Database and OSA
Oracle Database - Overview
Oracle Database – Product Benefits
Since the introduction of database management systems, database technology has been used to address the unique problems encountered when managing large volumes of all forms of information. With Oracle Database 11g, Oracle is once again breaking new ground in the management of this information through dramatic improvements in the performance, security, and types of content managed by Oracle Database.
There are many reasons organizations store all forms of information with Oracle database management systems.
- Robust Administration, Tuning and Management: Content stored in the database can be directly linked with associated data. Metadata and content are maintained in sync; they are managed under transactional control. The database also offers robust services for backup, recovery, physical and logical tuning.
- Simplicity of Application Development: Oracle’s support for a specific type of content includes SQL language extensions, PL/SQL and JAVA APIs, Xpath and Xquery (in the case of XML) and, in many cases, JSP Tag Libraries, as well as algorithms that perform common or valuable operations through built in operators.
- High Availability: Oracle’s Maximum Availability Architecture makes “zero data-loss” configurations possible for all data. Unlike common configurations where attribute information is stored in the database with pointers to unstructured data in files, only a single recovery procedure is required in the event of failure.
- Scalable Architecture: In many cases, the ability to index, partition, and perform operations through triggers, view processing, or table and database level parameters allows for dramatically larger datasets to be supported by applications that are built on the database rather than on file systems.
- Security: Oracle Database allows for fine-grained (row level and column level) security. The same security mechanisms are used for all forms of information. When using many file systems, directory services do not allow fine-grained levels of access control. It may not be possible to restrict access to individual users; in many systems enabling a user to access any content in the directory gives access to all content in the directory.