Free Essay

Database Migration Project

In: Computers and Technology

Submitted By salasri
Words 4932
Pages 20
Human Resources Data Migration Project
Implementation Plan
Human Resources Data Migration Project
Implementation Plan

Project Group 1:
Information Technology Group
March 4, 2013
Project Group 1:
Information Technology Group
March 4, 2013

VERSION HISTORY

Version # | ImplementedBy | RevisionDate | RequestedBy | ApprovedBy | Description of Change | 1.0 | student | 03-04-2013 | | | Preliminary draft | | | | | | | | | | | | | | | | | | |

Table of Contents
1.1 Purpose 4
1.2 System Overview 4 1.2.1 System Description 4 1.2.2 Assumptions and Constraints 4 1.2.3 System Organization 5
2 Management Overview 5
2.1 Problem Statement 5
2.2 Description of Implementation 6
2.3 Points-of-Contact 6
2.4 Major Tasks 7 2.4.1 Project Tasks 7 2.4.2 MS Access to Oracle Tasks 7 2.4.3 Oracle to Mongo Tasks 7
2.5 Implementation Schedule 8
2.6 Security and Privacy 8 2.6.1 System Security Features 8 2.6.2 Security Set Up During Implementation 8 3 Implementation Support 8
3.1 Hardware, Software, Facilities, and Materials 9 3.1.1 Hardware 9 3.1.2 Software 9 3.1.3 Facility 9 3.1.4 Materials 9
3.2 Documentation 9
3.3 Personnel 9 3.3.1 Staffing Requirements 9 3.3.2 Training of Implementation staff 9
3.4 Outstanding Issues 10
3.5 Implementation Impact 10
3.6 Communications Plan 10
3.7 Change Management 12 4 Implementation Risks and Contingencies 13
4.1 Technical Risks and Contingencies 13
5 Acceptance Criteria 14
6 Implementation Verification and Validation 14
APPENDIX A: Project Implementation Plan Approval 15
APPENDIX B: REFERENCES 16
APPENDIX C: SECURITY FEATURES 17
APPENDIX D: MIGRATION DETAILS 21
1.1 Description of Access to Oracle Implementation 21 *
Introduction
1.1 Purpose

The implementation plan describes the migration of data from an MS Access database to Oracle and MongoDB.
1.2 System Overview

The systems in scope for this data migration are databases. The current HR data resides in an Access Database running on a user desktop and lacks the necessary security and access control needed to be in compliance with the existing security policy.
1.2.1 System Description

Access Database: This is a database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. This system is no suitable for enterprise use and data security is limited to user password protection.

Oracle Database: This is a database management system, built around a relational database framework in which data objects can be directly access by users (or an application front end) using a structured query language (SQL). Oracle provides a comprehensive portfolio of security solutions (i.e. encryption, access control) to ensure data privacy, protect against insider threats, and enable regulatory compliance.

MongoDB: This is an open source document-oriented database system. It is part of the no structure query language (NoQSL) family of database systems. Instead of storing data in tables as is done in a "classical relational database”, MongoDB stores structured data as Java Script Object Notation (JSON) like documents (text based) with dynamic schemas, making the integration of data in certain types of applications easier and faster.
1.2.2 Assumptions and Constraints

The following assumptions will be considered for this data migration:

* Schedule: The data migration will be done over a weekend, to avoid any potential disruption to the other systems using the Oracle and MongoDB systems. * Budget: The budget will only account for the resources needed to complete the migration. * Resources: The project will use existing resources and will provide training. * Software: The Company has Oracle and MongoDB w/enterprise license already, so there is no need to purchase additional licenses. * Hardware: The Oracle and MongoDB databases are already in use, so there is no need to purchase additional hardware. * Constraints: There are no downtime constraints to execute the migration, and a copy of the data is ready available.
1.2.3 System Organization
The current systems are in place. The Oracle and MongoDB servers are in compliance with existing security policies, but the Access database is running on a user desktop exposing the confidential HR data to unauthorized access due to the weak Windows security in place. The diagram below shows the current setup.

Oracle server
Enterprise Network
MongoDB server
User desktop w/ Access DB
User desktop
User desktop
Security Policy
Current Systems Setup
Secured
Datacenter
Unsecured
Office Area

Oracle server
Enterprise Network
MongoDB server
User desktop w/ Access DB
User desktop
User desktop
Security Policy
Current Systems Setup
Secured
Datacenter
Unsecured
Office Area

2 Management Overview

During an IT audit of the company’s systems, policies and procedures, auditors discovered that that employee health data is being stored in an unsecure and unprotected Access Database within the Human Resources Department.
Auditors could not determine who has access to this data since no logs or record keeping regarding access was ever kept. The liability to both the company and the employees for any breach in the HIPAA protected data can result in extremely large fines and employees being fired and possibly sued.
The Human Resources Department has engaged the Information Technology Team to review the issues and both have agreed to migrate the data to a secure Oracle and Mongo DB; and restrict access to authorized personnel by job function using the existing access control system.
2.1 Problem Statement

A recent audit review has revealed the following issues related to employee health data privacy. These issues are a violation to the existing company security policy, and also to the regulatory compliance laws enacted under the Health Insurance Portability and Accountability Act (HIPAA) of 1996. * The Human Resources department uses an unsecured Microsoft Access database to store employee confidential health data. * The Human Resources department works in a silo. The Access Database is running in non-standard hardware not supported by the IT department. * The Access Database does not comply with corporate access control and security policies. * The Human Resources group does not know who has access to the data and do not keep logs for auditors. * The quality of the data has been compromised with inaccurate information, duplicate and missing records. * The company faces serious legal and reputational risk for non-compliance with public law and employee privacy policy respectively.
2.2 Description of Implementation

The project implementation consists of moving HR data from Access Database to Oracle and to Mongodb. The following diagram shows the migration flow:

2.3 Points-of-Contact

Role | Name | Contact Number | Business Sponsor | Marc Paller | 212-333-5555 | Project/Program Manager | Darrell Austin | 212-333-6666 | Database Administrator 1 | Ricardo Salas | 212-333-7777 | Database Administrator 2 | Chandrika Ganesan | 212-333-8888 | Oracle Engineer | John Dover | 212-561-3000 | | | | Table 2.2 – Points-of-Contact

2.4 Major Tasks
2.4.1 Project Tasks

1. Create implementation plan 2. Obtain implementation plan approval 3. Assemble project team 4. Personnel training – Oracle 5. Data migration – Access to Oracle 6. Data migration – Oracle – Mongodb 7. Configure db access control - Permissions 8. User acceptance test 9. IT Operations signed off to support new HR database 10. Obtain project closure approvals

2.4.2 MS Access to Oracle Tasks

1. Create a new Database User 2. Create a migration repository 3. Capture MS Access exported XML 4. Set Conversion preferences 5. Convert to Oracle Model 6. Scripts to create Oracle objects 7. Data move preferences 8. Migrate Data 9. User acceptance test

2.4.3 Oracle to Mongo Tasks

1. Extract Data 2. Import Data 3. User acceptance test

2.5 Implementation Schedule

2.6 Security and Privacy

The data in scope contains personal data and data security is of utmost importance to be compliant with the existing security policies and Privacy Act.
The following security measures are in place:

* Data transfer will be done only using SFTP * Data depositories or servers have to be in compliance with existing security policies * Data will be handle by authorized personnel * Outside vendors will have to sign a Non Disclosure Agreement and obtain security clearance to work on the project.
2.6.1 System Security Features

Oracle 11g has enhanced security features, while MongoDB relies on external security sources like application level encryption and Kerberos for authentication. See appendix C.

2.6.2 Security Set Up During Implementation

This section is not applicable to the data migration. The target Oracle and Mongodb servers are installed in a secured location. The data will be transfer using secure file transfer protocol (SFTP) and access to the data is limited to the project implementation team only.

3 Implementation Support

3.1 Hardware, Software, Facilities, and Materials
3.1.1 Hardware

This section is not applicable to the project. The hardware is already in place and operational.
3.1.2 Software

This section is not applicable to the project. The software in scope, Oracle 11g and Mongodb, are already being used by the company.
3.1.3 Facility
The servers in scope of this migration are located in the Main datacenter. The work can be done remotely, and there is no need to request datacenter access. In the event of a problem requiring datacenter access, the IT team has on site personnel available to assist.

3.1.4 Materials
This section is not applicable to the project.
3.2 Documentation
The project documentation will be saved in the IT group shared drive and the “Operational Turned Over Document” will be sent to the IT group for approval. Upon acceptance, the IT group will be responsible for the ongoing support of the HR data.

3.3 Personnel
3.3.1 Staffing Requirements

The personnel needed for this implementation will be from existing resources with the addition of an Oracle database person hired to assist and trained current personnel. The table below shows the personnel listed and the hours allocated for the project.

Project Resources | Category | Rate | Hours | Total USD | Project Manager | Employee | $100.00 | 40 | $4,000.00 | Database Administrator 1 | Employee | $75.00 | 40 | $3,000.00 | Database Administrator 2 | Employee | $75.00 | 40 | $3,000.00 | UAT Tester 1 | Employee | $85.00 | 8 | $680.00 | UAT Tester 2 | Employee | $85.00 | 8 | $680.00 | Oracle Engineer | Vendor | $140.00 | 40 | $5,600.00 | Total | 176 | $16,960.00 |

3.3.2 Training of Implementation staff

The existing support personnel will be trained in Oracle 11g. The Oracle engineer will give a 2 day overview of the Oracle Database including:

* Install Oracle Grid Infrastructure. * Create and manage users. * Install and configure an Oracle Database. * Create and manage storage structures. * Administer the Oracle Database. * Understand the Oracle database architecture and how its components work and interact with one another. * Perform backup and recovery. * Database security * Create an operational database and properly mange the various structures in an effective and efficient manner.
3.4 Outstanding Issues
None
3.5 Implementation Impact
There is no impact to the existing infrastructure. The network and servers have adequate processing power and disk capacity to handle the HR data volume.
The operational support of the HR database will be transitioned from the business side to the IT team. The IT database administrators are being trained to support Oracle, and they have the Mongodb knowledge.
Existing SLAs will remain in place, and all calls related to the HR data will flow through the Help desk as of today. 3.6 Communications Plan

The communications plan is the key to a successful project. Clearly and concise information will be delivered in the meetings with all the groups involved. The meetings will be scheduled via outlook and invitations will be sent to all stakeholders with meeting details including a conference bridge to dial-in if anyone is unavailable to meet in person.
The project manager will chair the meetings, take notes and is responsible to send meeting minutes after each meeting and follow up on all tasks assigned to ensure timely completion.
All project stakeholders are responsible to attend the meeting or send a representative if they have a conflict.
The tables below show the communications plan for the project stakeholders and project team members respectively.

The following table shows the communications plan for the project stakeholders and sponsor. Purpose of Communication | Target audience | Purpose of Communication | When / Frequency | Methods of Communication | Project initiation | Project sponsor, Project Manager and IT Director | Gather information for Initiation Plan | First meeting | Meeting | Implementation plan approval | All stakeholders | Distribute implementation plan to communicate project scope and get sponsor and senior management approvals. | Before Kick Off Meeting | Meeting and Distribute minutes via email. | Project Kick Off | All stakeholders | Communicate plan and stakeholder roles / responsibilities. | At or near Project Start Date | Meeting and Distribute minutes via email. | Project Review and Status Report | All stakeholders | Update stakeholders on progress of the project, and communicate potential risks and issues that might affect scope, schedule or budget. | Bi-weekly | Meeting and Distribute minutes via email | Sponsor Meetings as needed | Sponsor(s) and Project Manager | Update Sponsor(s) on status and discuss critical issues. Seek approval for changes to Project Plan. | Ad hoc | Meeting | PMO Audit/Review | Project Office, Project Manager, select stakeholders, and Sponsor. | Review status reports, issues, and risks. Identify and communicate potential risks and issues that may affect scope, schedule or budget. | Monthly | Meeting/Report | Post Project Review | Project Office, Project Manager, key stakeholders, and sponsor(s). | Identify improvement plans, lessons learned, what worked and what could have gone better. Review accomplishments. | End of Project | Meeting/Report |

The table below shows the communications plan for the project team. Purpose of Communication | Target audience | Purpose of Communication | When / Frequency | Methods of Communication | Team kick off Meeting | Project Team | Review detailed plans and assign roles and responsibilities. | First team meeting | Meeting / Conference Call | Team Meetings | Project Team | Review project deliverables, risks, and issues that might effect scope, schedule or budget. | Weekly | Meeting / Conference Call and distribute meeting minutes via email | Other… | To be determined by the Project Team | General communications | As needed | Meeting / Conference call / email | Post Project Review | Project team | Identify improvement plans, lessons learned, what worked and what could have gone better. Review accomplishments. | End of Project | Meeting / Conference Call and distribute report |

3.7 Change Management

The project will follow the existing change control processes for all project work. The changes will follow all phases shown in the below change management process flow:

There are two types of changes in the project lifecycle and both require an approved change request.

Scope change
These changes typically fall outside of the project charter and are driven by a problem encounter during implementation or new business requirements. The project team must evaluate the change and assess the impact on time, cost, risk, quality, resources and customer satisfaction.
The project manager is the only person that can approve the change requested by the project team members or the sponsor, and is responsible to communicate the change to the sponsor and stakeholders seeking their approval.

Project change
These changes are planned and needed to implement the approved solution or scope of work as agreed in the project charter. The project team writes schedules and executes the change. The project manager represents the change in the weekly Change Management Meetings to seek approvals.
As part of the existing Change Management Policy, all changes have to follow the below criteria: * Must be submitted a week in advance * Must have clearly defined scope and impact * Must include a test plan * Must include a rollback plan * Must be fully approved before any work is started

4 Implementation Risks and Contingencies

There are only technical risks associated with this implementation.

4.1 Technical Risks and Contingencies

The table below shows the risks associated with the data migration, the impact to the project and the actions needed to mitigate the risk if applicable.

Risk Type | Risk Title | Risk Impact | Mitigation Plan | Technical | Data corruption | Implementation delay | None | Technical | ETL failure | Implementation delay | Pre-migration test | Technical | Hardware failure | Implementation delay | Available spare part | Technical | Incorrect data Format | Implementation delay | Pre-migration test | Technical | Technical knowledge | Operational support | Train support personnel |

5 Acceptance Criteria

The acceptance criteria are based on data availability, integrity, security and performance.

Availability: The migrated data is available from oracle and MongoDB to the different systems in place, as it was before the migration.

Integrity: The structure of the migrated data is consistent with the formats needed by the systems in place.

Security: The migrated data is encrypted and access has been secured by job function keeping a log for auditors.

Performance: The migrated data can be accessed, computed and saved in the same time as before (no additional latency) or faster.

Support: The IT team has agreed to support HR data, and signed off the Operational Turnover documentation.

Usability: The business testers will perform a user acceptance test to validate the usability of the data and successful completion of all the processes depending on the HR data in scope.

6 Implementation Verification and Validation

The database administrators and business testers will perform the data migration verification and validation. The success of the data migration will be based on the agreed acceptance criteria below.
The contingency plan for the data migration is simply to point all the applications back to the Access Database server. The Access database server will not be compromised by this migration, and all data will stay intact.

APPENDIX A: Project Implementation Plan Approval
The undersigned acknowledge that they have reviewed the Human Resources Data Migration Plan and agree with the information presented within this document. Changes to this Project Implementation Plan will be coordinated with, and approved by, the undersigned, or their designated representatives. Signature: | | Date: | | Print Name: | | | | | | | | Title: | | | | Role: | Project Manager | | |

Signature: | | Date: | | Print Name: | | | | | | | | Title: | | | | Role: | Project Sponsor | | |

Signature: | | Date: | | Print Name: | | | | | | | | Title: | | | | Role: | Chief Information Officer | | |

APPENDIX B: REFERENCES
The following table summarizes the documents referenced in this document. Document Name | Description | Location | Human Resources Data Migration Project | Data Migration Plan | Epsilen Drop Box | | | | | | |

APPENDIX C: SECURITY FEATURES

ORACLE 11G
Automatic Secure Configuration

When you create a new database, you can use Database Configuration Assistant (DBCA) to automatically create a more secure configuration than in previous releases of Oracle Database. You can enable the following secure configuration settings in one operation:
Password-specific settings in the default profile. This feature enables you to enforce password expiration and other password policies. See "Configuring Password Settings in the Default Profile" for more information.
Auditing. This feature enables auditing for specific events such as database connections. See "Using Default Auditing for Security-Relevant SQL Statements and Privileges" for more information.
New Password Protections

Oracle Database now includes the following new password protections:
Easy ability to find default passwords. If you have upgraded from an earlier release of Oracle Database, you may have user accounts that still have default passwords. For greater security, you should find and change these passwords. See "Finding User Accounts That Have Default Passwords" for more information.
Password complexity verification. Password complexity verification ensures that users set complex passwords when setting or resetting passwords. You can enforce password complexity by using the default settings provided by Oracle Database, or create custom requirements to further secure the password complexity requirements for your site.
"Enforcing Password Complexity Verification" describes built-in password verification.
Enforced case sensitivity. See "Enabling or Disabling Password Case Sensitivity" for more information.
Stronger password hashing algorithm. This enhancement enables users to create passwords that contain mixed case or special characters. See "Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm" for more information.
SYSDBA and SYSOPER Strong Authentication

You can now use the Secure Sockets Layer (SSL) and Kerberos strong authentication methods to authenticate users who have the SYSDBA and SYSOPER privileges.
See "Strong Authentication and Centralized Management for Database Administrators" for more information.
SYSASM Privilege for Automatic Storage Management

The SYSASM system privilege has been added to Oracle Database 11g Release 1 (11.1), to be used exclusively to administer Automatic Storage Management (ASM). Use the SYSASM privilege instead of the SYSDBA privilege to connect to and administer ASM instances.
Encryption Enhancements
Intelligent LOB Compression, Deduplication, and Encryption with SecureFiles

Oracle Database supports a new, faster, and scalable Large Object (LOB) storage paradigm called SecureFiles. SecureFiles, in addition to performance, supports efficient compression, deduplication (that is, coalescing duplicate data), and encryption. LOB data can now be encrypted with Oracle Database, and is available for random reads and writes.
Compressed and Encrypted Dump File Sets

In this release, you can use Oracle Data Pump to compress and encrypt an entire dump file set. You can optionally compress and encrypt the data, metadata, or complete dump file set during an Oracle Data Pump export.
Transparent Data Encryption with Hardware Security Module Integration

Transparent data encryption (TDE) stores the master key in an encrypted software wallet and uses this key to encrypt the column keys, which in turn encrypt column data. While this approach to key management is sufficient for many applications, it may not be sufficient for environments that require stronger security. TDE has been extended to use hardware security modules (HSMs). This enhancement provides high assurance requirements of protecting the master key.
This release enables you to store the TDE master encryption key within a hardware security module (HSM) at all times, leveraging its key management capabilities. Only the table keys (for TDE column encryption) and tablespace keys (for TDE tablespace encryption) are decrypted on the HSM, before they are returned to the database; the encryption and decryption of application data remains with the database. Oracle recommends that you encrypt the traffic between HSM device and databases. This new feature provides additional security for transparent data encryption, because the master encryption key cannot leave the HSM, neither in clear text nor in encrypted format. Furthermore, it enables the sharing of the same key between multiple databases and instances in an Oracle Real Applications Clusters (Oracle RAC) or Data Guard environment.
Transparent Tablespace Encryption

Transparent tablespace encryption enables you to encrypt entire application tablespaces, encrypting all the data within these tablespaces. When a properly authorized application accesses the tablespace, Oracle Database transparently decrypts the relevant data blocks for the application.
Transparent tablespace encryption provides an alternative to TDE column encryption: It eliminates the need for granular analysis of applications to determine which columns to encrypt, especially for applications with a large number of columns containing personally identifiable information (PII), such as Social Security numbers or patient health care records. If your tables have small amounts of data to encrypt, then you can continue to use the TDE column encryption solution.
Fine-Grained Access Control on Network Services on the Database

Oracle Database provides a set of PL/SQL utility packages, such as UTL_TCP, UTL_SMTP, UTL_MAIL, UTL_HTTP, and UTL_INADDR, that are designed to enable database users to access network services on the database. Oracle Database PL/SQL Packages and Types Reference describes the PL/SQL utility packages in detail.
In a default database installation, these packages are created with the EXECUTE privilege granted to the PUBLIC role. This release enhances the security of these packages by providing database administrators the ability to control access to applications in the database that use these packages.
Change to AUDIT BY SESSION

The BY SESSION clause of the AUDIT statement now writes one audit record for every audited event. In previous releases, BY SESSION wrote one audit record for all SQL statements or operations of the same type that were executed on the same schema objects in the same user session. Now, both BY SESSION and BY ACCESS write one audit record for each audit operation. In addition, there are separate audit records for LOGON and LOGOFF events. If you omit the BY ACCESS clause, then BY SESSION is used as the default.
Be aware that this change applies only to statement options and system privileges that audit SQL statements other than data definition language (DDL) statements. The database has always audited using the BY ACCESS clause on all SQL statements and system privileges that audit a DDL statement.
Oracle XML DB Security Enhancements
XML Translation Support for Oracle Database XML

Security objects are now stored in the Oracle XML DB repository as XMLType objects. These security objects can contain strings that need to be translated to different languages so that they can be searched or displayed in those languages. Developers can store translated strings with the XMLType and retrieve and operate on these strings depending on the language settings of the user. The advantage of this feature is that it reduces the costs associated with developing applications that are independent of the target-preferred language of the user.
Support for Web Services

You can now use the Oracle XML DB HTTP server for service-oriented architecture (SOA) operations. This allows the database to be treated as simply another service provider in an SOA environment. Security administrators can control user access to Oracle Database Web services and their associated database objects by using the XDB_WEBSERVICES, XDB_WEBSERVICES_OVER_HTTP, and XDB_WEBSERVICES_WITH_PUBLIC predefined roles.
Directory Security Enhancements

In this release, administrators can now disallow anonymous access to database service information in a directory and require clients to authenticate when performing LDAP directory-based name look-ups. If you are using Microsoft Active Directory-based name lookups, then Oracle Database uses the native operating system-based authentication. If you are using Oracle Internet Directory (OID)-based name lookups, then Oracle Database performs authentication by using wallets.
Oracle Call Interface Security Enhancements

The following security enhancements are available for Oracle Call Interface (OCI):
Reporting bad packets that may come from malicious users or intruders
Terminating or resuming the client or server process on receiving a bad packet
Configuring the maximum number of authentication attempts
Controlling the display of the Oracle database version banner, to prevent intruders from finding information about the security vulnerabilities present in the database software based on the version
Adding banner information, such as "Unauthorized Access" and "User Actions Audited," to server connections so that clients can display this information.

APPENDIX D: MIGRATION DETAILS

1.1 Description of Access to Oracle Implementation
Oracle SQL Developer Migration Workbench will be used to migrate MS Access DB to Oracle. The implementation steps are enumerated below.

1.1.1 Create a new Database User

* Open SQL Developer and connect to the app11g DB that is already setup. * On the SQL Worksheet following commands will be executed to create the user. CREATE USER EAIREP IDENTIFIED BY eairep DEFAULT TABLESPACE USERS TEMPORARY TABLESPACE TEMP;

GRANT CONNECT, RESOURCE, CREATE SESSION, CREATE VIEW TO EAIREP;

1.1.2 Create a Migration Repository

To convert the MS Access XML file to the required tables in Oracle: * Create a new database connection for EAIREP user with the following properties and click connect to connect to the DB as EAIREP user:

Connection Name : EAIFINAL_PROJECT
Username : EAIREP
Password : eairep
Hostname : oit.scps.nyu.edu
Port : 1521
SID : app11g

* Right-click on EAIFINAL_PROJECT and select Migration Repository -> Associate Migration Repository and click close when the install completes.

1.1.3 Capture MS Access exported XML

Perform the following steps to capture the Access XML that has already been exported and downloaded in the capture directory:

* Click on migration -> Microsoft access captured XML. * Select the EAIFINAL.xml file from the dialog box and click OK to capture. * Check the captured models tab and expand EAIFINAL and verify the list of objects that were captured. 1.1.4 Conversion Preferences

Select ‘Is Quoted Identifier On’ from Tools->Preferences->Migration Identifier options.

1.1.5 Convert to Oracle Model

* Right-click on the captured EAIFINAL Access model and select convert to Oracle Model. * Click apply on the source data map window to convert to oracle model. * Verify the converted objects from the converted models tab.

1.1.6 Scripts to create Oracle Objects

To Generate the DDL statements to create Oracle objects perform the following steps:

* Right-click on the converted EAIFINAL and click on generate to create the SQL. * Execute the SQL from the SQL worksheet as user <username>.by clicking on the <connection name> from the connections. * Expand tables and verify that the tables have been created.

1.1.7 Data move preferences

Set the timestamp mask to the following: yyyy-mm-dd HH24:mi:ss.ff3 from Tools->Preferences->Migration->Data Move Options -> Date Mask ->Timestamp Mask.

1.1.8 Migrate Data

* Click on the converted models generated from step 2.1.5 and select Generate Offline Data move scripts and data files. * .Open a DOS prompt and CD to change to the directory where the data files and scripts are located. * From the command prompt execute oracle_ctl.bat file.
<c:/accessDataFiles> oracle_ctl * Click on tables->refresh in SQL Developer and open the tables and click on data to verify that the data has been loaded.

2.2 Description of ORACLE to MONGO DB Implementation

2.2.1 Extract data

* From SQL Developer SQL Worksheet execute the following command to select data from all the tables.

Example:

SELECT * FROM
<TABLE_NAME> A
INNER JOIN <TABLE_NAME> B
ON A.EMPL_ID = B.EMPL_ID
INNER JOIN <TABLE_NAME> C
ON B.EMPL_ID = C.EMPL_ID

* On the results window, right click and select export data to CSV file.

2.2.2 Import data

* Login to MONGDO DB from UMongo UI and connect to the DB. * Click on tools menu and select import from file and select the file created from the previous step and click import data. * Verify the data by executing the following command from UMongo:
Db.employee.find()

Similar Documents

Premium Essay

Migration

...company wishes to have more control over their site and how it is hosted, they can chose to use a server service. With this kind of service, a company that owns a large server farm leases out one or more servers to the company. This allows the company to dedicated servers which they have control over without the need to physically store the server or perform the regular maintenance. Web sites that involve database-driven web applications can eventually require many different servers. This can be a problem for some companies that do not have the logistical capabilities to store these servers on-site. Consider that these servers will take up space, require appropriate cooling, and warrant a sophisticated fire-suppression system. A server farm service will have all of this in place all ready at no additional cost to the client. When dealing with smaller web sites that do not require a large number of servers, or when there are sufficient facilities and infrastructure available, they can certainly be hosted internally, on the same site as the company. Even in the case of large database-driven web applications, companies tend to move to an internally-hosted paradigm once they have the resources necessary to actualize this desire. It is important that this be well thought out and planned for. It is not an inexpensive task. Migrating the System The first step in migrating the web site from an externally hosted service to an internal system is to get the infrastructure in place.......

Words: 2344 - Pages: 10

Free Essay

Migration

...Migration and its impact on the labor market Case Study: Romania "Those who contemplate the beauty of the earth find reserves of strength that will endure as long as life lasts. There is symbolic as well as actual beauty in the migration of the birds...There is something infinitely healing in the repeated refrains of nature - the assurance that dawn comes after night, and spring after the winter..."(Rachel Carson) 1. General theoretical aspects of migration. Historical and social perspective Migration is defined as a "change from a social, economic, political and / or cultural environment to another, in order to develop a project and answer to any individual or group expectations." Migration phenomenon has always existed, resulted through transhumance, invasions, colonization and crusades, generally caused by the attraction of the richest regions on the poorest populations. Labor migration is the supportive factor of globalization,'' a process that allows reducing geographical constraints on social and cultural processes in which individuals are increasingly aware of this." There is currently no state or part of the world that does not import or export workforce. During the 20th Century the migration process developed significantly. In this period, Romania was predominantly a country of emigration and still is. Acording to some sources, by 1914, a large number of people decided to cross the Atlantic Ocean, most focusing on the U.S. and Canada, the rest of them going......

Words: 3860 - Pages: 16

Premium Essay

Website Migration

...Website Migration Project Strayer University CIS 210 Systems Analysis and Development 6/16/2013 Executive Overview The Tony’s Chips web site is to be moved from and external hosting solution to an internal solution. In addition, the site will be redesigned to enable customers to place orders. These are two separate work tasks that should be treated separately and performed by different team members. There are many options for hosting the web site internally, including software choices to hardware architecture. This document will review the tasks that need to be performed, document the process of performing those tasks, and justify the software and hardware choices. Hosting Solutions There are a couple different alternative to how this web site is hosted. The company could host the web site with an external service that maintains their own servers and services. This method is commonly used by start-up businesses and web sites that do not require a huge amount of customization, monitoring, bandwidth, and storage. When a company wishes to have more control over their site and how it is hosted, they can chose to use a server service. With this kind of service, a company that owns a large server farm leases out one or more servers to the company. This allows the company to dedicated servers which they have control over without the need to physically store the server or perform the regular maintenance. Web sites that involve database-driven web applications can eventually......

Words: 2358 - Pages: 10

Premium Essay

Database Project Documentation Guide

...Database Project Documentation Guide IMPORTANT Note on how to present a document  No fancy fonts should be used Choose from – Times New Roman Tahoma Verdana Arial  The font size should be 12 or 14. (Neither smaller nor bigger)  Use 1.5 line spacing.  Make sure your document has page numbers.  Insert the Company name in the header. 1. Cover Page St. Mary’s College of Tagum National Highway, Tagum City Name of System and Company A Database Project Submitted to the Faculty of Bachelor of Science in Computer Science of St Mary’s College of Tagum In final fulfilment of the academic requirements for the CS 108 – Database Management System Submitted by: NAMES Date Submitted 2. Table of Contents 3. Document Scope - Describes the goal of this document in a narrative. - Introduction 4. System Overview - Provide a brief overview of the system. 5. Business Rules - Brief, precise, and unambiguous description of policy, procedure, or principle of the Company or Organization. 6. Relational Diagram - Representation of the Relational database’s entities, the attributes within those entities and the relationships between those entities. Example 7. Crow’s Foot ER Diagram - A graph/ diagram that represents the conceptual database as viewed by the end user. Example 8. ERM Components - Summarizes the ERM’s components and names the entities and their relations. Example. . 9. Data Dictionary - Provides detailed accounting of all tables found within the......

Words: 367 - Pages: 2

Free Essay

Website Migration Project

...also ensures that the information is organized in a predictable and consistent way in every page. In order to build the web architecture, the system analyst should into the company’s business needs, and come up with a clear statement of the goals. As there is an already existing old site running, it is crucial that the analyst understands the business and its technological issues involving the implementation of the project. Since we have an already running Tony’s chips website, it is important to gather the existing functional requirements of the website. The system analyst can get information from the employees of the old company; gather system documentation, production support and also using Fact finding techniques. On gathering this information the system analyst should make a decision on whether to go for a packed solution or develop the software in-house. If we decide to go for in-house development of the website, I recommend that we use; Apache as the web server, JEE as the language to develop the website, Linux as the Operating System and MYSQL for the database of the website. Since MYSQL, Apache and Linux are all open sources the company needs not to worry about their licenses and also by writing the software in Java helps us to deploy the code on any platform and the fact that it is not difficult to find people experienced in Java. While we build the new web architecture, the system design should be able to satisfy all the business needs as well as the needs of......

Words: 1686 - Pages: 7

Premium Essay

Term Paper: Website Migration Project

...Term Paper: Website Migration Project Term Paper: Website Migration Project Dimitri A. Brydie Professor Jennifer Merritt Systems Analysis and Development December 18, 2013 Tony’s Chips has recently been acquired by a new independent company and the organization leaders have decided to move the current website, which is hosted externally, to an internal host. The company wants the website to be redesigned so that after migration, customers will then be able to make orders online. The company’s leadership would also like to have a disaster recovery solution in place in case the main site goes down. The overall objective of the project is to plan and design a new effective platform to host the website and to efficiently transfer the current website with minimal downtime. In order to accomplish successful migration of the current website, the five phases of the systems development life cycle will be utilized. The five phases are: systems planning, systems analysis, systems design, systems implementation, and finally, systems support and security (Shelly & Rosenblatt 2012). The first phase in the website migration project will be to become familiarized with the business process and identify the objectives of the project. For an IT professional, this may consist of meeting with business leaders and studying the formal business plan to get a feel for the operations of the company. In this case, the company makes potato chips and distributes them. Another......

Words: 1977 - Pages: 8

Free Essay

Migration

...Migration has been significantly reshaping the traditional social and economic structures of rural communities of this country. The livelihood activities of rural families are no longer confined to farming and are increasingly being diversified through rural-to-urban and international migration. With the development of trade and industry and the awareness produced by the mass media, rural poor are shifting towards the urban areas in order to improve their living standards and to search for better livelihood opportunities. The lack of employment opportunities in the rural areas and better employment prospects and infrastructure facilities in the urban areas motivate people to migrate to urban areas. In the rural areas, sluggish agricultural growth and limited development of the rural non-farm sector raises the incidence of rural poverty, unemployment and underemployment. Moreover, absence of non-farm employment, low agricultural production has resulted in a growth of seasonal migration. Seasonal migration is the migration for a limited period of the year when no farming activity is underway. As most of the high productivity activities are located in the urban areas, people from rural areas move towards town or cities with a hope to grab diversified livelihood opportunities. Migration primarily occurs due to disparities in regional development. The causes of migration are usually explained by using two broad categories, namely, push and pull factors. Studies conducted in...

Words: 885 - Pages: 4

Premium Essay

Website Migration Project

...Website Migration Student’s name Institution Date   Website Migration Introduction The process of moving the old Website from an externally hosted solution to an internal one requires a lot to be put in place. There is a need to follow the system development life cycle (SDLS) for it to be successful and have transformational effect on the company’s operation (Klein, S. 2007). If there is redundancy in the site of the company, some measures should be carried out to ensure that it functions well to serve the company’s information needs. There should be a back-up site available as a failover in case the main site goes down. There is also a need for the site to be redesigned to allow customers to order products online. The system development life cycle (SDLS) is involves seven phases or steps that are followed in developing an information system from conception up to disposition. The following is the seven-step phase of developing an information system by a software engineer: 1. Conceptual Planning 2. Planning and Requirements Definition 3. System design 4. Development and Testing 5. Implementation phase 6. Operations and Maintenance phase 7. Operations and Maintenance phase Conceptual Planning This is the first phase in the system development life cycle. In this phase the information system conceptual framework is constructed. This will include the evaluation and assessment of the system to be developed to determine the cost and risks associated with the......

Words: 3420 - Pages: 14

Premium Essay

Term Paper - Website Migration Project

...leaders have decided to move the current website, which is hosted externally, to an internal host. The company wants the website to be redesigned so that after migration, customers will then be able to make orders online. The company’s leadership would also like to have a disaster recovery solution in place in case the main site goes down. The overall objective of the project is to plan and design a new effective platform to host the website and to efficiently transfer the current website with minimal downtime. In order to accomplish successful migration of the current website, the five phases of the systems development life cycle will be utilized. The five phases are: systems planning, systems analysis, systems design, systems implementation, and finally, systems support and security (Shelly & Rosenblatt 2012). The first phase in the website migration project will be to become familiarized with the business process and identify the objectives of the project. For an IT professional, this may consist of meeting with business leaders and studying the formal business plan to get a feel for the operations of the company. In this case, the company makes potato chips and distributes them. Another objective in phase one of the website migration project, is to decide who will be involved and at what point during the project their involvement will be required. One of the purposes of the redesigned website is to give customers the ability to place orders online. Currently the......

Words: 1950 - Pages: 8

Free Essay

Migration

...MIGRATION, MAINSTREAMING, EDUCATION AND HEALTH 1 ***Draft 2B*** Introduction If well-managed, migration has been recognized by the UN System-wide Task Team’s report Post 2015 Agenda: Realizing the Future We Want for All as an important tool “to ensure that globalization becomes a positive force for all the world’s peoples of present and future generations”. Migration can be an enabler of human development by enhancing people’s income, health and education. An improved standard of education and of physical, mental and social wellbeing not only empowers migrants, but also allows them to substantially contribute towards the social and economic development of their home communities and host societies. However, this can only happen when the rights and wellbeing of all those affected by migration are fulfilled and they are recognized as “positive agents of innovation with human rights.” The post-2015 development agenda concerns more than anyone the generation being born now. Healthy, safe and well-educated children are the cornerstone of thriving societies, sustainable growth and proper management of natural resources. For over a decade, the Millennium Development Goals (MDGs) have widely benefited children, both boys and girls, and young people. However, “there is major unfinished business as well as emerging and neglected issues that must be addressed boldly in the post-2015 development agenda, to ensure a world fit for children”. 2 One of the flaws of the MDGs is that by......

Words: 9812 - Pages: 40

Premium Essay

Database Design Project 7

...Module 7 - Project 2 Your assignment is from the text. • Complete Cases #65, 68, 69, 70, and 71 at the end of Chapter 7. Your assignment must be submitted to the Dropbox no later than Sunday 11:59 PM EST/EDT. CASES EliteVideo is a startup company providing concierge DVD kiosk service in upscale neighborhoods. EliteVideo can own several copies (VIDEO) of each movie (MOVIE). For example, the store may have 10 copies of the movie “Twist in the Wind”. “Twist in the Wind” would be one MOVIE and each copy would be a VIDEO. A rental transaction (RENTAL) involves one or more videos being rented to a member (MEMBERSHIP). A video can be rented many times over its lifetime, therefore, there is a M:N relationship between RENTAL and VIDEO. DETAILRENTAL is the bridge table to resolve this relationship. The complete ERD is provided in Figure P7.65. 65. Write the SQL code to create the table structures for the entities shown in Figure P7.65. The structures should contain the attributes specified in the ERD. Use data types that would be appropriate for the data that will need to be stored in each attribute. Enforce primary key and foreign key constraints as indicated by the ERD. MEMBERSHIP Mem_ Num Mem_ Fname Mem_ Lname Mem_Street Mem_City Mem_ State Mem_Zip Mem_ Balance RENTAL Rent_Num Rent_Date Mem_Num DETAILRENTAL Rent_Num Vid_Num Detail_Fee Detail_Duedate Detail_Returndate Detail_Dailylatefee VIDEO Vid_Num Vid_Indate......

Words: 344 - Pages: 2

Free Essay

Website Migration

...Term Paper Website Migration CIS University 09/07/15 Tony’s Chips has recently been sold to a new independent company. The new company has hired me to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. Therefore, the site will be redesigned so that customers will be able to place orders through the website and have them delivered as before. The design of the new system will be able to provide more data storage, faster retrieval, better security features and recovery solutions in the event that the website has any problems. With the operational reliability of the existing system, this will make it easier to improve the new system. The first part of the project goal is to discuss what it will take to build the web architecture, then what will have to be done to move the existing Website with minimal downtime, and then provide a disaster recovery plan in the event that the website should crash or stop working. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems......

Words: 2274 - Pages: 10

Premium Essay

Website Migration Project

...wide area of the schools management and organizational structure. I would like to build your institution an advanced website with all full features that come with the current technology in the market. The project will take approximately three weeks by which the activities I propose will be as follows: Week 1: Initial study of the feasibility and viability of the project in relation to the current policies and axioms of the school, Activities and structure of management and all such other things as will be MIKE | michaelngugi@gmail.com | November 3, 2015 MIKE | michaelngugi@gmail.com | November 3, 2015 Conducive or incidental to the achievement of a fully functional and impressive website. Week 2: The initial planning and design of a prototype design representation and submitting for approval, modification or abatement. The design agreed upon will consequently proceed to the next phase of the developing cycle. Week 3: This stage will involve coding and coming up with the working version of the website. Week 4: Presentation and implementation in form of hosting in a website hosting company and carrying all such other things that may include enhancing the visibility of the website in the leading search engines and other search engine optimization (SEO) tools. Budget. The project will cost a Total of Kshs. 80,000 Inclusive of all expenses and hosting charges and any other charge that may arise in the course of analysis and design of the website. A complete chart for the......

Words: 498 - Pages: 2

Free Essay

Ict - Evaluation for Database A2 Project

...Hotel Room Booking Database  Evaluation      I have created a booking system for the hotel which allows the user of the database, notably the  hotel staff, to input all information in regards to a hotel booking, including room information and  customer registration information. This is instead of the paper­based method of booking in, which  the hotel uses at current. I have created the booking database as, after consideration, the hotel  decided it would be a more up­to­date method of booking in and after they had several issues  with loss of data whilst using the paper­based method. Although it still may be the case that data  is occasionally/accidentally lost while using the booking database, this is much more less likely to  happen as back up copies can be made of the data, which were not made when using the  paper­based method as this would be too time consuming for the hotel. I have created a database  with four main parts, which are: Customer, Booking, Booking/Room and Room tables ­ which each  have a connected form. To use the Hotel Room Booking Database, the user should load the  database file from the shortcut on the desktop. Then, a splash screen will be displayed ­ this will  be the first thing that the user sees when the database file is loaded. After this, the user should  click anywhere on the splash screen to display the message box “Hit the OK button to progress to  the login screen”. The user then clicks OK, and then OK on the following mess......

Words: 7101 - Pages: 29

Premium Essay

Website Migration Project

... Explaining a concept: Website migration project Name Course Instructor Date Website Migration Project In this current era, every business is going online, and most of the selling and buying of goods and services is being done n online. That is why Tony chips should also have a website where it can be able to advertize its business and reach many customers. This paper will cover the steps and requirements on how Tony chips will transfer web hosting from an external source to internal as well as how to make their website redundant. In the efforts to build that redundant and scalable website, the key principles of availability, performance, reliability, scalability, manageability and cost require much attention (Matsudaira, 2012). Also, the SDLC must be duly followed as it is the requirement of any system. These are systems planning, system analysis, system design, system implementation, and lastly system support/security (Shelly & Rosenblatt, 2012). System Planning In this phase, the familiarization of the processes involved and objectives of the business must be well highlighted. A formal business plan needs to be in place to show which operations the company will undertake. There is a need to know all participants in the whole migration process and the time when they will you require then in the migration process. As the one of the requirements is that the website needs to be hosting should be internal, it means that a server there is a server requirement.......

Words: 3258 - Pages: 14