Story image


01 May 2010

A staff member once told me that just as he was leaving his previous organisation, management had come to the realisation that the grounds, properties and infrastructure they owned and maintained weren’t their most important assets. No, that was, in fact, their data. This realisation has spread across business and industry with companies now heavily, if not totally, reliant on the quality and availability of their data. This has never been more important than over the past 12 months during some of the toughest economic times most can remember. The ability to extract and report on customer information to help retain and drive business during this time has been critical to the sustainability of a number of businesses. Businesses can no longer rely on tools such as Access to provide enterprise-scale database storage and reporting, and gone are the days of copying and pasting data into an Excel spreadsheet! Within the latest versions of these products, applications such as the Office suite become reporting tools in their own right. These hook directly into the database and include far increased functionality. By migrating Access databases to a true relational database, data can be scheduled and delivered to users or customers in the format of their choice and at whatever time they choose. Users and customers can even be given the opportunity to implement desired changes themselves. This is a huge leap in database capabilities and can be done through tools that come with the database engine, or via associated third-party tools . With so many systems and applications reliant on a database as their ‘backend’, there is an ever-more critical need to have a standardised set of data for reporting purposes. Companies will often have separate customer relationship management, enterprise resource planning, financial and sales tracking systems, all of which contain a base set of data for their customers. With the tools available within these database products, the ability to extract, translate and load a standardised and normalised set of base data has become a much easier process. By de-duplicating this base line data, errors in processing are reduced and more accurate and timely outcomes can be achieved, meaning better and quicker results – and happier customers. While the reporting capabilities have improved, so have the high-availability and disaster recovery options. The ability to take copies of customer data off-site no longer relies on writing backups to tape and having a courier move them to a different location. Current database technologies mean real-time copies of databases can be spread across multiple servers in one location using functionality such as real application clustering (RAC) or database clustering, or in disparate locations, geo clustering. Copies of databases can also be transferred in real time to off-site locations using tools such as data guard, database mirroring or log shipping. With the prevalence of virtualisation technologies and changes in product licensing, these options become easy to implement and cost-effective. With reliance on data being so high, it is critical that you maintain its security, ensure it can be used in the way it is needed, and that it can be recovered in times of crisis. You need to ensure there are well-documented processes and procedures for management, maintenance and backup of the databases. With regards this, businesses need to understand two key areas: the recovery point objective (RPO) – how much data can they afford to lose – and the recovery time objective (RTO) – how long can they afford to have their systems unavailable prior to recovery. This will drive backup and recovery strategies that match requirements. While new and improved tools provide great opportunities and leaps forward in functionality, the base tasks of securing and maintaining the database and the data remain fundamental to a great user experience. No matter what flavour of relational database management system you choose to run, it is imperative that processes and procedures are put in place to ensure its availability. Often the focus is placed on the delivery of the data and it’s only when it becomes unavailable, normally at the end of the month, that users and organisations realise how important the core database administration function is. Don’t wait to find yourself in this situation!

Why businesses should ban email attachments
"When people are working from an outdated version of a document, they can waste time, make errors, and potentially risk the success of the project they’re working on."
IRD issues more than $80 million of refunds in one week
The first two batches of automatic tax assessments have been successfully issued by Inland Revenue.
Transformation of industry verticals through 5G – Frost & Sullivan
5G has the potential to transform industry verticals through indoor connectivity, but certain key verticals will experience stronger growth than others.
AWS announces the general availability of AWS Ground Station
Once customers upload satellite commands and data through AWS Ground Station, they can supposedly download large amounts of data over the high-speed AWS Ground Station network.
Citrix to extend Workspace to Google Cloud
“In expanding our partnership with Citrix, we can better help these customers with their transformations by enabling them to access and run the applications their businesses depend on anywhere—simply, flexibly and securely.”
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared.