08Jul2016

Application Development: NaCl and Sodium crypto libraries

Security concepts are very important at line of professional Application Development in enterprise scope. Cryptography helps us to achieve Integrity and Confidentiality as 2 of 3 main Security principles. Protocols needs us to encrypt and decrypt important data, specific content have to be signed and verified. For decades we used RSA, OpenSSL [https://www.openssl.org/] as general-purpose cryptography library and its wrappers. On the other hand, OpenSSL is not so easy to work with. It needs both some level of understanding cryptography and its approaches as a whole and pure implementation aspects of OpenSSL, as well. For now, we have much better approaches. Easy to use, but strong at line of cryptography and implementation.

NaCl

Daniel J. Bernstein (with colleagues) released NaCl library [https://nacl.cr.yp.to/] several years ago. It’s pronounced “slat”. The main goal was to bring easy-to-use solution for software developers, who need just-work cryptography in their projects. Simplicity is the key point of the interface of the framework. On the other hand, it covers all duties of cryptography library and provides all common routines: hashing, public-key encryption, signing and authenticated encryption. E.g., authenticated encryption is an algorithm including 3 steps mixed in one of 3 ways. NaCl provide single interface crypto_box, which is done everything in one step. Such approach is much safer. Developer can’t break something in the flow. Main implementation of the library is in C, C++ and python. C version can be used in embedded Application Development. It doesn’t depend on dynamic memory allocation. There are several implementations of the same function.

Read more
28Jun2016

Database Development: RethinkDB is a modern database for real time Web

Nowadays, almost all applications are asynchronous multi layer systems linked together via events scheme. One module of the system subscribes on events produced by another part. It’s regular Listener pattern. We have been designed and implemented a lot of applications in this way, but all of them are placed in the middle layer or UI side. It would be nice to have similar functionality on the data layer of persistent storage. Redis [http://redis.io/] as a Database Development system provides Listener approach out of the box. But Redis is in-memory key-value storage. It’s used rather as cache. There is RethinkDB database [https://www.rethinkdb.com/] supported Listener pattern and used as clustered document storage like MongoDB.

Installation

RethinkDB is open-source. There are installation packages available for all major platforms. On the other hand, it would be better to use docker container:

docker run -d -P –name rethink1 rethinkdb

Technically, the database is a set of tables. A table contains documents similar to MongoDB. JSON is used as representation of the nested structure of a document. There are 4 official drivers for RethinkDB: python, ruby, java and javascript for node.js. If you use other programming language, there are a lot of community-managed drivers based on JSON protocol.

RethinkDB has out of the box sharding and replication clustering. You can configure a cluster via Web UI administration console. Last one can be used for monitoring, as well.

Read more
03Aug2014

Database Development: MongoDB 3.0 is coming

A huge amount of time enterprises and startups around the world have been using various NoSQL platforms for their Database Development needs. The open source NoSQL database MongoDB [http://www.mongodb.org] is going to major release version 3.0 in March. The latest release candidate is already available [http://www.mongodb.org/downloads]. The MongoDB team is trying to touch even higher level of new DBMS standard for any project in any industry, to be called “default database”.

Improvements and innovations

There have done a lot of work at line both the academical research and practical usage. First of all, sufficient improvements in the storage layer bring comprehensive boost performance and scalability. There is the WiredTiger storage engine.

Read more
22Jan2013

Can SQL Server be counted as a BID for Business Intelligence Greatness?

In the term of the last months the main SQL Server got the whole set of brand new capabilities. According to the word of experts this doesn’t concern just the business intelligence inself.

One of the main features appeared to be the AlwaysOn, which now provides more significant capabilities within the infrastructure of the server. Such aspects as programmability, manageability, security and scalability are improved. The new components available in the new edition are made for analysis, integration and faster responding.

The query response within the In-Memory Column Store is also supported with the AlwaysOn system. According to the specialists’ point of view the new SQL is about 100 times faster than the previous one.

Read more
26Jun2012

Database security: things a good compliance officer ought to know

Starting the article, I decided to assume most people are already common with the database development and the details of its organization. Still I realized in the process that sometimes people dealing with the data protection aren’t really well informed about a lot of needful things. As we speak about databases, not all the developers actually know the aspects of the database security, as well as some issues that are security related can easily pass them. Moreover some databases are literally full of rather sensitive information.

So why would the companies through away awesome sums of money to keep their desktops and perimeters secure? Here are the main reasons to do so:

1. “I don’t see so I don’t care”. Usually the databases won’t get our attention unless they get slow or break down.

2. “Cat in a box”. Most compliance officers have no idea, what does actually happen inside the database aside from getting the needed information out of it.

3. “Welcome if you get access”. The feature of DBA is that they stay secure as long as you have the access, they will just go on tuning the performance of the database.

Read more
02Feb2011

Database development in the manager field

Every manager of the local database is usually in charge for a series of actions like integrity, performance and security of the given database management system. Also the database managers tend to plan and develop the database they’re working with as well as to deal with the incoming troubles of all kind. The specific details of manager work vary according to the databases and the inner nature of the organization that hired the specialist. The level of responsibility and the measures of control are also different. The manager may work with the entire database in all its aspects or be limited just to the database development in specified fields.

Read more
04Aug2010

How the other ways of MySQL development can be picked up.

Many people tend to use MySQL every day, thus they need the system to work effectively. Here we offer the basic survey over the various types of this program depending on the company that released it. The healthiest MySQL is believed to be in the hands of Oracle. Still this type od the program is not the open source, still the open source programs seem to be the most wanted and valuable. However Oracle never tried to deal with the open source, so the company most likely holds to its natural course.

So who can perform the really best of the best software of this kind?

We assume it might be any firm that has the possibility to do MySQL development. The hosting based on shared infrastructures is popular today, still the developers do not think about it too often. The users tend to choose the database that is really comfortable to use. With it we can define two mostly common features:
– MariaDB, that obtains most features of the MySQL;
– PostgreSQL, that is also a nice alternative.

Read more
18Jun2010

The weak points of the system the web database developers shall know

It’s not easy to protect data nowadays; still you will be much more protected if you cover the most visible vulnerabilities. This way your data will be secure.

The main thing is that most of the databases are not protected enough from the very beginning and it’s your trouble to protect them well enough. The administrator shall review the base regularly and close the unneeded packages so they will not appear the hole to dig into the database. The most important is however the regular patch.

Here are the most valuable ten features you shall keep in mind.
1. The password. It shall be complicated enough for the intruders not to break it in a second, leaving your database revealed.
2. SQL. The SQL injection is one of the most popular ways to get to your data and spoil it. Web database developers shall teach the system to avoid accepting all the data coming from the users.

Read more
22May2010

What applications development shall look like?

Sometimes the application just refuses to perform the correct way. Usually we expect from the page in the internet to work fast and be as effective as possible. With a good connection it shall take no more then 30 seconds for the well-programmed web application.

Still some databases do not obtain enough performance issues and work rather slow for that reason. It’s usually easy to change the design of the application; still the database has usually a lot of applications downloaded. So if you opt to change its design, it might have drastic consequences.
Here are the main features you shall not forget if you really want to create a good database.
1) Variables that are bind. The query of the database shall be properly identified and optimized for the effective system work as database application.
2) Badly formed query. This might be the reason of significant problems in the SQL. Choose the adequate corresponding construct.

Read more
26Jan2010

The life cycle of the Database Development in all its phases

The way from the needs of the local user to the effective solution in the form of the software is rather complicated. If we’re talking about the proper Big data programming, we shall perform the set of actions for creating the needed software and for it to perform the needed actions.

1) Analysis of the requirements.
Before creating the database you shall understand completely what you are expecting from it so it will answer your needs completely.

2) The design of the database.
Choose the most suitable database model, so the final result will be just what you expected.

3) Selection and Evaluation.
After creating the basis of the database development, you ought to evaluate it and choose the appropriate system of the management.

Read more
Pages:12