InterSystems has been dealing with big data in various forms for years. The multidimensional data structures enable enterprises to handle big data without completely re-architecting their database or giving up SQL data access.
There are two types of journaling built into Caché and Ensemble to help insure data integrity. The Write Image Journal and database Journaling protect the integrity of your data from both a Caché and application perspective.
In addition to resources, roles and users, SQL privileges can be assigned to users for the tables in a namespace. These privileges can be assigned to columns and rows in a table as well as their views and procedures.
Iran Hutchison shares his experience with successful Big Data implementations (European Space Agency & Credit Suisse), discusses breakthrough technology behind these initiatives and offers the Top 5 Considerations to define and execute your strategy
Each page of the Management Portal is secured with an administrative resource. Users must have Use permission to the appropriate resource to view the page. Custom resources can be assigned to pages to further secure them.
Vik Nagjee, InterSystems Product Manager for Core Technologies, talks to Bill Laberis of IDG about what InterSystems is doing to help our customers deploy applications based on our technologies in the cloud.
Joe DeSantis, VP of Development, shows notable features of HTML5 and CSS3, including new input fields, borders, shadows, transitions, media queries (with device-specific styling), local storage, graphics tools (both SVG and canvas), and more.
External backup is the recommended approach. Existing system backup can easily be expanded to include a Caché backup of all appropriate diretories. Restore procedures will vary based on how the backup was done and what is needed to restore.
Product Manager Ray Fucillo discusses various methods of providing high availability and the trade-offs between costs, ease of configuration and management, and the level of availability that can be expected.
To stay current with the latest operating systems and technologies, you must plan for some amount of downtime to do upgrades. But how much? Sales Engineer Steve Mallam outlines how to minimize the amount of downtime.
Caché maintains several logs providing information about your system and application health. Console log, Application Software Log and SYSLOG are all configurable and viewable via the Management Portal
Sometimes disaster strikes. Most organizations have systems and architectures in place that enable them to recover their valuable data. Product Manager Ray Fucillo outlines some schemes for disaster recovery and discusses the pros and cons of each.
Zen, our Web 2.0 component based development framework is introduced. Using industry standards AJAX, JSON, REST, Java Script and HTML5, Zen provides a dynamic way of building web pages using Caché security and server-side call backs.
Users and devices connecting to Caché or Ensemble must be authenticated to insure they are who they say they are. The Management Portal can be used to allow a variety of authentication methods as well as configure them for connectivity services.
This session will show you how to generate and apply Security Policies in Caché. It is strongly recommended that you watch Introduction to WS-Policy and Web Services Security before this session. This session includes information on WSDL.