3. 1. Consolidation with Pluggable Databases
3. Redaction Policy
4. In-Memory Options
Top N Query and Fetch and offset
Replacement to Rownum:
Adaptive Query Optimization and
Online Stats Gathering
Overview
2. Inline PL/SQL Functions and Procedures
5. Size Limit on Varchar2, NVarchar2, Raw Data
Types increased
4. 6. Size Limit on Varchar2, NVarchar2, Raw Data
Types increased
7. Inline PL/SQL Functions and Procedures
8. Generated as Identity/Sequence
Replacement
9. Indexes on a Single Column.
10. Online Migration of Table Partition or
Sub Partition
11. Temporary UNDO
12. In Database Archiving
Overview
(continued)
5. “In the real world, security is an afterthought, and many
companies don't make security a priority during their rush
to the market. This is especially true for distributed Oracle
databases.
Some reasons that security is inconsistent (or lacking) for
distributed Oracle databases include:
• Corporate acquisitions
• Lack of corporate standards
• Departments who design systems independently”
Oracle Tips by Burleson Consulting
6. What is a Database?
Data is now a critical differentiator in
nearly every industry.
Organizations on the leading edge of data
management are able to achieve greater
profitability by having:
faster decision-making,
deliver breakthroughs in performance
enhanced security
7. “Oracle Database users can take heart
in knowing that the technology to
which they are committed is
developing aggressively in the right
direction.”
Carl W. Olofson,
Research
Vice President, IDC
8. “Enterprises need to protect vital data
for their critical business applications in
real time without the downtime or data
loss often experienced when using
traditional approaches," said
Laura Dubois, Program Vice President
for IDC's Storage
9. Oracle is doing every thing to jump into the cloud
using these features:
Upgraded
Patched
Monitored
Tuned
RAC Enabled
Adjusted
Backed up
Data Guarded.
1.) Pluggable Databases Through Database
10. 2.) Redaction Policy:
• Data Redaction in simple terms means,
masking of data.
• The new data masking will use a package
called DBMS_REDACT. It is the extension
to the FGAC and VPD present in earlier
versions.
13. A Revolution in Data Management
Oracle Database 12c multitenant container
hosting and manage hundreds of pluggable
databases to dramatically reduce costs and
simplify administration.
• Oracle Database 12c also includes in-memory
data processing capabilities delivering
breakthrough analytical performance to power
the real-time enterprise.
42. Maximize Database Storage Efficiency
Maximize Database Storage Efficiency with
Automatic Data Optimization
• Maximize storage utilization, reduce costs,
and improve performance automatically.
• Automate storage compression and
storage tiering with the Heat Map and
Automatic Data Optimization features in
Oracle Database 12c.
• Reduce storage requirements by 50
percent or more while improving query
performance.
45. 5.) Size Limit on Varchar2, NVarchar2, Raw Data
Types increased
The previous limit on these data types
was 4K. In 12C, it has been increased
to 32,767 bytes. Up to 4K, the data is
stored inline.
I am sure everyone will be happy with
this small and cute enhancement.
46. 06. Restore a Table easily through RMAN
Earlier if you had to restore a particular
table, you had to do all sorts of things like
restoring a tablespace and or do Export
and Import.
The new restore command in RMAN
simplifies this task.
47. 7.) Inline PL/SQL Functions and Procedures
The query can be written as if it is calling a real
stored procedure, but however the functions
do not actually exist in the database
Views
Procedures
Function
48. 8.) Generated as Identity/Sequence
Replacement
Creating a separate sequence and
doing a sequence.nextval for each row
49. 09. Multiple Indexes on a Single Column
B-tree index as well as a Bit Map index
Privileged user accounts and over
privileged applications
50. 10.) Online Migration of Table Partition
Easily migrate a partition or sub partition
from one tablespace to another
When an ONLINE clause is specified, all
DML operations can be performed
without any interruption on the
partition/sub-partition which is involved
in the procedure.
51. 11. Temporary UNDO:
SQL> ALTER SYSTEM SET
PGA_AGGREGATE_LIMIT=2G;
SQL> ALTER SYSTEM SET
PGA_AGGREGATE_LIMIT=0; --disables the
hard limit
Prior to 12C, undo records generated by
TEMP Tablespace is stored in the undo
tablespace
52. 12. In Database Archiving
This feature enables archiving rows within a
table by marking them as inactive.
These inactive rows are in the database
and can be optimized using compression
but are not visible to the application. These
records are skipped during FTS (Full Table
Scan)
What's New?
Consolidating databases into mixedworkload environments that both run analytical queries and
process OLTP transactions.
There is a radical change and a major change in the core database architecture through the introduction of Container Databases also called CBD and Pluggable Databases (PDB).
The memory and process is owned by the Container Database. The container holds the metadata where the PDBs hold the user data. You can create up to 253 PDBs including the seed PDB.
With Pluggable Databases feature, you just have to do all this for ONE single instance. Without this feature, prior to 12C, you would have to create separate schemas and there is always a threat of security how much ever the isolation we build into it. There are problems with namespace conflicts, there is always going to be one public synonym that you can create. With PDBs you can have a separate HR or Scott schema for each PDB, separate Emp, Dept Tables and separate public synonyms. Additionally, 2 PDBs can talk to each other through the regular DB Link feature. There is no high startup cost of creating a database any more. Instead of one instance per day, the shift is into one instance per many databases. For the developer community, you can be oblivious of all this and still continue to use the PDBs as if it were a traditional database, but for the DBAs the world would look like it has changed a lot.
Another cool feature is, you can allocate a CPU percentage for each PDB.
Data Redaction in simple terms means, masking of data. You can setup a Data Redaction policy,
Example SSN field in a Employee table can be masked. This is called redaction. From SQL Develop you can do this by going to the table: Employee->Right click on Security Policy->click on New->click on Redaction Policy->Enter SSN. When you do a select * from employee, it will show that the SSN is masked.By doing this, whoever needs to view the data will be able to see it where as the other users will not be able to view it.
Enterprises are always looking to make business decisions more quickly to drive higher profits and maintain a competitive advantage.
What are the goals for in memory databases?
Oracle’s new Oracle Database In-Memory column store accelerates database queries and enables businesses to make better and faster decisions.
Most in-memory database ask that you run queries to get your data
Oracle’s unique approach speeds up analytics, data warehousing, and reporting workloads with almost no effort. Queries 3xs faster!
Existing applications automatically and transparently take advantage of in-memory processing without requiring any changes and without losing any existing Oracle Database capabilities.
Install in-memory option with ease. All application will run faster with no treaking or modification. Running Queries and Transaction slower!faster!
With the blazing speed of Oracle Database In-Memory, the manual effort and storage cost needed to build analytic indexes can now be eliminated.
The traditional audit commands available in previous releases continue to be supported in Oracle Database 12c.
Memory is much cheaper makes sense to use more
Memory is being used in place of hard-drive space queries and enables businesses to make better and faster decisions.
Physically organize the data in rows for transitions for sales orders.
First, database objects need not fit entirely in memory. Oracle Database allows the use of mixed storage tiers for balancing optimal performance with cost-efficiency
Oracle’s new Oracle Database In-Memory option column store accelerates database queries and transactions with in memory processing.
Rows organize data well for transaction. Read them and add them up.
Analytics are organized by column and report writing with millions of rows of data.
The magic of Oracle is data is in-memory option does both stored in rows and columns.
Enterprises are always looking to make business decisions more quickly to drive higher profits and maintain a competitive advantage.
Customers report 1-2-3 orders of magnitude improvement data improvement processing.
Oracle’s new Oracle Database In-Memory option column store accelerates database queries and transactions with in memory processing.
Row format is absolutely unchanged.
Why is OLTP faster?
On disk queries are loaded to cache as columns and rows compressed 10 to 20 times.
Column format is not logged.
CPU will scan billions of rows per second sometimes called vector instructions. These were originally designed for scientific purposes and now used for graphics. 32 processors 2.5 billion rows per core per processor. With 32 terabytes of memory. OLTP runs faster column format is unchanged?
CPU will scan billions of rows per second sometimes called vector instructions.
These were originally designed for scientific purposes and now used for graphics. 32 processors 2.5 billion rows per core per processor. With 32 terabytes of memory.
OLTP runs faster column format is unchanged?
Different techniques to do different things but much, much faster!
Database administrators and application developers need not rewrite, rebuild, or migrate their
applications.
Oracle Database In-Memory powers the real-time enterprise, unleashing new levels of
competitiveness and profitability by enabling them to make data-driven decisions, respond instantly to customer demands, and continuously optimize key processes
Second, all of Oracle Database’s industry-leading data management, availability, and security features remain fully in operation.
This means any existing Oracle Database–compatible application automatically and transparently benefits from columnar in-memory processing without additional programming or application changes.
Database administrators and application developers need not rewrite, rebuild, or migrate their applications.
Speed up updates by dropping analytic indexes with both row and column processing
No more predefining cubes
No more anticipating every query
Complexed OLTP database will have a purchase order in an indexed column.
Not just OLTP databases they are analytic databases
Insert P.O. into table
Insert and update several indexes is very costly. Version 12c drops analytic indexes and inserts, updates, and transition will run much, much faster!
Oracle could always build columnar database but it was slow
How to speed it up?
Complexed OLTP sometimes has 20 or 30 indexes.
Throw all the query processing away.
Maintaining analytic indexes are very costly. When you have both row and column this can be accomplished and speeds up updates by dropping analytic indexes.
Existing applications automatically and transparently take advantage of in-memory processing without requiring any changes and without losing any existing Oracle Database capabilities.
Column store is not logged it is cached.
In-memory column store is not persistent it is a cache there is no cost eventually you will have to do a reorganization
Some In-Memory databases that you load all your data in memory.
Oracle only loads the active part of database in memory in memory.
Keeps active part in memory-it is smart.
Column store is a cache
Speed of memory but the capacity of disk
Economical
Scalable
Fast
Memory hierarchy that manages memory economical, scalable, a lot of flash memory.
Xadata machine is crazy fast with real application clusters spread it across the different rack nodes. 32 trillion bytes of data 3 terabytes per second
Oracle Exadata Database Machine is the first and only database machine that provides extreme performance for both data warehousing and online transaction processing (OLTP) applications, and is an ideal platform for consolidating database workloads in the cloud and in the data center.
Availability to data is always a must
Reliability
Managability
Queries process in memory very fast OLTP
Column data is unchanged in column format
It works and simplifies data ware housing, transaction processing, queries.
Copies of column cache in at least two nodes.
Oracle Database In-Memory’s fault tolerance feature eliminates the risk of this degradation by optionally mirroring data across the servers of a cluster. Just as storage subsystems stripe and mirror data across disks to achieve high performance and high availability,
Oracle Database In-Memory distributes and duplicates in-memory data across the servers of a cluster. If a server fails, queries transparently start using redundant copies of the data
stored in the memory of surviving servers.
In downtime Oracle comes out and will fix the database.
Some In-Memory databases that you load all your data in memory.
CPU will scan billions of rows per second sometimes called vector instructions.
OLTP runs faster again because of row and column format.
Complex data integration, tuning, and index building
operations are eliminated.
How much running in memory?
How much column cache?
Multi node reliability and the only relational database that is!
Column data is unchanged in column format
Just like concern around my family’s education and values, a secure organization means that the people, the first line of defense against many of today’s risks, understand the long term implications of their actions and make the right choices
Take your pick local area, broadband, and wide area networks allow for a multitude of entertainment and communication wants and needs. Deploying multiple layers of security which are applied to a data storage environment, then intruders will have more difficulty accessing data and compromising the first layer of multi-layer environments.
***Database security is a set of established procedures, standards, polices, and tools that are used to protect data from theft, misuse, and unwanted intrusions, activities, and attacks. Data security deals with deals with permission and access to data structure and the data contained within it.
Some In-Memory databases that you load all your data in memory.
CPU will scan billions of rows per second sometimes called vector instructions. These were originally designed for scientific purposes and now used for graphics. 32 processors 2.5 billion rows per core per per processor. With 32 terabytes of memory. OLTP runs faster column format is unchanged? To analyze
I don’t think it ran.
It’s broke!
Bank ran a query that never finished!
Some In-Memory databases that you load all your data in memory.
CPU will scan billions of rows per second sometimes called vector instructions. These were originally designed for scientific purposes and now used for graphics. 32 processors 2.5 billion rows per core per per processor. With 32 terabytes of memory. OLTP runs faster column format is unchanged? To analyze
4.) Users are the weakest component within any security architecture. Mistakes happen and, far too often, users do not follow written policies as they should.
The following four different attributes of passwords can be enforced in almost every database server:
Complexity— A policy can be created that identifies the required length and character type combination (e. g., number, letter, uppercase, lowercase, symbols) of a password. It also determines whether a user can use common or dictionary words.
Failed attempts— A password that has been attempted too many times without avail can be an indication of an intruder. Therefore, it is best to lock an account that has had too many failed password attempts. The number of failed password attempts and the way in which these are handled can be identified as part of the password policy.
Finding journal entries to close month end books
A three-tier architecture is a client-server architecture in which the functional process logic, data access, computer data storage and user interface are developed and maintained as independent modules on separate platforms.
Three-tier architecture is a software design pattern and a well-established software architecture.
The three tiers in a three-tier architecture are:
Presentation Tier: Occupies the top level and displays information related to services available on a website. This tier communicates with other tiers by sending results to the browser and other tiers in the network.
Application Tier: Also called the middle tier, logic tier, business logic or logic tier, this tier is pulled from the presentation tier. It controls application functionality by performing detailed processing.
Data Tier: Houses database servers where information is stored and retrieved. Data in this tier is kept independent of application servers or business logic.
Oracle Advanced Compression Advisor is a free tool included with Oracle Database that provides you with an estimate of the compression ratio you’ll realize when you use Oracle Advanced
Compression.
Oracle Advanced Compression Advisor analyzes sample data you provide to estimate the actual results you’ll see when you use OLTP table compression in your environment.
Making storage one of the costliest elements of today’s IT budgets
IT organizations are adopting advanced database technologies that automate compression and storage tiering to scale with the growth of data volume while also improving database performance.
Automatic Data Optimization uses this information to automate compression and storage tiering
according to user-defined policies.
Oracle Advanced Compression can compress all types of data—including relational (table) data, unstructured (file) data, network data, and backup data
As companies adjust their organizational structure to meet new or rapidly evolving business needs, they need to ensure that employee access to information complies with their specific roles and responsibilities.
Example, large enterprises, will use the role of database administration and security administration ideally separated.
Prior to 12C, a column cant be in more than one index. In 12C, you can include a column in B-tree index as well as a Bit Map index. But, please note that only one index is usable at a given time.
The query can be written as if it is calling a real stored procedure, but however the functions do not actually exist in the database. You will not be able to find them in ALL_OBJECTS. I think this will be a very good feature for the developers to explore as there is no code that needs to be compiled.
The query can be written as if it is calling a real stored procedure, but however the functions do not actually exist in the database. You will not be able to find them in ALL_OBJECTS. I think this will be a very good feature for the developers to explore as there is no code that needs to be compiled.
Also called No Sequence Auto Increment Primary Key
You can now create a col with 'generated as identity' clause. Thats it. Doing this is equivalent to creating a separate sequence and doing a sequence.nextval for each row. This is another handy and a neat feature which will help developer community. This is also called No Sequence Auto Increment Primary Key.
Prior to 12C, a column cant be in more than one index. In 12C
But, please note that only one index is usable at a given time.
Similar to how the online migration was achieved for a non-partitioned table in prior releases, a table partition or sub partition can be moved to another tablespace online or offline. When an ONLINE clause is specified, all DML operations can be performed without any interruption on the partition|sub-partition which is involved in the procedure. In contrast, no DML operations are allowed if the partition|sub-partition is moved offline.
HTTP includes eight predefined actions that can be performed on a resource during the request or a response from a server: HEAD, GET, POST, PUT, DELETE, TRACE, OPTIONS, and CONNECT.
Error-based SQL injection Invalid SQL statements are supplied to the affected parameter in the HTTP request. The tool then monitors the HTTP responses for error messages that are known to have originated at the database server.
Oracle can be used regardless of whether the application is a 3 tier or traditional 2 tier applications, including stand-alone client-server applications.
Using RAS, applications do not have to develop their own access control policy infrastructure within the database. Administration of access control policies is separated from the actual program code, enabling flexibility and extensible.
Oracle Real Application Security unifies database and application-specific access control models by making it possible to define and use application-specific privileges, users, and roles within the database.
In addition, it provides the much needed application authorization functionalities in the database and a uniform administration model for access control policies on data.