Oracle向Linux kernel加入数据完整性代码
Oracle宣布向Linux kernel捐赠数据完整性代码。代码是Oracle和Emulex合作开发的,已被2.6.27 kernel所接受。代码向静止和传输中的
Oracle宣布向Linux kernel捐赠数据完整性代码。代码是Oracle和Emulex合作开发的,已被2.6.27 kernel所接受。
代码向静止和传输中的数据加入元数据,监视这些数据有没有被损坏。通过检查元数据——起验证信息作用——它将能保证I/O数据操作的有效性,,从而减少应用程序和数据库错误。
Oracle has announced that it has contributed data-integrity code to the Linux kernel.
The open-source code, which has been accepted into the Linux 2.6.27 kernel, is designed to reduce data corruption by decreasing the potential for incorrect data to be written to disk, and decreasing application and database errors, Oracle said in a statement on Tuesday. According to the enterprise-software maker, the code helps maintain integrity as data moves from application to database, and from Linux operating system to disk storage.
The code adds metadata to data at rest or in transit, to monitor whether that data has been corrupted. It helps make sure that I/O operations are valid by looking at that metadata — which acts as verification information — exchanged during data transmissions.
Oracle said it worked in conjunction with enterprise-network company Emulex to produce the code. Scott McIntyre, Emulex vice president of product marketing, said that the code contribution was a "significant milestone" for data-integrity development.
"Data integrity is vital to any business that relies on critical records and information to function successfully," McIntyre said in a statement. "Our work with Oracle is designed to help datacenter administrators quickly identify and remediate corrupted data, thereby protecting their business' assets, while also helping prevent lengthy server downtime and associated costs."
The code contribution includes generic support for data integrity at the block and file-system layers, Oracle added. Oracle and Emulex are also running an early-adopter program to allow customers to test the data-integrity features of the code. In 2007, Oracle, Emulex, Seagate and LSI formed the Data Integrity Initiative, designed to improve the integrity of data in transit and at rest. The initiative seeks to build on the data integrity field (DIF), now known as the T10 Protection Information Model, within the SCSI standard.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Oracle View Encryption allows you to encrypt data in the view, thereby enhancing the security of sensitive information. The steps include: 1) creating the master encryption key (MEk); 2) creating an encrypted view, specifying the view and MEk to be encrypted; 3) authorizing users to access the encrypted view. How encrypted views work: When a user querys for an encrypted view, Oracle uses MEk to decrypt data, ensuring that only authorized users can access readable data.

Uninstall method for Oracle installation failure: Close Oracle service, delete Oracle program files and registry keys, uninstall Oracle environment variables, and restart the computer. If the uninstall fails, you can uninstall manually using the Oracle Universal Uninstall Tool.

Deleting all data in Oracle requires the following steps: 1. Establish a connection; 2. Disable foreign key constraints; 3. Delete table data; 4. Submit transactions; 5. Enable foreign key constraints (optional). Be sure to back up the database before execution to prevent data loss.

Oracle Invalid numeric errors may be caused by data type mismatch, numeric overflow, data conversion errors, or data corruption. Troubleshooting steps include checking data types, detecting digital overflows, checking data conversions, checking data corruption, and exploring other possible solutions such as configuring the NLS_NUMERIC_CHARACTERS parameter and enabling data verification logging.

Solutions to Oracle cannot be opened include: 1. Start the database service; 2. Start the listener; 3. Check port conflicts; 4. Set environment variables correctly; 5. Make sure the firewall or antivirus software does not block the connection; 6. Check whether the server is closed; 7. Use RMAN to recover corrupt files; 8. Check whether the TNS service name is correct; 9. Check network connection; 10. Reinstall Oracle software.

Oracle database paging uses ROWNUM pseudo-columns or FETCH statements to implement: ROWNUM pseudo-columns are used to filter results by row numbers and are suitable for complex queries. The FETCH statement is used to get the specified number of first rows and is suitable for simple queries.

The method to solve the Oracle cursor closure problem includes: explicitly closing the cursor using the CLOSE statement. Declare the cursor in the FOR UPDATE clause so that it automatically closes after the scope is ended. Declare the cursor in the USING clause so that it automatically closes when the associated PL/SQL variable is closed. Use exception handling to ensure that the cursor is closed in any exception situation. Use the connection pool to automatically close the cursor. Disable automatic submission and delay cursor closing.

In Oracle, the FOR LOOP loop can create cursors dynamically. The steps are: 1. Define the cursor type; 2. Create the loop; 3. Create the cursor dynamically; 4. Execute the cursor; 5. Close the cursor. Example: A cursor can be created cycle-by-circuit to display the names and salaries of the top 10 employees.
