Chapter-4 explores how error handling is implemented using DbTwig and the patterns promoted by AsterionDB. You also learn about hard data-types and parameter checking.
Chapter-3 will show you how to create a procedure in a package and call the procedure from Postman. We will also cover some API design highlights and considerations.
Chapter-2 will show you how to wire-up a function in a package to DbTwig and call the function from a browser URL.
Get started quickly and easily with AsterionDB by watching this video.
In this video we will introduce the AsterionDB Digital Bunker and show you how to start writing applications following the patterns and techniques that power AsterionDB.
The contemporary file system’s organization traces its roots back to the early days of electronic computing, organized similar to the physical filing system it was intended to replace. The physical location of a file is a leaf in a hierarchical tree structure. Security is applied at the level of the container and enforced, typically, through the honor system.
Getting starting with AsterionDB on the Oracle Cloud Marketplace is easy. Experienced users can have a system up and running within 20 minutes.
What do you do when you have a bunch of content in an archive file that you need to ingest into AsterionDB? Simple, just unpack the archive file into AsterionDB’s drop directory!
This short video shows you how easy it is to ingest content directly into AsterionDB. One of the useful features in AsterionDB is our ‘drop directory’. Any file that you copy to the drop directory gets ingested directly into the database. We even capture metadata such as the full pathname, creation date etc.
AsterionDB was recently asked by a technology partner to investigate adding AI/ML capabilities into our product.
This short video provides some insight into how AsterionDB can be leveraged in your AI/ML environment.
With AsterionDB, we can secure your entire AI/ML workflow and all the assets that are worked upon.
“Evolve and adapt or die. It’s that simple. Your legacy applications and IT infrastructure will not be easily retrofitted to match today’s security requirements,” he said. “Having a unified approach to IT asset management and security for both cloud and on-premises systems is where you need to be headed.”
According to Steve Guilford (LinkedIn: Steven Guilford), CEO of AsterionDB, “Offloading network and security services to a dedicated DPU has distinct advantages in the AsterionDB architecture. We turn middle-tier devices into elastic security isolation components that focus specifically on networking requirements without any concern for data or business logic. This allows for the implementation of a generic API interface to centralized resources in the AsterionDB architecture. Generic APIs typically reveal a single entry-point. This single entry point thusly does not reveal any information to an infiltrator, which obviously greatly enhances security.”