Resource Governor is a new technology in SQL Server 2008 that enables differentiation of workloads and allocation of shared resources such as CPU and memory. It uses workload groups to classify incoming connections and assign them to resource pools that limit resource consumption. This allows setting workload priority and ensuring business critical applications get the resources they need without being disturbed by other applications. Resource utilization can be monitored using performance monitor counters and DMVs.
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...turgaysahtiyan
The AlwaysOn Availability Groups feature is a high-availability and disaster-recovery solution that provides an enterprise-level alternative to database mirroring. Introduced in SQL Server 2012, AlwaysOn Availability Groups maximizes the availability of a set of user databases for an enterprise. In this session we will talk about what’s coming with Always On, and how does it help to improve high availability and disaster recovery solutions.
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...turgaysahtiyan
The AlwaysOn Availability Groups feature is a high-availability and disaster-recovery solution that provides an enterprise-level alternative to database mirroring. Introduced in SQL Server 2012, AlwaysOn Availability Groups maximizes the availability of a set of user databases for an enterprise. In this session we will talk about what’s coming with Always On, and how does it help to improve high availability and disaster recovery solutions.
SQL Server AlwaysOn for Dummies SQLSaturday #202 EditionMark Broadbent
Welcome to Microsoft's world of the buzzword. Yes, they've done it again and created another ambiguous term that no one really understands. AlwaysOn is a powerful group of highly available technologies, and in this presentation, we will delve into their murky world & reveal the technology behind the buzz. Focusing specifically on the two key components of SQL Server 2012 AlwaysOn in Failover Clustered Instances and Availability Groups, we will investigate their pre-requisites, setup, administration, use & drawbacks. We will look at: Using Windows 2008, 2012 and Server Core Windows Clustering Quorum Failover Clustered Instances Availability Groups Readable Secondaries Clustering Tools and PowerShell Dummies and higher are welcome.
The AlwaysOn Availability Groups feature is a high-availability and disaster-recovery solution that provides an enterprise-level alternative to database mirroring. Introduced in SQL Server 2012, AlwaysOn Availability Groups maximizes the availability of a set of user databases for an enterprise
WebLogic Server Work Managers and Overload ProtectionJames Bayer
A tour of the WebLogic Server work manager and self-tuning thread pool features that automatically adjust to changing workloads and protect the server from overload conditions.
Geek Sync | SQL Security Principals and Permissions 101IDERA Software
You can watch the replay for this Geek Sync webcast, SQL Security Principals and Permissions 101, in the IDERA Resource Center, http://ow.ly/Sos650A4qKo.
Join IDERA and William Assaf for a ground-floor introduction to SQL Server permissions. This webinar will start with the basics and move into the security implications behind stored procedures, views, database ownership, application connections, consolidated databases, application roles, and much more. This session is perfect for junior DBAs, developers, and system admins of on-premises and Azure-based SQL platforms.
Speaker: William Assaf, MCSE, is a principal consultant and DBA Manager in Baton Rouge, LA. Initially a .NET developer, and later into database administration and architecture, William currently works with clients on SQL Server and Azure SQL platform optimization, management, disaster recovery and high availability, and manages a multi-city team of SQL DBAs at Sparkhound. William has written for Microsoft SQL Certification exams since 2011 and was the lead author of "SQL Server 2017 Administration Inside Out" by Microsoft Press, its second edition due out in 2019. William is a member of the Baton Rouge User Groups Board, a regional mentor for PASS, and head of the annual SQLSaturday Baton Rouge Planning Committee.
Once the ‘Backup Database’ command executed, SQL Server automatically does few ‘Checkpoint’ to reduce the recovery time and also it makes sure that at point of command execution there is no dirty pages in the buffer pool. After that SQL Server creates at least three workers as ‘Controller’, ‘Stream Reader’ and ‘Stream Writer’ to read and buffer the data asynchronously into the buffer area (Out of buffer pool) and write the buffers into the backup device.
SQL Server AlwaysOn for Dummies SQLSaturday #202 EditionMark Broadbent
Welcome to Microsoft's world of the buzzword. Yes, they've done it again and created another ambiguous term that no one really understands. AlwaysOn is a powerful group of highly available technologies, and in this presentation, we will delve into their murky world & reveal the technology behind the buzz. Focusing specifically on the two key components of SQL Server 2012 AlwaysOn in Failover Clustered Instances and Availability Groups, we will investigate their pre-requisites, setup, administration, use & drawbacks. We will look at: Using Windows 2008, 2012 and Server Core Windows Clustering Quorum Failover Clustered Instances Availability Groups Readable Secondaries Clustering Tools and PowerShell Dummies and higher are welcome.
The AlwaysOn Availability Groups feature is a high-availability and disaster-recovery solution that provides an enterprise-level alternative to database mirroring. Introduced in SQL Server 2012, AlwaysOn Availability Groups maximizes the availability of a set of user databases for an enterprise
WebLogic Server Work Managers and Overload ProtectionJames Bayer
A tour of the WebLogic Server work manager and self-tuning thread pool features that automatically adjust to changing workloads and protect the server from overload conditions.
Geek Sync | SQL Security Principals and Permissions 101IDERA Software
You can watch the replay for this Geek Sync webcast, SQL Security Principals and Permissions 101, in the IDERA Resource Center, http://ow.ly/Sos650A4qKo.
Join IDERA and William Assaf for a ground-floor introduction to SQL Server permissions. This webinar will start with the basics and move into the security implications behind stored procedures, views, database ownership, application connections, consolidated databases, application roles, and much more. This session is perfect for junior DBAs, developers, and system admins of on-premises and Azure-based SQL platforms.
Speaker: William Assaf, MCSE, is a principal consultant and DBA Manager in Baton Rouge, LA. Initially a .NET developer, and later into database administration and architecture, William currently works with clients on SQL Server and Azure SQL platform optimization, management, disaster recovery and high availability, and manages a multi-city team of SQL DBAs at Sparkhound. William has written for Microsoft SQL Certification exams since 2011 and was the lead author of "SQL Server 2017 Administration Inside Out" by Microsoft Press, its second edition due out in 2019. William is a member of the Baton Rouge User Groups Board, a regional mentor for PASS, and head of the annual SQLSaturday Baton Rouge Planning Committee.
Once the ‘Backup Database’ command executed, SQL Server automatically does few ‘Checkpoint’ to reduce the recovery time and also it makes sure that at point of command execution there is no dirty pages in the buffer pool. After that SQL Server creates at least three workers as ‘Controller’, ‘Stream Reader’ and ‘Stream Writer’ to read and buffer the data asynchronously into the buffer area (Out of buffer pool) and write the buffers into the backup device.
Investigate SQL Server Memory Like Sherlock HolmesRichard Douglas
Memory is one part of the holy trinity of resources consumed by SQL Server, the others being CPU and disk. Most people know how to look at disk latency and throughput and then take remedial measures to fix those issues. But what about memory issues?
In this session, you will learn how SQL Server uses memory and various caches, how to gauge memory pressure, and how to address the significant problems it can cause.
You will leave with a much clearer understanding of how to monitor and manage memory consumption within SQL Server using native Dynamic Management Objects.
DB12c: All You Need to Know About the Resource ManagerMaris Elsins
This presentation is different from the previous uploads as SLOB was used for the testing.
Oracle Database 12c Multitenant provides the highest level of Oracle Database resource efficiency, driven by an improved resource manager. The 12c resource manager effectively allocates resources both within a single database and between multiple pluggable databases in a container. This presentation will review new features of the 12c resource manager, provide guidelines for migration of your current resource management plan to 12c, and will also look into how much overhead the resource manager introduces.
Geek Sync I Dealing with Bad Roommates - SQL Server Resource GovernorIDERA Software
You can watch the replay for this Geek Sync webcast in the IDERA Resource Center: http://ow.ly/jmY250A5qtB
Given budgeting and licensing constraints, database servers have seen dramatic amounts of database consolidation. Managing performance in densely consolidated environments is always a challenge because you will have some users who are trying to run reports while other users are trying to execute OLTP workloads. What if there was a way to do load balancing between these workloads while putting your feet up on your desk? Well, there is and it's called the Resource Governor.
Watch the on demand webinar to learn the different ways to make your job easier through the utilization of SQL Server Resource Governor.
Watch the companion webinar at: http://embt.co/1ueUSsP
Making mistakes is human nature, avoiding them comes from experience and shared wisdom from others.
Tim Radney, Production DBA and Manager, and Embarcadero’s Scott Walz would like to share some SQL server wisdom on “gut check” strategies that can help you avoid making SQL server mistakes.
Making mistakes is human nature, avoiding them comes from experience and shared wisdom from others. Tim Radney, Production DBA and Manager, and Embarcadero’s Scott Walz would like to share some SQL server wisdom on “gut check” strategies that can help you avoid making SQL server mistakes.
Watch the webinar to learn:
- Backups – are yours good enough?
- Maintenance – learn about regular a maintenance that can keep your SQL Server running its best.
- Instance Configurations - Which settings should you be aware of that can make a huge difference?
- Baselines and why they are important.
SQL Server ASYNC_NETWORK_IO Wait Type ExplainedConfio Software
When a SQL Server session waits on the async network io event, it may be encountering issues with the network or with aclient application not processing the data quickly enough. If the wait times for "async network io" are high, review the client application to see if large results sets are being sent to the client. If they are, work with the developers to understand if all the data is needed and reduce the size of result set if possible. Learn tips and techniques for decreasing decrease waits for async_network_io in this presentation.
MySQL Optimization from a Developer's point of viewSachin Khosla
Optimization from a developer's point of view. Optimization is not only the duty of a DBA but its should be done by all those who are involved in the ecosystem
How to improve your apache web server’s performanceAndolasoft Inc
The performance of web application depends upon the performance of the web server and the database server. You can increase your web server’s performance either by adding additional hardware resources such as RAM, faster CPU etc.
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsZohar Elkayam
Oracle Week 2017 slides.
Agenda:
Basics: How and What To Tune?
Using the Automatic Workload Repository (AWR)
Using AWR-Based Tools: ASH, ADDM
Real-Time Database Operation Monitoring (12c)
Identifying Problem SQL Statements
Using SQL Performance Analyzer
Tuning Memory (SGA and PGA)
Parallel Execution and Compression
Oracle Database 12c Performance New Features
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Business update Q1 2024 Lar España Real Estate SOCIMI
Using Resource Governor to Control Resource Utilization
1. Dinesh Asanka
Database Specialist
Pearson Lanka (Pvt) Ltd.
http://twitter.com/dineshasanka
http://www.dbfriend.net/
dinesha@ecollege.com
RESOURCE GOVERNOR TO
CONTROL RESOURCE
UTILIZATION
2. Forum Post
• My SQL Server is accessed by several end user applications.
• When all the applications are in action my server performance is
bad.
• Some of those applications are business critical hence they should
not be disturbed by other application.
• How to allocate specific hardware resources for these business
critical applications?
3. What are your solutions for this?
• Move relevant databases to a different server.
• You can use SQL Server techniques like Mirroring, Log shipping,
Database Snapshot and Replication.
5. What is Resource Governor
• Resource Governor is a new technology in SQL Server 2008.
• Resource Governor enables you to differentiate these workloads
and allocate shared resources as they are requested, based on the
limits that you specify.
• Resource Governor is a quota system for SQL Server Resource.
• These resources are CPU and memory.
6. Types of Resource Issues
• “Non-Ending” queries.
• Unpredictable work loads.
• Limiting the CPU usage by backup jobs using backup compression.
• Setting workload priority.
8. Workload Groups
• Way of grouping loads by tasks, connections
• Assigned to a specific resource pool
• Internal tasks are part of internal Workload Group.
• e.g. Checkpoint, Ghost Cleanup
• Internal groups do not have any limits and can over turn other groups
regardless of their limits.
• Default group for the behavior of no resource governor running and will
over turn by other groups.
9. Workload Groups Options
Option Description Default
IMPORTANCE
Importance between workload
groups using the same
resource pool.
MEDIUM
REQUEST_MAX_MEMORY_GRANT_PERCENT
Max memory grant from the
resource pool for query
execution.
25%
REQUEST_MEMORY_GRANT_TIMEOUT_SEC
How long to wait for a query
execution memory grant .
0
REQUEST_MAX_CPU_TIME_SEC
Max amount of CPU time a
request can use
0
MAX_DOP Max degree of parallelism. 0
GROUP_MAX_REQUESTS
Maximum concurrent requests
per group.
0
10. Classification
• Incoming connection are classified into Workload Groups.
• T-SQL function
• HOST_NAME, APP_NAME, SUSER_NAME, IS_MEMBER,
CONNECTIONPROPERTY are the system functions we can used.
11. Resource Pools
• A resource pool is to limit resource consumption for one or more
workload groups.
Option Default
MIN_CPU_PERCENT 0
MAX_CPU_PERCENT 100
MIN_MEMORY_PERCENT 0
MAX_MEMORY_PERCENT 100
• Default and internal pools has the above values which cannot be
altered.
• Number of pools should be less than 20
15. New in Denali
• Support for 64 resource pools
• Enhanced CPU usage controls
• Enhanced resource allocation
16. My Field Notes
• Alter large table with 150 millions rows without effecting current
load.
• One Column was changed varchar(8000) to nvarchar(max).
• Another Column was change to text to varchar(max)
• High CPU due to page splits and conversion took 7-8 hrs.
17. PN
• Resource Governor does not impose any controls on a dedicated
administrator connection aka DAC.
18. Limitations
• Resource management is limited to the SQL Server Database
Engine.
• There is limited workload monitoring or workload management
between SQL Server instances.
• Limit specification applies to CPU bandwidth and memory
managed by SQL Server.
• Resource Governor is available only on the Enterprise, Developer,
and Evaluation editions of SQL Server.