It is a Blog containing information on Resources and usage Of All Types Of Softwares

Monday, October 20, 2008

Database software

Installing Oracle Real Application Clusters

Install Oracle Clusterware and Oracle Database software using Oracle Universal Installer (OUI), and create your database with Database Configuration Assistant (DBCA). This ensures that your Oracle RAC environment has the optimal network configuration, database structure, and parameter settings for the environment that you selected. As a database administrator, after installation your tasks are to administer your Oracle RAC environment at three levels:Instance AdministrationDatabase AdministrationCluster AdministrationUnderstanding Compatibility in Oracle Real Application Clusters Environments
To run Oracle RAC in configurations with different versions of the database in the same cluster, you must also install clusterware. For example, to run Oracle9i and Oracle 10g in the same cluster:For Oracle RAC nodes running the Oracle9i database, you must install an Oracle9i cluster:o For UNIX the cluster can be HACMP, Serviceguard, Sun Cluster, or Veritas SFo For Windows and Linux, the cluster is Oracle Cluster ManagerIf you want to install Oracle RAC running Oracle Database 10g or later releases, you must also install Oracle Clusterware. See your platform-specific Oracle Clusterware Installation guide and the Oracle Clusterware Administration and Deployment Guide for more information.If you are running Oracle RAC 10g and Oracle RAC 11g in the same cluster, you must be running Oracle Clusterware 11g (only)Oracle requires that you install the Oracle9i RAC software first if you are going to run it in a cluster with Oracle RAC 10g or Oracle RAC 11g.Overview of Oracle Real Application Clusters Installation and Database CreationOnce you have installed Oracle Clusterware and it is operational, run OUI to install the Oracle database software with Oracle RAC components.During the installation, OUI runs DBCA to create your Oracle RAC database according to the options that you select. DBCA also runs the Net Configuration Assistant (NETCA) to configure the network for your Oracle RAC environment.Oracle RAC software is distributed as part of the Oracle Database installation media. By default, the standard Oracle Database software installation process installs the Oracle RAC option when it recognizes that you are performing the installation on a cluster. The OUI installs Oracle RAC into a directory structure, which can be referred to as the Oracle home, which is separate from other Oracle software running on the system. Because OUI is cluster aware, it installs Oracle RAC software on all of the nodes that you defined to be part of the cluster.Oracle recommends that you select ASM during the installation to simplify storage management; ASM automatically manages the storage of all database files within disk groups. You can also configure services during installation, depending on your processing requirements. If you are using Oracle Database Standard Edition, then you must use ASM to store all of the database files.By default, Oracle creates one service for your environment and the service is for the database. (The default database service is typically identified using the combination of the DB_NAME and DB_DOMAIN initialization parameters: db_name.db_domain.) The default service is available on all instances in an Oracle RAC environment, unless the database is in restricted mode.Overview of Extending Oracle ASM and Oracle Real Application Clusters SoftwareYou can extend Oracle ASM and Oracle RAC in grid environments to additional nodes by copying cloned images of the ASM and Oracle RAC database homes to other nodes in the cluster. Oracle cloning copies images of the software to other nodes that have similar hardware and software. Cloning is best suited to a scenario where you need to quickly extend your Oracle RAC environment to several nodes of the same configuration.Oracle provides the following methods of extending Oracle Clusterware environments:Oracle cloning procedure using cloning scriptsOracle Enterprise Manager cloningThe addNode.sh script and OUI cloningFor new installations or if you have to install only one Oracle RAC database, you should use the traditional automated and interactive installation methods, such as OUI, or the Provisioning Pack feature of Oracle Enterprise Manager. If your goal is to add or delete Oracle RAC from nodes in the cluster, you can use the addNode.sh and rootdelete.sh scripts.The cloning process assumes that you successfully installed an Oracle Clusterware home and an Oracle home with Oracle RAC on at least one node. In addition, all root scripts must have run successfully on the node from which you are extending your cluster database.At a high level, Oracle cloning involves the following main tasks:Clone the Oracle Clusterware home.Clone the Oracle home with the Oracle RAC software.The process for cloning the Oracle home onto new nodes is similar to the process for cloning the Oracle Clusterware home.Run NETCA on each new node to create a listener.If you have not already created a database, then run the DBCA to create one.Follow the post-cloning procedures to complete the extension of your Oracle RAC environment onto the new nodes.

Master Database Corruption Of Sql

The installation of MS SQL Server is composed of several databases, each which hold its own relevance. Master database, Model database, TEMPDB, these are few of them. But the most important one is Master database.The Master database is the one which is responsible for carrying information like login accounts, the pointers to the other databases and so on. This comprises of the system catalogs to maintain the data like disk space, system wide configuration settings, other database existence information, file allocations and other similar and so is the most relevant part of the SQL Server installation. Without this database, the starting up of the server is practically impossible. The file extension of this file is MDF.
In few of the cases for the users, specially the SQL Server administrators, this becomes hard to resist that the master database is corrupt. The improper backup of the same add to the grief of the user and create the need of SQL recovery. There are number of reasons for the database corruption like virus attack etc. and strangely, some of the reports also state that the bulk use of DELETE from a table makes it corruptIf the master database is corrupt, then surely others also do have the problems and thus the need of MDF recovery comes to an immediate. However you can try out to rebuild it with rebuild.exe and restore it.But, if in any case, this procedure doesn’t work properly, then you can switch on the third party MDF Repair software. Also in complete success scene of rebuilding the master database, the other databases may be lying in the corrupted state for which again these SQL recovery software are needed.These software have the wonderful ability to run the scanning mechanism to repair and restore the MDF file. They can benefit you with complete MDF recovery in each and every instance of corruption with the intuitive user interface.You can have safe SQL recovery with their read-only nature. These MDF recovery utilities are applicable for all the objects of database.Stellar Phoenix SQL Database Recovery is the standout key term for having safe and complete MDF repair. The software uses the powerful scanning algorithms to give the stupendous results. This SQL repair software creates the script files after repair and the data can easily be restored.With the interactive user interface, this SQL recovery tool eases the users. You can use it for SQL Server 2000.

Forgot Pst Password

Security sits at the topmost priority to the user as otherwise the intrusion by other users will reveal your information, which is a harm to your personal and professional aspects. MS Outlook, which is widely accepted e-mail client, receives the emails in the single repository called PST file. Now, this is quite obvious that you will not desire to sacrifice the data security as PST may contain the relevant information, simply not to be disclosed other than you.One way to protect the Outlook PST data is to lock Outlook with the password, but unfortunately this is only applicable through third party tools. But on the other hand, you can deploy the password on your PST file. The users using the POP3 or HTTP receive e-mail messages directly to the PST, instead of any offline file and so password protection can be accomplished to the PST to protect it from the fairly unreliable people, using your system.

But have you thought of the situation when you have forgotten your own set password? Isn’t the scenario hard to imagine? Surely, it is. Eventually, your first response would be wander in each corner of your mind to track back the forgotten password. May be some of the users also search out the bits of paper or files which might secretly been used to store all the password information.The failure of all the attempts is the indication of PST password recovery through other means. By tit or tat, you would like to recover the forgotten password as this is the matter of your PST which is holding your precious information for so long and now the foolish incident of losing the password can’t ruin your expectation.Without the password, your e-mail messages, calendar items, notes, journals and rest other objects are waiting for PST recovery. Thus this is required to get PST password recovery done. This apparently complex task can be easily accomplished by the third party tools which are indented for recovering the lost PST password. These utilities may be equipped with the PST recovery options too. Stellar Phoenix Outlook PST Repair software does this job tremendously with the appropriate procedures to have PST password recovery. The software also has the mechanism to run the effectual algorithms to implement PST recovery. The software does all the intended jobs, quite magnificently and superbly, with no regrets


Data Recovery

Data recovery emergency fetch too many realities to face including financial and of course traumatically. The businesses, for which data is considered as assets, can experience downfall in the market, loss in revenues and eventually a complete destruction. Data loss is something like hitting the skyrocket in terms of expenses. While, talking on the individual level, the loss of the huge portions of information is reflected in the nights of sleep. So, this reveals that data recovery is more than a mere requirement. These are the life-saving techniques which work for your company to keep it operational. Shipments are waiting to be sent, calls are queuing up to be answered, bills are residing to be processed, and no data is there. Isn’t the scenario hard to even imagine? But this is a reality faced by the companies during the data absence.

Well, the impacts can be direct as well as either; the eventual destruction is just a rare incident due to loss of few files. But in any of the way, this may restrict your power to be active in few of the business operations. These are the conditions, practically hard to handle and hence resist.The loss of revenues and the money spent whilst your data is being rebuilt doesn’t go to the acceptance. If it goes for a week or longer, this needs the in-depth analysis to decide the fast solutions. However, the data recovery solutions are the key to all the locks of data loss.Data recovery remedies are the pleasuring material to the victims of data loss, who have realized that the data loss can kick out them from their job. However, data loss dram is played in by all the employees in the company. Employees seek the face of the IT department, whereas the IT department tries to put in the new rules to recover the information and to deal with the hard drive, which is a real threat to the data. This is due to the reason that sometimes the results are so drastic that data loss gets counted forever.Always bear in mind that the simple use of data recovery software will give you the effective results, while the hard drive is not obsessed by the physical crashes. On the other hand, you may require data recovery services in else case. Reliability of the source is also equally important as the root determines how the fruit will reap.Here, I am talking about data recovery company’s status and its achievements in recovering the data. This should be appropriate enough to give you the data recovery solutions.Stellar Information Systems Limited provides you the most ultimate quality data recovery solutions for the variety of data loss incidents. Data recovery software, for the different operating systems, are good to scan your affected media with the powerful scanning algorithms and to avail the safe data recovery.Data recovery service is benefited through Class 100 Clean Rooms and the job of expert and talented data recovery experts. The company assures you maximum data recovery in all cases of damage to the media.

No comments: