Feeds

Oracle shuts Windows on data integrity drive

Multivendor data checking spec will be Linux-only

Beginner's guide to SSL certificates

Oracle has slammed a window in Microsoft's face, by ensuring that a new enterprise data integrity checking scheme for mission-critical applications will run only on Linux.

The database company has linked up with Emulex, LSI, and Seagate to standardise the way that their technologies check for data corruption.

The four companies have formed the Data Integrity Initiative, and say their work will use the DIF (data integrity field) spec developed by the ANSI T10 committee - DIF allows 8 bytes of "protection information" to be added to each logical SCSI block.

However, it will also be based upon work done in Oracle's Hardware Assisted Resilient Data (HARD) programme, said Wim Coekaerts, Oracle's Linux engineering veep. That makes the initial DII thrust Linux-only, with no schedule yet for Windows or Unix implementation.

"Our work to implement DII technology in the Linux kernel will allow applications and kernel subsystems to take advantage of these crucial data integrity features," Coekaerts said.

Having a standard data checking mechanism allows data integrity to be verified all the way from the application through the storage network to the disk drive, the DII companies claimed. It will enable Emulex Fibre Channel SAN cards, LSI arrays, and Seagate hard disks to validate data by checking it against metadata created by the Oracle database.

"End-to-end data protection cannot be achieved by a single vendor, and therefore requires a multi-vendor initiative such as the DII," said Phil Bullinger, a senior veep with LSI's storage group.

DII will need new hardware as well as updated software, and the founding companies said that should begin arriving next year. As yet there are no SAN fabric suppliers involved, but the timescale presumably means there is still time for them to join up. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.