Embedded database gets security, speed upgrade - Embedded.com

Embedded database gets security, speed upgrade

SAN JOSE, Calif. — Embedded database provider McObject LLC (Issaquah, Wash.) was disclosing details of its upgrade to ExtremeDB, its embedded database, at the Embedded Systems Conference held here. The product's transition to version 4.1 is due to be announced in mid-May, the company's senior executives, said although some customers already have the upgrade.

A European company is using ExtremeDB 4.1's support for custom database collations to support searching using multiple languages in its digital television electronic program guides (EPGs). Added encryption and security features target applications ranging from large-scale defense and intelligence systems to digital rights management in multimedia devices.

The range of added features in ExtremeDB v. 4.1 include: support for custom collations, binary schema evolution, faster on-disk storage and retrieval and cyclic redundancy checking and RC4 encryption, according to CEO Steven Graves.

The binary schema enables ExtremeDB to save a database as a binary image and then restore it with a changed schema, or layout of tables, fields, indexes and other elements. This could have application in financial trading application or portable media player, the company said.

Version 4.1 also improves the process that manages interaction with persistent media such as hard disk and flash memory, in eXtremeDB Fusion, McObject's hybrid in-memory/on-disk embedded database. Performance is improved without code changes or explicit developer action while further improvement is possible through minor application code changes. However, McObject did not quantify the improvement that should be expected.

Cyclic redundancy check (CRC) at the database page level detects whether unauthorized modification to stored data has occurred, while RC4 encryption employs a user-provided cipher to prevent access or tampering. Page-level CRC can also be used in devices such as portable audio players to ensure digital rights management code has not been circumvented.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.