Tutorial – Chapter 4 – Error Handling

Chapter-4 explores how error handling is implemented using DbTwig and the patterns promoted by AsterionDB. You also learn about hard data-types and parameter checking.
Tutorial Chapter 3 – Data Layer APIs

Chapter-3 will show you how to create a procedure in a package and call the procedure from Postman. We will also cover some API design highlights and considerations.
Tutorial Chapter 2 – Wiring up DbTwig

Chapter-2 will show you how to wire-up a function in a package to DbTwig and call the function from a browser URL.
Tutorial Chapter 1 – Getting Started

Get started quickly and easily with AsterionDB by watching this video.
In this video we will introduce the AsterionDB Digital Bunker and show you how to start writing applications following the patterns and techniques that power AsterionDB.
The NoFS Initiative by Tim Robertson, V.P. of Technology

The contemporary file system’s organization traces its roots back to the early days of electronic computing, organized similar to the physical filing system it was intended to replace. The physical location of a file is a leaf in a hierarchical tree structure. Security is applied at the level of the container and enforced, typically, through the honor system.
Installing the AsterionDB Digital Bunker

Getting starting with AsterionDB on the Oracle Cloud Marketplace is easy. Experienced users can have a system up and running within 20 minutes.
Ingesting Content From Object Storage

What do you do when you have a bunch of content in an archive file that you need to ingest into AsterionDB? Simple, just unpack the archive file into AsterionDB’s drop directory!
This short video shows you how easy it is to ingest content directly into AsterionDB. One of the useful features in AsterionDB is our ‘drop directory’. Any file that you copy to the drop directory gets ingested directly into the database. We even capture metadata such as the full pathname, creation date etc.
Using a Scanner with AsterionDB

AsterionDB was recently asked by a technology partner to investigate adding AI/ML capabilities into our product.
This short video provides some insight into how AsterionDB can be leveraged in your AI/ML environment.
With AsterionDB, we can secure your entire AI/ML workflow and all the assets that are worked upon.
Steve Guilford, CEO of AsterionDB Quoted in CIO Magazine

“Evolve and adapt or die. It’s that simple. Your legacy applications and IT infrastructure will not be easily retrofitted to match today’s security requirements,” he said. “Having a unified approach to IT asset management and security for both cloud and on-premises systems is where you need to be headed.”
Steve Guilford, CEO of AsterionDB Quoted in CIO Magazine

According to Steve Guilford (LinkedIn: Steven Guilford), CEO of AsterionDB, “Offloading network and security services to a dedicated DPU has distinct advantages in the AsterionDB architecture. We turn middle-tier devices into elastic security isolation components that focus specifically on networking requirements without any concern for data or business logic. This allows for the implementation of a generic API interface to centralized resources in the AsterionDB architecture. Generic APIs typically reveal a single entry-point. This single entry point thusly does not reveal any information to an infiltrator, which obviously greatly enhances security.”