• IBM Consulting

    DBA Consulting can help you with IBM BI and Web related work. Also IBM Linux is our portfolio.

  • Oracle Consulting

    For Oracle related consulting and Database work and support and Migration call DBA Consulting.

  • Novell/RedHat Consulting

    For all Novell Suse Linux and SAP on Suse Linux questions releated to OS and BI solutions. And offcourse also for the great RedHat products like RedHat Enterprise Server and JBoss middelware and BI on RedHat.

  • Microsoft Consulting

    For Microsoft Server 2012 onwards, Microsoft Client Windows 7 and higher, Microsoft Cloud Services (Azure,Office 365, etc.) related consulting services.

  • Citrix Consulting

    Citrix VDI in a box, Desktop Vertualizations and Citrix Netscaler security.

  • Web Development

    Web Development (Static Websites, CMS Websites (Drupal 7/8, WordPress, Joomla, Responsive Websites and Adaptive Websites).

17 November 2012

StarTrek Next Generation Holodek by Microsoft!

Here is a pretty good start for the development of a Holodek or 3D projection from Microsoft Research:

Holo Desk is a novel interactive system combining an optical
see through display and Kinect camera to create the illusion
that users are directly interacting with 3D graphics. A virtual
image of a 3D scene is rendered through a half silvered mir-
ror and spatially aligned with the real-world for the viewer.
Users easily reach into an interaction volume displaying the
virtual image. This allows the user to literally get their hands
into the virtual display. A novel real-time algorithm for rep-
resenting hands and other physical objects, which are sensed
by the Kinect inside this volume, allows physically realistic
interaction between real and virtual 3D objects.

This is not just fun and play, there is more to learn at:

holographic interfaces

15 November 2012

Is your Data secure!

Oracle Database Security solutions can help to secure your data.

As you all know Cyber crime is on the rise and phishing on the web and rootkits and hacking are common these days. But not only your passwords and personal information is in risk of being stolen, also your Enterprise Data in your Databases is in risk of being compromised and stolen by all kinds of criminal elements.

Forrester recommends a comprehensive database security strategy should comprise of
three key pillars.

Foundation Pillar Comprises Of 
1) Discovery, 
2) Classification,
3) AAA, And Patch Management

Without understanding where and how your sensitive data is used, data security can be very challenging. The foundation pillar stresses on discovery and classification of sensitive data and having a robust authentication, authorization, and access control framework. In addition, all critical databases should be patched on a regular basis to eliminate known vulnerabilities. Understanding which databases contain sensitive data is a key requirement for any database security strategy. Enterprises should take a complete and ongoing inventory of all databases, including production and nonproduction, and ensure authentication, authorization, and access control is enabled for all critical databases. To establish a strong database security foundation, enterprises should use:
  •        Database discovery and classification that provides information on which databases to focus.
  • ·       Authentication, authorization, and access control for database access.
  • ·       Patch management that protects against known vulnerabilities.

SQL injection as a hacking technique is widely used and mostly due to faulty or sloppy programming. Can you afford to figure out which PL/SQL procedures and SQL queries lack bind variables and are subject to potential SQL injection and have all your Data in your Database compromised?
If your answer is no to this question, then take a look at the Oracle solutions to protect your DATA. Below you can find an overview video with all the security solutions for your enterprise that can help you protect your DATA.

As you can see in de figure below it is really important to protect your DATA as two third of all data recides in Databases, making this new Oracle technology more valuable then ever.
As already said hacking and criminal web behavior is becoming more of a problem then ever, even small businesses and individuals are targeted, as more and more things are done online:

And threats are not coming only from the outside, also fraudulent behavior from your workforce is becoming a concern to think about:

SQL Injection explained:

And the number of compliance regulations grows and companies start legging behind in conforming to these law imposed regulations:

There is a smart and quick solution to this however the Oracle Security solution, which is consisting of multiple facets, like the Database Firewall, the Audit Vault, Label Security, Data Masking amongst other features, as can be seen in the figure below:

How does all of this work in a overview easy to understand way, well the things you like to prevent from malicious hackers to do are the things listed below:

How unauthorized users are prevented to gain access to data that is not meant for their eyes the figure below explains how this is prevented.

You can control access to Data in the Database as follows:

Role based access control or classification of Data for certain users to allow access to that data.


Control users access to DATA with the Oracle Audit Vault:

And track changes to DATA with the Total Recall facility in the Oracle Database, for Critical Data with the Flashback Archive feature from Oracle Database 11gR2.

Here is a small video that explains Oracle Database Auditing: Oracle Database Audit Vault:

And here is a demo on Oracle Database Vault:

For more info please contact DBA Consulting at:
Drs. Albert Spijkers
DBA Consulting
web:              http://www.dbaconsulting.nl
blog:              http://drsalbertspijkers.blogspot.com/
profile:           http://nl.linkedin.com/pub/drs-albert-spijkers/13/b4a/7a8
Facebook :     http://www.facebook.com/DBA-Consulting
email: albertspijkers@dbaconsulting.nl

09 November 2012

Super Computing with Linux

Why computing with Linux is so SUPER!

On this blog I already blogged about IBM and why they invested heavily in open source software like RedHat and SUSE Enterprise Linux and that they are responsible for a lot of SAP and other implementations (70% SAP). But that is not the only thing Linux is good at.

Linux accounts for as much as 94.2% share as Supercomputer OS! This might come to you as a pleasant surprise, but indeed, Linux outshines any other operating system when it comes to Linux. Investigation of the latest ranking released by Top500 (independent organization responsible for ranking supercomputers according to the LINPACK benchmark) yields some very interesting results. As it might be boring for you go through a detailed report, we have compiled the results in a handy info graph that shall give you a quick and intuitive insight to our findings.

  • All the top Ten Supercomputers use Linux OS. (Linux OS includes Cray Linux Environment and bullx SUperCOmputer Suit)
  • All the top Twenty Supercomputers use Linux OS. Two of which use Linux OS bullx SUperCOmputer Suit.
  • Out of top 50 Supercomputers 44 run on Linux OS while 6 use OS other than Linux. 3 of which use Unix while 3 use Mixed OS. The supercomputers which employ Mixed Operating system use CNK/SLES 9.
  • Out of Top 100 Supercomputers 7 operate on UNIX, 1 on Windows, 5 use mixed operating system. All the rest 87 Supercomputer use Linux.
  • The super computer that runs on Windows ranks 96th fastest supercomputer out of 100.
  • Out of supercomputers ranked from 100th to 150th, 5 employ non-Linux OS 3 of which are Unix, 1 BSD-based OS and 2 run on Mixed type of OS.
  • Out of Supercomputers ranked between 100th to 200th, 11 use Operating system other than Linux. Of which 1 is Windows OS. The Windows Supercomputer is ranked 157th among top 200 Supercomputers.
  • Out of Supercomputers ranked between 200th to 300 only 4 supercomputers use OS other than Linux, 3 employ Mixed while 1 employs UNIX.
  • Finally out of top 500 super computers , 462 run Linux, followed by Unix with 24 Supercomputers and 11 running Mixed 2 running on Windows. Finally there is only 1 BSD OS based supercomputer.
  • Supercomputers that run on Windows family OS both employ Windows HPC 2008 OS.

Having stated all the stats, we come to the conclusion that Linux despite being an open source software (allegedly having lack of support, lack of proper documentation etc.) has completely crushed proprietary OS when it comes to supercomputers

Of all these super Computers IBM does have a really big share as can be seen in this overview:

For more info please contact DBA Consulting at:

Drs. Albert Spijkers
DBA Consulting
web:              http://www.dbaconsulting.nl
blog:              http://drsalbertspijkers.blogspot.com/
profile:           http://nl.linkedin.com/pub/drs-albert-spijkers/13/b4a/7a8
Facebook :     http://www.facebook.com/DBA-Consulting
email: albertspijkers@dbaconsulting.nl