Recovering a database with a missing transaction log #microsoft #sql #server, #sql

#

Recovering a database with a missing transaction log

Question: We had a SAN problem over the weekend and the upshot is that one of our main databases was shut down with open transactions, but we ve lost the log file. The last working backup is two weeks old.

Is there any way to recover the database without having to resort to the old backup?

Answer: Yes, but not without consequences.

Usually when a database has open transactions and the server crashes, crash recovery will run on the affected database and roll back the open transactions. This prevents the partial effects of transactions being present in the database. If the transaction log is not available when SQL Server starts, the database will be in the SUSPECT state.

In this case, the only way to bring the database online (note that I m not saying way to make the database usable ) is to use the emergency mode repair functionality that was added in SQL Server 2005. This basically builds a new transaction log and then runs a DBCC CHECKDB using REPAIR_ALLOW_DATA_LOSS. Read more .

The problem you will have if you decide to go this route is that emergency mode repair cannot roll back any of the active transactions as it has no knowledge of what they were, because the transaction log was destroyed. This means that at best, the resulting database will be transactionally inconsistent i.e. the state of the data in the database is unknown.

For instance, there may have been a transaction that was updating some sales records in a table, and only half of them were updated before the crash and subsequent transaction log loss occurred. You ll find it very difficult to figure out what state the data is in, and how to make the database properly usable again by the application.

Emergency mode repair is supposed to be a real last resort when all other methods of recovering data have failed.

In your case, you ll have to figure out what is the lesser of two evils recovering the database into an inconsistent state, or restoring the two-week old backup. You may end up deciding to do both, and trying to piece together the data, but that will be very time consuming and problematic again, because you don t know what was happening in the database at the time that the crash occurred.

To prevent this situation in future, beef up your backup strategy to use much more frequent backups, and add a high-availability technology that maintains a real-time copy of your database such as database mirroring or SQL Server 2012 Availability Groups.

[Unrelated: this is the last post on this blog, as we re going to focus on our own blogs moving forward. It s been great having this additional outlet to the community and we ve enjoyed writing the weekly posts for the last two years. We hope you ve enjoyed reading and learning from them too!]





CVE security vulnerability database #security, #cve, #nvd, #security #vulnerability, #vulnerability, #exploit, #cvss,

#

Current CVSS Score Distribution For All Vulnerabilities

Looking for OVAL (Open Vulnerability and Assessment Language) definitions? http://www.itsecdb.com allows you to view exact details of OVAL(Open Vulnerability and Assessment Language) definitions and see exactly what you should do to verify a vulnerability. It is fully integrated with cvedetails so you will be able to see OVAL definitions related to a product or a CVE entry.
Sample CVE entry with OVAL definitions. CVE-2007-0994

www.cvedetails.com provides an easy to use web interface to CVE vulnerability data. You can browse for vendors, products and versions and view cve entries, vulnerabilities, related to them. You can view statistics about vendors, products and versions of products. CVE details are displayed in a single, easy to use page, see a sample here.

CVE vulnerability data are taken from National Vulnerability Database (NVD) xml feeds provided by National Institue of Standards and Technology. Additional data from several sources like exploits from www.exploit-db.com. vendor statements and additional vendor supplied data, Metasploit modules are also published in addition to NVD CVE data.

Vulnerabilities are classified by cvedetails.com using keyword matching and cwe numbers if possible, but they are mostly based on keywords.

Unless otherwise stated CVSS scores listed on this site are CVSS Base Scores provided in NVD feeds. Vulnerability data are updated daily using NVD feeds.Please visit nvd.nist.gov for more details.

Please contact admin at cvedetails.com or use our feedback forum if you have any questions, suggestions or feature requests.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE’s CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE’s CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE’s OVAL web site.

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.





Next programming language #programming, #software #development, #devops, #java, #agile, #web, #iot, #database,

#

Why .NET Core Made C# Your Next Programming Language to Learn

Why .NET Core Made C# Your Next Programming Language to Learn

Get Your Apps to Customers 5X Faster with RAD Studio

For years I have read about polyglot programmers and how some new language was the new cool thing. Over time, it has been programming languages like Ruby, Python, Scala, Go, Node.js, Swift, and others. It is amazing to see what Microsoft, and the community, have done with .NET Core and how it has become the cool new thing.

The problem with many of the existing programming languages is they are good at one use case. Ruby and PHP are awesome for web applications. Swift or Objective-C are great for creating iOS or MacOS applications. If you wanted to write a background service you could use Python, Java, or other languages. Besides C#, JavaScript and Java may be the only languages that can be applied to a wide set of use cases.

It is hard for me to apply my skills to a broad set of problems if I have to learn many programming languages. It limits my job opportunities. The awesome thing about C# is the wide versatility of it that can be used for a wide variety of types of applications. Now with .NET Core working on MacOS and Linux, there truly is no limit to what you can do. We will explore this in more detail below.

Why C# and .NET Core Are the Next Big Thing

I have been playing with .NET Core for over a year now and have been very impressed with it. I have even ported a .NET app over to run on a Mac, which was pretty amazing to see in action after all these years!

Since our company creates developer tools that also work with .NET Core, I feel like we are more plugged in to what is going on. It feels like .NET Core is picking up steam fast and I predict there will be a huge demand for .NET Core developers in 2018. We talk to customers every day who are already running .NET Core apps in production.

According to the TIOBE programming index. C# is already one of the top 5 programming languages.

Top 6 Things to Know About C# and .NET Core

If you are thinking about learning a new programming language, I want to provide you some of my insights as to why C# and .NET Core should be on the top of your list.

Easy to Learn

If you have done any programming in C, Java, or even JavaScript, the syntax of C# will feel very familiar to you. The syntax is simple to understand and read. Based on the TIOBE index I posted above, there are millions of developers who could easily make the switch from Java or C.

There are lots of online resources to help you learn C#. Many are free and there are some that are low cost as well.

Modern Language Features

NET has been around a long time now and has steadily changed and improved over 15 years. Over the years I have seen awesome improvements like MVC, generics, LINQ, async/await, and more. As someone who has personally dedicated myself to the language, it is awesome to see it improve over time. With .NET Core, a lot has changed, including all of the ASP.NET stack being completely overhauled.

Here are some the top features:

  • Strongly typed.
  • Robust base class libraries.
  • Asynchronous programming – easy to use async/await pattern.
  • Garbage collection, automatic memory management.
  • LINQ – Language Integrated Queries.
  • Generics – List T , Dictionary T, T .
  • Package management.
  • The ability to share binaries across multiple platforms and frameworks.
  • Easy to use frameworks to create MVC web apps and RESTful APIs.

Versatility: Web, Mobile, Server, Desktop

One of the best things about C# and .NET is the versatility of it. I can write desktop apps, web applications, background services, and even mobile apps thanks to Xamarin. Besides C#, all I really have to know is a little JavaScript (aided by TypeScript) to hack some UI code together (which I still try to avoid!). ASP.NET Core templates even make use of Bootstrap layouts and npm for pulling in client-side libraries.

The versatility is a big deal because your investment in learning the language can be used for a wide array of things. Your skillset is highly portable. You can also jump from building web apps to mobile apps if you want to mix up what you are doing. This is a stark difference to most other programming languages that only work server side.

And let’s not forget the first class support for Microsoft Azure. It’s never been easier to get up and running and then deployed to the cloud in just a few clicks. Docker containers are also supported which makes it easy to deploy your app to AWS or other hosting providers as well.

Awesome Developer Tools

Visual Studio has always been regarded as one of the best IDEs available for developers. It is a great code editor that supports features like code completion, debugging, profiling, git integration, unit testing, and much more. Visual Studio now offers a full-featured, free Community edition.

It is also possible to write code for .NET Core as basic text files with your favorite text editor. You can also use Visual Studio Code on any OS as a great basic code editor. For those of you who will never give up your vim or emacs, you can even do C# development too. You could also install a plug-in for Visual Studio to add all of your favorite shortcut keys.

The whole .NET ecosystem is also full of amazing developer tools. For example, I couldn’t imagine living without Resharper from Jetbrains. There are dozens of awesome tools that exist, including a mixture of open source and commercial products.

Standardization of Skills

NET comes with a very good set of base class libraries. Unlike Node.js, simple string functions like LeftPad() are built in. The wide array of base classes really decreases the need for external packages. Microsoft does lean on some community projects as well, like JSON.NET, to be key libraries widely used in most projects.

Microsoft provides a very good set of patterns and practices for .NET. For example, there are standard data access (entity framework) and model-view-controller (MVC) frameworks built-in. Most developers use those standard frameworks. This makes it easy as a developer to move between teams and quickly understand how things work. Your knowledge and skills become more portable due to this.

.NET Core Is Open Source

One of the biggest changes to ever happen to .NET was the open sourcing of the code. Virtually all of the code is now on GitHub for anyone to review, fork, and contribute to. This is a huge change that most people in the industry never thought would happen.

As a developer, from time to time you need to look under the covers to see what your code is really doing. For example, in the past, I once wondered if I called Dispose() on a database connection if that closes the connection or not. If you can access the source code somehow, you can quickly verify these types of questions.

Even if you don’t contribute to the source code, you benefit from the huge community that is. Problems and improvements are quickly discussed, coded, and released for you to use on a regular basis. Gone are the days of waiting years in-between releases for major improvements or minor bug fixes.





Security Assessment, VAPT, ECSA Training in Bangalore, Chennai, Mumbai, Pune, Delhi, Gurgaon,

#

A penetration test is done to evaluate the security of a computer system or network by simulating an attack by a malicious user / hacker. The process involves active exploitation of security vulnerabilities that may be present due to poor or improper system configuration, known and / or unknown hardware or software flaws, or operational weaknesses in process or design.

This analysis is carried out from the position of a potential attacker, to determine feasibility of an attack and the resulting business impact of a successful exploit. Usually this is presented with recommendations for mitigation or a technical solution.

About this workshop

This workshop gives an in-depth perspective of penetration testing approach and methodology that covers all modern infrastructure, operating systems and application environments.

This workshop is designed to teach security professionals the tools and techniques required to perform comprehensive information security assessment.

Participants will learn how to design, secure and test networks to protect their organization from the threats hackers and crackers pose. This workshop will help participants to effectively identify and mitigate risks to the security of their organization s infrastructure.

This 40 hour highly interactive workshop will help participants have hands on understanding and experience in Security Assessment.

A proper understanding of Security Assessment is an important requirement to analyze the integrity of the IT infrastructure.

Expertise in security assessment is an absolute requirement for a career in information security management and could be followed by management level certifications like CISA, CISSP, CISM, CRISC and ISO 27001.

There are many reasons to understand Security Assessment:

  • Prepare yourself to handle penetration testing assignments with more clarity
  • Understand how to conduct Vulnerability Assessment
  • Expand your present knowledge of identifying threats and vulnerabilities
  • Bring security expertise to your current occupation
  • Become more marketable in a highly competitive environment

Therefore this workshop will prepare you to handle VA / PT assignments and give you a better understanding of various security concepts and practices that will be of valuable use to you and your organization.

This workshop will significantly benefit professionals responsible for security assessment of the network / IT infrastructure.

  • IS / IT Specialist / Analyst / Manager
  • IS / IT Auditor / Consultant
  • IT Operations Manager
  • Security Specialist / Analyst
  • Security Manager / Architect
  • Security Consultant / Professional
  • Security Officer / Engineer
  • Security Administrator
  • Security Auditor
  • Network Specialist / Analyst
  • Network Manager / Architect
  • Network Consultant / Professional
  • Network Administrator
  • Senior Systems Engineer
  • Systems Analyst
  • Systems Administrator

Anyone aspiring for a career in Security Assessment would benefit from this workshop. The workshop is restricted to participants who have knowledge of ethical hacking countermeasures.

The entire workshop is a combination of theory and hands-on sessions conducted in a dedicated ethical hacking lab environment.

  • The Need for Security Analysis
  • Advanced Googling
  • TCP/IP Packet Analysis
  • Advanced Sniffing Techniques
  • Vulnerability Analysis with Nessus
  • Advanced Wireless Testing
  • Designing a DMZ
  • Snort Analysis
  • Log Analysis
  • Advanced Exploits and Tools
  • Penetration Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Routers and Switches Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Wireless Network Penetration Testing
  • Denial of Service Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Stolen Laptop, PDAs and Cell phones Penetration Testing
  • Application Penetration Testing
  • Physical Security Penetration Testing
  • Database Penetration testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Blue Tooth and Hand held Device Penetration Testing
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of a Penetration Tester
  • Standards and Compliance




What is business intelligence (BI)? Definition from #business #intelligence #database

#

business intelligence (BI)

Business intelligence (BI) is a technology-driven process for analyzing data and presenting actionable information to help corporate executives, business managers and other end users make more informed business decisions. BI encompasses a wide variety of tools, applications and methodologies that enable organizations to collect data from internal systems and external sources, prepare it for analysis, develop and run queries against the data, and create reports, dashboards and data visualizations to make the analytical results available to corporate decision makers as well as operational workers.

Download this free guide

Hadoop 2 Upgrades: Ready to Take Advantage?

Hadoop doesn’t lack for attention, but that has yet to translate into high adoption or success rates. Find out if you should leverage Hadoop 2 upgrades here.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy .

The potential benefits of business intelligence programs include accelerating and improving decision making; optimizing internal business processes; increasing operational efficiency; driving new revenues; and gaining competitive advantages over business rivals. BI systems can also help companies identify market trends and spot business problems that need to be addressed.

BI data can include historical information, as well as new data gathered from source systems as it is generated, enabling BI analysis to support both strategic and tactical decision-making processes. Initially, BI tools were primarily used by data analysts and other IT professionals who ran analyses and produced reports with query results for business users. Increasingly, however, business executives and workers are using BI software themselves, thanks partly to the development of self-service BI and data discovery tools.

Business intelligence combines a broad set of data analysis applications, including ad hoc analysis and querying, enterprise reporting, online analytical processing (OLAP ), mobile BI. real-time BI. operational BI. cloud and software as a service BI. open source BI. collaborative BI and location intelligence. BI technology also includes data visualization software for designing charts and other infographics. as well as tools for building BI dashboards and performance scorecards that display visualized data on business metrics and key performance indicators in an easy-to-grasp way. BI applications can be bought separately from different vendors or as part of a unified BI platform from a single vendor.

BI programs can also incorporate forms of advanced analytics. such as data mining. predictive analytics. text mining. statistical analysis and big data analytics. In many cases though, advanced analytics projects are conducted and managed by separate teams of data scientists. statisticians, predictive modelers and other skilled analytics professionals, while BI teams oversee more straightforward querying and analysis of business data.

Business intelligence data typically is stored in a data warehouse or smaller data marts that hold subsets of a company’s information. In addition, Hadoop systems are increasingly being used within BI architectures as repositories or landing pads for BI and analytics data, especially for unstructured data. log files, sensor data and other types of big data. Before it’s used in BI applications, raw data from different source systems must be integrated, consolidated and cleansed using data integration and data quality tools to ensure that users are analyzing accurate and consistent information.

In addition to BI managers, business intelligence teams generally include a mix of BI architects, BI developers, business analysts and data management professionals; business users often are also included to represent the business side and make sure its needs are met in the BI development process. To help with that, a growing number of organizations are replacing traditional waterfall development with Agile BI and data warehousing approaches that use Agile software development techniques to break up BI projects into small chunks and deliver new functionality to end users on an incremental and iterative basis. Doing so can enable companies to put BI features into use more quickly and to refine or modify development plans as business needs change or new requirements emerge and take priority over earlier ones.

Sporadic usage of the term business intelligence dates back to at least the 1860s, but consultant Howard Dresner is credited with first proposing it in 1989 as an umbrella category for applying data analysis techniques to support business decision-making processes. What came to be known as BI technologies evolved from earlier, often mainframe-based analytical systems, such as decision support systems and executive information systems. Business intelligence is sometimes used interchangeably with business analytics ; in other cases, business analytics is used either more narrowly to refer to advanced data analytics or more broadly to include both BI and advanced analytics.

This was last updated in October 2014

Next Steps

Learn how business intelligence analytics tools can benefit corporate strategies and operations. Users accessing Cognos can incorporate Forward Looking BI, and use it to seamlessly integrate BI with predictive analytics.

Continue Reading About business intelligence (BI)





T-SQL Programming Part 5 – Using the CASE Function #microsoft, #articles, #microsoft

#

T-SQL Programming Part 5 – Using the CASE Function

Have you ever wanted to replace a column value with a different value based on the original column value? Learn how, with the T-SQL CASE function.

The CASE function is a very useful T-SQL function. With this function you can replace a column value with a different value based on the original column value. An example of where this function might come in handy is where you have a table that contains a column named SexCode, where 0 stands for female, 1 for male, etc. and you want to return the value “female” when the column value is 0, or “male” when the column value is 1, etc. This article will discuss using the CASE function in a T-SQL SELECT statement.

The CASE function allows you to evaluate a column value on a row against multiple criteria, where each criterion might return a different value. The first criterion that evaluates to true will be the value returned by the CASE function. Microsoft SQL Server Books Online documents two different formats for the CASE function. The “Simple Format” looks like this:

And the “Searched Format” looks like this:

Where the “input_expression” is any valid Microsoft SQL Server expression, the “when_expression” is the value in which the input_expression is compared, the “result_expression ” is the value that will be return for the CASE statement if the “when_expression” evaluates to true, ” . n ” represents that multiple WHEN conditions can exist, the “else_result_expression ” is the value that will be returned if no “when_expression” evaluates to true and in the “Searched Format” the “Boolean_expression” is any Boolean express that when it evaluates to true will return the “result_expression”. Let me go through a couple of examples of each format to help you better understand how to use the CASE function in a SELECT statement.

For the first example let me show you how you would use the CASE function to display a description, instead of a column value that contains a code. I am going to use my earlier example that I described at the top of this article where I discussed displaying “female” or “male” instead of the SexCode. Here is my example T-SQL Code:

Here is the output from this T-SQL code:

This example shows the syntax in action for a CASE function using the “Simple Format”. As you can see the CASE function evaluates the PatientSexCode to determine if it is a 0, 1, or 2. If it is a 0, then “female” is displayed in the output for the “Patient Sex” column. If the PatientSexCode is 1, then “male” is display, or if PatientSexCode is 2 then “unknown” is displayed. Now if the PatientSexCode is anything other than a 0, 1 or 2 then the “ELSE” condition of the CASE function will be used and “Invalid PatientSexCode” will be displayed for the “Patient Sex” column.

Now the same logic could be written using a “Searched Format” for the CASE function. Here is what the SELECT statement would look like for the “Searched Format”:

Note the slight differences between the “Simple” and “Searched” formats. In the “Simple” format I specified the column name for which row values will be compared against the “when_expressions” ,where as in the “Searched” format each WHEN condition contains a Boolean expression that compares the PatientSexCode column against a code value.

Now the CASE function can be considerably more complex than the basic examples I have shown. Suppose you want to display a value that is based on two different columns values in a row. Here is an example that determines if a Product in the Northwind database is of type Tins or Bottles, and is not a discontinued item.

The output for the above command on my server displays the following:

As you can see I’m using a “Searched Format” for this CASE function call. Also, each WHEN clause contains two different conditions. One condition to determine the type (tins, or bottles) and another condition to determine if the product has been discontinued. If the QuantityPerUnit contains the string “Tins” and the Discontinue column value is 0 then the “Type of Availability” is set to “Tins”. If the QuantityPerUnit contains the string “Bottles” and the Discontinue column value is 0 then the “Type of Availability” is set to “Bottles”. For all other conditions, the “Type or Availability” is set to “Not Tins , Not Bottles , or is Discontinued.

The WHEN clauses in the CASE function are evaluated in order. The first WHEN clause that evaluates to “True” determines the value that is returned from the CASE function. Basically, multiple WHEN clauses evaluate to “True”, only the THEN value for the first WHEN clause that evaluates to “True” is used as the return value for the CASE function. Here is an example where multiple WHEN clauses are “True.”

The output on my machine for this query looks like this:

If you look at the raw titles table data in the pubs database for the title “You Can Combat Computer Stress!” you will note that the price for this book is $2.99. This price makes both the “price 12.00” and “price 3.00” conditions “True”. Since the conditions are evaluated one at a time, and the “price 12.00” is evaluated prior to the “price 3.00,” the “Price Category” for the title “You Can Combat Computer Stress!” is set to “Cheap”.

The CASE function can appear in different places within the SELECT statement, it does not have to only be in the selection list within the SELECT statement. Here is an example where the CASE function is used in the WHERE clause.

The output for this query looks like this:

Here I only wanted to display books from the titles table in pubs database if the price category is ‘Average’. By placing my CASE function in the WHERE clause I was able to accomplish this.

Conclusion

As you can see the CASE function is an extremely valuable function. It allows you to take a data column and represent it differently depending on one or more conditions identified in the CASE function call. I hope that the next time you need to display or use different values for specific column data you will review the CASE function to see if it might meet your needs.

See All Articles by Columnist Gregory A. Larsen





Steps to Rebuild Master Database In SQL Server #backup #database #sql #server

#

Rebuild Master Database in SQL Server Without Backup

It has been observed that many SQL Server administrators, in fact majority of them, backup their user databases regularly, but turn a blind eye to the system databases. While most of them do not understand the value of these databases, some remain in their comfort zone owing to the years of no failure. Whatever be the reason, we will help you to be acquainted with the methods to restore the system databases, should the admins find themselves in a crucial situation.

Reasons Behind Master Database Rebuilding

There are a number of reasons due to which, the master database needs to be rebuild. Some of them are:

  • At times, user delete some crucial information like linked servers, logins, SQL Server configuration, and other user objects.
  • The master database is not coming online and the admin does not have a backup of the master database.
  • It can also happen that the master database has been corrupted due to various hardware and software failure and can no longer be used.
  • The administrator might want to make a clone of the server or might want to restore the master database to a new instance.

How to Rebuild Master Database in SQL Server?

The following procedure will help you to rebuild the master system database. The entire process, which we will discuss in this write up, will be divided into three sections for the convenience of the users.

1. Pre-Rebuild Process

Since, only the master database is corrupt, therefore, in order to ensure the authenticity of other system database files, it gets necessary to take their backup. The files that need to be backed up are MSDB Data, MSDB Log, model model Log In order to do so, follow the below mentioned steps:

  • Open SQL Server Configuration Manager.
  • From the left pane, select SQL Server Services option. This will list all the services that are currently running.
  • Right click on the service and select Stop option for stopping all the services one by one.
  • Exit SQL Server Configuration Manager.
  • Browse to the location where all the system files of a particular SQL Server instance are stored.

C:\Program Files\Microsoft SQL Server\[INSTANCE NAME]\MSSQL\DATA

Note: Keep in mind this location, as this is where the master database files will be rebuild automatically.

  • Cut all the healthy system files, save them in a new folder, and delete corrupted master mastlog, tempdb, templog files.

2. Rebuilding Process

The steps that are followed for rebuilding are:

  • In the command prompt, change the directory location of the server instance to the location where the SQL Server 2016 installation media.
  • Open Command Prompt as Administrator.
  • Since my installation media is stored in the F: Drive, change the directory location by entering f: and press Enter.
  • The next step is to run the following command:

    Note: In case your account name contains a blank space, keep in mind to enclose the account name within quotes. Moreover, if you are specifying multiple accounts, separate them with a space.
  • When all the system databases are rebuilt, it returns no message in the command prompt. In order to verify whether the process has been completed successfully, examine the summary.txt file. the location of this file is:
    C:\Program Files\Microsoft SQL Server\130\Setup Bootstrap\Logs

3. Post-Rebuild Process

  • The first step after rebuilding is to restart all the services, which were stopped earlier.
  • If you have backups of model and MSDB databases, restore them.
  • In case the backup is not present, simply replace the rebuilt MSDB and model files with the files that were backed up in the I. section. (This should be done after stopping the services).

In this blog, we have described the full procedure for rebuilding the master database in the scenario when the backup is not available.We believe that with its help you will be able to rebuild the master database successfully.





Free Data Modeling Tool Business Process Design Software #free #data #modeling #tool,

#

Open ModelSphere –
Free Software Tool for Conceptual and Relational Data Modeling,
Business Process Modeling and UML Modeling

Open ModelSphere is a powerful free data, process and UML modeling tool / software. Open ModelSphere covers conceptual and logical data modeling as well as physical design, i.e. database modeling (database modelling). It supports several notations, e.g. Entity-Relationship, DATARUN and Information Engineering. Conceptual models can be converted to relational models and vice versa.

Thanks to its reverse engineering capabilities, Open ModelSphere allows graphical visualization of your relational database’s architecture, thus making modifications easy. As a complete data modeling tool / software, it allows the generation of SQL scripts from your model as well. Open ModelSphere supports all the database management systems in a generic manner. A standard built-in interface connects to SQL databases via ODBC/JDBC driver.

Open ModelSphere also includes expert modules to validate the integrity of your architecture and the coherence of what you established (meeting the requirements of each DBMS). This validation expertise will help you save research time among the multitude of restrictions that exists in each management system.

Open ModelSphere also helps systems analysts to integrate the creation of data flow and business process diagrams and to elaborate an enterprise’s workflow and logistics. You can specify resources, transactions, communicational exchanges, cost calculated in time, money and effort, etc. Open ModelSphere is not restricted to business process modeling, but also allows you to set up the technical design at the application system level.

Open ModelSphere supports you to schematize the various processes’ details in a hierarchical manner, thus enabling you to decompose a process in subprocesses. This way, it is easy to keep an overview, while having access to a very detailed view of the processes. When setting the data flow diagram, it becomes easier to design a relational database that meets the company’s needs, hence avoiding loss of time and money.

Last, but not least – Open ModelSphere provides the functionality of a rich UML modeling tool / software. You can create Activity, Class, Collaboration, Component, Deployment, Package, Sequence, Statechart and Use Case diagrams.

With respect to the coexistence of relational and object-oriented approaches, class models can be linked to data models. Moreover, class models can be generated from data models and vice versa.





5 SQL Server 2014 Security Enhancements #sql #server #2014, #database #security

#

5 SQL Server 2014 Security Enhancements

SQL Server 2014 continues the Microsoft commitment to excellence in security. According to the National Institute of Standards and Technology (NIST) public security board, SQL Server reportedly has the lowest number of security vulnerabilities across major database vendors. In addition, SQL Server has been deemed the most secure database by the Information Technology Intelligence Consulting (see, SQL Server Delivers Industry-Leading Security , 2010 and Stratus ftServer and SQL Server Deliver Continuous Availability , 2012).

SQL Server 2014 offers Common Criteria (CC) Certification at the High Assurance Level, as well as enhanced separation of duty for greater security. Additional new features include Transparent Data Encryption for better data protection and Encryption Key Management, allowing the storage of keys on a separate server.

1. Transparent Data Encryption (TDE)

In SQL Server 2014, TDE functionality takes the non-encrypted backup data and encrypts the data before writing it to disk. In order to preserve a major compression factor of SQL Server backup compression in conjunction with the newly introduced encryption, the compression is performed on the backup data first, before the encryption is applied to the compressed data. With this order of actions, a major compression factor can be preserved while the backup as it rests on the backup vehicle is encrypted.

2. Encryption Key Management

As discussed above, to secure your backup data in SQL Server 2014, you can now select to encrypt when you create a backup. The encryption options include an encryption algorithm and a certificate or asymmetric key to be used for the encryption. Only asymmetric keys residing in the Extended Key Management is supported.

Multiple encryption algorithms up to AES 256-bit are supported giving you a variety of algorithms to choose from. Adding backup encryption to a TDE encrypted database, gives additional protection for your data.

You can control the process using PowerShell. SQL Server Management Objects (SMO), or SQL Server Management Studio (SSMS), or T-SQL. Encryption options can also be used when configuring SQL Server Managed Backup to Windows Azure, therefore providing additional security for your off-site data.

It is very important that the certificate or key used for encrypting must be backed up to a different location than the backup that the certificate or key is used to encrypt. Without this certificate or key the backup file cannot be restored. For more information, see: Backup and Restore Enhancements in SQL Server 2014 CTP2 .

New Server-Level Permissions

SQL Server 2014 also has 3 new server-level permissions.

3. CONNECT ANY DATABASE Permission

Grant CONNECT ANY DATABASE to a login that must connect to all databases that currently exist and to any new databases that might be created in future. This permission does not grant any permission in any database beyond connect. You may combine CONNECT ANY DATABASE permission with SELECT ALL USER SECURABLES or VIEW SERVER STATE to allow an auditing process to view all data or all database states on the instance of SQL Server.

4. IMPERSONATE ANY LOGIN Permission

When granted, IMPERSONATE ANY LOGIN allows a middle-tier process to impersonate the account of clients connecting to it, as it connects to databases. When denied, a high privileged login can be blocked from impersonating other logins. For example, a login with CONTROL SERVER permission can be blocked from impersonating other logins.

5. SELECT ALL USER SECURABLES Permission

When SELECT ALL USER SECURABLES permission is granted, a login such as an auditor can view data in all databases that the user can connect to. For additional information, see What s New (Database Engine)





Quickbooks over VPN? Archive – Micro Focus Forums #operations, #work, #quickbooks, #long,

#

05-Apr-2005, 07:16 PM

I recently set up our new accountant with the BM vpn and NW clients so that
she might be able to access our quickbooks 2000 database via a mapped drive
while connected to our BM3.7 server. She can connect fine, and althought QB
(a known resource hog) is fairly slow for most common operations over the
vpn (both client and server have SDSL connections over 500kbps), it is not
entirely unworkable. SOME particular operations, however, take an
IMPOSSIBLY long time (especially find operations in the records DB),
literally many, many orders of magnitude slower than everything else.

Is this really just due to the number of drive accesses involved in these
operations, or is there some other buggy issue at work here?

Does anyone know how to troubleshoot/work around this problem effectively?
We are really trying to avoid having to shutdown/lock the QB system long
enough for our accountant to copy the DB to a local machine, do her work,
and then write it back out to our system. We really need a way for her to
be able to work remotely AND concurrently with the rest of us.

Many, many thanks in advance for any help.

06-Apr-2005, 04:26 PM

You will probably need to take some traces (Ethereal on the PC’s
involved) to see what kind of traffic is involved. Might be as simple
as needing to reduce MTU size on one or both ends of that connection.

Perhaps simpler would be to use pcANYWHERE, VNC or terminal server/RDP
to remote control an internal PC over the VPN to do the work remotely.

Craig Johnson
Novell Support Connection SysOp
*** For a current patch list, tips, handy files and books on
BorderManager, go to http://www.craigjconsulting.com ***

06-Apr-2005, 04:33 PM

My experience with Quickbooks over a lan is that the newer versions can be a
little slow as it is. I would venture to say that there is just way too
much data to push through that small DSL pipe.

14-Apr-2005, 04:07 PM

Thanks for the input Craig and JP,

I apologize for my own sluggish response. I actually found a post on
another site that echoed Craig’s suggestion of running quickbooks on a local
machine and having the remote client connect to it using pcAnywhere or the
like so that all the heavy drive accesses remain local. I’m going to give
that a try.

Thanks again for the help,





Free Office software #free #office #software, #business #program, #office #suite, #office #program,

#

Personal Information Manager, Database and Word Processor. Download TreePad and enjoy better access, organization and control over all your data, notes, bills, projects, clients, addresses, letters, speeches, research, collections, classroom notes, Web pages, links, bibliographic listings, and whatever else your creativity enables you to entrust TreePad with, for good organization, easy access, and safe storage.
Despite all its features and power, TreePad is as easy to use as the Windows explorer and will fit (including data) on one floppy!
Freeware, Shareware, Linux and Windows versions are available on www.treepad.com .
Created by Freebyte.

Fully customizable addressbook program for Windows XP, Vista, 2000, NT, 95, 98, ME. Freeware and shareware versions are available. Custom Addressbook is an easy to use, small, and extremely flexible Address Management program. Another advantage of its small size, is that the program and its database file can run directly from an external disk, such as a USB stick, floppy, etc. Some of the additional features: password protection, minimize to tray, data encryption, data compression, import, search, backup, non-western fonts, etc.
For more information, please see here. Created by Freebyte.

Free online clocks, free clock programs which you can install, clock screensavers, clock widgets for your Website or blog, alarms and timers, time-related utilities, free project and time-scheduling software.

Free general purpose calculators, calculator collections, scientific/technical calculators, currency conversion and exchange rates.

Free personal finance software, free accounting programs, free invoicing software and free accounting scripts.

Online Business Services
Free Financial Software

E-commerce services, virtual cash systems, payment processing services, check printing, business-to-business portals, online stock trading, currency converters, free accounting software, etc.

Free Software
created by Freebyte

Free Personal Information Managers, free File and Disk Utilities, free Address Books, free eBook Software and more. All created by Freebyte.com.

Free ebooks, free eBook authoring tools, free photo albums.

Free online dictionaries for a multitude of languages, free specialized dictionaries (medicine, business, sports, computing, construction. ), free thesauri, free online spellcheckers, language tools, language links, and more.

Online courses, education for kids, online university education, educational resources.

Work from home, start your own business, make money from your Website, join affiliate programs, get paid to take online surveys, get paid by reading email, get paid by surfing the Web, money making tutorials, earn revenue by placing ads on your Website, advertisement programs, get a fee to refer customers, receive commission for offering custom builds, etc.

Free programs to surf the Web, free email software, email virus protection, free newsgroup programs, free Internet chat, telephony and messaging applications, free telnet software, free firewalls, etc.

Free screensavers, cursors, ringtones and desktop themes. Free 3D screensavers, nature, funny and artistic screensavers, screensaver construction packages which don’t require any programming, and more.

A large listing of services that provide free but also non-free email addresses. Web based email, email forwarding, pop email, etc. Also: add email services to your domain.

Free images, icons,
clipart, backgrounds,
photos

Download images and clipart for free, royalty-free stock photographs, thousands of free fonts, free icons, free GIFs, animated GIFs, free backgrounds, wallpapers, etc.

Free images, bars, arrows, flags, animated gifs and signs for your Web page.

Freebyte Gallery:
Background Images

Free background images for your Web pages: stone, marble, metal, decoration, sky backgrounds, timber images, psychedelic, office, trees and plants, space and stars.

Free Paint Programs, Free Image Viewers, Free Photo Albums, Free graphics converters, 2-D Animation Software, 3-D / Animation software and more!

Free online encyclopedias, maps, satellite images, electronics, computing, physics, science, etc.

The latest News Headlines; a large collection of news sites: English (USA/UK), German, Spanish, French, Italian, Dutch, Russian, Chinese, Brazilian, Arabic, Scandinavian, weather, sports, science, showbizz, economy, Internet, computer, etc.





Cool Things to Do with Netsh #netsh, #microsoft #windows #server #2003, #windows

#

Cool Things to Do with Netsh

The Netsh command is a powerful command-line tool for Windows Server 2003, Windows XP, and Windows 2000. Netsh is available in the Microsoft Windows 2000 Server Resource Kit and is standard in Windows 2003 and XP. Netsh lets you change almost any network configuration setting as well as document network configurations. You can use the command in a batch file or from its own command shell. Netsh has a useful Help system that you can access by adding /? to almost any of its subcommands. Here are 10 cool things that you can use Netsh to do.

10. Show TCP/IP settings The command

shows the system s current TCP/IP configuration settings. You can see whether the system is using DHCP or static addressing as well as view the system s current IP address, subnet mask, gateway address, and DNS servers.

9. Change network configuration Netsh can change the current network configuration. The command

sets the IP address of the system configuration Local Area Connection to 192.168.0.10, the subnet mask to 255.255.255.0, and the gateway address to 192.168.0.254. This use of Netsh comes in handy for laptops that must switch between static and dynamic addressed networks.

8. Use a dynamic DHCP assigned address The command

sets the IP address of the Local Area Connection system configuration to use DHCP addressing.

7. Change a DNS server address When you change the system s IP address type, you almost always have to change the DNS server s address as well. The command

configures the Local Area Connection to use a DNS server whose address is 192.168.0.2.

6. Dynamically assign the DNS server address When you switch to dynamic DHCP addressing, you typically also want the DNS server address to be assigned dynamically. The command

sets the Local Area Connection interface to use a DHCP-assigned DNS address.

5. Configure a WINS server Netsh also lets you configure WINS servers. The following command configures a system s Local Area Connection interface to use a WINS server that has the IP address 192.168.100.3.

4. Work with other interfaces Netsh works with DHCP, Internet Authentication Service (IAS), and RAS interfaces as well as the local network interface. The command

dumps the local DHCP server s configuration to the dhcpcfg.dat file. You can use this file in conjunction with Netsh to recreate the DHCP server.

3. Work with remote systems One of Netsh s best hidden features is its ability to work with remote systems. The command

sets the current computer to a different system on the network.

2. Save the current configuration The Interface Dump subcommand saves your current network configuration and generates a script that you can use to regenerate the configuration. The command

redirects the Dump command to the mycfg.dat file.

1. Restore network configuration The Netsh Exec command runs a Netsh script file. The command

restores to your system the network configuration data that the preceding sample command saved.

Anonymous User (not verified)

I too ran into this problem. Do this: 1. Create a batch file called netsh.bat ( for example ) with the netsh commands you would like to run ( just as they would run locally on your PC ) 2. Copy netsh.bat to C:\ (for example) on all of the nodes that need the change ( you can copy netsh.bat across your LAN via another batch file ). 3. With another batch file, schedule an AT job on each node that needs the change: this at job should run c:\netsh.bat ( that has already been copied to each node that needs the change ). This works becuase the job is running locally on each PC, rather than being pushed from another. Thanks, and good luck. -LP

ROBERT (not verified)

To add multiple DNS entries you need to type: netsh interface ip set dns name=”Wireless Network Connection” source=static addr=192.168.1.200 register=PRIMARY netsh interface ip add dns name=”Wireless Network Connection” addr=192.168.1.5 index=2 They need to be entered on a separate line.

Cameron Fairbairn (not verified)

In order to add multiple DNS servers, use the following syntax: add dns “Local Area Connection” 10.0.0.1 add dns “Local Area Connection” 10.0.0.3 index=2 index=2 adds the IP as a secondary dns server.

Anonymous User (not verified)

Wow, that came out ugly, let me try again: C:\WINNT\system32>netsh netsh>interface interface>show interface Admin State State Type Interface Name ————————————————————————- Enabled Dedicated Local Area Connection Enabled Internal Internal Enabled Loopback Loopback (Note: Look for “Dedicated” connection types with any name other than a GUID) interface>ip interface ip>delete dns “Local Area Connection” all interface ip>set dns “Local Area Connection” static 10.10.10.2 interface ip>add dns “Local Area Connection” 10.10.10.3 index=2

Would anyone know why I am getting the following error with #3, which is the remote command. When I run “netsh set machine virtual2000” I get the following response “WARNING: Could not obtain host information from machine: [10.1.2.106]. Some commands may not be available. Access is denied” The result is identical when I try “netsh -r virtual2000” I have tried physical servers as well, but I get the same result. I tried to google the error, but I don’t see anything. The netsh interface works fine until you get to the “set IP address” portion”. At that point, the available commands are blank.

wYc88 (not verified)

tschreier (not verified)

Is it possible to use netsh to disable and then enable an interface? Been trying to figure out a way do do that from a cmd line. thx

Anonymous User (not verified)

Joseph Davies (not verified)

The sentence “The Netsh command is a powerful command-line tool for Windows Server 2003, Windows XP, and Windows 2000. Netsh is available in the Microsoft Windows 2000 Server Resource Kit and is standard in Windows 2003 and XP.” should be changed to “The Netsh command is a powerful command-line tool that is installed by default for Windows Server 2003, Windows XP, and Windows 2000.” Netsh is included with Windows 2000, not as part of the Windows 2000 Server Resource Kit. Thanks.

Anonymous User (not verified)

Find your interface name & set multiple dns entries like this: C:\WINNT\system32>netsh netsh>interface interface>show interface Admin State State Type Interface Name ————————————————————————- Enabled Dedicated Local Area Connection Enabled Internal Internal Enabled Loopback Loopback (Note: Look for “Dedicated” connection types with any name other than a GUID) interface>ip interface ip>delete dns “Local Area Connection” all interface ip>set dns “Local Area Connection” static 10.10.10.2 interface ip>add dns “Local Area Connection” 10.10.10.3 index=2

Anonymous User (not verified)

Is it possible in WIN 2000 to “disable” “Local Area Connection” using NetSh? What are the commands?

Anonymous User (not verified)

usage of devcon to disable network adapter use the ‘hwids =net’ to find the compatible id for your adapter c:\devcon hwids =net PCI\VEN_8086 ?>

Amazon Virtual Private Cloud (VPCs) and Amazon RDS – Amazon Relational Database

#

Amazon Virtual Private Cloud (VPCs) and Amazon RDS

There are two Amazon Elastic Compute Cloud (EC2) platforms that host Amazon RDS DB instances, EC2-VPC and EC2-Classic. Amazon Virtual Private Cloud (Amazon VPC) lets you launch AWS resources, such as Amazon Relational Database Service (Amazon RDS) DB instances, into a virtual private cloud (VPC).

When you use an Amazon VPC, you have control over your virtual networking environment: you can select your own IP address range, create subnets, and configure routing and access control lists. The basic functionality of Amazon RDS is the same whether your DB instance is running in an Amazon VPC or not: Amazon RDS manages backups, software patching, automatic failure detection, and recovery. There is no additional cost to run your DB instance in Amazon VPC.

Accounts that support only the EC2-VPC platform have a default VPC. All new DB instances are created in the default VPC unless you specify otherwise. If you are a new Amazon RDS customer, if you have never created a DB instance before, or if you are creating a DB instance in a region you have not used before, you are most likely on the EC2-VPC platform and have a default VPC.

Some legacy DB instances on the EC2-Classic platform are not in a VPC. The legacy EC2-Classic platform does not have a default VPC, but as is true for either platform, you can create your own VPC and specify that a DB instance be located in that VPC.

This documentation only discusses VPC functionality relevant to Amazon RDS DB instances. For more information about Amazon VPC, see Amazon VPC Getting Started Guide and Amazon VPC User Guide.





Open source database software list #open #source #database #software #list

#

Databases

ArcGIS
ArcGIS is a GIS (Geographic Information Systems) for your desktop that comes with ArcEditor software, ArcGIS help system and Esri Data and Maps. You’ll have access to the ArcGIS Desktop Resource. Read more

EMS SQL Manager for MySQL 2007
SQL Manager for MySQL makes work with any MySQL database a simple task. No more need for command-line tool ‘mysql’. Everything can be controlled directly from within SQL Manager – all database. Read more

Evernote
Evernote provides a means to capture just about anything you would want to save whether it is notes to yourself, something you saw or heard or even just things that you like. It works with nearly. Read more

Filemaker Pro 9
Using Filemaker Pro users can easily and fast create databases – and even share them over the web. Customize the applications you build to get the look-and-feel you or your organization require. Once. Read more

Microsoft Access 2010
Microsoft’s versatile tool for creating database driven application – or simply just maintain your data. Even though Access has its own embedded database engine – it is also able to connect to other. Read more

Microsoft Active Directory
Microsoft Active Directory ships as a component of Windows Server. Active Directory lets you manage many different type of components in your enterprise e.g. users. Microsoft Active Directory. Read more

Microsoft Office Sharepoint Server 2007
Microsoft Office Sharepoint server (MOSS) runs on top of Windows Sharepoint Services (WSS), adding core features and and user web parts. Essentially, it’s a workflow engine and business intelligence. Read more

Microsoft SQL Server 2005
As backend for Microsoft products that require a database – Microsoft SQL Server is available to make integration and development simple and easy. SQL Server is today considered one of the top 3. Read more

Navicat
Navicat is a database management tool that lets users manage multiple databases on remote servers as well as local. Features include Unicode support, wizards for importing and exporting, batch job. Read more

Oracle Database 10g
Oracle Databases has been on the market for almost 30 years. This makes Oracle the most well-known commercial database company ever – and the many years of research and development has produced the. Read more

Oracle SQL Developer 1.1
Oracle SQL Developer is freeware product from Oracle for managing databases. It has a great graphical user interface (gui) which makes manipulating of data a simple task. Also browsing database. Read more

Quest Software Toad for Oracle
Toad is one of the most populare and widely used database development and administration tools. This feature-rich product is a must-have for everyone working with Oracle. Features include query. Read more

Sleepycat Berkeley DB 4.4
Berkeley DB is an embeddable database that allows you to add database functionality to your applications without having to manage a large Relational Database Management System (RDBMS). Also data is. Read more

Open source software

389 Directory Server
389 Directory Server (previously known as Fedora Directory Server) is an open source LDAP server with many advanced features and built for both high performance and reliability. The 389 Directory. Read more

Alfresco 2.1
Alfresco (Italian for “outdoors”) is an open source, less expensive alternative to Microsoft Office SharePoint Server. The plentiful ECM (enterprise content management) features of Alfresco rival the. Read more

Apache Derby
Apache Derby is an open source relational database – part of the Apache DB Project. Derby is written in java and is ideel for embeddable due to its small memory footprint. Derby supports SQL storing. Read more

Apache Directory Server
Apache Directory Server is an open source LDAP directory server implemented in java. It provides an excellent back-end database for managing users, network resources and more. The architecture is. Read more

Firebird 2.0.1
Firebird is a relational database based on source code that Inprise (now Borland) release as open source. Many features from the ANSI SQL standard are included making Firebird easy to work with if. Read more

Glom
Glom is an advanced database system and user interface designer with lots of high-level features. Its advantages include its simplicity and nearly no programming requirements. Loosely based on. Read more

HeidiSQL
HeidiSQL is a brilliant, small and simple open source SQL tool for MySQL databases. It does exactly what you expect it to – and a few extra things. Downloading, installing and configuring is very. Read more

HSQL Database Engine
HSQL Database Engine or just HSQLDB is an open source java database engine for embedding into your applications. As the name indicates HSQLDB supports SQL making it very flexible when it comes to. Read more

Ingres 2006 Community Edition
For many years Ingres has been a well-known names in the database business. Now it is available as open source. Ingres is a high performance and highly scalable database systems, which also features. Read more

Kexi 2.2
Kexi strives to be a rapid application development (rad) tool for database driven development. Use Kexi to quick design forms to access and create your data – just as any full features application. Read more

MindTouch Core 9
MindTouch is the Web’s most popular commercially supported wiki platform for creating content and mashups using a wiki interface. The free, open source application is an easy to use program. Read more

MySQL 5.0
Increasingly growing market shares caused by a good reputation and of course the fact that it is completely free of charge – makes MySQL the most widely deployed open source database. For most web. Read more

NeverNote
Nevernote was created in response to popular demand of Linux users. A clone of Evernote, it was originally intended for Linux but can also run on Windows. Nevernote is a note-saving program that. Read more

OpenOffice Base 3.0
Maintain your databases or create new ones. Base either connects to your existing database engine – or your can use its built-in HSQL database. For beginners Base offers wizards to help create forms. Read more

PostgreSQL 8.3
PostgreSQL is a relational database system (RDBMS). Considered one of the most advanced open source databases on the market – PostgreSQL is a tough competitor for the top commercial database. Read more

Quantum GIS
Quantum GIS (QGIS) is a geographical information system (GIS) that works with many platforms and with other commercial software packages. It has all of the common GIS functions and features. Its. Read more

SQLite 3.3.17
SQLite is an open source embeddable database engine written in C. It provides all of the standard features you would normally find in any commercial SQL database product – such as SQL, transaction. Read more

SQLTools 1.4.1
SQLTools is an open source tool for Oracle database development. It is a small and light weighted tool which also aims at being fast and responsive. SQLTools’ powerful editor has many features to. Read more

SQuirreL SQL Client
Relational Database Systems can make life difficult, especially when working with multiple databases. Squirrel is an open-source SQL Client that will help you solve database problems with its. Read more

TOra 2.0
TOra is an open source database administration and sql tool for Oracle. With TOra you can perform virtually any administrative task on your Oracle database servers – anything from user and security. Read more





Your Data #cloud #database

#

Oracle Database Cloud

Extract More Value from Your Data with Oracle Database Cloud

Data is one of your most valuable assets. Yet it presents its own set of challenges. The volume and velocity of data growth—as well as the increasing complexity of data management—place crushing demands on traditional data centers.

Oracle Data Management Cloud delivers the most complete, secured, and highly optimized enterprise-scale data management solution enabling organizations of all sizes to easily migrate and deploy workloads to the cloud. True hybrid cloud architecture ensures 100 percent compatibility. A single-vendor cloud experience provides complete data management.

Your Data. Your Choice.

Whether you are developing applications, extending your data center to the cloud, or implementing a big data strategy, Oracle data management cloud services give you instant access to highly secured, massive cloud scalability, to drive faster innovation and proven cost savings. Preserve your database investment with 100 percent compatibility cloud migration.

Explore the resources on this page to learn how easy it is to get started with data management on Oracle Cloud.

Your Oracle Database in the cloud.

Migrating Your Oracle Database To Oracle Cloud

Oracle understands that everyone’s path to the cloud is different, so we offer a variety of options to reach your goal. Discover the many advantages and options for moving your database and applications to the cloud while learning what sets Oracle apart from other cloud providers.

Cloud Data

– Manage the massive data growth of the new digital economy

– Scale your infrastructure to meet your business needs

– Meet service demands for secured data delivery from anywhere

Oracle Database Cloud offers comprehensive data-management solutions that empower you to deliver more value at the speed of business demand.

Oracle Database Cloud


  • Innovations

    – Rapid provisioning of database instances for DevTest

    – Instant access to optimized database cloud infrastructure for enterprise workload deployment

    – Access to all Oracle Database innovations such as Oracle Database In-Memory, Oracle Multitenant, and Oracle Real Application Clusters

    – Highly available and secure architecture for consistent, on-demand, resources

    – 100 percent compatibility with on premises for true hybrid cloud deployment

    – Access to other data management cloud services to support any data type

    Database Innovations

  • Migration

    – Eliminate hardware costs and management headaches

    – Leverage elastic resources for faster support of peak periods and better cost utilization during off periods

    – Leverage existing skills with a cloud platform that offers the same experience as on-premises deployments

    – Move between on premises and the cloud in minutes

    – Benefit from 100 percent application compatibility

    Cloud-Based Database

  • DevTest

    – Get access to a web-development environment with Oracle Application Express, or use Java through the Oracle Java Cloud Service

    – Gain the ability to link other preferred development environments as necessary

    – Easily connect to Oracle Database Cloud Service

    – Leverage application specific migration tools and a single console for hybrid cloud

    DevTest Applications

  • Unmatched Performance

    Accelerate innovation with unmatched database performance and rapid cloud scaling. Fully optimized cloud infrastructure supports any-size workload, empowering companies of all sizes to easily adopt data management in the cloud. This high-availability infrastructure can power the most demanding OLTP and analytics operations. Proven high availability ensures business continuity.

    • Video: Oracle’s Larry Ellison Keynote at Oracle OpenWorld 2016 (56:18)
    • Solution brief: Oracle Cloud Beats Amazon Web Services (PDF)
  • Solutions For Every Data Type

    Make an easy, seamless transition to the cloud with a single-vendor cloud experience. Oracle Data Management Cloud supports all data types, including SQL, NoSQL, and Hadoop, as well as workloads of any size. Data warehousing, OLTP, and big-data solutions enable everyone in your organization—from developers to data scientists —to unlock the value in their data.

    • Solution brief: Oracle Database Cloud 12.2 (PDF)
    • Video: The Industry’s Most Comprehensive
      Data Management Cloud (5:24)

    Automated Cloud Tooling, Simplified Migration, and Management

    Oracle Database workloads are 100 percent compatible—on premises or in the cloud. No code changes required. Fully configured database instances can be provisioned in a few clicks to deliver immediate access to all database options and features. Simplified migration and automated cloud tooling further streamline data management. With Oracle Data Management Cloud, you have visibility across your entire IT estate so you can easily manage hybrid cloud environments.

    • IDC report: Integrated Cloud-Based Monitoring and Analytics Break Down IT Operations Silos

    We selected Oracle Database Cloud Service over Microsoft because only Oracle provides the most cost-effective and optimized platform for our existing Oracle Database users. We have reduced computing resources by four times and enhanced the reliability of our critical library automation system (LAS) to support future growth.

    Taeseok Lee, CEO, Dodream System

    We anticipate that moving our entire IT environment to Oracle Cloud will have an incredible impact on our business model in many ways, including our ability to serve our clubs and their members.

    Patrick Benson, CIO, ClubCorp.

    Oracle platform as a service and Oracle infrastructure as a service were natural choices as far as moving to the cloud and the move was easy. The ease in moving between on-premises solutions—Oracle and third-party offerings—and Oracle Cloud ensured a smooth migration.

    Dan Goerdt, President, Flexagon

    We selected Oracle Database Cloud Service over other vendors, such as Amazon and IBM, because nothing is better than Oracle managing its own databases. We could also easily migrate the existing database license to Oracle Database In-Memory 12c and minimize capital expenditure.

    Pramod Gokhale, CIO, Mankind Pharma





    Electronic Data Capture – Clinical Trial Management Software #electronic #data #capture #software,

    #

    Electronic Data Capture (EDC) and data management for Clinical Trials and other research studies.

    • Advanced, flexible with powerful features
    • Capture data from any device
    • Customization components, wide range of data entry options
    • Integration with any other software through ODM standards
    • Create your own professional questionnaires
    • Complete control over your studies with query management and custom reporting

    More info

    Dacima’s Clinical Trial and Epidemiological Research data management software offers innovative solutions designed to streamline data collection, enhance your data management and improve data quality.

    Dacima Clinical Suite is the most advanced and flexible Electronic Data Capture system. Our user-friendly and flexible web Electronic Data Capture (EDC) software application allows you to easily tailor the clinical database and interface to meet the requirements of your research study, making it ideal for a wide range of medical research study designs, including clinical trials, patient registries, observational study designs, web surveys, electronic Patient Reported Outcomes (ePRO), post-marketing studies and administrative databases.

    With its many features and capabilities and an easy-to-use designer interface you can create database without the need for programming expertise. Dacima offers the most powerful, flexible and user-friendly EDC software on the market.

    Dacima Software offered us a solution tailored to our unique needs Université de Montréal

    Dacima Software provided us with a cost-effective and easy to use data management platform for our clinical trials Jewish General Hospital

    Control, ease of use and cost — DACIMA provided a one-stop solution for our clinical data collection BioIntegral Surgical

    Look what clients are saying about us and our software!

    Large probability for errors

    EDC With Dacima

    Traditional E DC

    Easy-to-use but limited capabilities

    Limited edit checks

    Focus on Clinical Trials

    EDC Without Dacima

    Dacima Clinical Suite

    Save time and money now!

    Intuitive design and advanced features

    Customizable to your needs!

    Real-time edit checks





    Understanding SQL Server Backup Types #backup #database #sql #server

    #

    Understanding SQL Server Backup Types

    Applies to: SQL Server 2000, SQL Server 2005

    Database backups are at the core of any SQL Server disaster recovery planning for any production system. Backups may be used to provide a means of recovery to a point-in-time when the database was last operational. Microsoft® SQL Server™ provides several types of backups that may be combined to formulate a customized disaster recovery plan depending on the nature of the data and the recovery requirements. It is highly recommended that all SQL Server databases be backed up periodically.

    SQL Server backup media

    A database may be backed up to disk or to tape. The examples in this article assume a disk backup directly into a disk file (as opposed to a disk backup device). Any database can be backed up to a random disk file at any time. The file may either be initialized (using WITH INIT) or appended with the new backup.

    Types of backups in SQL Server

    SQL Server provides several different kinds of backups including Complete. Differential. Transaction Log. andFile(s) and Filegroup(s) backup. A combination of these backups may be used to formulate a robust disaster recovery strategy. The following paragraphs explain each SQL Server backup type

    Complete database backup

    A complete database backup creates a stand-alone image of the entire database. A complete database backup is self-dependent and may be restored to either the same or a new database on the same or a different server. This provides plenty of flexibility at the time when this backup has to be restored. A complete backup may be restored without the need for any other kind of backup. It may also be performed for databases in any recovery model. Restoring a complete database backup typically would be considered a starting point for a disaster recovery situation where the entire database is lost or damaged. It is recommended that a complete database backup be performed at regular intervals for all production databases. It is also recommended that a complete backup should be performed for system databases if there are any changes performed to the SQL Server operating environment such as creating or removing databases, configuring security, creating and modifying DTS/SSIS packages or scheduled jobs, adding and removing linked servers, etc.

    BACKUP DATABASE Northwind
    TO DISK = c:backupsnorthwind.bak
    WITH INIT

    Restore syntax (Same database)

    RESTORE DATABASE Northwind
    FROM DISK = c:backupsnorthwind.bak

    Restore syntax (New database and/or server)

    RESTORE DATABASE Northwind_new
    FROM DISK = c:backupsnorthwind.bak
    WITH MOVE northwind TO c:new_locationNorthwind_new.mdf
    MOVE northwind_log TO c:new_locationNorthwind_new_log.ldf

    Differential database backup

    A differential backup backs up only modified extents since the last complete backup. An extent is a group of 8 data pages each consisting of 8 KB (64 KB in total). By definition, differential backups are cumulative. The most recent differential backup contains all changes from all previous differential backups performed since the most recent complete database backup. Differential backups may be considered as an alternative for databases that are large and are modified infrequently. These would include data warehouse type of databases. Differential backups have several limitations including the following:

    • They do not provide point-in-time restore capabilities
    • They may only be restored after a complete database backup is restored
    • They may not be performed on the master database

    BACKUP DATABASE Northwind
    TO DISK = c:backupsnorthwind_diff.bak
    WITH INIT, DIFFERENTIAL

    Restore syntax (Same database Note that a complete database backup is restored first using WITH NORECOVERY)

    RESTORE DATABASE Northwind
    FROM DISK = c:backupsnorthwind.bkp
    WITH NORECOVERY

    RESTORE DATABASE Northwind
    FROM DISK = c:northwind_diff.bkp
    WITH RECOVERY

    Transaction log backup

    An SQL Server database consists of two components: data file(s) and transaction log file(s). A transaction log captures the modifications made to the database. A simple transaction may place several records in the transaction log. Each of these records is known as a log record and is assigned a unique identification number known as the log sequence number (LSN). Log records that belong to the same transaction are linked together through the LSN. If SQL Server service shuts down unexpectedly, upon restart the recovery process examines the entries in the transaction log and if there are transactions that have not been rolled forward completely, the recovery process rolls back the changes performed as part of these incomplete transactions. This operation is extremely important as it forms the basis of transactional recovery. Entries in the transaction log are also used if transactional replication is configured for the specific database.

    A transaction log backup backs up all transactions since either the previous transaction log backup, or the complete database backup if there have been no transaction log backups performed for the database in the past. This backup may then be used to apply the backed-up changes, in case disaster recovery is required. Transaction log backups may only be applied to a database in an unrecovered state. A database may be in an unrecovered state if it is being restored from a set of backups as part of a disaster recovery procedure, or if it is configured as a standby database on a warm backup server. A transaction log backup also truncates the inactive portion of the transaction log, unless the database is configured as a Publisher in transactional replication and there are transactions pending propagation to Subscribers.

    Each transaction log backup contains a First and Last log sequence number (LSN). Consecutive transaction log backups should have sequential LSNs for the boundary log records. These LSN values may be examined using the RESTORE HEADERONLY command. If LastLSN from the previously restored transaction log backup does not match the FirstLSN from the backup that is currently being restored, the restore operation fails with the following error: This backup set cannot be restored because the database has not been rolled forward far enough. You must first restore all earlier logs before restoring this log . If the above message is generated while restoring a particular transaction log backup, which is part of a set of transaction log backups that are to be restored, any attempts to restore further transaction log backups will fail with this message. There could be several reasons for consecutive transaction log backups being out of sequence. Some of the most common reasons noted from support experience have been:

    • The database recovery model has been changed to Simple and back to either Full or Bulk-Logged. Switching the recovery mode to Simple causes the transaction log to be truncated
    • Another transaction log backup was performed between the previous successfully restored backup and the one generating this message
    • The transaction log was manually truncated between the two backups
    • The database was in Bulk-Logged recovery model and non-logged operations were performed
    • Transaction log backups are not allowed for databases in Simple Recovery model. While in Simple Recovery model, a database’s transaction log is truncated every time a CHECKPOINT is invoked for the database

    Transaction log backups provide the possibility of performing a point-in-time restore or point-of-failure restore. You can also perform a restore to a named transaction with transaction log backups.

    BACKUP LOG Northwind
    TO DISK = c:backupsnorthwind_log_1.bak
    WITH INIT

    Restore syntax (Same database Note that a complete database backup is restored first using WITH NORECOVERY, then a sequence of transaction log backups)

    RESTORE DATABASE Northwind
    FROM DISK = c:backupsnorthwind.bkp
    WITH NORECOVERY

    RESTORE LOG Northwind
    FROM DISK = c:northwind_log_1.bkp
    WITH RECOVERY

    File(s) and Filegroup(s) backup

    Use BACKUP to back up database files and filegroups instead of the full database when time constraints make a full database backup impractical. To back up a file instead of the full database, put procedures in place to ensure that all files in the database are backed up regularly. Also, separate transaction log backups must be performed. After restoring a file backup, apply the transaction log to roll the file contents forward to make it consistent with the rest of the database.