Welcome!

Java IoT Authors: Pat Romanski, Zakia Bouachraoui, Elizabeth White, Mehdi Daoudi, Liz McMillan

Related Topics: Java IoT, Open Source Cloud

Java IoT: Article

Perst Embedded Database Boosts Performance & Stability In All-Java "Frost" Freenet Client

McObject Lending a Helping Hand

The all-Java Perst open source, object-oriented embedded database system from McObject has improved performance, stability and development ease in the open-source Frost client software for the Freenet global peer-to-peer network. The new Frost client has already been downloaded by thousands of Freenet users who are enjoying a “much better” application experience due to Perst, according to a Frost project leader.

Frost is a newsgroup reader-like client application used to share encrypted messages, files and other information over Freenet without fear of censorship. Frost previously used an open source database based on the SQL application programming interface (API). In late 2007, a newly released Frost version adopted Perst as a replacement for the embedded SQL database. Within this version, Perst stores messages as well as message and file-sharing meta-data, including a list of all shared files in the network, according to Karsten Graul, administrator of the global Frost development project.

“The Frost experience became much better since we started using Perst, due to shorter response times,” Graul said. He attributed the performance increase to eliminating SQL processing overhead, and to developers’ enhanced ability with Perst to optimize database access for different data types and layouts.

In contrast to SQL databases, Perst stores data directly in Java objects, eliminating the need for expensive (in performance terms) run-time conversions between the database representation of the data and the Java representation. Perst's API is tightly integrated with Java, resulting in exceptional “transparent persistence” and ease in working with objects.

Improvements cited in the Perst-based Frost client software include:

Reliability. The previously used SQL database often left files in an inconsistent state when Frost ended unexpectedly, Graul said. This resulted in corrupted data. In contrast, Perst’s transaction mechanism protects the integrity of its data files, and the database can recover quickly, he said.

Development ease. Perst’s object-oriented approach simplifies changing or extending storage code. For example, when a new field is added to a persistent class, Perst can automatically add this field to existing persistent data records.

Footprint. Without SQL processing overhead, Frost consumes less memory. Disk space is conserved by Perst’s ability to store text encoded in UTF-8 characters.

Performance. The SQL database in Frost became slower when table size grew, and developers could do little to improve performance. “In a SQL system, you formulate a query in SQL and the SQL system transforms the query into an access strategy. You have no direct way to influence the strategy that is used to access the data,” Graul said. In contrast, Frost’s developers are able to optimize Perst for accessing specific types of data, and control data access strategies, resulting in better performance, Graul said.

More Stories By Java News Desk

JDJ News Desk monitors the world of Java to present IT professionals with updates on technology advances, business trends, new products and standards in the Java and i-technology space.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...