Maximizing Database System Reliability

eXtremeDB is a reliable embedded database

Database system reliability encompasses protection from loss of database availability, safeguards on data integrity, and freedom from software defects/database corruption. These characteristics are built into eXtremeDB through several features making it a highly reliable embedded database. 

ACID-compliant transactions

eXtremeDB’s transactions support the ACID (Atomic, Consistent, Isolated and Durable) properties.  This feature safeguards data integrity by guaranteeing that interdependent operations either complete together or are cancelled together.  Learn more about this and other key features.

Transaction logging

Transaction logging provides recoverability. While it might seem that transaction logging re-introduces on-disk storage overhead into in-memory databases, McObject’s benchmark tests confirm that an IMDS with transaction logging still outperforms a traditional “on-disk” DBMS performing the same tasks, even when the on-disk database is fully cached.

Non-volatile memory support

Using non-volatile memory as storage, in-memory databases gain durability while keeping high performance. (For more in this topic, please read McObject’s white paper, Database Persistence, Without the Performance Penalty.)

High Availability

eXtremeDB’s high availability option ensures continuous database operation even in the face of hardware or software failure. eXtremeDB’s HA support includes both synchronous (2-safe) and asynchronous (1-safe) replication, with application-directed failover.

Active Replication Fabric

eXtremeDB’s Active Replication Fabric has the capability to replicate data from the edge to the server, potentially through many tiers. It will intelligently queue data during network malfunctions or outages for later synchronization.

Clustering

eXtremeDB’s clustering capability adds reliability via the presence of multiple, synchronized database nodes.

Advanced debugging and corruption prevention

The database runtime implements many verification traps and consistency checks. After application debugging, the optimized version of the eXtremeDB runtime can be used, removing traps and internal checks, and restoring valuable clock cycles. In addition, cyclic redundancy check is built into the backup-and-restore feature for in-memory databases, to ensure the database was written in its entirety when saved, and has not been corrupted.  

Type-safe API

eXtremeDB’s native C/C++ API is type-safe, so that any errors in data-typing are caught at compile time.  

Built-in security features

eXtremeDB multi-layered security offers AES encryption employs a user-provided cipher to prevent access or tampering. The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is supported in all communications (client/server, HA and Cluster).

eXtremeDB sets the standard in database management system reliability.

eXtremeDB is used in systems that cannot afford to fail, from nuclear power plants to military aircraft.  Industry leaders around the world depend on eXtremeDB for a reliable embedded database.  Read the Tornado GR4 goes eXtreme.

We invite you to contact us or evaluate free trial software.