Skip to content

Software Development News: .NET, Java, PHP, Ruby, Agile, Databases, SOA, JavaScript, Open Source

Methods & Tools

Subscribe to Methods & Tools
if you are not afraid to read more than one page to be a smarter software developer, software tester or project manager!

Database

Oracle Introduces New Cloud Services for Hotels and Casinos

Oracle Database News - Wed, 01/27/2016 - 14:00
Press Release Oracle Introduces New Cloud Services for Hotels and Casinos New Oracle Cloud services enable hotels, casinos and other hospitality companies to personalize and improve the guest experience while making operations more efficient

Redwood Shores, Calif.—Jan 27, 2016

To help hospitality companies personalize all aspects of their engagement with customers while also delivering an excellent guest experience on site, Oracle today introduced a cloud services version of its industry-leading suite of hospitality solutions. The new Oracle Hospitality cloud services enable hotel and casino operators to better manage every aspect of their customer relationships and on-site operations, while simplifying their IT infrastructure and deriving value faster from new innovations.

“To win in the highly competitive hotel industry, hotels need to deliver personalized guest experiences, increase operational efficiency, and effectively manage distribution,” said Ray Carlin, vice president of product strategy, Oracle Hospitality. “Oracle’s cloud-based solutions bring significant advantages in all these key areas, while at the same time streamlining on-premise IT management and offering enhanced application and data security built in.”

Oracle’s hospitality-focused solutions, combined with its broader product and service offering, are used by hundreds of thousands of operators worldwide to provide superior service and experience to their guests anywhere. By delivering its full suite of solutions via the Oracle Cloud, Oracle is making it easier for hospitality companies of all sizes to implement new features and business functionality faster and dramatically simplify the IT infrastructure required to deliver a world-class customer experience at hotel and casino properties around the globe.

Oracle OPERA Cloud services build upon Oracle’s commitment to develop cloud-enabled versions of its most powerful applications.  The cloud services streamline and improve most aspects of hospitality management including:

  • Deliver exceptional guest experiences: With Oracle OPERA Cloud’s comprehensive guest profiling capability, hotels can capture the guest preferences they need to personalize and differentiate the guest experience. Personalized experiences will enhance guest loyalty and drive membership growth in loyalty programs.
  • Mobile-enable hotel operations: Oracle OPERA Cloud runs on Oracle MICROS tablets and other leading tablets and smart phones to allow hotel personnel greater flexibility to provide guest services anywhere on the property.
  • Secure enterprise data: Oracle OPERA Cloud runs Oracle’s technology stack from applications to disk, with unprecedented security, high performance and availability.
  • Maximize occupancy and revenue: Maximize sales with the Oracle Distribution Cloud, an add-on suite of services that allows hotels to effectively manage room rates and allocation of room inventory to various distribution channels.
  • Integrate food and beverage operations: Oracle OPERA Cloud comes with pre-built integration to Oracle Hospitality Simphony, the leading point-of-sale solution for the food and beverage industries.
  • Innovate faster: Deliver service innovations, enable easier upgrades and drive business process improvements by simplifying information technology infrastructure.
  • Integrate with enterprise applications and property infrastructure: Hotels can leverage an extensive partner network and hundreds of pre-built interfaces to back-office applications (accounts receivable accounts payable), payment gateways, hotel industry applications, and property infrastructure devices to ease integration.

Hotels can further enhance the customer experience with their guest-facing mobile applications that leverage the web services in Oracle OPERA Cloud to provide key guest services across the travel lifecycle.

“Mobility has become a key competitive differentiator in the hotel industry. With the ability to access information instantly via mobile devices, guests now expect a very personalized mobile-enabled hospitality experience,” said Carlin.  “Oracle OPERA Cloud enables operators to quickly and cost-effectively make that vision a reality.”

With the industry’s broadest portfolio of public cloud services, Oracle Cloud continues to show strong adoption, supporting 62 million users and 23 billion transactions each day. Oracle Cloud runs on 30,000 devices and 400 petabytes of storage in 19 data centers around the world.

Contact Info Greg Lunsford
Oracle
+1.650.506.6523
greg.lunsford@oracle.com Angela Seutter
Amodeo Associates
+1.612.280.1493
seutter.angela@gmail.com About Oracle

Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. For more information about Oracle (NYSE:ORCL), visit www.oracle.com.

Trademarks

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Safe Harbor

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle Corporation. 

Talk to a Press Contact

Greg Lunsford

  • +1.650.506.6523

Angela Seutter

  • +1.612.280.1493

Follow Oracle Corporate

Categories: Database, Vendor

Use Dynamic Data Masking to obfuscate your sensitive data

Data privacy is a major concern today for any organization that manages sensitive data or personally identifiable information (PII). Examples of such data include sensitive customer information such as phone numbers, email addresses and bank information, HR data on employees and financial business data.

This sensitive information is often stored in the database, and it should only be available to specific people on a need-to-know basis. Beyond that need, the sensitive data should not be exposed via the application, or to developers or IT personnel who access the production database directly.

Traditionally, the logic of obfuscating sensitive data has been developed in the application layer, requiring it to be duplicated across all modules and applications accessing the data. Alternatively, special views have been created to avoid exposure of these sensitive data pieces on the database itself, although these can impact database operations and are susceptible to errors. In other cases, third-party tools have been introduced to manage the concealment of the restricted data.

SQL Server 2016 and Azure SQL DB now offer a built-in feature that helps limit access to those particular sensitive data fields: Dynamic Data Masking (DDM).


DDM can be used to hide or obfuscate sensitive data, by controlling how the data appears in the output of database queries. It is implemented within the database itself, so the logic is centralized and always applies when the sensitive data is queried. Best of all, it is incredibly simple to configure DDM rules on sensitive fields, which can be done on an existing database without affecting database operations or requiring changes in application code.

How DDM works

Dynamic Data Masking rules can be defined on particular columns, indicating how the data in those columns will appear when queried. There are no physical changes to the data in the database itself; the data remains intact and is fully available to authorized users or applications. Database operations remain unaffected, and the masked data has the same data type as the original data, so DDM can often be applied without making any changes to database procedures or application code.

To add a data mask on a certain column in your database, all you need to do is alter that column by adding a mask and specifying the required masking type. Here, you can choose default masking, which fully masks out the original value, partial masking where you can specify part of the data to expose, or random masking, which replaces the numeric value with a random value within a specified range. There is also an email masking function, which exposes the first character and keeps the email format.

Full masking:

Configure masking function:

Results:

Partial masking:

Configure masking function:

Results:

You can also configure masking functions on columns at the time of table creation:

Creating a table with Dynamic Data Masking:

Enabling access to privileged users

When configuring Dynamic Data Masking rules, the underlying data is unaffected — so privileged users can still access the real data. Administrators of the database are always exempt from masking, so they will always get the real data when performing queries. You can also specify certain users that will have access to the actual data by assigning them the UNMASK permission:

Assigning the UNMASK permission:

Common questions about DDM

Does DDM apply for all database clients, like Java or Node.js?
Yes, query results always contain masked data for nonprivileged users, regardless of the client used to connect to the database.

What happens if a user copies data from a masked column out of the table and into a TEMP table?
In this case, the data is masked when it is retrieved from the original table — so it is written to the target table in masked format (unless a privileged user is retrieving it). This means that the original data cannot be restored from the TEMP table. This ensures that users who do not have access to unmasked data cannot expose the real data by copying it elsewhere. Note: To avoid data corruption, be sure to assign database read/write permissions appropriately.

What is the performance impact of using DDM?
Since the data masking is performed only at the end of the database query operation, right before the data is returned, the performance impact is minimal and often negligible. You should still validate the exact performance impact for your workload.

Part of a comprehensive security solution 

Note that Dynamic Data Masking is not a replacement for access control mechanisms, and is not a method for physical data encryption. DDM is intended to simplify the obfuscation of sensitive data by centralizing the logic in your database, but it does not provide complete protection against malicious administrators running exhaustive ad-hoc queries. Dynamic Data Masking is complementary to other SQL Server security features (auditing, encryption, Row-Level Security, etc.) and it is highly recommended to use it in conjunction with them to better protect your sensitive data in the database.

Getting started

You can get started immediately with Dynamic Data Masking to restrict users from seeing sensitive information in your database. All you need to do is identify the sensitive columns in your database and configure data masking for those columns, specifying how much of the data to reveal.

You can learn more about Dynamic Data Masking for SQL Server and for Azure SQL database with the following resources:

See the other posts in the SQL Server 2016 blogging series.

Categories: Database

Oracle Powers Precision Medicine Delivery with New Solution Connecting Research, Pathology and Clinical Care

Oracle Database News - Mon, 01/25/2016 - 14:00
Press Release Oracle Powers Precision Medicine Delivery with New Solution Connecting Research, Pathology and Clinical Care Oracle Healthcare Precision Medicine accelerates and expands collaboration from genetic testing through clinician decision-making for better, targeted outcomes

Redwood Shores, Calif. —Jan 25, 2016

To advance the evolving field of precision medicine, Oracle Health Sciences today announced Oracle Healthcare Precision Medicine. This first-of its kind software solution connects genetic testing, report generation, and clinical care decision-making to accelerate delivery of precision medicine while making it more attainable and affordable. With this solution, Oracle continues to support the paradigm shift in clinical research and healthcare, from a one-size-fits-all approach to combat disease to a methodology that treats biological variations of individual patients.

Precision medicine is revolutionizing drug development and healthcare. President Barack Obama described it as, “one of the greatest opportunities for new medical breakthroughs... ever seen.” Personalized medicines account for 42 percent of all drugs in development. With precision medicine treatments, survival rates for colorectal cancer have increased by 15 percent, while hospitalization for heart patients has declined by 30 percent.1 These promising numbers offer early glimpses into how precision medicine will dramatically improve patient outcomes and drive greater, overall efficiencies in research and healthcare.

Precision Medicine and Data Insight

The advancement of precision medicine involves targeting large amounts of genetic data from gene panels to whole genome sequencing (WGS). The task of identifying, reviewing, and acting on these biomarkers falls to three groups of specialists, the researcher (uncovering the biomarkers), the molecular pathologist (identifying the actionable biomarkers for a given condition), and the clinician (evaluating the resulting data and advising on treatment plans).

These groups face challenges in isolating clinically actionable information and creating individual diagnostic reports. Lack of traceability, scalability, data privacy/security, siloed tools, disparate terminologies, and varied workflows all contribute to their inability to collaborate on the best therapy for the patient. The kind of collective solution necessary to address these challenges did not exist—until now.

“Oracle is the authority in data management and analysis—even down to the molecular level,” said Steve Rosenberg, senior vice president and general manager, Oracle Health Sciences. “Our translational solutions are used in 12 medical research institutions around the world. Applying our deep data expertise and healthcare innovation insight, we’ve developed Oracle Healthcare Precision Medicine, an innovative solution that supports advanced methodologies for personalized treatments. It is the next logical step in support of precision medicine.”

Simplifies Decision Making For Research Teams and Clinicians to Improve Patient Outcomes

Oracle Healthcare Precision Medicine addresses the data aggregation, knowledge exchange, normalization, and workflow issues that restrict the timely creation of patient molecular profiles. The solution allows a wide range of experts to conduct seamless collaborations on ‘best treatment’ plans for individual patients.

Key benefits of the solution include:

  • Full spectrum testing from gene panels through whole genome sequencing Accelerated test throughput via streamlined lab workflow for higher revenue and lower costs
  • Consistent report design and simplified clinical action planning
  • Complete traceability for compliance requirements
  • Integration with electronic health record (EHR) systems and third-party vendors for seamless clinical workflow and adoption

1 101: Improving Patient Care in the 21st Century. PMC, 2015.
http://www.personalizedmedicinecoalition.org/Userfiles/PMC-Corporate/file/PMC_2015_annual_report.pdf

  • Additional Information To learn more about Oracle Health Sciences, please follow @OracleHealthSci and Oracle Health Sciences.
Contact Info Samantha Thai
Oracle
+1.510.917.5564
samantha.thai@oracle.com Mary Tobin
O’Keeffe & Company
+1.503.658.7396
mtobin@okco.com About Oracle

Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. For more information about Oracle (NYSE:ORCL), visit www.oracle.com.

Trademarks

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Safe Harbor

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle Corporation. 

Talk to a Press Contact

Samantha Thai

  • +1.510.917.5564

Mary Tobin

  • +1.503.658.7396

Follow

Follow Oracle Corporate

Categories: Database, Vendor

Use Dynamic Data Masking to obfuscate your sensitive data

Data privacy is a major concern today for any organization that manages sensitive data or personally identifiable information (PII). Examples of such data include sensitive customer information such as phone numbers, email addresses and bank information, HR data on employees and financial business data.

This sensitive information is often stored in the database, and it should only be available to specific people on a need-to-know basis. Beyond that need, the sensitive data should not be exposed via the application, or to developers or IT personnel who access the production database directly.

Traditionally, the logic of obfuscating sensitive data has been developed in the application layer, requiring it to be duplicated across all modules and applications accessing the data. Alternatively, special views have been created to avoid exposure of these sensitive data pieces on the database itself, although these can impact database operations and are susceptible to errors. In other cases, third-party tools have been introduced to manage the concealment of the restricted data.

SQL Server 2016 and Azure SQL DB now offer a built-in feature that helps limit access to those particular sensitive data fields: Dynamic Data Masking (DDM).


DDM can be used to hide or obfuscate sensitive data, by controlling how the data appears in the output of database queries. It is implemented within the database itself, so the logic is centralized and always applies when the sensitive data is queried. Best of all, it is incredibly simple to configure DDM rules on sensitive fields, which can be done on an existing database without affecting database operations or requiring changes in application code.

How DDM works

Dynamic Data Masking rules can be defined on particular columns, indicating how the data in those columns will appear when queried. There are no physical changes to the data in the database itself; the data remains intact and is fully available to authorized users or applications. Database operations remain unaffected, and the masked data has the same data type as the original data, so DDM can often be applied without making any changes to database procedures or application code.

To add a data mask on a certain column in your database, all you need to do is alter that column by adding a mask and specifying the required masking type. Here, you can choose default masking, which fully masks out the original value, partial masking where you can specify part of the data to expose, or random masking, which replaces the numeric value with a random value within a specified range. There is also an email masking function, which exposes the first character and keeps the email format.

Full masking:

Configure masking function:

Results:

Partial masking:

Configure masking function:

Results:

You can also configure masking functions on columns at the time of table creation:

Creating a table with Dynamic Data Masking:

Enabling access to privileged users

When configuring Dynamic Data Masking rules, the underlying data is unaffected — so privileged users can still access the real data. Administrators of the database are always exempt from masking, so they will always get the real data when performing queries. You can also specify certain users that will have access to the actual data by assigning them the UNMASK permission:

Assigning the UNMASK permission:

Common questions about DDM

Does DDM apply for all database clients, like Java or Node.js?
Yes, query results always contain masked data for nonprivileged users, regardless of the client used to connect to the database.

What happens if a user copies data from a masked column out of the table and into a TEMP table?
In this case, the data is masked when it is retrieved from the original table — so it is written to the target table in masked format (unless a privileged user is retrieving it). This means that the original data cannot be restored from the TEMP table. This ensures that users who do not have access to unmasked data cannot expose the real data by copying it elsewhere. Note: To avoid data corruption, be sure to assign database read/write permissions appropriately.

What is the performance impact of using DDM?
Since the data masking is performed only at the end of the database query operation, right before the data is returned, the performance impact is minimal and often negligible. You should still validate the exact performance impact for your workload.

Part of a comprehensive security solution

Note that Dynamic Data Masking is not a replacement for access control mechanisms, and is not a method for physical data encryption. DDM is intended to simplify the obfuscation of sensitive data by centralizing the logic in your database, but it does not provide complete protection against malicious administrators running exhaustive ad-hoc queries. Dynamic Data Masking is complementary to other SQL Server security features (auditing, encryption, Row-Level Security, etc.) and it is highly recommended to use it in conjunction with them to better protect your sensitive data in the database.

Getting started

You can get started immediately with Dynamic Data Masking to restrict users from seeing sensitive information in your database. All you need to do is identify the sensitive columns in your database and configure data masking for those columns, specifying how much of the data to reveal.

You can learn more about Dynamic Data Masking for SQL Server and for Azure SQL database with the following resources:

See the other posts in the SQL Server 2016 blogging series.

Try SQL Server 2016 CTP3

Categories: Database

Exploring SQL Server 2016 Always Encrypted – Part 3 – Differences between Deterministic or Randomize Encryption

Database Journal News - Mon, 01/25/2016 - 09:01

In this third article of the exploring SQL Server 2016 Always Encrypted series, Greg Larsen looks at the differences between an Always Encrypted column that uses an encryption type of Deterministic and those that use encryption type of Randomized.

Categories: Database

Limiting access to data using Row-Level Security

To satisfy compliance standards, internal regulations or basic security principles, applications often need to limit a user's access to only certain rows of data in a database. For example:

  • An oil and gas exploration application might restrict an analyst's access to well production data based on the analyst’s region and role.
  • A healthcare application might restrict a doctor's access to patient data based on the doctor’s staffing assignments.
  • A multitenant application with a "shared database, shared schema" tenancy model needs to prevent tenants from accessing data that does not belong to them.

Traditionally, customers have implemented their row-level access logic using SQL views or customized application code. But these workarounds can introduce problems: Views are decentralized, susceptible to runtime errors and difficult to maintain during application upgrades. And customized application code is not only difficult to maintain as your codebase grows, but also impossible in scenarios where you don't own the application code (e.g., commercial off-the-shelf software).

Row-Level Security (RLS), a new programmability feature available in Azure SQL Database and SQL Server 2016, solves these problems by centralizing your row-level access logic within the database. As your application grows, RLS helps you maintain a consistent data access policy and reduce the risk of accidental data leakage.

How it works

RLS is a form of "predicate-based access control" — it works by automatically applying a security predicate to all queries on a table. The predicate determines which users can access which rows. For example, a simple predicate might be, "WHERE SalesRep = CURRENT_USER", while a complicated predicate might include JOINs to look up information in other tables.

There are two types of security predicates:

  • Filter predicates silently filter SELECT, UPDATE and DELETE operations to exclude rows that do not satisfy the predicate.
  • Block predicates explicitly block INSERT, UPDATE and DELETE operations that do not satisfy the predicate.

To add a security predicate on a table, you first need an inline table-valued function that defines your access criteria. Then, you create a security policy that adds filter and block predicates on any tables you like, using this function. Here's a simple example that prevents sales representatives from accessing rows in a customer's table that are not assigned to them:

CREATE FUNCTION dbo.customerPredicate(@SalesRepName AS sysname)
    RETURNS TABLE
    WITH SCHEMABINDING
AS
    RETURN SELECT 1 AS accessResult
    WHERE @SalesRepName = USER_NAME() OR USER_NAME() = 'Manager'
go

CREATE SECURITY POLICY dbo.customerAccessPolicy
    ADD FILTER PREDICATE dbo.customerPredicate(SalesRepName) ON dbo.Customers,
    ADD BLOCK PREDICATE dbo.customerPredicate(SalesRepName) ON dbo.Customers
go

-- Now test the policy by impersonating SalesRep01
EXECUTE AS USER = 'SalesRep01'
go

-- Only rows where SalesRepName = 'SalesRep01' are returned (filter predicate)
SELECT * FROM dbo.Customers
go

-- Error because the new SalesRepName <> 'SalesRep01' (block predicate)
INSERT INTO dbo.Customers
    (CustomerId, CustomerName, SalesRepName)
VALUES
    (1, 'New Customer', 'SalesRep99')
go

REVERT
go

Frequently asked questions

What is the performance impact of using RLS?

In general, RLS will have the same performance as a view. Because RLS relies on the query optimizer to inline the predicate function efficiently, the performance depends on the complexity of your queries and predicates, as well as any indexes you have created. For more information, see Row-Level Security: Performance and common patterns.

Can I limit access based on AD group memberships?

Yes, you can use the IS_MEMBER() function in your predicate to check SQL role or AD group memberships. For an example, see the RLS Hospital Demo script.

What if my application uses connection pooling with a single login for all users?

No problem, your application can use the new SESSION_CONTEXT feature to get and set session-scoped key-value pairs to identify users for RLS, while still enabling efficient connection pooling. For examples, see the RLS Mid-Tier Demo script or the Web app with a multitenant database using Entity Framework and Row-Level Security tutorial.

If I've enabled RLS, does this mean that my DBAs cannot access data using SSMS?

No. Like other row-level security solutions, RLS is intended for scenarios where the queries that a user can execute are controlled by a middle-tier application. DBAs and users with ad-hoc query access to the database may be able to infer the existence of filtered data, using side-channels. For more information, see the RLS official documentation.

Getting started

If your application needs to limit users' access to specific rows of data, we encourage you to use RLS. The easiest way to try it with SQL Server 2016 is to download the AdventureWorks Database for SQL Server 2016 CTP3 and walk through the RLS sample script.

You can also learn more with the following resources:

See the other posts in the SQL Server 2016 blogging series.

Categories: Database

Video: To the future of analytics with SQL Server, BI and Cortana Analytics Suite

How cool is data analytics? Super cool!

If you think that description sounds like hype, you should watch the video of Jason Wilcox’s Foundational session at PASS as he presents fascinating examples that demonstrate how Microsoft’s data platform and Azure Machine Learning is making "The Future of Analytics" real today.

Wilcox discusses how advanced analytics has progressed to the point of discovering insights that you may not think to look for. These insights can lead in unexpected directions. Take the example of the elevator manufacturing company System Corp. Advanced analytics uncovered the surprising fact that patterns of elevator movement are an incredible predictor of whether a tenant will renew a lease because elevator usage spikes before they move out. In another case, Twitter discovered that the sentiments of tweets predict heart attack rates in various regions better than medical predictors. Says, Wilcox, “Insights are shockingly possible when you merge massive amounts of data.”

In the category of super cool, Wilcox discloses the amazing details behind Microsoft Research’s How Old Do I Look app. Find out how a single developer built this viral app in a few days using Azure as a service. Within three days, the app attracted 1.2 million visitors per hour, and so far 82 million unique visitors have uploaded 565 million images. The Azure cloud infrastructure for this popular app stretched automatically, scaling to 1,600 cores at the peak, without the need to pre-allocate anything.

Watch the video to find out the details of these and other fascinating examples. You’ll see live demonstrations of the power of SQL Server, Microsoft BI, Azure, and Cortana Analytics Suite.

Categories: Database

CLK Enerji Selects Oracle Utilities for Business Transformation

Oracle Database News - Thu, 01/21/2016 - 17:33
Press Release CLK Enerji Selects Oracle Utilities for Business Transformation Largest energy utility inTurkey will deliver a more modern and flexible Meter to Cash customer experience

İstanbul, Turkey—Jan 21, 2016

CLK Enerji, Turkey’s largest energy utility, has selected Oracle Utilities solutions to transform and modernize its billing systems and improve service quality for its customers across all areas of its business.

With the changing landscape of the Turkish energy market, new demands are being placed on the country’s utilities requiring them to develop more customer-centric services and adapt their operations for the digital age. In a move designed to lower operating costs, increase accuracy and streamline its customer operations, CLK Enerji is implementing Oracle Utilities Customer Care & Billing (CC&B) and Oracle Utilities Meter Data Management (MDM) to deliver a more flexible, performing service to its growing base of energy and cost-conscious customers.

CLK Enerji serves nearly 10 million customers in Turkey and boasts an annual electricity distribution and sales strength of 46 billion kWh. With Oracle Utilities solutions, the company will build on its market-leading capabilities and deliver a new standard of excellence for energy management and customer service.

The scalability features of Oracle Utilities CC&B and MDM will enable CLK Enerji to customize its billing offerings to meet the varied needs of its fast-growing customer base. Oracle Utilities’ solutions span the entire meter-to-cash process, eliminating gaps in communication, protecting revenue, and reducing manual work through automation. Energy users will be able to manage their own consumption and billing needs online while benefiting from new levels of flexibility and control. By empowering customers in this way, CLK Enerji will benefit from a lower total cost of ownership of its CIS platform.

Serhan Ozhan, CIO at CLK Enerji said: “The energy landscape in Turkey is in the midst of a sweeping change and as the country’s leading energy provider we want to be at the forefront of this transformation. Oracle Utilities was the only vendor that could offer an end-to-end suite of technologies which are flexible, secure and scalable enough to underpin our ambitious modernization plans, and that will allow us to deliver on our customers’ evolving expectations.”

Mike Ballard, Director for Oracle Utilities Strategy, EMEA said: “The legacy systems that many utilities still have in place today are not designed to support the demands of the modern energy market. Having a choice, customers in competitive markets become increasingly demanding of their service provider. They are also becoming increasingly concerned with how much energy they use and expect their utilities to help them manage their consumption and lower their bills. Working with Oracle Utilities, CLK Enerji is setting the standard for this new era of energy and customer management in Turkey and the surrounding region.”

  • Follow @OracleUtilities on Twitter. To learn more about Oracle Utilities’ solutions visit www.oracle.com/industries/utilities.
Contact Info Samantha Thai
Oracle
+1.510.917.5564
samantha.thai@oracle.com About Oracle

Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. For more information about Oracle (NYSE:ORCL), visit www.oracle.com.

Trademarks

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Safe Harbor

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle Corporation. 

Talk to a Press Contact

Samantha Thai

  • +1.510.917.5564

Follow

Follow Oracle Corporate

Categories: Database, Vendor

Limiting access to data using Row-Level Security

To satisfy compliance standards, internal regulations or basic security principles, applications often need to limit a user's access to only certain rows of data in a database. For example:

  • An oil and gas exploration application might restrict an analyst's access to well production data based on the analyst’s region and role.
  • A healthcare application might restrict a doctor's access to patient data based on the doctor’s staffing assignments.
  • A multitenant application with a "shared database, shared schema" tenancy model needs to prevent tenants from accessing data that does not belong to them.

Traditionally, customers have implemented their row-level access logic using SQL views or customized application code. But these workarounds can introduce problems: Views are decentralized, susceptible to runtime errors and difficult to maintain during application upgrades. And customized application code is not only difficult to maintain as your codebase grows, but also impossible in scenarios where you don't own the application code (e.g., commercial off-the-shelf software).

Row-Level Security (RLS), a new programmability feature available in Azure SQL Database and SQL Server 2016, solves these problems by centralizing your row-level access logic within the database. As your application grows, RLS helps you maintain a consistent data access policy and reduce the risk of accidental data leakage.

How it works

RLS is a form of "predicate-based access control" — it works by automatically applying a security predicate to all queries on a table. The predicate determines which users can access which rows. For example, a simple predicate might be, "WHERE SalesRep = CURRENT_USER", while a complicated predicate might include JOINs to look up information in other tables.

There are two types of security predicates:

  • Filter predicates silently filter SELECT, UPDATE and DELETE operations to exclude rows that do not satisfy the predicate.
  • Block predicates explicitly block INSERT, UPDATE and DELETE operations that do not satisfy the predicate.

To add a security predicate on a table, you first need an inline table-valued function that defines your access criteria. Then, you create a security policy that adds filter and block predicates on any tables you like, using this function. Here's a simple example that prevents sales representatives from accessing rows in a customer's table that are not assigned to them:

CREATE FUNCTION dbo.customerPredicate(@SalesRepName AS sysname)
    RETURNS TABLE
    WITH SCHEMABINDING
AS
    RETURN SELECT 1 AS accessResult
    WHERE @SalesRepName = USER_NAME() OR USER_NAME() = 'Manager'
go

CREATE SECURITY POLICY dbo.customerAccessPolicy
    ADD FILTER PREDICATE dbo.customerPredicate(SalesRepName) ON dbo.Customers,
    ADD BLOCK PREDICATE dbo.customerPredicate(SalesRepName) ON dbo.Customers
go

– Now test the policy by impersonating SalesRep01
EXECUTE AS USER = 'SalesRep01'
go

– Only rows where SalesRepName = 'SalesRep01' are returned (filter predicate)
SELECT * FROM dbo.Customers
go

– Error because the new SalesRepName <> 'SalesRep01' (block predicate)
INSERT INTO dbo.Customers
    (CustomerId, CustomerName, SalesRepName)
VALUES
    (1, 'New Customer', 'SalesRep99')
go

REVERT
go

Frequently asked questions

What is the performance impact of using RLS?

In general, RLS will have the same performance as a view. Because RLS relies on the query optimizer to inline the predicate function efficiently, the performance depends on the complexity of your queries and predicates, as well as any indexes you have created. For more information, see Row-Level Security: Performance and common patterns.

Can I limit access based on AD group memberships?

Yes, you can use the IS_MEMBER() function in your predicate to check SQL role or AD group memberships. For an example, see the RLS Hospital Demo script.

What if my application uses connection pooling with a single login for all users?

No problem, your application can use the new SESSION_CONTEXT feature to get and set session-scoped key-value pairs to identify users for RLS, while still enabling efficient connection pooling. For examples, see the RLS Mid-Tier Demo script or the Web app with a multitenant database using Entity Framework and Row-Level Security tutorial.

If I've enabled RLS, does this mean that my DBAs cannot access data using SSMS?

No. Like other row-level security solutions, RLS is intended for scenarios where the queries that a user can execute are controlled by a middle-tier application. DBAs and users with ad-hoc query access to the database may be able to infer the existence of filtered data, using side-channels. For more information, see the RLS official documentation.

Getting started

If your application needs to limit users' access to specific rows of data, we encourage you to use RLS. The easiest way to try it with SQL Server 2016 is to download the AdventureWorks Database for SQL Server 2016 CTP3 and walk through the RLS sample script.

You can also learn more with the following resources:

See the other posts in the SQL Server 2016 blogging series.

Categories: Database

Video: To the future of analytics with SQL Server, BI and Cortana Analytics Suite

How cool is data analytics? Super cool!

If you think that description sounds like hype, you should watch the video of Jason Wilcox’s Foundational session at PASS as he presents fascinating examples that demonstrate how Microsoft’s data platform and Azure Machine Learning is making “The Future of Analytics” real today.

Wilcox discusses how advanced analytics has progressed to the point of discovering insights that you may not think to look for. These insights can lead in unexpected directions. Take the example of the elevator manufacturing company System Corp. Advanced analytics uncovered the surprising fact that patterns of elevator movement are an incredible predictor of whether a tenant will renew a lease because elevator usage spikes before they move out. In another case, Twitter discovered that the sentiments of tweets predict heart attack rates in various regions better than medical predictors. Says, Wilcox, “Insights are shockingly possible when you merge massive amounts of data.”

In the category of super cool, Wilcox discloses the amazing details behind Microsoft Research’s How Old Do I Look app. Find out how a single developer built this viral app in a few days using Azure as a service. Within three days, the app attracted 1.2 million visitors per hour, and so far 82 million unique visitors have uploaded 565 million images. The Azure cloud infrastructure for this popular app stretched automatically, scaling to 1,600 cores at the peak, without the need to pre-allocate anything.

Watch the video to find out the details of these and other fascinating examples. You’ll see live demonstrations of the power of SQL Server, Microsoft BI, Azure, and Cortana Analytics Suite.

Categories: Database

Oracle's ANSI Join Syntax Can Result In Wrong Results

Database Journal News - Thu, 01/21/2016 - 09:01

Oracle can still have issues with ANSI join syntax, producing sub-optimal translations and possibly wrong results.  Read on to see how Oracle processes ANSI join syntax and how that translation process can create some problems.

Categories: Database

Cost-effective data management with DB2 10.5 and EMC FAST VP, Part 2: EMC Virtual Provisioning and FAST VP

IBM - DB2 and Informix Articles - Thu, 01/21/2016 - 06:00
You need a cost-effective way to structure your company's data so that you can instantly access hot dataor data that is accessed frequentlywhile also storing enormous amounts of cold datadata that is not accessed very often. In this series, we'll show you how to use the multi-temperature data feature, introduced in IBM DB2 Version 10.1 for Linux, UNIX, and Windows (DB2 10.1) with EMC Symmetrix VMAX Fully Automated Storage Tiering for Virtual Pools (FAST VP) technology to place the right data on the right storage at the right time to keep hardware costs to a minimum and help you achieve your SLA goals. Part 2 illustrates how EMC Symmetrix VMAX Fully Automated Storage Tiering for Virtual Pools (FAST VP) technology works and shows you how to configure and deploy the product.
Categories: Database

Lumentum Shines a Light on the Benefits of Oracle Global Trade Management Cloud

Oracle Database News - Wed, 01/20/2016 - 17:00
Press Release Lumentum Shines a Light on the Benefits of Oracle Global Trade Management Cloud

Redwood Shores, Calif.—Jan 20, 2016

Oracle today announced that Lumentum Holdings Inc. has become the first company to go live with Oracle Global Trade Management Cloud Service (GTM) for product classification and export compliance screening.  Their five-month implementation, which includes an out-of-the-box integration with Oracle E-Business Suite Managed Cloud Service.  Lumentum manufactures and exports optical networking devices, commercial lasers and 3D sensing tools that are used in almost every network in the world. Telecommunication companies, enterprises and data centers around the globe depend on Lumentum’s innovative components and modules.

Oracle GTM Cloud Service allows Lumentum to proactively manage the entire export compliance process, from classifying their items for export, screening their sales orders and customer deliveries for restricted and denied parties, export compliance and license requirements, and export documentation.

“Trade compliance is the process of ensuring country-specific laws and regulations are followed when shipping goods across international borders,” said Sree Vaidyanathan, VP Information Technology, Lumentum. “Businesses that fail to comply with these export policies can face increased order fulfilment time, severe penalties and trade restrictions. Oracle’s GTM solution supports all of our compliance needs and provides effective screening capabilities so we can scale and expand the business globally”.

Oracle partner, Accelalpha, expertise in Oracle E-Business Suite provided Lumentum with a holistic approach to develop end-to-end business processes and re-usable solution components as part of a rapid deployment strategy. A key objective of the project was to minimize infrastructure and system administration costs which had to be delivered against a period of dramatic change while Lumentum was being spun out from its parent company JDS Uniphase Corporation.

“To support rapid and cost-effective business growth and market expansion, shippers like Lumentum are looking for competitive ways to streamline and enhance complex trade management processes,” said Derek Gittoes, vice president, supply chain management product strategy, Oracle. “We provide the industry’s most comprehensive transportation and global trade management cloud platform. As a result we are in a better place than ever to help our customer’s further optimize processes, reduce costs and mitigate risks.”

Both companies will share best practices and experiences at Oracle's Modern Supply Chain Experience event that takes place in San Jose, California Jan 25-27th 2016. Over 2,000 supply chain professional are expected to attend the event which will includes a partner showcase, 21 tracks and 100 breakout sessions.

Contact Info Asad Mushtaq
Oracle
+44 207 562 7068
asad.mushtaq@oracle.com About Oracle

Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. For more information about Oracle (NYSE:ORCL), visit www.oracle.com.

Trademarks

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Safe Harbor

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle Corporation. 

Talk to a Press Contact

Asad Mushtaq

  • +44 207 562 7068

Follow Oracle Corporate

Categories: Database, Vendor

Call for Papers, PostgreSQL and PostGIS, Session #8, April, 6th

PostgreSQL News - Wed, 01/20/2016 - 01:00

After seven successful sessions dedicated to the new features of PostgreSQL 9.0 (February 2011), to PostGIS (June 2011 & September 2014), to replication systems (February 2012), to migration from Oracle to PostgreSQL (October 2012), to PostgreSQL performance (March 2013) and to our 10th anniversary, in September 2015, we'd like to announce that the 8th PostgreSQL Session will be held on April 6th, 2016, in Lyon, France.

This year, another place, but always the same format!

Indeed, Dalibo and Oslandia organize together one day of lectures dedicated to PostgreSQL and PostGIS.

We're launching a call for papers for this event. You may now submit your talks, in English or in French. Each talk should last 30 minutes (questions included). We are interested in any talks on the following subjects:

PostgreSQL :

  • What's New in PostgreSQL
  • Use cases
  • Migration to PostgreSQL
  • Performance Tuning
  • Backup and Restore
  • High-Availability
  • Data Warehouse / Big Data

PostGIS :

  • Advanced spatial analysis with PostgreSQL/PostGIS
  • PointCloud Data and/or 3D with PostgreSQL/PostGIS
  • Performances improvements with PostgreSQL/PostGIS

Talks can be either: a case study, a Proof of Concept, a tutorial, a benchmark, a presentation of a new feature, etc. Of course, we're open to propositions on any other migration related topics (monitoring, hardware, replication, etc.) !

The submission deadline is February 29, 2016.

You can now send your proposals to call-for-paper@postgresql-sessions.org

Please give us a little information about yourself and your talk, such as:

  • First Name and Last Name
  • Twitter Account (if any)
  • Company
  • Short Biography (contributions to the PostgreSQL community)
  • Talk title
  • Talk abstract
  • Any specific needs

Slides should have a free licence (Creative Commons BY-ND 3.0 or compatible), and sent to Dalibo. This day will be filmed, and all the lectures will be recorded and published after the Session. By sending a proposal, you agree to be recorded and waive any compensation for it.

The selected speakers not living in France will be reimbursed for travel and one night accomodation.

See you in Lyon in April !

About the PostgreSQL Sessions:

The PostgreSQL sessions are designed to be a time to discover and meet the community. Each session is a single day consisting of lectures, organized around a specific theme and a guest. The proposed talks aimed at all levels and all profiles: Developer, Administrator, Project Managers, IT Managers, ...

Entry is free and open to all, within the limits of available seats.

About Dalibo:

Since 2005, Dalibo is the leading French PostgreSQL company and provides its experience and expertise to its clients in Europe. The company delivers a full range of PostgreSQL services: Training, Development, Performance Tuning, High Availibilty setup, Oracle to PostgreSQL migration, Troubleshooting, and PostgreSQL support.

About Oslandia:

Oslandia is a company with a focus on Open Source GIS architecture. We are characterized by our expertise, agility and dynamism. Our business model is based on services around Open Source GIS software which we are expert on. More than just offering expertise, we are also software editor for some OpenSource GIS components we develop, renown and used worldwide (PostGIS, MapServer Suite, QGIS). This implication requires us to be in the heart of communities of developers and standardisation (worldwide codesprints, participation in future software version orientation, new feature development on our own R&D budgets...).

Categories: Database, Open Source

Getting Started with JSON Support in SQL Server 2016 – Part 1

Database Journal News - Tue, 01/19/2016 - 09:01

SQL Server 2016 introduces built-in support for storing, managing and processing JSON data. Read on to learn about this new feature and follow along with a step-by-step guide to start parsing and using JSON content natively in SQL Server 2016.

Categories: Database

Cost-effective data management with DB2 10.5 and EMC FAST VP, Part 1: The multi-temperature data feature

IBM - DB2 and Informix Articles - Fri, 01/15/2016 - 06:00
You need a cost-effective way to structure your company's data so that you can instantly access hot dataor data that is accessed frequentlywhile also storing enormous amounts of cold datadata that is not accessed very often. In this series, we'll show you how to use the multi-temperature data feature, introduced in IBM DB2 Version 10.1 for Linux, UNIX, and Windows (DB2 10.1) with EMC Symmetrix VMAX Fully Automated Storage Tiering for Virtual Pools (FAST VP) technology to place the right data on the right storage at the right time to keep hardware costs to a minimum and help you achieve your SLA goals. Part 1 introduces the DB2 multi-temperature data feature and shows you how to use its features.
Categories: Database

Oracle Launches EMEA Recruitment Drive to Add 1,400 New Cloud Sales Professionals

Oracle Database News - Thu, 01/14/2016 - 22:41
Press Release Oracle Launches EMEA Recruitment Drive to Add 1,400 New Cloud Sales Professionals Oracle’s rapid cloud growth drives workforce expansion and new cloud sales centers.

Reading, UK—Jan 14, 2016

Oracle has announced a Europe, Middle East and Africa (EMEA) recruitment drive to hire 1,400 new cloud sales professionals who will play a vital role in fuelling the growth of the company’s cloud business throughout the region.

The new roles will be based in six locations: Amsterdam (The Netherlands); Cairo and Dubai (Middle East); Dublin (Ireland); Malaga (Spain) and Prague (Czech Republic). 

In addition to hiring the very best talent from the above locations, Oracle is looking for recruits with a range of experience from across the EMEA region, from highly motivated sales professionals with two to three years’ experience to highly experienced senior sales professionals.

As well as increasing its cloud sales workforce Oracle will be investing in two new cloud sales centres in Amsterdam and Cairo and new state-of-the-art offices opening this year in Dubai, Dublin and Prague.

The move to recruit 1,400 new cloud sales professionals into its EMEA inside sales operation follows a multi-billion dollar investment from Oracle in developing the most complete portfolio of cloud computing services. Oracle’s cloud technologies deliver everything from secure computing infrastructure to best-in-class enterprise cloud applications. Oracle currently offers more than 600 different cloud applications which combined with its comprehensive on-premise hardware and software offering, creates the opportunity to help organisations seamlessly manage their overall enterprise computing environment while helping them transition to the cloud. Over the past six months, Oracle added nearly 1,500 new software as a service (SaaS) customers and more than 2,100 platform as a service (PaaS) customers.

Loic Le Guisquet, president, Oracle, said:

“These are exciting times for Oracle. We are extending our sales force to support our customers through their digital transformation. Starting today we are hiring 1,400 sharp, ambitious inside sales professionals across Europe, the Middle East and Africa. I want socially savvy, switched on individuals who can help customers respond to the digital imperative and make their businesses future proof. We’re looking for people who want to be relevant to the biggest trends shaping business and technology. Anybody looking to make a real impact with their career in technology should come and join Oracle, The Cloud Company.”

Oracle is running a dedicated website to handle applications at: http://experience.oracle.com

  About Oracle

Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. For more information about Oracle (NYSE:ORCL), visit www.oracle.com.

Trademarks

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Safe Harbor

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle Corporation. 

Follow Oracle Corporate

Categories: Database, Vendor

Microsoft Business Intelligence PASS keynote: Five minutes to sign up; five minutes to WOW!

See how you can get real-time interactive visualizations of customer data, as Microsoft Corporate Vice President James Phillips demonstrates exciting new capabilities available with Power BI and Microsoft’s powerful data platform, including SQL Server, SQL Server Analysis Services (SSAS), SQL Server Reporting Services (SSRS), Datazen, and Azure SQL Database. In this video of Phillips’ PASS Summit session, you’ll learn about all the new capabilities available now, as well as Microsoft’s roadmap for business intelligence (BI). Among the exciting demonstrations Phillips offers, you’ll see how Power BI history and cross-filtering along with integration of Microsoft Research Machine Learning and the Azure cloud platform, you can take advantage of a hybrid solution that offers you game-changing business insights.


In its most recent Agile BI Wave report, Forrester Research shows Microsoft BI moving all the way to the upper right, as a leader in BI. Forrester says that with Microsoft BI innovations, the “sleeping giant” has awoken.” In fact, Phillips notes that Power BI makes Microsoft the world’s fastest growing visualization platform, with more than 185 countries signing up for—and truly using—Power BI. Microsoft is passionate about making Power BI quick, easy, and free so that customers have the experience of “five minutes to sign-up; five minutes to WOW!” with Power BI.

With all the insights into customer and business activity available in today’s digital world, BI is a requirement for success. Check out this informative and fascinating video and find out how Microsoft is acting on the fact that “software is the greatest driving force in bringing business closer to customers … [and] software makes data…Organizations that turn data into value through insights will thrive.”

Click here to learn about currently available BI capabilities and how they fit together to form an unmatched solution that’s moving forward and an unmatched pace to deliver insights.

Categories: Database

Data security, SQL Server 2016, and your business

Security is unquestionably a major priority for Microsoft. A recent news story reported that the company “is spending $1 billion a year to make Microsoft products more secure.” The Microsoft data platform, including SQL Server and Azure SQL Database, is at the top of the list of products investing in security. But, be aware that a commitment to data security is actually nothing new. SQL Server has long been recognized for its outstanding security record: According to the National Institute of Standards and Technology(NIST)1 public security board, for the past six years, SQL Server has had the fewest security vulnerabilities when compared with the major database vendors. In addition, SQL Server has been deemed “the most secure database” by the Information Technology Industry Council (ITIC). Despite this excellent security record, Microsoft is not content to rest on its laurels and is continuing to invest in security, providing customers with new and improved tools to secure data and applications.

From an IT infrastructure and compliance perspective, the importance of protecting data is clear. Witness the fact that security has been identified as one of the “Eight emerging data center trends to follow in 2016.” But data protection also has profound business implications and can even be a competitive differentiator by helping drive customer loyalty and retention, create opportunities for premium offers and new sources of revenue, and protect future revenue streams, according to Forrester Research 2.To help deal with the complexity and scope of data security — and diminish risks to your business — Microsoft provides an across-the-board, in-depth security approach that includes application security, network security, and database security.

Data Security and SQL Server

Playing into this overall approach, SQL Server 2016 and Azure SQL Database include advanced, layered security functionality to help protect data itself as well as access to that data, and then provide monitoring capabilities. Data security features include (but are not limited to) the following:

  • Always Encrypted enables encryption inside client applications without revealing encryption keys to SQL Server. It allows changes to encrypted data without the need to decrypt it first.
  • Transparent Data Encryption (TDE) protects data at rest by encrypting all the user data in data files. TDE prevents users from attaching or restoring a database to another server as a way to access the data.
  • Support for Transport Layer Security (TLS), which has now been updated to version 1.2, protects data in transit and offers protection from such tactics as man-in-the-middle attacks.
  • Dynamic Data Masking (DDM) and Row-Level Security (RLS) help developers build applications that require restricted direct access to certain data as a means of preventing users from seeing specific information.

This layered approach to data security and Microsoft’s overall commitment to advancing security and privacy protection address important considerations for business today. Upcoming blogs will go into deep technical detail on these security capabilities, but examining a business scenario can help illuminate the business benefits that data security can help ensure.

Business implications

Data has become not only a business asset, but it is now also a competitive differentiator: A company that can ensure that customer and business data are secured has a competitive edge over a company that does not make data security a priority. This means that for business and technical decision-makers to enable their businesses to compete effectively, they need a data platform with built-in security features and they need a strategy that takes advantage of the built-in security capabilities.

The business implications of data security range from speeding up customer service, to impacting the bottom line, to protecting shareholder value. Underscoring the potential bottom-line concerns of financial executives, a recent survey found that 66 percent of CFOs consider security to be a high or very high priority. Even at the end-user level, the potential business impact of exposing sensitive data is recognized: Another recent survey discloses that “71 percent of end users say that they have access to company data they should not be able to see.”

How can Microsoft’s data security capabilities ease such concerns? Consider just one example showing how Dynamic Data Masking, as a part of your data security program, can help you address the point raised by those end users who admitted they had access to data (such as Social Security Numbers or health details) that they shouldn’t be able to view. For example, suppose you have a call center where representatives deal with customer billing questions. When a customer record comes up, the representative needs to see certain information to answer questions. But some customer information, such as specific personal health details, need to remain confidential for HIPAA compliance. With Dynamic Data Masking, IT administrators can take simple steps to define policies, or rules, to mask any personally identifiable information that is not needed for the customer interaction. This way, the representative can view a customer record without having access to confidential information. Customer information is secured, but at the same time, customer service is able to answer questions by accessing appropriate data without compromising privacy.

Commitment to security built-In

As the article cited above emphasizes, Microsoft is spending $1 billion per year to ensure that its products are secured so that businesses are protected. SQL Server and Azure SQL Database are continuously building-in state-of-the-industry security technologies as part of this ongoing commitment to security. For business, this means you don’t have to pay extra to give IT staff security tools that are easy to deploy and maintain — those tools are built into Microsoft’s data platform. At the same time, businesses can build data security infrastructure that supports customers and provides a competitive edge. To learn more about Microsoft’s data security approach, see the Security Center for SQL Server Database Engine and Azure SQL Database and the SQL Security Blog.

See the other posts in the SQL Server 2016 blogging series

1. National Institute of Standards and Technology Comprehensive Vulnerability Database update 10/2015

2. The Future of Data Security And Privacy: Growth And Competitive Differentiation Vision: The Data Security And Privacy Playbook, John Kindervag, Heidi Shey, and Kelley Mak, Forrester, July 10, 2015

Categories: Database

Microsoft Business Intelligence PASS keynote: Five minutes to sign up; five minutes to WOW!

See how you can get real-time interactive visualizations of customer data, as Microsoft Corporate Vice President James Phillips demonstrates exciting new capabilities available with Power BI and Microsoft’s powerful data platform, including SQL Server, SQL Server Analysis Services (SSAS), SQL Server Reporting Services (SSRS), Datazen, and Azure SQL Database. In this video of Phillips’ PASS Summit session, you’ll learn about all the new capabilities available now, as well as Microsoft’s roadmap for business intelligence (BI). Among the exciting demonstrations Phillips offers, you’ll see how Power BI history and cross-filtering along with integration of Microsoft Research Machine Learning and the Azure cloud platform, you can take advantage of a hybrid solution that offers you game-changing business insights.

In its most recent Agile BI Wave report, Forrester Research shows Microsoft BI moving all the way to the upper right, as a leader in BI. Forrester says that with Microsoft BI innovations, the “sleeping giant” has awoken.” In fact, Phillips notes that Power BI makes Microsoft the world’s fastest growing visualization platform, with more than 185 countries signing up for—and truly using—Power BI. Microsoft is passionate about making Power BI quick, easy, and free so that customers have the experience of “five minutes to sign-up; five minutes to WOW!” with Power BI.

With all the insights into customer and business activity available in today’s digital world, BI is a requirement for success. Check out this informative and fascinating video and find out how Microsoft is acting on the fact that “software is the greatest driving force in bringing business closer to customers … [and] software makes data…Organizations that turn data into value through insights will thrive.”

Click here to learn about currently available BI capabilities and how they fit together to form an unmatched solution that’s moving forward and an unmatched pace to deliver insights.

Categories: Database