3. This session is focused on the database and application
environment. No actual database or vendor platform special
knowledge is required to gain value from the session,
although I can answer questions on most platforms due to my
multi-platform technical background.
I’d been just hired as the Lead DBA for this company
This was agile before agile was really a thing
DBA group reported to development…until I moved them to operations years later.
I now have to go tell upper management of my findings
I wasn’t asked to do this, it was just something I recognized was a deficit in the environment and had to be done before fixing everything.
Now this isn’t the response I expected
Promptly cashed out any stocks I had that even remotely touched their stock data.
Test Data Management or TDM
With masking of critical data pushed to test and development, which can be time consuming, too.
IBM says this can’t be done effectively- it’s easy to put in place, but….
Time consuming, lots of hardware and support costs.
Not collaborative between the DBA and the tester, (non Scrum culture driven)
Not scalable?
Risky for data security
Sythetic is safer??
Subsetting is less expensive, but it’s resource intensive.
I think the right size is for development and test is the same size and the same data as production to ensure that they are going up against the same challenges they’ll have in production.
That’s the RIGHT SIZE.
At no time does this model discuss the power of virtualization.
Point out the engine and size after we’ve compressed and de-duplicated.
Note that each of the VDBs will take approximately 5-10G vs. 1TB to offer a FULL read/write copy of the production system
It will do so in just a matter of minutes.
That this can also be done for the application tier!
Almost 30 million users at risk already this YEAR!
Almost 900 breaches reported and this is what was reported.
60% is stated unreported.
If the ssn is the reference key, then the numbers should be masked identically across the objects to ensure integrity is maintained.
Article 29 makes it unlawful in EMEA to not just encrypt, but to mask data in non production systems and when handling data outside of secure environments.
HIPAA protects medical information
PCI protects payment information, via the internet, inside companies and in the public eye.
PII protects personably identify information between systems, (big brother) for demographics and information collections
SOX protects investor information
This may appear to be a traffic disaster of changes, but for developers with Agile experience, a “sprint” looks just like this. You have different sprints that are quick runs and merges where developers are working separately on code that must merge successfully at the correct intersection and be deployed.
Versioning with source control is displayed at the top, using Virtual images. You can see each iteration of the sprints.
In the middle section is the branches of that occur during the development process. A virtual can be spun from a virtual, which means that it’s easier for developers to work from the work another developer has produced.
Stopping points and release via a clone is simply minutes vs. hours or days.
This is less overwhelming than the last image…show how easy it is to manage and work with Delphix, (specifying a virtualizing product)