...A Comparative Investigation and Evaluation of Oracle9i and SQL server2000 with respect to Performance and Scalability By Phathisile Sibanda Supervisor: Mr John Ebden Computer Science Department, Rhodes University 26 September 2005 Abstract: Performance and scalability are two omnipotent factors determining database availability and reliability. This is especially true for modern computer systems due to the inclusion of the Internet in Online transaction processing (OLTP) and E-commerce applications which use databases. This evolution gave birth to an enduring need for high throughput, good response time, excellent data consistency and concurrency control. This paper evaluates SQL server 2000 and Oracle 9i with respect to performance and scalability. Initial performance tests showed that at low to medium workload both database systems behaved in a similar fashion in terms of throughput and response time. At high load however Oracle 9i emerged victorious in both cases. market and use of the Internet in databases. The first point has lead to competition between commercial and open source database vendors while the second has resulted in a need for high performance database systems. This whole controversy has in the past lead database vendors to employ numerous tricks in bid to improve the processing speed of their systems during benchmarking and thus falsely prove that their databases products are superior to other competitors. Some of their...
Words: 3061 - Pages: 13
...Performance Tuning Guidelines for Windows Server 2012 April 12, 2013 Abstract This guide describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the Windows Server 2012 operating system. It describes each setting and its potential effect to help you make an informed decision about its relevance to your system, workload, and performance goals. The guide is for information technology (IT) professionals and system administrators who need to tune the performance of a server that is running Windows Server 2012. For the most current version of this guide, see Performance Tuning Guidelines for Windows Server 2012. ------------------------------------------------- Disclaimer: This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. You bear the risk of using it. ------------------------------------------------- Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. ------------------------------------------------- This document does not provide you with any legal rights to any intellectual...
Words: 50142 - Pages: 201
...Indian Railways customer success story I n dustry • Public Sector BusI n ess Challenge • Providing a seamless and centralized process of purchasing and managing unreserved tickets syBase teCh nology • Adaptive Server® Enterprise • SQL Anywhere® • Replication Server® Key Ben efIts • Minimizes the transaction time of issuance to less than 20 seconds per ticket • Enables advance booking and cancellation of unreserved tickets from any station • Improves passenger satisfaction with 24x7 ‘Always Available’ ticketing • Minimizes possibilities of manipulations and malpractice • Enables centralized control for monitoring and auditing • Ensures accounting of the tickets sold across all railway zones • Sustains growth in passengers without any growth in staff • Simplifies changes in fare structure, destination and other database updates Indian Railways (IR), the largest rail network in Asia and the world’s second largest under one management, spanning over 6000 stations, carries 17 million passengers every day. Only a million passengers travel with reserved seat tickets, and the remaining 16 million passengers travel each day without a confirmed seat. While reserved ticketing technology is enabled, unreserved ticketing was done primitively using printed cards. Generating over 49% of its earnings, Indian Railways needed a solution to centralize the purchase and management of unreserved tickets...
Words: 1725 - Pages: 7
...A closer look at LepideAuditor Suite Server systems are like pillars to establish the working environment in an organization. These servers should be up all times without any interruptions. If a server crashes or goes down because of an unwanted change, the users will not be able to work. Such problematic changes can be a result of IT Administrator’s trial to test a new policy in a live environment or it can be because of an unwelcome access. In case of the latter, the organization will not only lose valuable time of its professionals, but also there is a chance of an insider’s unexpected access to the million-dollar information stored on the servers. With change configuration auditing of servers in hand, an IT Administrator is supposed to save the...
Words: 900 - Pages: 4
...Running head: DATABASE AND DATA WAREHOUSING DESIGN Database and Data Warehousing Design Yolanda McCollum Dr. Constance D. Blanson CIS499: Information Systems Capstone February 11, 2014 Database and Data Warehousing Design Why does one need data warehousing? According to Total Metrics (2013): 1. The prime purpose of a Data Warehouse is to store, in one system, data and information that originates from multiple applications within, or across, organizations. The data may be stored ‘as received’ from the source application, or it may be processed upon input to validate, translate, aggregate, or derive new data/information. 2. Most of the data load functions are processed in batch. There are few on-line data maintenance functions. The on-line functions that do exist tend to update the reference files and data translation tables. 3. A database alone does not constitute a Data Warehouse system. At a minimum, a Data Warehouse system must include the database and corresponding load functions. Data reporting functions are optional. They may, or may not be an integral part of the Data Warehouse system. 4. The prime purpose of storing the data is to support the information reporting requirements of an organization i.e. multiple users and multiple applications. 5. The Data Warehouse may, or may not, provide the required reporting functions. In some cases, external applications access the Data Warehouse files to generate their own reports and queries. 6. Data Warehouse...
Words: 880 - Pages: 4
...increasing its performance levels. • Fault Tolerance: The system has to be available even if one or more components fail. • Transparency: All kind of system users perceives it as a simple one rather than a set of components working on the same goal. Distributed systems definition and characteristics emerge three main elements that are shared by their users: • Resources: Resource sharing is the state that available hardware and software is accessible from system’s users. User access is controlled by suitable modules called resource managers. The scope of these modules is to efficiently assign resources to users. Resources managers use a system model to describe resources and a scheduler to control desired allocations. System model provides real time information to the allocator about the resources availability and properties. The allocator then depending on those information allocate resources to tasks in such way to keep performance on optimum levels (Raman, Livny, & Solomon, 2000). A simple example of sharable resource is a printer connected to a local area network. LAN users has the ability to use printer in order to print documents. A suitable module delegates and queues print jobs from connected users. Each user who like to print document send a request to this module (printer manager). The printer manager controls the requests arrived and fulfil them depending on the policies, protocols and algorithms that are applicate. Another example is web server and application server functionality...
Words: 3083 - Pages: 13
...Big Data [Name of Writer] [Name of Institution] Introduction The term Big Data is gaining more followers and popularity. However, despite this trend, not all organizations are clear about how to face the challenge to store, organize, display and analyze large volumes of data. The term Big Data is gaining more followers and popularity. However, despite this trend so evident, not all organizations are clear about how to face the challenge to store, organize, display and analyze large volumes of data. There are multiple techniques in terms of huge database storing approaches that can store petabytes, exabytes and may be zetabytes data. These options are Cassendara, Mongodb and HBase. We will discuss about them one by one and in a proper research method and will compare them in order to contrast their difference and efficiency. Research Background One problem in understanding the phenomenon is that the size of these data sets the volume greatly exceeds the Data warehouse. A plane collects 10 terabytes of information from sensors every 30 minutes flight, while the Stock Exchange of New York collects structured information 1 TB per day. In the context of Big Data, volumes are reaching peta bytes, exa bytes and then soon to zeta bytes. For instance, Apple has just announced that 7 trillion send daily notifications to iOS devices. The explosion of information in social networks, blogs, and emails is characterized the presence of data key...
Words: 3463 - Pages: 14
...Database Tuning and Administration Guide for SP6.1 February 22, 2007 IBM Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net © IBM Internet Security Systems, Inc. 1994-2006. All rights reserved worldwide. Customers may make reasonable numbers of copies of this publication for internal use only. This publication may not otherwise be copied or reproduced, in whole or in part, by any other person or entity without the express prior written consent of Internet Security Systems, Inc. Patent pending. Internet Security Systems, System Scanner, Wireless Scanner, SiteProtector, Proventia, Proventia Web Filter, Proventia Mail Filter, Proventia Filter Reporter ADDME, AlertCon, ActiveAlert, FireCell, FlexCheck, Secure Steps, SecurePartner, SecureU, and X-Press Update are trademarks and service marks, and the Internet Security Systems logo, X-Force, SAFEsuite, Internet Scanner, Database Scanner, Online Scanner, and RealSecure registered trademarks, of Internet Security Systems, Inc. Network ICE, the Network ICE logo, and ICEpac are trademarks, BlackICE a licensed trademark, and ICEcap a registered trademark, of Network ICE Corporation, a wholly owned subsidiary of Internet Security Systems, Inc. SilentRunner is a registered trademark of Raytheon Company. Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated. Certicom is a trademark and Security Builder is a registered trademark of Certicom...
Words: 5367 - Pages: 22
...1.) You are developing a project that contains multiple SQL Server Integration Services (SSIS) packages. The packages will be deployed to the SSIS catalog. One of the steps in each package accesses an FTP site to download sales transaction data. You create project parameters to store the username and password that are used to access the FTP site. You need to ensure that the username and password values are encrypted when they are deployed. What should you do? A. set the Sensitive property of the parameters to True. B. Set the ProtectionLevel property of the package to EncryptSensitiveWithUserKey. C. Change the parameters to package parameters. D. Change the project to the Legacy Deployment model. Answer: A 2.) You develop a SQL Server Integration Services (SSIS) package that imports SQL data into a data warehouse every night. The SQL data contains many misspellings and variations of abbreviations. To import the data, a developer used the Fuzzy Lookup transformation to choose the closest-matching string from a reference table of allowed values. The number of rows in the reference table is very large. If no acceptable match is found, the Fuzzy Lookup transformation passes a null value. The current setting for the Fuzzy Lookup similarity threshold is 0.50. Many values are incorrectly matched. You need to ensure that more accurate matches are made by the Fuzzy Lookup transformation without degrading performance. What should you do? A. Change the Exhaustive property to True...
Words: 5340 - Pages: 22
...2011 Install SharePoint Server 2010 Installation and configuration for development This tutorial helps you to install SharePoint Server 2010. It shows you step-by-step how to setup requirements like Windows Server 2008 R2 including roles and features, administrative and service accounts as well as SQL Server 2008 R2. With these requirements installed you are able to deploy SharePoint Server 2010. Get more tutorials at http://sharepoint-tutorial.net/ Need a SharePoint book? http://sharepoint-book.net/ SharePoint resources http://andreasglaser.net/ Disclaimer THIS INFORMATION IS PROVIDED “AS IS” WITHOUT ANY WARRANTY OF ANY KIND. All trademarks are property of their respective owners. © Copyright 2011 Andreas Glaser Software Engineering GmbH Version: 1.1, 3/9/2011 Overview 1 Table of contents 1. Overview .............................................................................................................................. 2 1.1. 1.2. 2. 2.1. 2.2. 2.3. Hardware requirements .......................................................................................................... 3 Software requirements ........................................................................................................... 4 Installation ............................................................................................................................... 5 Updates ...............................................................................................
Words: 4069 - Pages: 17
...Adaptec, Inc. AMD Opteron and Opteron are trademarks of Advanced Micro Devices, Inc. BakBone and NetVault are trademarks or registered trademarks of BakBone Software, Inc. EMC, PowerPath, SRDF, and Symmetrix are registered trademarks of EMC Corporation. GoldenGate is a trademark of GoldenGate Software, Inc. Hewlett-Packard and HP are registered trademarks of Hewlett-Packard Company. Intel, Pentium, and XEON are registered trademarks of Intel Corporation. IBM, CICS, RACF, Tivoli, z/OS, and z/VM are registered trademarks of International Business Machines Corporation. Linux is a registered trademark of Linus Torvalds. LSI and Engenio are registered trademarks of LSI Corporation. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are registered trademarks of Microsoft Corporation in the United States and other countries. Novell and SUSE are registered trademarks of Novell, Inc., in the United States and other countries. QLogic and SANbox trademarks or registered trademarks of QLogic Corporation. SAS and SAS/C are trademarks or registered trademarks of SAS Institute Inc. SPARC is a registered trademarks of SPARC International, Inc. Sun Microsystems, Solaris, Sun, and Sun Java are trademarks or registered trademarks of Sun Microsystems, Inc., in the...
Words: 18345 - Pages: 74
...SHAREPOINT 2010 AND FAST SEARCH SERVER 2010 INSTALLATION AND CONFIGURATION PLAN Document Control |Document Details | |Project Name |Intranet Revamp | |Document Location |IT | |Document Reference | SharePoint 2010 Installation Plan.doc | |Revision History | |Revision Description |Version |Date |Author / Editor | |Initial draft |0.1 |08/08/2010 |Chiyesu Kalaba | |Final draft |0.2 |25/08/2010 |Jacob Siwiti | 1. INTRODUCTION This document outlines the process of preparing, installation and configuration of...
Words: 7699 - Pages: 31
...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...
Words: 15647 - Pages: 63
...Overflow • Fragmentation Attacks • Session Hijacking • Social Engineering • SQL Injection / Injection attacks • Eavesdropping • Replay Attacks There are many more attacks possible but these are the attack we focused on. With each threat, we analyzed how these attacks could be used against us and what counter measures would be used to prevent or mitigate such events from happening. DOS/DDOS Attacks- In general, Denial of Service attacks are used to flood an infrastructure with requests to the point where systems cannot keep up with the volume and crash as a result. As a business that relies on bidding and some public access, this can be troublesome as it would crash the website and stop business at critical times. In order to prevent such attacks, a NIDS or Network Intrusion Detection System can and should be implemented to “weed out” false requests from IP addresses that are flooding the system. For further protection the use of a “Honeypot” or trap for hackers can be used to direct any incoming attacks towards a lesser valuable target. Man in the Middle attacks- Man in the middle attacks are exactly what they sound like. The danger in these attacks lay with the hacker who lies between the connection of the client and server and either intercepts information between the two, or sometimes poses as the server to grab information from the client like passwords, or other critical information. To protect against these...
Words: 1272 - Pages: 6
...TERM PAPER ON Information System of Standard Bank Limited [pic] Submitted To: Dr. Md. Mosharraf Hossain Professor Department of Management University of Dhaka Submitted By: Sabbir Ahmed 3-11-21-065 Department of Management University of Dhaka Date of Submission 09.11.2014 Preface Theoretical knowledge, what we learn through our academic activities, is not sufficient to prepare ourselves for the life battle. Academic knowing is needed to be backed up by practical experience. In business studies, besides their usual theoretical course works, students are required to fulfill some practical assignments which are set by the course teachers to examine the depth of knowledge learned by the students. Most of the time, the students are required to study a practical working environment of any organization or industry to critically examine ‘what is actually going on’ in the real world. This document is prepared as a result of an assignment set by the honorable course teacher of the course “Fundamental of MIS”. .My duty was to describe “Information System of My Organization.” and report what I found. This is how this assignment paper titled “Information System of Standard Bank Limited.” was emerged. I believe this paper is a reflection of accumulation of my effort, learning and dedication. Letter of Transmittal November 8, 2014 Dr. Mosharraf Hossain Professor MBA (Evening) Program Department...
Words: 1837 - Pages: 8