Tuesday, February 2, 2010

How to Install Oracle Client 11g

These instructions apply to Microsoft Windows only. When you install Oracle database software (try installing Enterprise edition), by default it also installs Oracle client. So if you have installed Oracle database software in your machine and want to connect to your local database you simply invoke the Oracle Client and given the necessary login credentials and you are in. You do not have to worry much about setting up your sql*net configuration as the installation process should usually take care of that if you chose to do so.

But for people who want to access an Oracle database that is not local and in a remote machine then you must need to install Oracle client in your machine. Even if You do not want to use SQL*Plus but want to use TOAD or SQL Developer or something like that, you still need Oracle client. Because internally these database access/development tools use Oracle clients software to connect to the target database.

So the most important thing to remember is, you must need Oracle client software in your machine if you want to connect to a remote Oracle database.

Installing Oracle client is not difficult. You just need to be a bit careful. The step by step instructions below should help you to install an Oracle Client in your machine. These instructions assume that you have downloaded the Oracle client software that you desire to install and unzipped the zip file into some folder.

To make the instructions easy to understand I’ll explain what I did here:

1. Downlaoded Oracle Client Software from Oracle (zip file win32_11gR1_client.zip). This file is almost 500MB.

2. Unzipped win32_11gR1_client.zip into C:\win32_11gR1_client folder. A sub folder called “Client” is created under folder “c:\win32_11gR1_client”. Within the Client sub folder there is a file called setup.exe, this is the file I’ll run.

3. I want to install my Oracle Client in my D: disk drive.

System Requirement: Oracle client is not so much of a heavy software but still it needs significant amount of disk space. So make sure that you have at least 1GB free in your disk drive where you want to install your client.

1

Open Windows Explorer and navigate to c:\win32_11gR1_client\client

2

Run setup.exe (double click on it).

3

Wait until the following screen is displayed

Click Next on this screen

4

Select Administrator and then click Click Next button

5

Enter d:\oracle for Oracle Base

Click Next button

6

Click Next button again on this screen.

7

Click Install

8

The installation will now start as shown below.

Wait until the installation is 100% complete

9

The installation process will now try to configure Oracle Net Configuration.

Do not do anything. Wait until you get the following screen

10

Click Next

11

Click Finish

12

Click Exit

13

Click Yes

14

Done

DATA MINING –CONCEPT AND TECHNIQUES

DATA MINING –CONCEPT AND TECHNIQUES

INTRODUCTION
Data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cut costs, or both. It allows users to analyze data from many different dimensions or angles, categorize it and summarize the relationships identified. It is the process of finding correlations or patterns among dozens of fields in large relational databases.

DATA, INFORMATION AND KNOWLEDGE

Data: Any facts, numbers, or text that can be processed by a computer is Data. Large amounts of data are being accumulated by the organizations in different formats and different databases. There are three types of data.

Operational or transactional data: This includes sales, cost, inventory, payroll, and accounting.

Non-operational data: Data from industry sales, forecast data, and macro economic data are considered non-operational.

Meta data: Data about the data itself. This includes logical database design or data dictionary definitions.

Information: Patterns, associations, or relationships among all the above type of data provide information of all the above types of data.

Knowledge: Information can be converted into knowledge about historical patterns and future trends. For example, a manufacturer or retailer could determine which items are most susceptible to promotional efforts.

FOUNDATIONS OF DATA MINING

Data mining techniques are the result of a long process of research and product development. This evolution began when business data was first stored on computers, continued with improvements in data access, and more recently, generated technologies that allow users to navigate through their data in real time. Data mining takes this evolutionary process beyond retrospective data access and navigation to prospective and proactive information delivery. Data mining is ready for application in the business community because it is supported by three technologies that are now sufficiently mature:

⃰ Massive data collection

⃰ Powerful multiprocessor computers

⃰ Data mining algorithms

ROLE OF DATA MINING

Companies with a strong consumer focus - retail, financial, communication and marketing organizations, primarily use data mining today. It enables these companies to analyze the relationships among "internal" factors such as price, product positioning, staff skills ,etc., and "external" factors such as economic indicators, technology, competition, and customer demographics in order to determine the impact on sales, customer satisfaction, and corporate profits.

Data mining helps the retailer to use point-of-sale records of customer purchases to send targeted promotions based on an individual's purchase history. By mining demographic data from comment or warranty cards, the retailer can develop products and promotions to appeal to specific customer segments. Data mining software analyzes relationships and patterns in stored transaction data based on the user queries. Software available for such analysis is: statistical, machine learning and neural networks. Four types of relationships are sought for this purpose. They are:

Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This in­formation can be used to increase traffic by having daily specials.

Clusters: Grouping of data items according to logical relationships or consumer preferences.

Associations: Data mining can be used to identify associations. Example-beer and diaper.

Sequential patterns: Data mining is used to determine behaviour pat­terns and trends. For example, an outdoor equipment retailer can pre­dict the likelihood of a backpack being purchased based on consumers’ purchase of sleeping bags and hiking shoes.

MAJOR ELEMENTS OF DATA MINING

· Extract, transform, and load transaction data

· Store and manage the data

· Provide data access

· Analyze the data by software.

· Present the data.

DATA MINING TECHNIQUES

The most commonly used techniques in data mining are:

Artificial neural networks: Non-linear predictive models that learn through training and resemble biological neural networks in structure.

Decision trees: Tree-shaped structures that represent sets of decisions. These decisions generate rules for the classification of a dataset. Specific decision tree methods include Classification and Regression Trees (CART) and Chi Square Automatic Interaction Detection (CHAID) .

Genetic algorithms: Optimization techniques that use process such as genetic combination, mutation, and natural selection in a design based on the concepts of evolution.

Nearest neighbor method: A technique that classifies each record in a dataset based on a combination of the classes of the k record(s) most similar to it in a historical dataset

Rule induction: The extraction of useful if-then rules from data based on statistical significance.

INFRASTRUCTURE REQUIRED

Today, data mining applications are available on all size systems for mainframe, client/server and PC platforms. System prices range from several thousand dollars for the smallest applications up to $1 million a terabyte for the largest. Enterprise-wide applications generally range in size from 10 gigabytes to over 11 terabytes. The factors that affect the system are:

Size of the database: the more data being processed and maintained, the more powerful the system required.

Query complexity: the more complex the queries and the greater the number of queries being processed, the more powerful the system required.

CONCLUSION

Most companies already collect and refine massive quantities of data. Data mining techniques can be implemented rapidly on existing software and hardware platforms to enhance the value of existing information resources, and can be integrated with new products and systems as they are brought on-line.

Use Of Windows 7 Compatibility Mode For Any Application Program

Now don’t be frustrated, if you have any application from older version which are finding difficult to run on Windows 7.

Windows 7 gives you option to run that program via Compatibility Mode .Many a time we often are caught under condition when our previous version of program don’t suit the new operating system. In that case we find our self very much helpless .To come over the problem use Windows 7 Compatibility Mode as follows .Open the program by making right click on the program’s shortcut, .exe file, or installation program .Open the properties Window .There are different tabs. Select “Compatibility.” Here search the option “Run this program in Compatibility Mode.” Check or uncheck the setting you required for running the program. If you want to rung the privilege level you can modify it.Now apply all these setting and click on "OK."

Implementing Windows 7 for Business Purpose

Most of the people are looking Windows 7as the operating system of this millennium. With the fabulous desktop, ability to upload the complete series of device driver for Vista and network security the new business generation is waiting with their breathe hold.

Hardware configuration: The high demanding configuration and poor driver support of Windows 7 are some of the hurdles in the feasibility. Hard drive of 20 GB and 1 GHZ processor as we know is the minimum. Obviously any business is related to the capital and so much demanding configuration will put some extra burden on their budget. Also the complexity of the operating system is causing slower boot of the system.

But limitations are everywhere. Let’s go into the positive aspects:

What we need in a Business, Simplicity in operating, privacy of our data and adaptability with different software. All these features are meeting the expectation of the user.

Touch-Screen: Now use your finger for working on computer give up the mouse. With Windows 7 and a touch – sensitive screen, you can browse online newspaper, flick through photo albums and shuffle files and folders. We are using the touch screen technology for years, but Windows 7extends it to every corner of your PC. The Start menu and taskbar now sport larger, fingertip-friendly icons. Familiar Windows 7 programs are also touch-ready. You can even finger paint in Paint! Windows Touch—available only in the Home Premium, Professional, and Ultimate editions of Windows 7.Need to zoom in on a picture? Pinch your fingers together. Want to right-click on something? Touch it with one finger and tap the screen with a second on the screen.

As per the windows 7 networks security, you can apply a separate firewall profile to different network connection. Which is dynamic in function?

There are some quite specific tools which can provide extraordinary security, mention below :


Bit Locker : It caps your data from hackers or theft .How can you help protect your data from loss, theft, or hackers? The answer: Bit Locker. Bit Locker keep a security lock on your documents, it keep everything in encrypted form on external drive. You are even safe if you have misplaced your portable storage devices like USB flash drives and external drives.

Direct Access : In the corporate world lots of energy is spend on building Virtual private networks, now Windows 7brings the Direct Access to save your time and energy. It commits secure connection to remote client without dealing with VPNs. This is an quite innovative gift to mobile user and sufficient reason for switching to Windows 7.


App Locker :
Now corporate has a good management over their software. It will inhibit any unauthorized access to any program. Ordinary users will not be able to install new programs however they can run it. It organization can keep a track on their user if they are involved in malpractice such as playing with settings designed for Internet Explorer. App Locker addresses this problem and lets IT centrally configure who can run which application. App Locker checks each program against corporate policies when a user tries to start it. Though it can be difficult to implement in a large organization, IT can get some immediate benefits by rolling App Locker out to highly managed workstations.

User Account Control: In Windows 7, you can turn on User Account Control (UAC) without it displaying warnings for programs you started. This means no more screen-dimming each time you start the Microsoft Management Console — but you’re still alerted if a Web page tries to change system settings or install unauthorized programs. If you disabled UAC in Vista, do yourself a favor and turn it on again once you’ve moved toWindows 7.


Compatibility Mode:
Most of us face problems in Transition period. Because the earlier programs find it difficult to be suited with the new operating system. In such situation don’t lose your temper and make use of "Compatibility Mode" to run that particular software. This is easy to apply.