Sidebar

Product Review: Vision replicate1

Product Reviews
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

 

Whatever the reason, the sharing of information among these disparate applications and unconnected data stores is often difficult, generally cumbersome and sometimes jury-rigged, if it is done at all. This is a problem. Easy access to integrated information is typically a requirement for productive operations and effective business analysis. What's more, the redundant manual entry of data into multiple databases is expensive and increases the potential for error.

These are the kinds of issues that Vision replicate1, from Vision Solutions, Inc., is designed to address.

Data Replication

Vision replicate1 falls into the class of software known as data replication infrastructure. However, the word "replication" may be misleading. The definition of replicate is to make an exact copy, but that is not always what Vision replicate1 is called upon to do—although it can do that as well. For one thing, the source and target database(s) may use different DBMSs. What's more, before sending it off to the other database(s), Vision replicate1 can transform the captured data, for example, to accommodate differing data types on the target database or to address differing user requirements, such as changing product names to accommodate regional differences. Thus, the transmitted data that is loaded into the target database is a replica of the underlying meaning of the source data but not necessarily of its form. For simplicity, the remainder of this article will use the word "replication" to refer to this copying of data content, regardless of the end form.

Vision replicate1 can perform its replication functions without the need for any programming on your part unless you want to apply custom-built data transformations.

The above discussion provides a high-level view of Vision replicate1, but a more detailed look at its features and functions is necessary to understand the value that your organization can derive from it.

Heterogeneity

Vision replicate1, which is written in Java, is very portable. It can run under a variety of operating systems, including Windows NT, XP, 2000, and 2003; HP-UX; Solaris; AIX; Linux; OS/400; i5/OS; OS/390; and z/OS. And it can move data from and to Microsoft SQL Server, Oracle, DB2, UDB, and Sybase, with support for virtually all of the data types available with each of those databases.

To be clear, Vision replicator1 doesn't run only homogeneously on the single platform of your choice, although it can do that. The point of this discussion is that it is capable of heterogeneous operations, i.e., copying data from, say, a DB2 sales database running on a System i server to an Oracle accounting database running under Solaris.

In addition, the database schemas do not have to be the same on the source and target. For instance, the product_number column in the catalog table in the source database can be mapped to the prodno column in the products table on the target. Or a single table can be split, with some of its columns being mapped to one target table and some to another. Likewise, provided they contain appropriate keys, tables can be joined, with the columns from two source tables being mapped into a single target table.

Bi-Directionality

Vision replicate1 can move data between servers in both directions simultaneously. As it does so, it checks for conflicts that arise when the same data is modified simultaneously in different locations. When it detects a data collision, Vision replicate1 will, depending on the parameters you set when you configure it, either automatically resolve the conflict using a rule you've specified or flag the conflict for manual resolution.

Flexible Topologies

Unidirectional and bidirectional replication is supported for all topologies, including one-to-one, one-to-many, many-to-one, many-to-many, and cascade. Using a cascade topology, replication proceeds through a chain of servers. This might be used, for example, by a U.S.-based global company that wants to reduce transmission costs by setting up a U.S. hub and replicating data from there to a European hub. The European hub can then assume responsibility for distributing the data to various European branch offices, rather than having the U.S. hub transmit to all of them individually.

Partitioning

Data partitioning—a feature that the industry also calls data selection, data filtering, or conditional data distribution—allows you to restrict replication to specific rows and columns. For example, the company telephone directory might be fed from a human resources database by replicating only the name, department, and phone number columns. Or consider a large retailer that maintains its enterprise-wide product catalog centrally, but not all products are sold in all regions. It could reduce catalog access bandwidth requirements by replicating just the relevant rows to local regional catalogs in near real-time, without the need for operator intervention.

Complex Boolean expressions can be used to define the row selection criteria.

Transformations

Not all people need data in the same way. Product databases in the U.S. may include measurements in pounds and inches, but the company's European product database may use kilograms and centimeters. Product names may be in English in England, but in French in France. Some of a company's offices may want to store dates in mmddyyyy format, but offices in other countries may want them stored in ddmmyyyy or yyyymmdd format.

Vision replicate1 can handle these differences by applying transformations to data before it is copied to the target database. Included are more than 40 pre-built transformations that can be applied without the need for any programming. You can also develop your own transformations using Java.

Column Mapping

Column mapping allows columns to be split, merged, or derived before being sent to the target database. Column splitting can be used to, say, split telephone numbers into area codes and local numbers so the area code can be used as a geographic filter. Column merging might be used to, for example, merge separate first_name and last_name columns into a single name column. The derived columns feature can be used to perform tasks such as using ZIP codes or telephone area codes to create a sales district column on the target table when it doesn't exist on the source.

Guaranteed Delivery

Vision replicate1 is designed to guarantee that data will be delivered to and loaded onto the target database. When it detects that a change has been made to the set of data selected for replication, it captures that change and stores it in a queue on the source machine. The data is not deleted from the queue until the target confirms that the data has been received and applied to the database. If the target server or the network connection to it is down, Vision replicate1 holds the data updates in its queue until the target becomes available again.

Extensive Monitoring and Control

Three tools are available to monitor and control the replication processes:

  • OmniMonCon, a graphical user interface
  • OmniConsole, a command-line application
  • WebMonCon, a Web-based interface

You can use these tools to start and stop replication processes and journal managers, view the status of the change capture processes, monitor replication queues, display logs, and more.

Data Movement Methods

Vision replicate1 provides a choice of data movement methods. Replication mode captures changes as they happen on the source database and, typically, transmits them immediately to the target, although you can also schedule the apply process to occur at a specific time or periodically. Because only changes are transmitted, this method is suitable for facilitating near real-time synchronization of the source and target databases.

Copy mode automates the capture, distribution, and application of snapshots of tables or subsets of tables. It can apply the snapshot as a complete refresh, append it to existing data, or merge incoming data with existing rows.

Synchronization mode combines the replication and copy modes. When you select this mode, Vision replicate1 initiates a snapshot copy. While that is being processed, the software captures changes made on the source database without applying them to the target. When the snapshot copy process completes, you can initiate the replication apply process to load all of the captured changes into the source database.

Model-Driven

Data distribution and sharing is defined and controlled through a model that is stored in a metadata repository that defines data sources, data targets, selection criteria, paths the data should follow, and the transformations (if any) that should be applied.

There are two ways to build and maintain the model. You can use Replication Schema Language (RSL) to define all of the parameters of the model manually. Alternatively, Vision provides a Windows-based GUI, OmniDirector, that you can use to define the model. Everything that you can do using RSL, you can also do by pointing and clicking in OmniDirector.

In order for OmniDirector to provide its full functionality, it must be able to connect to all source and target systems and it must be granted authority to query the participating databases so that it can build lists of available tables and columns. Once those lists are built, you then select target and source databases, tables, columns, and paths from the lists to create the model.

When you finish building the model, OmniDirector validates it for completeness and accuracy. The model is then committed as production metadata on each data replication source server. The model repository at the source is stored in the native DBMS of the server and contains only the metadata required at that server, not the entire model. Because every replication source server has its own copy of the necessary metadata, even if any one server fails or is taken offline, the remainder can continue their replication processes, with changes stored in queues if necessary. Thus, there is no single point of failure that can stop replication from functioning servers.

RSL is particularly useful when it comes time to migrate your replication model. You can move a model from development or test simply by exporting the RSL, changing the server names, importing the updated RSL, and committing it. This eliminates the need to re-create in production what was already created in test, thus avoiding extra work and the potential for human error whenever information is rekeyed.

Case in Point

Vision replicate1 is often used to consolidate data from various operational systems into a data warehouse. One organization that is using it for this purpose is Florida's Broward County Public Schools, the sixth largest school district in the U.S. Broward County Public Schools serves approximately 265,000 students in more than 260 schools and education centers. It employs approximately 41,900 people.

The school district makes extensive use of the data at its disposal, including attendance records, grades, test scores, medical histories, and contact information for parents and guardians. Broward uses Vision replicate1 to copy data from a variety of sources into its data warehouse. More than 200,000 students, parents, teachers, and school administrators have been given login IDs that grant them access to portions of the data warehouse as appropriate.

A key to success in the school district's business intelligence efforts is the timeliness of the data in the warehouse. Vision replicate1 helps to ensure that timeliness. "About 85 percent of our users are on Macs, and the other 15 percent on PCs," explained Phyllis Chasser, Ph.D., senior data warehouse analyst, Broward County Public Schools. "All of the student transactional applications as well as our data warehousing activities run on IBM System i. With [Vision] replicate1, we can bring data over rapidly from a wide range of data sources, including SQL tables, DB2 tables, flat files, SAP, Oracle, and others—often with just a point, click, and drag."

Easier access to more timely data has allowed the school district to enhance collaboration among teachers and administrators and improve decision-making processes. "A good example is the fact that our district demographics change on a regular basis; we have a lot of students moving from school to school during the year," said Chasser. "We used to update all of our records overnight, but now, some of the most essential data, such as student registration and attendance, is real-time. So, by the time the student reports to the new school, everything is already there, and if they move during the middle of today, the records are there immediately. Students can be placed right away in the specific classes they need. If they have problems with English or they need to be on the lunch program, there's no delay."

Broward County School District's innovative use of data warehousing has captured attention. The school district is one of five finalists in the "Creating an Agile BI Infrastructure" category of Business Intelligence Perspective's "Best Practices" Awards. At time of writing, the top honoree had not yet been announced.

http://www.mcpressonline.com/articles/images/2002/Visionlogo10100700.jpg


 
Vision Solutions, Inc.
17911 Von Karman Ave.
Irvine, CA 92614
Tel: 949.253.6500
Fax: 949.253.6501
Web: www.visionsolutions.com
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

 


 

Joel Klebanoff

Joel Klebanoff is a consultant, writer, and formerly president of Klebanoff Associates, Inc., a Toronto-based marketing communications firm. He has 30 years' experience in various IT capacities and now specializes in writing articles, white papers, and case studies for IT vendors and publications across North America. Joel is also the author of BYTE-ing Satire, a compilation of a year's worth of his columns. He holds a BS in computer science and an MBA, both from the University of Toronto.


MC Press books written by Joel Klebanoff available now on the MC Press Bookstore.

BYTE-ing Satire BYTE-ing Satire
Find out the hilarious answer to the eternal question: "Is technology more hindrance than help?"
List Price $14.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

RESOURCE CENTER

  • WHITE PAPERS

  • WEBCAST

  • TRIAL SOFTWARE

  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things


    Read Node.js for Enterprise IBM i Modernization Now!

     

  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!

     

  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.

     

  • Progressive Web Apps: Create a Universal Experience Across All Devices

    LANSAProgressive Web Apps allow you to reach anyone, anywhere, and on any device with a single unified codebase. This means that your applications—regardless of browser, device, or platform—instantly become more reliable and consistent. They are the present and future of application development, and more and more businesses are catching on.
    Download this whitepaper and learn:

    • How PWAs support fast application development and streamline DevOps
    • How to give your business a competitive edge using PWAs
    • What makes progressive web apps so versatile, both online and offline

     

     

  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.

     

  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact

     

  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment

     

     

  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.

     

     

  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.

     

     

  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails

     

  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.

     

     

  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Node Webinar Series Pt. 1: The World of Node.js on IBM i

    SB Profound WC GenericHave you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
    Watch Now.

  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.