/or domains. Though the MDM market may well consider itself conceptually and technically mature, end users still struggle to determine whether they should embrace specialist MDM solutions dedicated to supporting one subject area, or make one strategic acquisition and implement truly-multi domain software that addresses multiple subject areas.

Posted November 09, 2010

Leveraging Data Models for Business Intelligence and Data Warehousing Agility

Posted November 09, 2010

There has been a lot of interest lately in NoSQL databases and, of course, many of us have strong backgrounds and experience in traditional relational "SQL" databases. For application developers this raises questions concerning the best way to go. One recurring truth that eventually surfaces with all new software technologies is that "one size does not fit all." In other words, you need to use the right tool for the job, as each has its own strengths and weaknesses. In fact, a danger of many new architectural approaches is one of "over-adoption" - using a given tool to address a wide array of situations when originally they were designed for the specific problem domain in which they excel.

Posted November 09, 2010

When IBM developers set out to build the next version of Informix their goal was to build on the foundation of one of the more mature, effective and reliable pieces of information management software in the industry. With the 10th anniversary of the IBM acquisition of Informix fast approaching, they knew that the 11.7 release would be closely watched by clients and partners alike.

Posted October 12, 2010

Cloud computing offers the promise of greater agility, resource optimization, and user performance, yet many businesses are understandably leery about jumping onto the cloud bandwagon until they have assurances that hosted resources will be secure. In fact, security concerns are the main obstacle to widespread cloud computing adoption among enterprises today. Before taking advantage of these capabilities, businesses need to assure users they have a simple way to access all their applications, and trust that their information is secure in the cloud.

Posted October 12, 2010

The flood of digital information increases the need for accuracy - including knowing which data to leave out. Remember when we used to ride around in our cars and listen to AM radio? Maybe you're not quite old enough to remember, but there was a time when AM radio was all we had - and that was fine. There also used to be only a handful of television channels, which we had to get up out of our chairs to change. That was fine, too. We didn't long for a wider variety of music on the radio, or more channels to watch on TV. We had what we had, and it was all fine - it was all "good enough."

Posted October 12, 2010

The relational database - or RDBMS - is a triumph of computer science. It has provided the data management layer for almost all major applications for more than two decades, and when you consider that the entire IT industry was once described as "data processing," this is a considerable achievement. For the first time in several decades, however, the relational database stranglehold on database management is loosening. The demands of big data and cloud computing have combined to create challenges that the RDBMS may be unable to adequately address.

Posted October 12, 2010

InterSystems Corporation has rolled out a new version of its Caché high-performance object database. The new release targets the growing demand by CIOs for economical high availability by introducing database mirroring, while also addressing Java developers' need for high-volume high-performance processing combined with persistent storage for event processing systems. Robert Nagle, InterSystems vice president for software development, recently chatted with DBTA about the release and the new features it offers. Commenting on the growing interest in NoSQL databases, Nagle observes that many of the beneficial characteristics people see in NoSQL are in fact true of Caché - a flexible data model and zero DBA cost. "But for us, what is unique is that it is not NoSQL, it is that it needs to be SQL - without the overhead of relational technology - because I think SQL is extremely important for almost every class of application that is deployed."

Posted October 12, 2010

Oracle is a fast-changing company, and in recent years, its pace has accelerated to blinding speed. The software giant has expanded well beyond its relational database roots to encompass applications, management tools, service-oriented architecture and middleware, and even hardware. There are now many components to Oracle - from three major databases, to enterprise resource applications, to web applications to development languages to open source desktop tools.

Posted September 07, 2010

Organizations turn to master data management (MDM) to solve many business problems - to reach compliance goals, improve customer service, power more accurate business intelligence, and introduce new products efficiently. In many cases, the need for an MDM implementation is dictated by the business challenge at hand, which knows no single data domain. Take a manufacturing customer, for example. The company decided to deploy an MDM solution in order to solve buy-side and sell-side supply chain processes, to more effectively manage the procurement of direct and indirect materials and to improve the distribution of products. To meet these goals the solution must be capable of managing vendor, customer, material and product master data. Unfortunately, quite a few vendors sell technology solutions that focus exclusively on either customer data integration (CDI) or product information management (PIM), which solves only a piece of the business problem.

Posted September 07, 2010

Brent Ozar achieved SQL Server 2008 Master status earlier this year, becoming the fifth person in the U.S. outside of Microsoft to achieve the company's highest technical certification. A Quest Software SQL Server expert at the time, Ozar has since joined SQLskills.com, a provider of training and consulting focused on Microsoft SQL Server, as a principal consulting partner. In this issue, he provides an arcane gliimpse into the intense 3-week-long onsite program that include the most difficult exams he had ever seen.

Posted September 07, 2010

Many organizations now have, in their possession, the sophisticated analysis tools and dashboards that connect to back-end systems and enable them to peer deeply into their businesses to assess progress on all fronts-from revenues to stock outs to employee performance. However, a recent survey of 279 Oracle applications managers reveals that when it comes to decision making, simple spreadsheets still remain the tool of choice. And business users still wait days, weeks, and months for their IT departments to deliver reports, despite significant investments in performance management systems.

Posted September 07, 2010

IBM has entered into a definitive agreement to acquire Storwize, a privately held company based in Marlborough, Mass. Storwize provides real-time data compression technology to help clients reduce physical storage requirements by up to 80%, improving efficiency and lowering the cost of making data available for analytics and other applications. With Storwize, IBM says, it is acquiring storage technology that is unique in the industry due to its ability to compress primary data, or data that clients are actively using, of multiple types - from files to virtualization images to databases - in real-time while maintaining performance. "This is in contrast to what we see our competitors doing, which is primarily focusing on compressing data that is inactive, or data at rest - backup data, as an example," explained Doug Balog, vice president of IBM Storage, during a conference call announcing the planned acquisition.

Posted August 10, 2010

First elected to Oracle Applications Users Group board of directors in 2009, David Ferguson became president of the OAUG this year. He talks with DBTA this month about how the users group is getting "back to basics" with educational sessions and networking opportunities as well as the new approaches it is taking to meet its members' evolving needs.

Posted August 10, 2010

Earlier this year, Andy Flower took over as president of the Independent Oracle Users Group from Ian Abramson. With Oracle OpenWorld right around the corner, Flower talks with DBTA about how the IOUG is changing to best meet the challenges and opportunities presented by the expanding Oracle ecosystem, despite what continues to be a difficult economy. For the IOUG, it is "the year of the member" and it all starts with the database, he says.

Posted August 10, 2010

Many see 2010 shaping up as a boom year for cloud computing, with cloud adopters capable of realizing significant reductions in administrative IT costs compared to non-adopters. However, it's not enough to simply develop and implement a cloud strategy. Rather, enterprises must take into account the performance of their cloud-based assets and the impact of the cloud on their end users' and customers' experiences. After all, the apparent cost and elasticity advantages of the cloud won't yield any business benefit if the direct consequence is a poor end user experience. For this reason, businesses considering the cloud must do the due diligence and insist on performance guarantees from cloud service providers that map directly to business objectives - or risk impacting revenue, brand image and customer satisfaction.

Posted August 10, 2010

Mid-sized businesses are using and saving more data than ever before. Indeed, the phenomenon that IT engineers have come to refer to as "big data" is being felt in businesses of all sizes. At the same time, however, organizations are facing reduced budgets. Regardless of how much data their likely overburdened IT staff must manage today and tomorrow, mid-sized businesses must find ways to save money by keeping a tight rein on both capital and operational expenditures.

Posted July 12, 2010

Oracle has introduced Oracle Business Intelligence 11g. "The new release allows customers to integrate relational and OLAP analysis across a multitude of different federated data sources and presents that in a very simple way to end users so that they can do analysis on their own without understanding or needing to know that there might be potentially multiple data sources beneath," Paul Rodwick, vice president of product management for Oracle Business Intelligence, tells DBTA. Representing the result of a large investment in simplifying the end user experience, adds Rodwick, companies will see "very interactive dashboards that are completely live and completely interconnected and allow business people to do their own analysis without really needing to go into any kind of query tool." The new release also provides new capablities for search and collaboration, and enhanced performance, scalability, and security through deeper integration with Oracle Enterprise Manager 11g and other components of Oracle Fusion Middleware.

Posted July 12, 2010

Everybody seems to agree with the need for organizations to do a better job of protecting personal information. Every week the media brings us reports of more data breaches, and no organization is immune. Hospitals, universities, insurers, retailers, and state and federal agencies all have been the victims of breach events, often at significant costs. State privacy laws such as the new Massachusetts privacy statutes have placed the burden of protecting sensitive information squarely on the shoulders of the organizations that collect and use it. While some managers might view this as yet one more compliance hurdle to worry about, we feel it presents an excellent opportunity to evaluate existing practices and procedures. The good news is that there are some great solutions available today that can help organizations of all stripes address these requirements while at the same time tightening data security practices, streamlining operations, and improving governance.

Posted July 12, 2010

Despite its many advances, the modern data center is still a complicated mess of technology silos and components that are manually cobbled together and managed. This complexity imposes tremendous operational burden and cost. Fortunately, data centers are going through a major transformation, driven in large part by virtualization. This sea change promises to simplify and automate management, allowing IT to focus less on data center plumbing and more on delivering IT services that drive the business forward.

Posted July 12, 2010

VoltDB, LLC, has begun shipping the VoltDB OLTP database management system that is intended to offer faster transaction processing capabilities due to lower overhead. VoltDB, developed under the leadership of Postgres and Ingres co-founder, Mike Stonebraker, is a next-generation, open source DBMS that, according to the company, has been shown to process millions of transactions per second on inexpensive clusters of off-the-shelf servers. The VoltDB design is based on an in-memory, distributed database partitioning concept that is optimized to run on today's memory-rich servers with multi-core CPUs. Data is held in memory (instead of on disk) for maximum throughput, which eliminates buffer management. VoltDB distributes data - and a SQL engine to process it - to each CPU core in the server cluster. Each single-threaded partition operates autonomously, eliminating the need for locking and latching. Data is automatically replicated for intra-cluster high availability, which eliminates logging.

Posted June 07, 2010

Customer service is always important but never more critical than during difficult economic times, when wasting time is just not acceptable and customer satisfaction is an imperative. Atlantic Detroit Diesel-Allison sells and services a full line of Detroit Diesel, Mercedes-Benz, and MTU engines, and the automatic transmissions offered by the Allison Transmission Division of General Motors Corporation. Atlantic DDA had initiated a plan to improve its service department by improving order processing, thus driving more revenue, with additional goals of gaining operational efficiency and heightening customer satisfaction. In order to achieve these objectives, Atlantic DDA needed to make real-time information available to its teams of service representatives.

Posted June 07, 2010

In only a few years' time, the world of data management has been altered dramatically, and this is a change that is still running its course. No longer are databases run in back rooms by administrators worrying about rows and columns. Now, actionable information is sought by decision makers at all levels of the enterprise, and the custodians of this data need to work closely with the business.That's because, in the wake of the recent financial crisis and economic downturn, there's a push from both high-level corporate management and regulators to achieve greater understanding and greater transparency across the enterprise, Jeanne Harris, executive research fellow and a senior executive at the Accenture Institute for High Performance, and co-author, along with Tom Davenport, of Competing on Analytics and Analytics at Work, tells DBTA. "In many ways, I think the ultimate result of the financial crisis is that executives realized they cannot delegate analytics to subordinates; they can't view it as technology or math that doesn't really affect them."

Posted June 07, 2010

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28

Sponsors