Maximizing Database System Reliability

Database system reliability encompasses protection from loss of database availability, safeguards on data integrity, and freedom from software defects/database corruption. These characteristics are built into eXtremeDB through several features.

ACID-compliant transactions

eXtremeDB’s transactions support the ACID (Atomic, Consistent, Isolated and Durable) properties, which safeguard data integrity by guaranteeing that interdependent operations either complete together or are cancelled together.  Learn more about this and other key features.

Transaction logging

Optional transaction logging provides recoverability. While it might seem that transaction logging re-introduces on-disk storage overhead into in-memory databases, McObject’s benchmark tests confirm that an IMDS with transaction logging still outperforms a traditional “on-disk” DBMS performing the same tasks, even when the on-disk database is fully cached.

Non-volatile memory support

Using non-volatile memory as storage, in-memory databases gain durability while keeping high performance. (Read McObject’s white paper, Database Persistence, Without the Performance Penalty.)

High Availability

eXtremeDB’s high availability option ensures continuous database operation even in the face of hardware or software failure. eXtremeDB’s HA support includes both synchronous (2-safe) and asynchronous (1-safe) replication, with application-directed failover.

Active Replication Fabric

eXtremeDB’s Active Replication Fabric has the capability to replicate data from the edge to the server, potentially through many tiers. It will intelligently queue data during network malfunctions or outages for later synchronization.

Clustering

eXtremeDB’s clustering capability adds reliability via the presence of multiple, synchronized database nodes.

Advanced debugging and corruption prevention

The database runtime implements many verification traps and consistency checks. After application debugging, the optimized version of the eXtremeDB runtime can be used, removing traps and internal checks, and restoring valuable clock cycles. In addition, cyclic redundancy check is built into the backup-and-restore feature for in-memory databases, to ensure the database was written in its entirety when saved, and has not been corrupted.  Learn more about this and other features on this page.

Type-safe API

eXtremeDB’s native C/C++ API is type-safe, so that any errors in data-typing are caught at compile time.

Built-in security features

eXtremeDB multi-layered security offers AES encryption employs a user-provided cipher to prevent access or tampering. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is supported in all communications (client/server, HA and Cluster).