Caché audits various systems events by default but additional ones can be enabled. User defined events can be audited as well but are added programatically.
Robert Nagle talks about some new capabilities of Caché as they relate to mobile development, deploying in the cloud, unlocking the potential of unstructured data, and big data analytics.
InterSystems Caché fully support MultiValue as a development platform. You can use your MultiValue (MV) skills and leverage existing MultiValue code as you create applications with rich web interfaces, advanced security and more.
Paul Grabscheid, InterSystems Vice President of Strategic Planning, explains why companies trust InterSystems as a key partner for technology innovation and market leadership.
Zen Reports is our reporting engine providing output to a browser, PDF or a spreadsheet. The report definition and display are defined to define the data and layout for the report.
Users and devices connecting to Caché or Ensemble must be authenticated to insure they are who they say they are. The Management Portal can be used to allow a variety of authentication methods as well as configure them for connectivity services.
Having set up resources and roles, users can be created and assigned to their appropriate roles. The roles for a given user define what assets they have access to and what their permissions are for those assets.
In securing your environment the first things that need to be created are resources and roles. Roles are a collection of resources and permissions providing privilaged access to assets.
A new namespace and two databases are created via the Management Portal. One database is used for code and the other is used for data. Dismounting and mounting of a database is also shown.
Once a user is authenticated, they are then authorized to access various assets. These assets are databases, connection services, system functions and user applications. Resources and roles are assigned to assets and users for authorization.
Memory allocation for global and routine buffers can be modified in the Management Portal. The use of the ^GLOSTAT utility helps provide guidence for proper allocation.
Resource based services control user access to Caché. Basic services control communication between Caché servers. Enabling these services permits appropriate communication and connection. Assign users to appropriate resources to allow connection.
The Vision for Breakthrough Applications: A breakthrough application has three aspects: mass personalization; unlocking the data; and driving intelligent action.
System administration and management functions for Caché and Ensemble are available via the web based Management Portal. This video presents an introduction to the options available in the Management Portal.
Web, client and privileged routines can escalate the roles of a user once they are authenticated and assigned their initial authorization. This minimizes initial privileges and gives the application complete control over who can use it.
InterSystems has been dealing with big data in various forms for years. The multidimensional data structures enable enterprises to handle big data without completely re-architecting their database or giving up SQL data access.
There are two types of journaling built into Caché and Ensemble to help insure data integrity. The Write Image Journal and database Journaling protect the integrity of your data from both a Caché and application perspective.
In addition to resources, roles and users, SQL privileges can be assigned to users for the tables in a namespace. These privileges can be assigned to columns and rows in a table as well as their views and procedures.
Iran Hutchison shares his experience with successful Big Data implementations (European Space Agency & Credit Suisse), discusses breakthrough technology behind these initiatives and offers the Top 5 Considerations to define and execute your strategy
Data and code can be stored in separate databases. Mapping allows a namespace to have access to globals, routines and packages in a variety of databases.
Each page of the Management Portal is secured with an administrative resource. Users must have Use permission to the appropriate resource to view the page. Custom resources can be assigned to pages to further secure them.
Encryption protects data at rest. Entire databases or specific data elements can be encrypted using AES. Encryption key management is crucial to properly securing and using encryption keys.
Vik Nagjee, InterSystems Product Manager for Core Technologies, talks to Bill Laberis of IDG about what InterSystems is doing to help our customers deploy applications based on our technologies in the cloud.