We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byShon Hudson
Modified about 1 year ago
© 2007 Princeton Softech, Inc. Achieve Siebel Excellence Best Practices Solution in Archiving and Test Data Management Northern California OAUG, Training Day January 2007 Stephen Mohl Siebel Specialist
© 2007 Princeton Softech, Inc. 2 What If …? What if you could easily identity and remove outdated data from your Siebel database? What if your users could still view the archived data from within the Siebel application? What if you could easily populate test databases with masked production data?
© 2007 Princeton Softech, Inc. 3 Princeton Softech Optim ™ Manage enterprise application data throughout the information lifecycle Apply business rules to subset, archive, store and access enterprise application data Protect data privacy Leverage a single solution to support and scales across applications, databases, and platforms Optimize the business value of your IT infrastructure
© 2007 Princeton Softech, Inc. 4 What is Enterprise Data Management?
© 2007 Princeton Softech, Inc. 5 Manage application performance and data volume growth cost effectively. Ensure regulatory compliance by maintaining data needed for potential audit. Preserve data snapshot prior to upgrade. Siebel Archiving Business Drivers
© 2007 Princeton Softech, Inc. 6 Comprehensive Performance Management Strategy Add Capacity Train Users Reconfigure Application Tune System Archive Outdated Data
© 2007 Princeton Softech, Inc. 7 Siebel Archiving Solution Results Archive subsets of Siebel data -Complete business object -Audit-ready “snapshot in time” Delete inactive, historical data from production Archive associated attachments from file system Locate and browse archived data Combined Reporting of active and inactive data
© 2007 Princeton Softech, Inc. 8 Siebel Archiving Solution Results Store data on cost-effective media -Access across medium types Access archive data across Siebel versions -Archive in 7.7, but access in 7.8 Provide scalable, enterprise support Selectively restore data for additional business processing -Production/Reporting/Auditing
© 2007 Princeton Softech, Inc. 9 Integration Schematic Siebel On Premise Applications Local DB Siebel Mobile Applications Development Environment Siebel Tools Design PST EAI Siebel Application Server Business Logic Layer and Core Service Data Layer Services User Interface Services Bus. Process Bus. Process Siebel Teller Applications Multiple Client Device Support Siebel Portal Framework Federated Data Sources Oracle PSFT Legacy JDEdwards OLTP Siebel Universal CustomerMaster Sync SiebelRepository Web Server OLTP Files PSTCX_Table Runtime Archive File Directory Archive Files
© 2007 Princeton Softech, Inc. 10 Translating Siebel Object Model to Optim- Siebel The Business Object becomes an Access Definition (AD) BO’s primary BC table becomes Optim’s start table Links, Joins and Multi value links determine: -Tables included in the Access Definition - Relationships between the tables -Separate Access Definitions for Optim-Siebel Archiving that use ‘Cascade Delete property’ determine the setting of Optim ‘Delete After Archive’
© 2007 Princeton Softech, Inc. 11 Archive Process Optim Server Archive File Directory Staging Area CUSTOMERS ORDERS DETAILS CUSTOMERS ORDERS DETAILS Production DB Access Archive Purge Restore Storage Archive Files
© 2007 Princeton Softech, Inc. 12 Support for: Databases -Oracle, Sybase, Informix, DB2, UDB, SQL/Server -Complex interrelationships Applications -Custom & Packaged, Legacy, Oracle E-Business Suite, PeopleSoft Enterprise, JD Edwards EnterpriseOne, Siebel, Amdocs CRM -Multiple, interrelated applications, databases & platforms Archiving Process Flow OLTP Production OLTP Optim Engine Optim Engine Template NT, Solaris, AIX, HP/UX OS/390, z/OS Archive while online for 24x7 operations Access DB2 from Unix Place DB2 Archive on Unix Templates -Define a business object -Created from schema RI, Erwin import, GUI or a combination -Multiple DBMS support Out of the box -Siebel 7.5, 7.7, & 7.8 Establish policies -Constraints or condition checks, used to determine eligibility -Time or other parameters provided at run time Archive Optim Archive -Compressed -Secured -Indexed retrieval Widest selection of Information Lifecycle options -SAN, NAS -Nearline (Centera, RISS, DR550, Intellistore) -Offline (Tape, CD, Optical) -Enterprise Vault, Tivoli Industry standard archive -Does not require a DBMS -Does not require the application (Decommissioning) -Cannot be altered Allows for deferred purge operation -Auditable -Proves data archived is identical to purged data -Allows for user review prior to purge
© 2007 Princeton Softech, Inc. 13 Ensure Referential Integrity Ex: Activities Archive File
© 2007 Princeton Softech, Inc. Enterprise Test Data Management
© 2007 Princeton Softech, Inc. 15 Challenges of Siebel Test Data Management Siebel doesn’t provide a solution or methodology for TDM Siebel has a very complex data model consisting of many tables with multiple relationships between tables Siebel Industry Applications share a common repository -Each application doesn’t use all tables and relationships that are found in Siebel tools Configuration at each customer will determine the final use case
© 2007 Princeton Softech, Inc. 16 Solution Goals Extract precise subsets of related data to build realistic, “right-sized” test databases -Create referentially intact subsets -Remove the bulk of production data -Minimize the load on testing and staging servers Speed iterative testing tasks with reusable processing definitions and Extract Files to ensure consistency
© 2007 Princeton Softech, Inc. 17 Benefits Maximize allocated disk space Increase number of test/dev environments Reduce infrastructure costs Realize development and test efficiencies -Reduce the cycle times for test upgrades -Reduces time and resources required to backup and maintain non- production environments
© 2007 Princeton Softech, Inc. 18 Repeat ?*%$! Wait Production Database Copy Share test database with everyone else Extract RI Accuracy? Right Data? Expensive, Dedicated Staff, Ongoing Responsibility. Changes After Complex Subject to Change Extract Write SQL Manual examination: Right data? What Changed? Correct results? Unintended Result? Someone else modify? After Production Database Copy Changes Current Practice? Clone Production Request for Copy #1 - Clone Production #2 - Write SQL
© 2007 Princeton Softech, Inc. 19 Training Production Database Conceptual Options Production Clone Reduced Clone Resized Clone Tables are Truncated, but database footprint still the same Database resized and re-indexed QA Dynamically load relationally intact data set’s and objects based on selection criteria's Stage Test
© 2007 Princeton Softech, Inc. 20 Compare the "before" and "after" data from an application test Compare results after running modified application during regression testing Identify differences between separate databases Audit changes to a database Compare analyzes complete sets data – finding changes in rows in tables -Single-table or multi-table compare -Creates compare file of results -Displays results on screen Comparing Data
© 2007 Princeton Softech, Inc. 21 What about data privacy? Provide the fundamental components of test data management and enable organizations to de-identify, mask and transform sensitive data Companies can apply a range of transformation techniques to substitute customer data with contextually-accurate but fictionalized data to produce accurate test results By masking personally-identifying information, it protects the privacy and security of confidential customer data, and supports compliance with local, state, national, international and industry-based privacy regulations
© 2007 Princeton Softech, Inc. 22 De-Identifying Test Data Removing, masking or transforming elements that could be used to identify an individual -Name, address, telephone, SSN / National Identity number No longer confidential; therefore acceptable to use in open test environments Masked or transformed data must be appropriate to the context -Consistent formatting (alpha to alpha) -Within permissible range of values
© 2007 Princeton Softech, Inc. 23 Transformation Techniques String literal values Character substrings Random or sequential numbers Arithmetic expressions Concatenated expressions Date aging Lookup values Intelligence
© 2007 Princeton Softech, Inc. 24 Example: Bank Account Numbers First Financial Bank’s account numbers are formatted “ ” with the first three digits representing the type of account (checking, savings, or money market) and the last four digits representing the customer identification number To mask account numbers for testing, use the actual first three digits, plus a sequential four-digit number The result is a fictionalized account number with a valid format: -“ ” becomes “ ” -“ ” becomes “ ”
© 2007 Princeton Softech, Inc. 25 Example: First and Last Name Direct Response Marketing, Inc. is testing its order fulfillment system Fictionalize customer names to pull first and last names randomly from the Customer Information table: -“Gerard Depardieu” becomes “Ronald Smith” -“Lucille Ball” becomes “Elena Wu” - Optim ships with over 5,000 male/female names and over 80,000 last names
© 2007 Princeton Softech, Inc. 26 Example: Addresses Direct Response Marketing, Inc. is testing its order fulfillment system Fictionalize customer addresses to pull an entire address from the Customer Information table: -“111 Campus Drive Princeton NJ ” becomes “1223 E. 12 th Street NY, NY 10079” - Optim ships with over 100,000 valid CASS addresses
© 2007 Princeton Softech, Inc. 27 Example: Intelligence Generating valid social security numbers (as defined by the US Social Security Administration) Generate valid credit card numbers (as defined by credit card issuers) Generate desensitized addresses Generate address based on format:
© 2007 Princeton Softech, Inc. 28 Social Security Numbers and Credit Cards F. NameL. NameCredit Card#SSN# JohnDenver VanessaJones F. NameL. NameCredit Card#SSN# JohnDenver VanessaJones Production Database Data before Masking Data after Masking… Masked with Valid CC# and SS# How are these numbers valid? Test Database Valid For Social Security NumbersFor Credit Card Numbers A Social Security Number (SSN) consists of nine digits. The first three digits is called the "area number'. The central, two- digit field is called the "group Number". The final four-digit field is called the "serial Number". All numbers must fit the latest available criteria for each section. Most credit card numbers are encoded with a "Check Digit". A check digit is a digit added to a number (either at the end or the beginning) that validates the authenticity of the number. A simple algorithm is applied to the other digits of the number which yields the check digit.
© 2007 Princeton Softech, Inc. 29 Using Custom Masking Exits Apply complex data transformation algorithms and populate the resulting value to the destination column Selectively include or exclude rows and apply logic to the masking process Valuable where the desired transformation is beyond the scope of supplied Column Map functions Example: Generate a value for CUST_ID based on customer location, average account balance, and volume of transaction activity
© 2007 Princeton Softech, Inc. 30 Implementation Time Line Project Scope Identify Application(s) Access requirements Application locations Develop Resource Plan Training Plan Project Plan Project Start PLANNING AND DISCOVERY Analysis Analyze Infrastructure IT & Business Processes Enhanced access Define Retention policies Archive location Business objects Update Resource plan Project Plan IMPLEMENTATION Design & Build Testing Production Design Architecture Business objects Conduct Team training Prepare Environments Test Plans Build (Optional) Business Objects Enhanced data access Conduct End user training Test Archive Data Access Backup Prepare Go live plan Production Environment Go Live Recurring archive process Project Team Activated Project Delivered SUPPORT Review Support Conduct Project Review Value measurement Prepare Success Story Provide User support Monitor Maintenance Issue resolution
© 2007 Princeton Softech, Inc. Questions & Answers
Maximo © 2009 IBM Corporation Optim ™ for Maximo.
© 2012 IBM Corporation Information Management How to create right-sized test database ? Step-by-step Use Case Jan Musil, Database Specialist, Community.
PrincetonSoftech 2004 Maximize Oracle E-Business Suite Performance by Archiving Historical Data David K. Glomski Sr. Consultant.
Optim ™ © 2008 IBM Corporation ® Enterprise Data Management Featuring IBM ® Optim™ Unlocking the Business Value of Information for Competitive Advantage.
UNIT 2: Overview of the Database Development Process Pearson Education © 2009.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
© 2007 Princeton Softech, Inc. Anatomy of a Archiving Project Basic Principles To Consider Eric Offenberg, Product Marketing Manager Tim Smith, Technical.
Information Lifecycle Management for Oracle Apps Data Erik Jarlstrom Director of North American Pre-sales.
02/12/00 E-Business Architecture John Tullis DePaul Instructor
C6 Databases. 2 Problems with traditional file environments Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple.
Oracle’s EPM System and Strategy Oracle Hyperion Financial Data Quality Management (FDM) for Planning Michael van der Merwe Oracle BI & EPM Strategy.
Database Administration Chapter 16. Need for Databases Data is used by different people, in different departments, for different reasons Interpretation.
Chapter 9 Database Planning, Design, and Administration Transparencies © Pearson Education Limited 1995, 2005.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
© 2005 Princeton Softech, Inc. Princeton Softech Anatomy of an Archive Project Let’s Talk About Data!! April 18, 2007 Alan Schneider.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data Enterprise Technology Centre.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
1 Oracle Database 11g – Flashback Data Archive. 2 Data History and Retention Data retention and change control requirements are growing Regulatory oversight.
Chapter 4-1 Chapter 4: Organizing and Manipulating the Data in Databases Introduction Creating Database Tables in Microsoft Access Entering Data In Database.
Database Features Lecture 2. Desirable features in an information system Integrity Referential integrity Data independence Controlled redundancy Security.
20 Copyright © 2008, Oracle. All rights reserved. Cache Management.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
DATABASE MGMT SYSTEM (BCS 1423) Chapter 5: Methodology – Conceptual Database Design.
Integrating the Mainframe Liberating Enterprise Data.
2 Copyright © 2006, Oracle. All rights reserved. Defining Data Warehouse Concepts and Terminology.
Managing Oracle Applications Data … Smarter No part of this presentation may be reproduced or transmitted in any form by any means, electronic or mechanical,
ITGS Databases. Databases - organized collections of related data –Databases are at the heart of many IT systems Example: student records Databases –Data.
Agenda Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your.
1 Database Systems: A Practical Approach to Design, Implementation and Management International Computer Science S. Carolyn Begg, Thomas Connolly Lecture.
BUSINESS INTELLIGENCE/DATA INTEGRATION/ETL/INTEGRATION AN INTRODUCTION Presented by: Gautam Sinha.
Advanced Accounting Information Systems Day 10 answers Organizing and Manipulating Data September 16, 2009.
Chapter 14 The Second Component: The Database.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Microsoft ® SQL Server ® 2008 and SQL Server 2008 R2 Infrastructure Planning and Design Published: February 2009 Updated: January 2012.
Physical Database Monitoring and Tuning the Operational System.
Efficient RDF Storage and Retrieval in Jena2 Written by: Kevin Wilkinson, Craig Sayers, Harumi Kuno, Dave Reynolds Presented by: Umer Fareed 파리드.
Chapter 4-1. Chapter 4-2 Chapter 4: Organizing and Manipulating the Data in Databases Introduction Creating Database Tables in Microsoft Access Entering.
Data and Database Administration CISB514 Advanced Database Data Administration & Database Administration.
34 Copyright © 2007, Oracle. All rights reserved. Module 34: Siebel Business Services Siebel 8.0 Essentials.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
2 Copyright © Oracle Corporation, All rights reserved. Defining Data Warehouse Concepts and Terminology.
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
Views In some cases, it is not desirable for all users to see the entire logical model (that is, all the actual relations stored in the database.) In some.
© 2017 SlidePlayer.com Inc. All rights reserved.