Free Essay

Database Migration Project

In:

Submitted By salasri
Words 4932
Pages 20
Human Resources Data Migration Project
Implementation Plan
Human Resources Data Migration Project
Implementation Plan

Project Group 1:
Information Technology Group
March 4, 2013
Project Group 1:
Information Technology Group
March 4, 2013

VERSION HISTORY

Version # | ImplementedBy | RevisionDate | RequestedBy | ApprovedBy | Description of Change | 1.0 | student | 03-04-2013 | | | Preliminary draft | | | | | | | | | | | | | | | | | | |

Table of Contents
1.1 Purpose 4
1.2 System Overview 4 1.2.1 System Description 4 1.2.2 Assumptions and Constraints 4 1.2.3 System Organization 5
2 Management Overview 5
2.1 Problem Statement 5
2.2 Description of Implementation 6
2.3 Points-of-Contact 6
2.4 Major Tasks 7 2.4.1 Project Tasks 7 2.4.2 MS Access to Oracle Tasks 7 2.4.3 Oracle to Mongo Tasks 7
2.5 Implementation Schedule 8
2.6 Security and Privacy 8 2.6.1 System Security Features 8 2.6.2 Security Set Up During Implementation 8 3 Implementation Support 8
3.1 Hardware, Software, Facilities, and Materials 9 3.1.1 Hardware 9 3.1.2 Software 9 3.1.3 Facility 9 3.1.4 Materials 9
3.2 Documentation 9
3.3 Personnel 9 3.3.1 Staffing Requirements 9 3.3.2 Training of Implementation staff 9
3.4 Outstanding Issues 10
3.5 Implementation Impact 10
3.6 Communications Plan 10
3.7 Change Management 12 4 Implementation Risks and Contingencies 13
4.1 Technical Risks and Contingencies 13
5 Acceptance Criteria 14
6 Implementation Verification and Validation 14
APPENDIX A: Project Implementation Plan Approval 15
APPENDIX B: REFERENCES 16
APPENDIX C: SECURITY FEATURES 17
APPENDIX D: MIGRATION DETAILS 21
1.1 Description of Access to Oracle Implementation 21 *
Introduction
1.1 Purpose

The implementation plan describes the migration of data from an MS Access database to Oracle and MongoDB.
1.2 System Overview

The systems in scope for this data migration are databases. The current HR data resides in an Access Database running on a user desktop and lacks the necessary security and access control needed to be in compliance with the existing security policy.
1.2.1 System Description

Access Database: This is a database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. This system is no suitable for enterprise use and data security is limited to user password protection.

Oracle Database: This is a database management system, built around a relational database framework in which data objects can be directly access by users (or an application front end) using a structured query language (SQL). Oracle provides a comprehensive portfolio of security solutions (i.e. encryption, access control) to ensure data privacy, protect against insider threats, and enable regulatory compliance.

MongoDB: This is an open source document-oriented database system. It is part of the no structure query language (NoQSL) family of database systems. Instead of storing data in tables as is done in a "classical relational database”, MongoDB stores structured data as Java Script Object Notation (JSON) like documents (text based) with dynamic schemas, making the integration of data in certain types of applications easier and faster.
1.2.2 Assumptions and Constraints

The following assumptions will be considered for this data migration:

* Schedule: The data migration will be done over a weekend, to avoid any potential disruption to the other systems using the Oracle and MongoDB systems. * Budget: The budget will only account for the resources needed to complete the migration. * Resources: The project will use existing resources and will provide training. * Software: The Company has Oracle and MongoDB w/enterprise license already, so there is no need to purchase additional licenses. * Hardware: The Oracle and MongoDB databases are already in use, so there is no need to purchase additional hardware. * Constraints: There are no downtime constraints to execute the migration, and a copy of the data is ready available.
1.2.3 System Organization
The current systems are in place. The Oracle and MongoDB servers are in compliance with existing security policies, but the Access database is running on a user desktop exposing the confidential HR data to unauthorized access due to the weak Windows security in place. The diagram below shows the current setup.

Oracle server
Enterprise Network
MongoDB server
User desktop w/ Access DB
User desktop
User desktop
Security Policy
Current Systems Setup
Secured
Datacenter
Unsecured
Office Area

Oracle server
Enterprise Network
MongoDB server
User desktop w/ Access DB
User desktop
User desktop
Security Policy
Current Systems Setup
Secured
Datacenter
Unsecured
Office Area

2 Management Overview

During an IT audit of the company’s systems, policies and procedures, auditors discovered that that employee health data is being stored in an unsecure and unprotected Access Database within the Human Resources Department.
Auditors could not determine who has access to this data since no logs or record keeping regarding access was ever kept. The liability to both the company and the employees for any breach in the HIPAA protected data can result in extremely large fines and employees being fired and possibly sued.
The Human Resources Department has engaged the Information Technology Team to review the issues and both have agreed to migrate the data to a secure Oracle and Mongo DB; and restrict access to authorized personnel by job function using the existing access control system.
2.1 Problem Statement

A recent audit review has revealed the following issues related to employee health data privacy. These issues are a violation to the existing company security policy, and also to the regulatory compliance laws enacted under the Health Insurance Portability and Accountability Act (HIPAA) of 1996. * The Human Resources department uses an unsecured Microsoft Access database to store employee confidential health data. * The Human Resources department works in a silo. The Access Database is running in non-standard hardware not supported by the IT department. * The Access Database does not comply with corporate access control and security policies. * The Human Resources group does not know who has access to the data and do not keep logs for auditors. * The quality of the data has been compromised with inaccurate information, duplicate and missing records. * The company faces serious legal and reputational risk for non-compliance with public law and employee privacy policy respectively.
2.2 Description of Implementation

The project implementation consists of moving HR data from Access Database to Oracle and to Mongodb. The following diagram shows the migration flow:

2.3 Points-of-Contact

Role | Name | Contact Number | Business Sponsor | Marc Paller | 212-333-5555 | Project/Program Manager | Darrell Austin | 212-333-6666 | Database Administrator 1 | Ricardo Salas | 212-333-7777 | Database Administrator 2 | Chandrika Ganesan | 212-333-8888 | Oracle Engineer | John Dover | 212-561-3000 | | | | Table 2.2 – Points-of-Contact

2.4 Major Tasks
2.4.1 Project Tasks

1. Create implementation plan 2. Obtain implementation plan approval 3. Assemble project team 4. Personnel training – Oracle 5. Data migration – Access to Oracle 6. Data migration – Oracle – Mongodb 7. Configure db access control - Permissions 8. User acceptance test 9. IT Operations signed off to support new HR database 10. Obtain project closure approvals

2.4.2 MS Access to Oracle Tasks

1. Create a new Database User 2. Create a migration repository 3. Capture MS Access exported XML 4. Set Conversion preferences 5. Convert to Oracle Model 6. Scripts to create Oracle objects 7. Data move preferences 8. Migrate Data 9. User acceptance test

2.4.3 Oracle to Mongo Tasks

1. Extract Data 2. Import Data 3. User acceptance test

2.5 Implementation Schedule

2.6 Security and Privacy

The data in scope contains personal data and data security is of utmost importance to be compliant with the existing security policies and Privacy Act.
The following security measures are in place:

* Data transfer will be done only using SFTP * Data depositories or servers have to be in compliance with existing security policies * Data will be handle by authorized personnel * Outside vendors will have to sign a Non Disclosure Agreement and obtain security clearance to work on the project.
2.6.1 System Security Features

Oracle 11g has enhanced security features, while MongoDB relies on external security sources like application level encryption and Kerberos for authentication. See appendix C.

2.6.2 Security Set Up During Implementation

This section is not applicable to the data migration. The target Oracle and Mongodb servers are installed in a secured location. The data will be transfer using secure file transfer protocol (SFTP) and access to the data is limited to the project implementation team only.

3 Implementation Support

3.1 Hardware, Software, Facilities, and Materials
3.1.1 Hardware

This section is not applicable to the project. The hardware is already in place and operational.
3.1.2 Software

This section is not applicable to the project. The software in scope, Oracle 11g and Mongodb, are already being used by the company.
3.1.3 Facility
The servers in scope of this migration are located in the Main datacenter. The work can be done remotely, and there is no need to request datacenter access. In the event of a problem requiring datacenter access, the IT team has on site personnel available to assist.

3.1.4 Materials
This section is not applicable to the project.
3.2 Documentation
The project documentation will be saved in the IT group shared drive and the “Operational Turned Over Document” will be sent to the IT group for approval. Upon acceptance, the IT group will be responsible for the ongoing support of the HR data.

3.3 Personnel
3.3.1 Staffing Requirements

The personnel needed for this implementation will be from existing resources with the addition of an Oracle database person hired to assist and trained current personnel. The table below shows the personnel listed and the hours allocated for the project.

Project Resources | Category | Rate | Hours | Total USD | Project Manager | Employee | $100.00 | 40 | $4,000.00 | Database Administrator 1 | Employee | $75.00 | 40 | $3,000.00 | Database Administrator 2 | Employee | $75.00 | 40 | $3,000.00 | UAT Tester 1 | Employee | $85.00 | 8 | $680.00 | UAT Tester 2 | Employee | $85.00 | 8 | $680.00 | Oracle Engineer | Vendor | $140.00 | 40 | $5,600.00 | Total | 176 | $16,960.00 |

3.3.2 Training of Implementation staff

The existing support personnel will be trained in Oracle 11g. The Oracle engineer will give a 2 day overview of the Oracle Database including:

* Install Oracle Grid Infrastructure. * Create and manage users. * Install and configure an Oracle Database. * Create and manage storage structures. * Administer the Oracle Database. * Understand the Oracle database architecture and how its components work and interact with one another. * Perform backup and recovery. * Database security * Create an operational database and properly mange the various structures in an effective and efficient manner.
3.4 Outstanding Issues
None
3.5 Implementation Impact
There is no impact to the existing infrastructure. The network and servers have adequate processing power and disk capacity to handle the HR data volume.
The operational support of the HR database will be transitioned from the business side to the IT team. The IT database administrators are being trained to support Oracle, and they have the Mongodb knowledge.
Existing SLAs will remain in place, and all calls related to the HR data will flow through the Help desk as of today. 3.6 Communications Plan

The communications plan is the key to a successful project. Clearly and concise information will be delivered in the meetings with all the groups involved. The meetings will be scheduled via outlook and invitations will be sent to all stakeholders with meeting details including a conference bridge to dial-in if anyone is unavailable to meet in person.
The project manager will chair the meetings, take notes and is responsible to send meeting minutes after each meeting and follow up on all tasks assigned to ensure timely completion.
All project stakeholders are responsible to attend the meeting or send a representative if they have a conflict.
The tables below show the communications plan for the project stakeholders and project team members respectively.

The following table shows the communications plan for the project stakeholders and sponsor. Purpose of Communication | Target audience | Purpose of Communication | When / Frequency | Methods of Communication | Project initiation | Project sponsor, Project Manager and IT Director | Gather information for Initiation Plan | First meeting | Meeting | Implementation plan approval | All stakeholders | Distribute implementation plan to communicate project scope and get sponsor and senior management approvals. | Before Kick Off Meeting | Meeting and Distribute minutes via email. | Project Kick Off | All stakeholders | Communicate plan and stakeholder roles / responsibilities. | At or near Project Start Date | Meeting and Distribute minutes via email. | Project Review and Status Report | All stakeholders | Update stakeholders on progress of the project, and communicate potential risks and issues that might affect scope, schedule or budget. | Bi-weekly | Meeting and Distribute minutes via email | Sponsor Meetings as needed | Sponsor(s) and Project Manager | Update Sponsor(s) on status and discuss critical issues. Seek approval for changes to Project Plan. | Ad hoc | Meeting | PMO Audit/Review | Project Office, Project Manager, select stakeholders, and Sponsor. | Review status reports, issues, and risks. Identify and communicate potential risks and issues that may affect scope, schedule or budget. | Monthly | Meeting/Report | Post Project Review | Project Office, Project Manager, key stakeholders, and sponsor(s). | Identify improvement plans, lessons learned, what worked and what could have gone better. Review accomplishments. | End of Project | Meeting/Report |

The table below shows the communications plan for the project team. Purpose of Communication | Target audience | Purpose of Communication | When / Frequency | Methods of Communication | Team kick off Meeting | Project Team | Review detailed plans and assign roles and responsibilities. | First team meeting | Meeting / Conference Call | Team Meetings | Project Team | Review project deliverables, risks, and issues that might effect scope, schedule or budget. | Weekly | Meeting / Conference Call and distribute meeting minutes via email | Other… | To be determined by the Project Team | General communications | As needed | Meeting / Conference call / email | Post Project Review | Project team | Identify improvement plans, lessons learned, what worked and what could have gone better. Review accomplishments. | End of Project | Meeting / Conference Call and distribute report |

3.7 Change Management

The project will follow the existing change control processes for all project work. The changes will follow all phases shown in the below change management process flow:

There are two types of changes in the project lifecycle and both require an approved change request.

Scope change
These changes typically fall outside of the project charter and are driven by a problem encounter during implementation or new business requirements. The project team must evaluate the change and assess the impact on time, cost, risk, quality, resources and customer satisfaction.
The project manager is the only person that can approve the change requested by the project team members or the sponsor, and is responsible to communicate the change to the sponsor and stakeholders seeking their approval.

Project change
These changes are planned and needed to implement the approved solution or scope of work as agreed in the project charter. The project team writes schedules and executes the change. The project manager represents the change in the weekly Change Management Meetings to seek approvals.
As part of the existing Change Management Policy, all changes have to follow the below criteria: * Must be submitted a week in advance * Must have clearly defined scope and impact * Must include a test plan * Must include a rollback plan * Must be fully approved before any work is started

4 Implementation Risks and Contingencies

There are only technical risks associated with this implementation.

4.1 Technical Risks and Contingencies

The table below shows the risks associated with the data migration, the impact to the project and the actions needed to mitigate the risk if applicable.

Risk Type | Risk Title | Risk Impact | Mitigation Plan | Technical | Data corruption | Implementation delay | None | Technical | ETL failure | Implementation delay | Pre-migration test | Technical | Hardware failure | Implementation delay | Available spare part | Technical | Incorrect data Format | Implementation delay | Pre-migration test | Technical | Technical knowledge | Operational support | Train support personnel |

5 Acceptance Criteria

The acceptance criteria are based on data availability, integrity, security and performance.

Availability: The migrated data is available from oracle and MongoDB to the different systems in place, as it was before the migration.

Integrity: The structure of the migrated data is consistent with the formats needed by the systems in place.

Security: The migrated data is encrypted and access has been secured by job function keeping a log for auditors.

Performance: The migrated data can be accessed, computed and saved in the same time as before (no additional latency) or faster.

Support: The IT team has agreed to support HR data, and signed off the Operational Turnover documentation.

Usability: The business testers will perform a user acceptance test to validate the usability of the data and successful completion of all the processes depending on the HR data in scope.

6 Implementation Verification and Validation

The database administrators and business testers will perform the data migration verification and validation. The success of the data migration will be based on the agreed acceptance criteria below.
The contingency plan for the data migration is simply to point all the applications back to the Access Database server. The Access database server will not be compromised by this migration, and all data will stay intact.

APPENDIX A: Project Implementation Plan Approval
The undersigned acknowledge that they have reviewed the Human Resources Data Migration Plan and agree with the information presented within this document. Changes to this Project Implementation Plan will be coordinated with, and approved by, the undersigned, or their designated representatives. Signature: | | Date: | | Print Name: | | | | | | | | Title: | | | | Role: | Project Manager | | |

Signature: | | Date: | | Print Name: | | | | | | | | Title: | | | | Role: | Project Sponsor | | |

Signature: | | Date: | | Print Name: | | | | | | | | Title: | | | | Role: | Chief Information Officer | | |

APPENDIX B: REFERENCES
The following table summarizes the documents referenced in this document. Document Name | Description | Location | Human Resources Data Migration Project | Data Migration Plan | Epsilen Drop Box | | | | | | |

APPENDIX C: SECURITY FEATURES

ORACLE 11G
Automatic Secure Configuration

When you create a new database, you can use Database Configuration Assistant (DBCA) to automatically create a more secure configuration than in previous releases of Oracle Database. You can enable the following secure configuration settings in one operation:
Password-specific settings in the default profile. This feature enables you to enforce password expiration and other password policies. See "Configuring Password Settings in the Default Profile" for more information.
Auditing. This feature enables auditing for specific events such as database connections. See "Using Default Auditing for Security-Relevant SQL Statements and Privileges" for more information.
New Password Protections

Oracle Database now includes the following new password protections:
Easy ability to find default passwords. If you have upgraded from an earlier release of Oracle Database, you may have user accounts that still have default passwords. For greater security, you should find and change these passwords. See "Finding User Accounts That Have Default Passwords" for more information.
Password complexity verification. Password complexity verification ensures that users set complex passwords when setting or resetting passwords. You can enforce password complexity by using the default settings provided by Oracle Database, or create custom requirements to further secure the password complexity requirements for your site.
"Enforcing Password Complexity Verification" describes built-in password verification.
Enforced case sensitivity. See "Enabling or Disabling Password Case Sensitivity" for more information.
Stronger password hashing algorithm. This enhancement enables users to create passwords that contain mixed case or special characters. See "Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm" for more information.
SYSDBA and SYSOPER Strong Authentication

You can now use the Secure Sockets Layer (SSL) and Kerberos strong authentication methods to authenticate users who have the SYSDBA and SYSOPER privileges.
See "Strong Authentication and Centralized Management for Database Administrators" for more information.
SYSASM Privilege for Automatic Storage Management

The SYSASM system privilege has been added to Oracle Database 11g Release 1 (11.1), to be used exclusively to administer Automatic Storage Management (ASM). Use the SYSASM privilege instead of the SYSDBA privilege to connect to and administer ASM instances.
Encryption Enhancements
Intelligent LOB Compression, Deduplication, and Encryption with SecureFiles

Oracle Database supports a new, faster, and scalable Large Object (LOB) storage paradigm called SecureFiles. SecureFiles, in addition to performance, supports efficient compression, deduplication (that is, coalescing duplicate data), and encryption. LOB data can now be encrypted with Oracle Database, and is available for random reads and writes.
Compressed and Encrypted Dump File Sets

In this release, you can use Oracle Data Pump to compress and encrypt an entire dump file set. You can optionally compress and encrypt the data, metadata, or complete dump file set during an Oracle Data Pump export.
Transparent Data Encryption with Hardware Security Module Integration

Transparent data encryption (TDE) stores the master key in an encrypted software wallet and uses this key to encrypt the column keys, which in turn encrypt column data. While this approach to key management is sufficient for many applications, it may not be sufficient for environments that require stronger security. TDE has been extended to use hardware security modules (HSMs). This enhancement provides high assurance requirements of protecting the master key.
This release enables you to store the TDE master encryption key within a hardware security module (HSM) at all times, leveraging its key management capabilities. Only the table keys (for TDE column encryption) and tablespace keys (for TDE tablespace encryption) are decrypted on the HSM, before they are returned to the database; the encryption and decryption of application data remains with the database. Oracle recommends that you encrypt the traffic between HSM device and databases. This new feature provides additional security for transparent data encryption, because the master encryption key cannot leave the HSM, neither in clear text nor in encrypted format. Furthermore, it enables the sharing of the same key between multiple databases and instances in an Oracle Real Applications Clusters (Oracle RAC) or Data Guard environment.
Transparent Tablespace Encryption

Transparent tablespace encryption enables you to encrypt entire application tablespaces, encrypting all the data within these tablespaces. When a properly authorized application accesses the tablespace, Oracle Database transparently decrypts the relevant data blocks for the application.
Transparent tablespace encryption provides an alternative to TDE column encryption: It eliminates the need for granular analysis of applications to determine which columns to encrypt, especially for applications with a large number of columns containing personally identifiable information (PII), such as Social Security numbers or patient health care records. If your tables have small amounts of data to encrypt, then you can continue to use the TDE column encryption solution.
Fine-Grained Access Control on Network Services on the Database

Oracle Database provides a set of PL/SQL utility packages, such as UTL_TCP, UTL_SMTP, UTL_MAIL, UTL_HTTP, and UTL_INADDR, that are designed to enable database users to access network services on the database. Oracle Database PL/SQL Packages and Types Reference describes the PL/SQL utility packages in detail.
In a default database installation, these packages are created with the EXECUTE privilege granted to the PUBLIC role. This release enhances the security of these packages by providing database administrators the ability to control access to applications in the database that use these packages.
Change to AUDIT BY SESSION

The BY SESSION clause of the AUDIT statement now writes one audit record for every audited event. In previous releases, BY SESSION wrote one audit record for all SQL statements or operations of the same type that were executed on the same schema objects in the same user session. Now, both BY SESSION and BY ACCESS write one audit record for each audit operation. In addition, there are separate audit records for LOGON and LOGOFF events. If you omit the BY ACCESS clause, then BY SESSION is used as the default.
Be aware that this change applies only to statement options and system privileges that audit SQL statements other than data definition language (DDL) statements. The database has always audited using the BY ACCESS clause on all SQL statements and system privileges that audit a DDL statement.
Oracle XML DB Security Enhancements
XML Translation Support for Oracle Database XML

Security objects are now stored in the Oracle XML DB repository as XMLType objects. These security objects can contain strings that need to be translated to different languages so that they can be searched or displayed in those languages. Developers can store translated strings with the XMLType and retrieve and operate on these strings depending on the language settings of the user. The advantage of this feature is that it reduces the costs associated with developing applications that are independent of the target-preferred language of the user.
Support for Web Services

You can now use the Oracle XML DB HTTP server for service-oriented architecture (SOA) operations. This allows the database to be treated as simply another service provider in an SOA environment. Security administrators can control user access to Oracle Database Web services and their associated database objects by using the XDB_WEBSERVICES, XDB_WEBSERVICES_OVER_HTTP, and XDB_WEBSERVICES_WITH_PUBLIC predefined roles.
Directory Security Enhancements

In this release, administrators can now disallow anonymous access to database service information in a directory and require clients to authenticate when performing LDAP directory-based name look-ups. If you are using Microsoft Active Directory-based name lookups, then Oracle Database uses the native operating system-based authentication. If you are using Oracle Internet Directory (OID)-based name lookups, then Oracle Database performs authentication by using wallets.
Oracle Call Interface Security Enhancements

The following security enhancements are available for Oracle Call Interface (OCI):
Reporting bad packets that may come from malicious users or intruders
Terminating or resuming the client or server process on receiving a bad packet
Configuring the maximum number of authentication attempts
Controlling the display of the Oracle database version banner, to prevent intruders from finding information about the security vulnerabilities present in the database software based on the version
Adding banner information, such as "Unauthorized Access" and "User Actions Audited," to server connections so that clients can display this information.

APPENDIX D: MIGRATION DETAILS

1.1 Description of Access to Oracle Implementation
Oracle SQL Developer Migration Workbench will be used to migrate MS Access DB to Oracle. The implementation steps are enumerated below.

1.1.1 Create a new Database User

* Open SQL Developer and connect to the app11g DB that is already setup. * On the SQL Worksheet following commands will be executed to create the user. CREATE USER EAIREP IDENTIFIED BY eairep DEFAULT TABLESPACE USERS TEMPORARY TABLESPACE TEMP;

GRANT CONNECT, RESOURCE, CREATE SESSION, CREATE VIEW TO EAIREP;

1.1.2 Create a Migration Repository

To convert the MS Access XML file to the required tables in Oracle: * Create a new database connection for EAIREP user with the following properties and click connect to connect to the DB as EAIREP user:

Connection Name : EAIFINAL_PROJECT
Username : EAIREP
Password : eairep
Hostname : oit.scps.nyu.edu
Port : 1521
SID : app11g

* Right-click on EAIFINAL_PROJECT and select Migration Repository -> Associate Migration Repository and click close when the install completes.

1.1.3 Capture MS Access exported XML

Perform the following steps to capture the Access XML that has already been exported and downloaded in the capture directory:

* Click on migration -> Microsoft access captured XML. * Select the EAIFINAL.xml file from the dialog box and click OK to capture. * Check the captured models tab and expand EAIFINAL and verify the list of objects that were captured. 1.1.4 Conversion Preferences

Select ‘Is Quoted Identifier On’ from Tools->Preferences->Migration Identifier options.

1.1.5 Convert to Oracle Model

* Right-click on the captured EAIFINAL Access model and select convert to Oracle Model. * Click apply on the source data map window to convert to oracle model. * Verify the converted objects from the converted models tab.

1.1.6 Scripts to create Oracle Objects

To Generate the DDL statements to create Oracle objects perform the following steps:

* Right-click on the converted EAIFINAL and click on generate to create the SQL. * Execute the SQL from the SQL worksheet as user <username>.by clicking on the <connection name> from the connections. * Expand tables and verify that the tables have been created.

1.1.7 Data move preferences

Set the timestamp mask to the following: yyyy-mm-dd HH24:mi:ss.ff3 from Tools->Preferences->Migration->Data Move Options -> Date Mask ->Timestamp Mask.

1.1.8 Migrate Data

* Click on the converted models generated from step 2.1.5 and select Generate Offline Data move scripts and data files. * .Open a DOS prompt and CD to change to the directory where the data files and scripts are located. * From the command prompt execute oracle_ctl.bat file.
<c:/accessDataFiles> oracle_ctl * Click on tables->refresh in SQL Developer and open the tables and click on data to verify that the data has been loaded.

2.2 Description of ORACLE to MONGO DB Implementation

2.2.1 Extract data

* From SQL Developer SQL Worksheet execute the following command to select data from all the tables.

Example:

SELECT * FROM
<TABLE_NAME> A
INNER JOIN <TABLE_NAME> B
ON A.EMPL_ID = B.EMPL_ID
INNER JOIN <TABLE_NAME> C
ON B.EMPL_ID = C.EMPL_ID

* On the results window, right click and select export data to CSV file.

2.2.2 Import data

* Login to MONGDO DB from UMongo UI and connect to the DB. * Click on tools menu and select import from file and select the file created from the previous step and click import data. * Verify the data by executing the following command from UMongo:
Db.employee.find()

Similar Documents

Free Essay

Jagat

...experience in Teradata Database Administrator. Initial Level of experience in BIG Data Hadoop. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Expertise in proactively handling Oracle database issues to avoid major incident. Expertise in Root Cause Analysis and trouble shooting skills Expertise in mentoring database specialists and Handling Escalated calls. Expertise in providing solution within given SLA to avoid SLA bridge. Expertise in reviewing plan, risk and impact analysis before change. Expertise in implementing exact solution within given SLA. Expertise in providing exact solution during incident to avoid / reduce problem. Expertise in applying permanent fix to avoid problem. Expertise in providing different types of solution to migrate Non-Exadata into Exadata. Expertise in capacity management of databases according to their growth. More than 10 end to end RAC setup implemented in Oracle 10G and 11G on various platforms like RHEL ,SUN Solaris and AIX. More than 20 Dataguard setup implemented in Oracle 9i,10g and 11G. Extensive experience in identifying cause of high CPU and IO utilization. Extensive experience Database Performance and Query tuning. Extensive experience Oracle Exadata Performance and Query tuning. Expertise in identifying root cause issue of Oracle database and OS level. Expertise in Technical Leadership. Expertise in migrating non-Exadata database into EXADATA. Depth...

Words: 4360 - Pages: 18

Premium Essay

Term Paper: Website Migration Project

...Term Paper: Website Migration Project Term Paper: Website Migration Project Dimitri A. Brydie Professor Jennifer Merritt Systems Analysis and Development December 18, 2013 Tony’s Chips has recently been acquired by a new independent company and the organization leaders have decided to move the current website, which is hosted externally, to an internal host. The company wants the website to be redesigned so that after migration, customers will then be able to make orders online. The company’s leadership would also like to have a disaster recovery solution in place in case the main site goes down. The overall objective of the project is to plan and design a new effective platform to host the website and to efficiently transfer the current website with minimal downtime. In order to accomplish successful migration of the current website, the five phases of the systems development life cycle will be utilized. The five phases are: systems planning, systems analysis, systems design, systems implementation, and finally, systems support and security (Shelly & Rosenblatt 2012). The first phase in the website migration project will be to become familiarized with the business process and identify the objectives of the project. For an IT professional, this may consist of meeting with business leaders and studying the formal business plan to get a feel for the operations of the company. In this case, the company makes potato chips and distributes them. Another objective...

Words: 1977 - Pages: 8

Premium Essay

Term Paper - Website Migration Project

...leaders have decided to move the current website, which is hosted externally, to an internal host. The company wants the website to be redesigned so that after migration, customers will then be able to make orders online. The company’s leadership would also like to have a disaster recovery solution in place in case the main site goes down. The overall objective of the project is to plan and design a new effective platform to host the website and to efficiently transfer the current website with minimal downtime. In order to accomplish successful migration of the current website, the five phases of the systems development life cycle will be utilized. The five phases are: systems planning, systems analysis, systems design, systems implementation, and finally, systems support and security (Shelly & Rosenblatt 2012). The first phase in the website migration project will be to become familiarized with the business process and identify the objectives of the project. For an IT professional, this may consist of meeting with business leaders and studying the formal business plan to get a feel for the operations of the company. In this case, the company makes potato chips and distributes them. Another objective in phase one of the website migration project, is to decide who will be involved and at what point during the project their involvement will be required. One of the purposes of the redesigned website is to give customers the ability to place orders online. Currently the website...

Words: 1950 - Pages: 8

Premium Essay

Cis 210 Term Paper

...effective in house e-commerce website for Tony’s Chips. Website MIGRATION PROJECT [Document subtitle] Website MIGRATION PROJECT [Document subtitle] Introduction Tony’s Chips has been acquired by a new independent company. The new company’s intention is to focus on the e-commerce website that they have planned. Currently, the old website is externally hosted and it is required to be moved to an internal one. This new system will store, retrieve, and have data recovery solutions for the company. An additional backup site will need to be created as a failover if the main site goes down. The new and improved site will need to allow customers access to order products online. Project Goal This project has an overall goal of producing a system and website that is in accordance to the demands of Tony’s Chips. The systems architecture will involve all of the systems requirements in its design. The architecture will make use of programs that perform efficiently and properly. Application compatibility is also key to for all of the system components that are going to be used in the system. The project is also aimed at creating a reliable backup and recovery solution for the system. Available system component alternatives The requirements for the system is one that has a system architecture that is stable, efficient and user friendly. The architecture will be composed of an operating system, a database, a web server and server side scripting software. In each of these...

Words: 2669 - Pages: 11

Free Essay

Financial Analyst

... PROFESSIONAL SUMMARY Possessing strong understanding of the Information Technology practice, extensive experience working with PeopleSoft (PIA) Administration for over the last 7 years. Demonstrated strong Technical and Problem Management skills. PeopleSoft Administrator, Oracle Database, LINUX, UNIX skills have enabled me to perform multiple installations, upgrades, performance tuning, and troubleshooting the infrastructure components required to establish and maintain the PeopleSoft PIA Architecture. PeopleSoft Server Administration – Installed and configured PeopleTools, File Server, Application Server, Process Scheduler Server, Tuxedo, WebLogic Web Server, PeopleSoft Internet Architecture (PIA) and Report Distribution, Load Balancing, Failover, Integration Broker, Single Signon, LDAP, Environment Management Framework, PeopleSoft Application Security Administration, Disaster Recovery, Business Continuity Planning for various PeopleSoft Oracle Database Instances. Expertise in performing routine maintenance activities - Environment Refreshes, PS Project Migration, File Object Migration, Performance Tuning of Web Server, Application Server, Tuxedo, Process Scheduler Server and Database, PeopleSoft Application Security. Successfully applied PeopleTools Product Patches, Application Patches, Bundles, Maintenance Packs, and PeopleTools Upgrades. Trouble shoot problems related to Server Components and Failed Process or Jobs, Performance Tuning, Turning on Traces, Working...

Words: 1065 - Pages: 5

Premium Essay

Est1 Task 1 Mountain Health Care

...well as management met to discuss the project and the goals JTMG would like to meet. During the meeting, the groups decided who would handle the key deliverables. Mountain Healthcare was the key contact for all aspects of the project. Mountain Healthcare handled the purchase and configuration of the servers for the three new environments. Once that was completed Planet Healthcare, the software vendor for Pluto, installed the software for Pluto in the environments. After the installation of the software, the Mountain Healthcare IT staff performed the first data migration. During this time, the groups decided the best method of migrating. The groups decided that bringing over all data from the PMG environment would be the least disruptive to the groups in the long run. Over the next six weeks, a great deal was accomplished, including reporting and test environments’ setup. During this time, each module of Pluto was tested and reviewed by staff at JTMG and PMG. PMG also conducted training on the applications for the JTMG staff for the modules that JTMG would become responsible for after the migration. All third-party software was configured and setup during this period. Once JTMG felt comfortable with the new environment and training the go-live was scheduled. When the go-live was scheduled, the employees at PMG and JTMG were notified of the upcoming downtime as were the outside vendors who accessed Plutonet. The final migration was performed without any issues and JTMG...

Words: 1930 - Pages: 8

Premium Essay

Business

...Company Gap Analysis of Purchase order system at ABC Company Consolidated report detailing site wise PO’s and collection made No systematic monitoring of Cash flows Shooting E mails attaching the Bills to Supplier, Project Manager and Account Department Manual Triplication of Bill Centralized automated Purchase order numbering system Uncontrolled Purchase order numbering Downloadable file option for Pos maintained on the portal Hard Copies lost when removed from file for discussions/clarification Ticket to be raised before any changes and Communication of changes to the supplier given after the changes are recorded in the system Changes in PO are communicated to supplier over Phone hence improper recording Maintenance of Master Price List and Supplier List Different prices for same item ordered Control Register details maintained in a Database of a system Manual Control Register As Is System To Be System Requirement Analysis 1) List Requirements I. System generated PO number with User and location component coded. II. PO can be viewed/saved in PDF form from the application. Same can then be printed III. Every PO raised for a particular project is routed to that project’s PM for approval. He can also consolidate orders for the same supplier before forwarding them. IV. Every change to a PO(by PM/supplier) raised as a separate ticket and needs to be approved as...

Words: 1050 - Pages: 5

Premium Essay

Mgt2 It Project Management Task 1

...GenRays Matrix Template Project Management Knowledge Areas Recommended Tool(s) Project Charter, Facilitation Technique Project Integration Management Interviews, Product Analysis Project Scope Management Justification for Tool The project charter will be used for this knowledge management area because it defines the HRIS projects purpose, objectives, requirements, risks, and budget, which is important for this top-down, overall view of the project. The Facilitation Technique will also be used because it not only facilitates the development of the project charter, but will help the project team members accomplish their tasks through brainstorming, problem solving, meeting management, and conflict resolution. Interviews with GenRays senior leaders, department heads, and staff will be used for this knowledge management area to determine what the most beneficial aspects of an HRIS system are to the company. The results of the interviews will be used to help identify and define the features and functions of the project’s deliverables. Product Analysis will also be used to help determine which vendor’s pre-packaged HRIS system best meets the company’s needs, by analyzing the HRIS requirements, the product breakdown, the systems required, and the value of the product, and comparing to the offerings and information provided by the potential vendors that have already been identified. Decomposition, Expert Judgment, Gantt Chart Decomposition will be used for Project Time Management in...

Words: 14782 - Pages: 60

Premium Essay

Project Charter

...Project Vision, Objectives and Scope The organization consists of a team of experienced accounting professionals providing clear and relevant advice in a timely and professional manner. Its approach is to deliver an integrated solution by tapping into various years of experience and expertise to deal with everyday challenges. Vision The vision of the project is to increase productivity, minimize errors and improve clients’ satisfaction by implementing an Enterprise Solutions that will help simplify the accounting processes and still have the ability to generate the information needed to make informed business decisions. The project is intended to support the planning, oversight, and implementation of QuickBooks Enterprise Solutions and to establish a structure to maintain the accounting functions and payroll with system/data interfaces, tables, and codes. The project will provide planning, analysis, programming, data updates, testing, documentation, software quality assurance and implementation support to ensure that this software provides continued relevance to the accounting department of the organization (Horne, 2011). Objectives The objectives of the project include the following 1. Support and improve the current operations in the organization. 2. Improve efficiency of delivery systems, 3. Reduce product costs. 4. Improve the company’s market position and future prospects. Scope Statements The Project...

Words: 3222 - Pages: 13

Premium Essay

Research of Improve the Data Quality

...methods to improve the quality of data. However, in the view of the experience summary and practice accumulation in the practical application, the paper mainly focuses on the ETL dispatcher and way of check to improve data quality of data warehouse. First of all, the automation of data management which is realized by ETL principle make the data into a data stream., the database where the data exists become as starting point of ETL, saving the data warehouse with ultimate high-quality data as the end of ETL. Second, for the data which the ETL data flow has been formed to generate example, for the data which complete ETL processes structure to handling historical information, thus ensuring that the ETL flow can monitoring. Third, building the processing logic of ETL tectonic processes, is the core of constructing high-quality data, constructing the automated calibration procedures based on the actual experience , so that the calibration procedures can correct erroneous data when passing by, and finally achieving the goal of access the high-quality data. Finally, the implementation of the EMC project has proved that the illegal data in the form of ETL run through calibration procedures can be handled in accordance with the set in advance , ensuring the...

Words: 3026 - Pages: 13

Free Essay

Website Migration

...Term Paper Website Migration CIS University 09/07/15 Tony’s Chips has recently been sold to a new independent company. The new company has hired me to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. Therefore, the site will be redesigned so that customers will be able to place orders through the website and have them delivered as before. The design of the new system will be able to provide more data storage, faster retrieval, better security features and recovery solutions in the event that the website has any problems. With the operational reliability of the existing system, this will make it easier to improve the new system. The first part of the project goal is to discuss what it will take to build the web architecture, then what will have to be done to move the existing Website with minimal downtime, and then provide a disaster recovery plan in the event that the website should crash or stop working. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis...

Words: 2274 - Pages: 10

Premium Essay

Website Migration Project

...Explaining a concept: Website migration project Name Course Instructor Date Website Migration Project In this current era, every business is going online, and most of the selling and buying of goods and services is being done n online. That is why Tony chips should also have a website where it can be able to advertize its business and reach many customers. This paper will cover the steps and requirements on how Tony chips will transfer web hosting from an external source to internal as well as how to make their website redundant. In the efforts to build that redundant and scalable website, the key principles of availability, performance, reliability, scalability, manageability and cost require much attention (Matsudaira, 2012). Also, the SDLC must be duly followed as it is the requirement of any system. These are systems planning, system analysis, system design, system implementation, and lastly system support/security (Shelly & Rosenblatt, 2012). System Planning In this phase, the familiarization of the processes involved and objectives of the business must be well highlighted. A formal business plan needs to be in place to show which operations the company will undertake. There is a need to know all participants in the whole migration process and the time when they will you require then in the migration process. As the one of the requirements is that the website needs to be hosting should be internal, it means that a server there is a server requirement. Besides that...

Words: 3258 - Pages: 14

Free Essay

Tech

...Website Migration Project What is information architecture (IA)? Information architecture (IA) refers to the structure or organization of your website. It describes the ways in which the different pages of your site relate to one another and ensures information is organized in a consistent and predictable way on each page. It involves steps such as: 1. assessing existing and needed content, 2. organizing the pages, 3. providing clues to help use the site efficiently, and 4. developing navigational structure The website architect needs to have a solid understanding of usability, in-depth knowledge of web development tools, online marketing technologies, and everything else involved in the construction and maintenance of a website. The following are the general overview of website architecture process: 1: Project Brief- Gathering the needed data from the client and your team can usually take 2 days figuring out the information in the architecture process. Info such as Determine Goals and Expected Outcomes, Brainstorm with the Client, Client Idea Summary, Determine the Target Audience, Determine Competitors, Meet the Decision Makers. 2: Website Goal Definition- The goals define the direction of the entire website production process. 3: Define the Target Audience- This stage involves researching the target audience. We need to identify what types of users will go to the site, and also define the needs of each group. This involves gather characteristics data,...

Words: 1171 - Pages: 5

Free Essay

Cis 210 – Systems Analysis and Development Website Migration Term Paper

...Website Migration Project Chinnasut Nhurod CIS 210 – Systems Analysis and Development Dr. Wesley E. Phillips Strayer University September 15, 2013 Website Migration Project for Tony’s Chips Building the Web Architecture In order to build the web architecture, the system analyst would be required to analyse the business requirements of the organization and then develop a clear statement of goals of the organization. Since, the old site of the company is running it would be vital to understand the technological and business related issues associated with the previous website. Along, with that it should also be determined whether the IT staffs of the company possesses necessary experience and skills essential for the implementation of the project. The company might have to consider additional resources, training programs, and hiring of consultants for the project’s success (Nelson et.al, 2010). The project should be developed on a modular manner so the users can approve and test the various functional elements of the website. Since the Tony’s Chips website was already operating, it would be essential for the developer to gather the existing functional requirements for the website. During the data collection process the system analyst will conduct interviews of the people from the product support department, and they will gather the system documentation using the fact finding techniques (McArdle et.al, 2010). Once all the requirements are fulfilled the next step would...

Words: 3871 - Pages: 16

Premium Essay

Website Migration

...Website Migration Project Strayer University CIS 210 Systems Analysis and Development 6/16/2013 Executive Overview The Tony’s Chips web site is to be moved from and external hosting solution to an internal solution. In addition, the site will be redesigned to enable customers to place orders. These are two separate work tasks that should be treated separately and performed by different team members. There are many options for hosting the web site internally, including software choices to hardware architecture. This document will review the tasks that need to be performed, document the process of performing those tasks, and justify the software and hardware choices. Hosting Solutions There are a couple different alternative to how this web site is hosted. The company could host the web site with an external service that maintains their own servers and services. This method is commonly used by start-up businesses and web sites that do not require a huge amount of customization, monitoring, bandwidth, and storage. When a company wishes to have more control over their site and how it is hosted, they can chose to use a server service. With this kind of service, a company that owns a large server farm leases out one or more servers to the company. This allows the company to dedicated servers which they have control over without the need to physically store the server or perform the regular maintenance. Web sites that involve database-driven web applications can eventually require...

Words: 2358 - Pages: 10