Dry stuff! Oracle decrypts 'zero loss' data protection
According to statistics, the data volume of most enterprises is expected to increase 50 times by 2020. Such a huge data set will lead to extremely high risks of data loss. Current solutions for protecting business data fail to meet the needs of mission-critical enterprise databases. These solutions have the potential to lose up to a day's worth of business data each time a restore is performed, place a heavy burden on production servers during backups, and fail to ensure database-level recoverability or scale to accommodate growing workloads. Database requirements. Basically, they replicate the database as a discrete set of files rather than a transactional system with specific integrity and performance requirements.
Oracle Zero Data Loss Recovery Appliance is a breakthrough data protection solution that directly meets these needs through tight integration with Oracle Database. The appliance eliminates the risk of data loss and significantly reduces the overhead of data protection on production servers. In addition, it scales to protect thousands of databases, ensures end-to-end data validation, and enables full lifecycle protection, including disk backup, tape backup, and remote replication.
Recently, Oracle held an online seminar titled "Oracle Decrypts 'Zero Loss' Data Protection", which provided an in-depth explanation of Oracle's upgrade path from capabilities to services and the excellent performance of Oracle's zero data loss recovery machine.
At this online seminar, Mr. Pan Yuqi, General Manager of Oracle China's System Business Technology Department, first delivered a speech titled "The Road to Internalizing the Cloud—Upgrading from Capabilities to Services."
Mr. Pan Yuqi first elaborated on the fact that Oracle has transformed into a cloud service provider for enterprise computing from three aspects.
1. Oracle provides comprehensive SaaS, PaaS, and IaaS services.
2. At Oracle, the research and development of SaaS, PaaS, and IaaS are integrated.
3. Oracle’s public cloud and private cloud use exactly the same technology.
In the process of realizing seamless migration of "public and private" clouds, comprehensive deployment will be carried out with the same standards, the same products, and unified management.
Mr. Pan Yuqi said that Oracle currently provides four major private cloud services: database as a service (Exadata), enterprise application as a service (PCA/Exalogic), big data and analysis as a service (Exadata/BDA), and data protection as a service (ZDLRA/ZFS). At this point, the traditional data center has been transformed into a private cloud.
Subsequently, Mr. Pan Yuqi cited several cases to illustrate that the existing disaster recovery system is often vulnerable to attacks or problems at the logical level and cannot cope with malicious attacks. Therefore, the disaster recovery system is often intolerant of disasters and urgently needs to change its inherent characteristics. With data protection thinking in mind, Oracle Zero Data Loss Recovery All-in-One came into being.
The second session of this online seminar is a tit-for-tat dialogue brought by Mr. Zhang Jingjing, Chief Technical Advisor of Oracle China System Business Technology Department, and Mr. Yang Zheng, Senior Technical Advisor of Oracle China System Business Technology Department: Data Protection-- -Reveal the black technology of ZDLRA.
The two of them first started with the name of Oracle's zero data loss recovery machine. ZDLRA, this seemingly strange name, stands for Zero Data Loss Recovery Appliance. As a data protection product, its name is so simple that you can tell at a glance that it is a data protection and recovery all-in-one machine, as well as its commitment to data, IT infrastructure and enterprise business.
ZDLRA is a data protection system specially designed to protect databases. The purpose of the design is to provide the highest level of protection for Oracle databases and ensure backup/recovery performance and efficiency. At the same time, it ensures that it can support all versions of Oracle databases and Various types of hardware, operating systems and business environments hosting databases. It is tightly integrated with Oracle's database to provide continuous data protection for the database, offloading almost all backup processing system resource overhead from the production server.
In order to achieve the design goal of zero data loss and significantly eliminate the recovery time (RTO) of the database, Oracle has introduced two new technologies for ZDLRA: Delta Push and Delta Storage Store).
The base configuration consists of 2 compute servers and 3 storage servers, all connected via internal high-speed InfiniBand. It offers a highly available configuration, including 94 TB of available incoming backup capacity. Users can incrementally upgrade the base rack by adding more storage servers (up to 18 storage servers for a full rack). Adds 32 TB of usable capacity per storage server. Each full rack has a total usable capacity of 580 TB, with an effective virtual full backup capacity of 5.8 PB. The total database size that the Recovery Appliance can protect is equivalent to the available capacity for a typical recovery cycle of 10 days. If additional capacity is needed, another base rack can be connected via high-speed InfiniBand. The second rack contains its own two compute servers, increasing the connectivity and processing power of the configuration. As with the first rack, users can easily expand their storage capacity by gradually adding storage servers. Up to 18 fully configured racks can be connected to form a single appliance, providing over 10 PB of usable capacity, or over 100 PB of virtual full backup.
In addition to Delta Push and Delta Store, as well as powerful hardware configuration and hardware architecture system, ZDLRA also has two major technical backings. The first is MAA - Oracle Maximum Availability Architecture - based on Oracle high availability technology. Its goal is to achieve the optimal high availability architecture with the lowest cost and complexity. It ensures the high performance of the Oracle database. Availability (such as active clustering, replication, continuous Oracle data validation, Oracle-aware backup and recovery, non-downtime maintenance, etc.) is available for any platform or application and is tightly integrated with Oracle Engineered Systems. The second is the famous RMAN. As we all know, RMAN is the "core engine" used to back up and restore Oracle. It greatly saves the storage space and data transmission time required to back up and restore Oracle databases by using compression and other technologies - RMAN Using incremental backup technology, only the RMAN database blocks that have changed since the last backup are backed up.
A total of about 13,414 people participated in this online seminar. Everyone actively participated in asking questions and interacting. The attention on Oracle Zero Data Loss Recovery Appliance and Oracle business was extraordinary.
The above is the detailed content of Dry stuff! Oracle decrypts 'zero loss' data protection. For more information, please follow other related articles on the PHP Chinese website!

The Internet does not rely on a single operating system, but Linux plays an important role in it. Linux is widely used in servers and network devices and is popular for its stability, security and scalability.

The core of the Linux operating system is its command line interface, which can perform various operations through the command line. 1. File and directory operations use ls, cd, mkdir, rm and other commands to manage files and directories. 2. User and permission management ensures system security and resource allocation through useradd, passwd, chmod and other commands. 3. Process management uses ps, kill and other commands to monitor and control system processes. 4. Network operations include ping, ifconfig, ssh and other commands to configure and manage network connections. 5. System monitoring and maintenance use commands such as top, df, du to understand the system's operating status and resource usage.

Introduction Linux is a powerful operating system favored by developers, system administrators, and power users due to its flexibility and efficiency. However, frequently using long and complex commands can be tedious and er

Linux is suitable for servers, development environments, and embedded systems. 1. As a server operating system, Linux is stable and efficient, and is often used to deploy high-concurrency applications. 2. As a development environment, Linux provides efficient command line tools and package management systems to improve development efficiency. 3. In embedded systems, Linux is lightweight and customizable, suitable for environments with limited resources.

Introduction: Securing the Digital Frontier with Linux-Based Ethical Hacking In our increasingly interconnected world, cybersecurity is paramount. Ethical hacking and penetration testing are vital for proactively identifying and mitigating vulnerabi

The methods for basic Linux learning from scratch include: 1. Understand the file system and command line interface, 2. Master basic commands such as ls, cd, mkdir, 3. Learn file operations, such as creating and editing files, 4. Explore advanced usage such as pipelines and grep commands, 5. Master debugging skills and performance optimization, 6. Continuously improve skills through practice and exploration.

Linux is widely used in servers, embedded systems and desktop environments. 1) In the server field, Linux has become an ideal choice for hosting websites, databases and applications due to its stability and security. 2) In embedded systems, Linux is popular for its high customization and efficiency. 3) In the desktop environment, Linux provides a variety of desktop environments to meet the needs of different users.

The disadvantages of Linux include user experience, software compatibility, hardware support, and learning curve. 1. The user experience is not as friendly as Windows or macOS, and it relies on the command line interface. 2. The software compatibility is not as good as other systems and lacks native versions of many commercial software. 3. Hardware support is not as comprehensive as Windows, and drivers may be compiled manually. 4. The learning curve is steep, and mastering command line operations requires time and patience.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Dreamweaver Mac version
Visual web development tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.