• IBM Consulting

    DBA Consulting can help you with IBM BI and Web related work. Also IBM Linux is our portfolio.

  • Oracle Consulting

    For Oracle related consulting and Database work and support and Migration call DBA Consulting.

  • Novell/RedHat Consulting

    For all Novell Suse Linux and SAP on Suse Linux questions releated to OS and BI solutions. And offcourse also for the great RedHat products like RedHat Enterprise Server and JBoss middelware and BI on RedHat.

  • Microsoft Consulting

    For Microsoft Server 2012 onwards, Microsoft Client Windows 7 and higher, Microsoft Cloud Services (Azure,Office 365, etc.) related consulting services.

  • Citrix Consulting

    Citrix VDI in a box, Desktop Vertualizations and Citrix Netscaler security.

  • Web Development

    Web Development (Static Websites, CMS Websites (Drupal 7/8, WordPress, Joomla, Responsive Websites and Adaptive Websites).

16 February 2011

Oracle Secure Files a new option in Oracle Enterprise Database 11gR2

Oracle SecureFiles
Consolidated Secure Management of Data

  • SecureFiles is a new 11g feature designed to break the performance barrier keeping file data out of databases
  • Next-generation LOBs - faster, and with more capabilities
  • transparent deduplication, compression and encryption
  • leverage the security, reliability, and scalability of database
  • superset of LOB interfaces allows easy migration from LOBs

  • Enables consolidation of file data with associated relational data
  • single security model
  • single view of data
  • single management of data
  • scalable to any level using SMP scale-up, or grid scale-out

SecureFiles is a major rearchitecture of how the database handles unstructured (file) data
not an incremental improvement to LOBs

Entirely new:

  • disk format
  • network protocol
  • versioning and sharing mechanisms
  • caching and locking
  • redo and undo algorithms
  • space and memory management
  • cluster consistency algorithms

SecureFile Innovations

Write Gather Cache:
Cache above the storage layer buffers data up to 4MB during writes before flushing to disk
Allows for large contiguous space allocation for LOB data and reduced write latency. 
Intelligent Pre-fetching:
Improves read performance by pre-fetching LOB data from disk
Overlaps disk IO with network latency to improve throughput
New Space Management routine:
Automates new space allocation and “freed” space reclamation
Optimized chunk size reduces fragmentation
No more High Water Mark contention as with old LOBs
Deletion and Reuse of entire LOBs not just individual chunks.

Advanced Features - Compression

Huge storage savings
industry standard compression algorithms
2-3x compression for typical files (doc, pdf, xml)

minimal CPU overhead during compression
Automatically detects if SecureFile data is compressible
skips compression for already compressed data and when space savings are minimal or zero

Two levels of compression provide different compression ratios
compression Levels: MEDIUM (default), HIGH 
higher the degree of compression, higher the latency and CPU overhead incurred

SecureFiles Compression is independent of table or index compression

Server-side compression

allows for random reads and writes to SecureFile data
can be specified at a partition level

Part of the Advanced Compression Option

Advanced Features - Encryption
  • Extends Transparent Data Encryption (TDE) syntax to SecureFile data

  • old LOB or BasicFiles data can not be encrypted

  • Performed at Block level

  • Support for industry-standard encryption algorithms

  • 3DES168

  • AES128

  • AES192 (default)

  • AES256

  • Encrypt on a per-column basis 

  • Part of the Advanced Security Option

Secure files are ideal also for multi media datafiles in the Database:

07 February 2011

Microsoft Online services now in offering!

From now on DBA Consulting has Microsoft Online Services in offering (also known as BPOS Suite). It is a complete service that allows you to use all the modern features of todays multi-media communications. It consists of the following services:

The Suite is a complete offering of all the parts, but one can also order separate parts of the Suite, which makes it even cheaper. On my website http://www.dbaconsulting.nl I descibed the details and pricing of the different options of choice.

Together with Windows phone 7, you can use the service even more effcient. Here is a link to the possibilties of the windows phone 7 and a small video introduction of the BPOS service offering:

Windows Phone 7 brings together a captivating phone experience with 
best-in-class productivity through Microsoft® Outlook® Mobile and 
Microsoft Office Mobile, providing a platform  for compelling 
applications that can work across phone, web, and PC.

BPOS overview video:

Quick Trial intro:

Note: BPOS will  be rebranded to Office 365 in the spring of 2011. Here are some of the official launch videos and will mean that you as a customer will have even more possibilities for communications and other service and more easy of use with Office 2010 as basic platform to do all your communications and cluod activities.

Office 365 offical video:

Office 365 How it works:

05 February 2011

From now on I am a Redhat Ready Business Partner!

From now on I am a Redhat Ready Business Partner. This means, that apart from the Oracle Unbreakable Linux Enterprise Edition, which is a adapted version of Redhat (specially for Oracle Products perfectly suited but also works fine with third party products), I also have in offering as a Reseller all Redhat Products. I wil start my focus on Redhat Enterprise Server 6, which I tested sofar and has some really nice new features. here are some quotes from a study that Redhat had done by the CIO Insight Magazine Vendor Value survey:

With Red Hat Enterprise Linux, you can do more, today.

Red Hat Enterprise Linux is an enterprise platform well-suited for a broad range of applications across the IT infrastructure. The latest release, Red Hat Enterprise Linux 6, represents a new standard for Red Hat by offering greater flexibility, efficiency, and control. It works across a broad range of hardware architectures, hypervisors, and clouds. Corporations and agencies that standardize on Red Hat Enterprise Linux are free to focus on building their businesses, knowing they have a platform that delivers more of what they need.

More reliable. Worry less when you choose Red Hat over Microsoft Windows.

Senior IT managers rank the quality of Red Hat's technology in the top tier of the software vendors list, as the CIO Insight Magazine Vendor Value survey has reported for the past seven years running. Red Hat Enterprise Linux delivers superior uptime to Microsoft, and your ability to install patches faster than for Microsoft Windows Server 2003 or Windows Server 2008 reduces downtime, freeing your time for more strategic IT tasks. Our global team and innovative engineering approach results in a stable operating system platform in which each release is supported for up to 10 years. You can look to Red Hat to offer and track some of the latest innovations in the industry.

Although every vendor allways claims to be the safest and most relaiable (and they are when you implement correctly), here is the result of that same survey:


More open. Run the applications your business needs on the platforms you choose.

My Learning progress as an Oracle Gold Partner.

Here is a view of my learning progress as a Oracle Gold Partner until now. Hope the economy will thrive soon and I will be fluded with projects form Oracle and Microsoft and Redhat.

01 February 2011

Firewall Builder 4.1.3 Review

Firewall Builder 4.1.3 is currently the latest version of Firewall Builder which can be downloaded for a free trial from http://www.fwbuilder.org/. It is a very versatile product with which one can create firewall rules for different kind of servers from preconfigured templates. it is also possible to build the firewall from scratch according to ones own preferences and company policy rules.

It offers a GUI for generating complex ipfw, iptables, PF, Cisco IOS extended access lists, Cisco ASA (PIX) configurations.

Here is a small Quick Start tutorial for Firewall Builder.

You can manage multiple Firewalls from a single GUI.

Major Features

  • Visual GUI with drag-and-drop objects for creating firewall rules
  • User defined library of objects, such as IP networks, can be used across all firewalls
  • Create meta objects, like groups, that don't exist natively on target device
  • Rule analysis to verify rules are syntactically correct and will work on the target device
  • Optimization of rules to increase rule matching performance
  • Integrated installer to securely deploy rules

With Firewall Builder, you can manage the security policy of your firewall efficiently and accurately,
without the learning curve usually associated with command line interfaces.Instead of thinking in terms
of obscure commands and parameters, you simply create a set of objects describing your firewall, servers,
and subnets, and then implement your firewall policy by dragging objects into policy rules. You can also
take advantage of a large collection of predefined objects describing many standard protocols and services.
Once a policy is built in the GUI, you can compile it and install it on one, or several, firewall machines.
Firewall Builder helps you write and manage configuration for your firewalls.
It writes iptables shell
script, pf.conf file, Cisco router access lists or PIX configuration for you. You can then copy and paste
configuration generated by Firewall Builder, copy the file manually or using your own scripts, or use
built-in function to configure the firewall. Firewall Builder provides change control and search functions.
It allows you to reuse the same address and service objects in rules of many firewalls. It simplifies
coordinated changes of the rules in multi-vendor environments and helps avoid errors in generated
Firewall Builder can generate complex iptables, PF, Cisco IOS extended access lists, Cisco ASA (PIX)
configurations. You do not have to remember all the details of their syntax and internal operation. This
saves time and helps avoid errors.
Firewall Builder makes it easy to add IPv6 rules to the existing firewall policy. Create objects describing
your IPv6 network, add them to the same rule set that defines your security policy for IPv4 and configure
it as "mixed IPv4+IPv6 rule set". The program will generate two configurations from it, one for IPv4 and
another for IPv6, using correct objects for each. There is no need to maintain two policies in parallel for
the whole time of transition from IPv4 to IPv6.
You can generate configuration for a range of devices starting from small Linksys, D-Link and other routers running 
DD-WRT or OpenWRT, to firewalls running Linux, FreeBSD or OpenBSD on a regular or purposebuilt
 PC, to Cisco routers and Cisco ASA (PIX) firewalls.

I started my evaluation with a firewall from a template, which I assume is what most people will do.
When you start Firewall Builder you will get the following welcome screen:

Once you have read and closed the welcome window, you will get the following screen:

Here you can start creating your firewall configuration by double clicking on the Create Firewall button. This will lead you to the following screen:

This screen lets you choose the operating system, which in this case is the MAX OS X 10.6.5 OS. Here the important thing is to check the Use preconfigured firewall templates checkbox, in order to arrive at the following screen:

Here the best option is to choose the template of your choice, but for a simple old second hand laptop like mine it is best to choose the web server template with just one ethernet card. Remember to first look up the name of the ethernet card for your system, in this case just open about this MAC and click on NETWORK and lookup the ethernet description in this case en0. Click on next and the following screen appears:

Here you can set your IP Address correctly, this is the default address that is configured, but you can just click on the line with the IP Address and change it to whatever your ip address is. Keep it secret for prying eyes though.

After that you can click on next and specify the name for the Firewall configuration file and where you want to save it. After you click on next the compilation of the firewall configuration can start:

Make sure that you have the right access privileges (in this case root). Click on next and the firewall will be compiled as you can see in the screenshot:

After successful compilation you can deploy the firewall. This can be done with a script, which is automatically available in the Firewall builder tool, or manually, which I had to do, because on a MAC laptop the root account is as a rule disabled for security reasons. Same on a Windows platform never go online with Administrator rights (question is why I still do it myself). The compilation produces two files a .fw file and a .fwb file. Both files have to be copied to /etc/fw directory. If the directory does not exist just create it with cd /etc, mkdir /fw and set the access rights correct with chmod +x for the files after copying them to the /etc/fw directory on MAC OS X. In firewall builder your configured rules and ip address look like this:

As you can see the screenshot above shows your configuration and you can off course add and remove new rules as shown in the video above. The process is approximately the same for Linux and Unix machine with the difference that you either use .rpm or .deb packages or tarred .gz files. On windows the install is easy, just download the package and double click and follow the instructions as allways on windows.

But However just as a joke (because I like windows products):