The BI server was crashing when running multiple reports and dashboards simultaneously due to running out of memory. Security filters applied to fact tables rather than dimensions were identified as a potential cause. Rewriting the security filters to improve efficiency solved the crashing and performance issues. Analyzing query complexity, volume of data retrieved, and logical execution plans provided insights to diagnose and address the problems.
This document discusses how Oracle Fusion Middleware can be integrated with Oracle E-Business Suite. Key points include:
1) Fusion Middleware components like Single Sign-On, Portal, and Internet Directory can provide additional features and manage users.
2) Single Sign-On allows external users secure access to E-Business Suite applications with one login.
3) Portals allow custom pages to be built with E-Business Suite portlets to access data based on user responsibilities.
4) Internet Directory can synchronize user credentials between E-Business Suite and the directory.
Oracle Workflow allows modeling of business processes and routing of tasks. It has a 3-tier architecture with a workflow engine, directory services and database. Key components include the workflow definition file, workflow builder, worklist and notification system. An example diagram showed a requisition approval process with steps for creating, approving, rejecting or completing a requisition routed to appropriate users.
Whats new in Enterprise 5.0 Product SuiteMicro Focus
This document summarizes new features across Micro Focus's Enterprise Product Suite version 5.0, including .NET Core support, Amazon Web Services Quick Start, COBOL formatting, code analysis views, Enterprise Server scale out architecture, common web administration, Application Workflow Manager improvements, AppMaster Builder data view changes, CICS and IMS support enhancements, COBOL and PL/I language additions, debugging upgrades, and more. Key areas of focus include multi-system administration of Enterprise Server, integration of mainframe workloads on modern platforms, and development productivity aids.
Case Study - SharePoint - Customer ExtranetDavid Gilbert
A construction company used SharePoint as an intranet portal but wanted to improve collaboration and processes. They upgraded their internal SharePoint to MOSS 2007 and moved customer sites to a new extranet for improved security and performance. The solution provided separate environments for internal and customer information, a larger extranet system, and an upgraded intranet ready to use new MOSS features. This enabled customers to easily share information while the company gained improved workflows and analytics capabilities.
The document discusses optimization of dynamic SQL statements through the use of SQL packages. SQL packages allow the access plans for dynamic SQL statements to be shared across users and connections, improving performance over traditional dynamic SQL. When a prepared dynamic SQL statement is executed, the optimizer can leverage the existing access plan in the SQL package rather than generating a new plan. This approach makes the performance of dynamic SQL more comparable to static SQL.
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
Oracle's Exadata and Exalogic are impressive products in their own right. But working in combination they deliver unparalleled transaction processing performance with up to a 30x increase over existing legacy systems, with the lowest cost of ownership over a 3 or 5 year basis than any other hardware. In this session you'll learn how to leverage Oracle's Engineered Systems within your enterprise to deliver record-breaking performance at the lowest TCO.
Oracle BI Enterprise Edition Plus (OBIEE) is a comprehensive business intelligence platform that provides tools for interactive dashboards, advanced reporting, ad hoc analysis, alerts, and integration. It includes pre-packaged content for various Oracle applications. The key components are the Oracle BI Server for data handling and the Oracle BI Answers tool for report building. In BI Answers, users can drag and drop columns to build queries, apply filters and formatting. Dashboards allow displaying multiple reports for summarized views.
This document discusses how Oracle Fusion Middleware can be integrated with Oracle E-Business Suite. Key points include:
1) Fusion Middleware components like Single Sign-On, Portal, and Internet Directory can provide additional features and manage users.
2) Single Sign-On allows external users secure access to E-Business Suite applications with one login.
3) Portals allow custom pages to be built with E-Business Suite portlets to access data based on user responsibilities.
4) Internet Directory can synchronize user credentials between E-Business Suite and the directory.
Oracle Workflow allows modeling of business processes and routing of tasks. It has a 3-tier architecture with a workflow engine, directory services and database. Key components include the workflow definition file, workflow builder, worklist and notification system. An example diagram showed a requisition approval process with steps for creating, approving, rejecting or completing a requisition routed to appropriate users.
Whats new in Enterprise 5.0 Product SuiteMicro Focus
This document summarizes new features across Micro Focus's Enterprise Product Suite version 5.0, including .NET Core support, Amazon Web Services Quick Start, COBOL formatting, code analysis views, Enterprise Server scale out architecture, common web administration, Application Workflow Manager improvements, AppMaster Builder data view changes, CICS and IMS support enhancements, COBOL and PL/I language additions, debugging upgrades, and more. Key areas of focus include multi-system administration of Enterprise Server, integration of mainframe workloads on modern platforms, and development productivity aids.
Case Study - SharePoint - Customer ExtranetDavid Gilbert
A construction company used SharePoint as an intranet portal but wanted to improve collaboration and processes. They upgraded their internal SharePoint to MOSS 2007 and moved customer sites to a new extranet for improved security and performance. The solution provided separate environments for internal and customer information, a larger extranet system, and an upgraded intranet ready to use new MOSS features. This enabled customers to easily share information while the company gained improved workflows and analytics capabilities.
The document discusses optimization of dynamic SQL statements through the use of SQL packages. SQL packages allow the access plans for dynamic SQL statements to be shared across users and connections, improving performance over traditional dynamic SQL. When a prepared dynamic SQL statement is executed, the optimizer can leverage the existing access plan in the SQL package rather than generating a new plan. This approach makes the performance of dynamic SQL more comparable to static SQL.
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
Oracle's Exadata and Exalogic are impressive products in their own right. But working in combination they deliver unparalleled transaction processing performance with up to a 30x increase over existing legacy systems, with the lowest cost of ownership over a 3 or 5 year basis than any other hardware. In this session you'll learn how to leverage Oracle's Engineered Systems within your enterprise to deliver record-breaking performance at the lowest TCO.
Oracle BI Enterprise Edition Plus (OBIEE) is a comprehensive business intelligence platform that provides tools for interactive dashboards, advanced reporting, ad hoc analysis, alerts, and integration. It includes pre-packaged content for various Oracle applications. The key components are the Oracle BI Server for data handling and the Oracle BI Answers tool for report building. In BI Answers, users can drag and drop columns to build queries, apply filters and formatting. Dashboards allow displaying multiple reports for summarized views.
A quick overview of a large application integration project I just wrapped up where we use a service approach to integrate 50 interfaces from 23 applications.
At least check out the diagrams and lessons learned at the end.
Pre mts Sharepoint 2010 i SQL Server 2012Łukasz Grala
This document summarizes Łukasz Grala's qualifications and experience working with SQL Server, BI, and SharePoint solutions. It then provides an agenda for an upcoming presentation or training that will cover new features in PowerPivot and Reporting Services in SQL Server 2012, the Project Crescent reporting project, and high availability in SQL Server 2012. The document also includes architectural diagrams showing the relationships between different BI components in SQL Server 2012 like PowerPivot, Reporting Services, and Analysis Services.
Oracle Fusion Middleware - pragmatic approach to build up your applications -...ORACLE USER GROUP ESTONIA
Oracle Fusion Middleware provides a complete set of integrated middleware products and services for building applications. It includes components for web and mobile development, user engagement, content management, business intelligence, identity management, integration, and application development tools. The platform offers high performance, scalability, availability, and security. Oracle Fusion Middleware uses a service-oriented architecture and supports both cloud and on-premises deployments. It allows organizations to modernize applications and integrate legacy systems on a single, open standards-based platform.
The document discusses designing, deploying, and optimizing SharePoint 2010 on VMware. It covers topics such as performance of SharePoint on vSphere, capacity planning including workload modeling and SQL server capacity, and high availability, disaster recovery, and backup of SharePoint on vSphere. A case study with EMC is also mentioned.
What’s New in SharePoint 2013 for IT ProsSPC Adriatics
SharePoint 2013 includes several new and improved features for IT professionals. It introduces new service applications for app management, translation services, and work management. The distributed cache service and request management features were added to improve performance. Support for SQL 2012 and shredded storage provide more flexible storage options. Additional enterprise content management, business intelligence, and mobile features were also introduced.
The LABVANTAGE architecture provides a scalable and high-performance environment for laboratory information management. It uses a zero-footprint design that allows users to access the system from any device with a web browser. The system's layers include web servers, application servers, database servers, and optional reporting servers. It leverages standard technologies like Java, HTML, and SQL for flexibility and integration. The architecture is designed for reliability, security, and to easily scale for increased user loads through clustering of servers.
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael NoelMichael Noel
This document discusses security layers in a SharePoint environment. It covers 5 layers of security: infrastructure security, data security, transport security, edge security, and rights management. For infrastructure security, it discusses service account setup, Kerberos authentication, and physical security. For data security, it covers role-based access control, SQL transparent data encryption, and antivirus. It also provides steps for configuring Kerberos and SQL TDE. The document then discusses transport security using SSL and IPSec, edge security with UAG/TMG, and rights management with Active Directory Rights Management Services.
The document discusses Microsoft workgroups and domain networks. A workgroup has no central authority, with each computer storing its own local user accounts. This requires setting up the same account on each machine. A domain network uses directory services like Active Directory to centrally manage user accounts across multiple servers and client computers, providing a more scalable solution for large organizations. Hash tables and functions are also discussed as a method for mapping user names to account information in a directory service database.
Kautilya is a powerful enterprise reporting, business intelligence, and analytics tool that provides dynamic web-based reports, dashboards, and real-time data access and analysis capabilities. It includes features such as report scheduling, exporting, security, and connecting to multiple data sources. Kautilya also offers unique functions like building analytics directly from transactional data using its state-of-the-art in-memory analytics engine and combining existing reports to create new reports or comparisons.
The document provides an introduction to JBoss Application Server, including its history, architecture, components, installation process, directory structure, and how to start and stop the server. It also discusses the JBoss Administration Console and JMX Console for managing and monitoring the application server.
The document provides an overview of JBoss Application Server 7. Key points include:
- JBoss AS 7 has a modular, lightweight architecture compared to previous versions. It uses a modular service container (MSC) for fast startup and classloading.
- Modules isolate dependencies and allow different versions to coexist. The server and deployments are implemented as modules.
- JBoss AS 7 is certified for Java EE 6 Web Profile and aims to be small, fast, manageable, and embeddable compared to previous versions.
- New releases will continue adding functionality toward a full Java EE 6 implementation while maintaining the goals of performance and modularity.
This document discusses JBoss Enterprise Application Platform (EAP) 6 and its capabilities for easing into cloud deployments. EAP 6 implements the full Java EE 6 specification and is designed with a cloud-ready architecture featuring high automation, flexible management, and dynamic resource usage. It provides fast performance, modular design, and centralized configuration. EAP 6 supports developer productivity with Maven integration and sample applications.
Integrating Novell Collaboration Products with SugarCRM, Salesforce.com and S...Novell
Third-party application support for products like Novell GroupWise and Novell Teaming is among the top customer enhancement requests—and critical to user productivity. In this session, we'll show you how we've done it with our upcoming data synchronization product, Novell Data Synchronizer. We'll introduce you to the product and take a detailed look at the way it enables integration between Novell collaboration products and SugarCRM, Salesforce.com and Microsoft SharePoint.
JBoss Application Server 7 provides a more manageable and performant platform compared to previous versions. It features two operational modes: standalone for development and domain for managing multiple servers. The domain mode uses separate processes for the process controller, host controller, and server instances which allows for centralized management of the servers.
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
The webinar will review a multi-layered framework for PostgreSQL security, with a deeper focus on limiting access to the database and data, as well as securing the data.
Using the popular AAA (Authentication, Authorisation, Auditing) framework EnterpriseDB will cover:
- Best practices for authentication (trust, certificate, MD5, Scram, etc).
- Advanced approaches, such as password profiles.
- Deep dive of authorisation and data access control for roles, database objects (tables, etc), view usage, row-level security, and data redaction.
- Auditing, encryption, and SQL injection attack prevention
Service Oriented Architecture (SOA) [2/5] : Enterprise Service BusIMC Institute
The document discusses enterprise service buses (ESBs). It defines an ESB as middleware that acts as a mediator between different, often incompatible protocols and middleware products. The core capabilities of an ESB include web services support, adapters, invocation, mediation, routing, transformation, orchestration, and security. Java Business Integration (JBI) is introduced as an open standard for ESBs. OpenESB, which implements JBI, and its integration with GlassFish are also summarized. Finally, a sample usage scenario of using an ESB for loan processing is presented.
CETPA INFOTECH PVT LTD is one of the IT education and training service provider brands of India that is preferably working in 3 most important domains. It includes IT Training services, software and embedded product development and consulting services.
http://www.cetpainfotech.com
The document discusses Enterprise Service Bus (ESB) and Java Business Integration (JBI). It defines ESB as middleware that acts as a mediator between different protocols and products. JBI is a specification that defines a standard architecture and container for pluggable integration components. OpenESB is an open source implementation of an ESB runtime based on JBI. It provides tools for developing, deploying, and managing composite applications. The document presents examples of how OpenESB and GlassFish can be used to implement a loan processing application using components like BPEL, JavaEE, and XSLT within a JBI architecture.
The document compares the architecture of Cognos 8.2, OBIEE 10g, and OBIEE 11g across several features. Some key differences include:
- OBIEE 10g and 11g are based on N-tier architectures while Cognos uses a web-based service-oriented architecture.
- OBIEE 10g and 11g require desktop tools for repository development and management while Cognos 8.2 is platform independent.
- OBIEE 11g improved support for clustering, load balancing, and in-memory capabilities compared to earlier versions.
- All three support integration with external applications, single sign-on, and LDAP integration for security. However,
Enterprise Java Beans (EJB) is a platform for building portable, reusable, and scalable business applications using the Java programming language.
EJB allows application developers to focus on building business logic without having to spend time on building infrastructure code for services such as transactions, security, automated persistence, and so on.
This presentation introduces EJB 3.0 concepts with code examples.
During this brief walkthrough of the setup, configuration and use of the toolset we will show you how to find the trees from the forest in today's modern cloud environments and beyond.
Oracle BI Architecture consists of four main components: Oracle BI Web/Client, Oracle BI Presentation Server, Oracle BI Server, and Oracle BI Scheduler. The Oracle BI Server is the core component that communicates with the Presentation Server and connects to various data sources using metadata to generate dynamic SQL queries and cache query results.
A quick overview of a large application integration project I just wrapped up where we use a service approach to integrate 50 interfaces from 23 applications.
At least check out the diagrams and lessons learned at the end.
Pre mts Sharepoint 2010 i SQL Server 2012Łukasz Grala
This document summarizes Łukasz Grala's qualifications and experience working with SQL Server, BI, and SharePoint solutions. It then provides an agenda for an upcoming presentation or training that will cover new features in PowerPivot and Reporting Services in SQL Server 2012, the Project Crescent reporting project, and high availability in SQL Server 2012. The document also includes architectural diagrams showing the relationships between different BI components in SQL Server 2012 like PowerPivot, Reporting Services, and Analysis Services.
Oracle Fusion Middleware - pragmatic approach to build up your applications -...ORACLE USER GROUP ESTONIA
Oracle Fusion Middleware provides a complete set of integrated middleware products and services for building applications. It includes components for web and mobile development, user engagement, content management, business intelligence, identity management, integration, and application development tools. The platform offers high performance, scalability, availability, and security. Oracle Fusion Middleware uses a service-oriented architecture and supports both cloud and on-premises deployments. It allows organizations to modernize applications and integrate legacy systems on a single, open standards-based platform.
The document discusses designing, deploying, and optimizing SharePoint 2010 on VMware. It covers topics such as performance of SharePoint on vSphere, capacity planning including workload modeling and SQL server capacity, and high availability, disaster recovery, and backup of SharePoint on vSphere. A case study with EMC is also mentioned.
What’s New in SharePoint 2013 for IT ProsSPC Adriatics
SharePoint 2013 includes several new and improved features for IT professionals. It introduces new service applications for app management, translation services, and work management. The distributed cache service and request management features were added to improve performance. Support for SQL 2012 and shredded storage provide more flexible storage options. Additional enterprise content management, business intelligence, and mobile features were also introduced.
The LABVANTAGE architecture provides a scalable and high-performance environment for laboratory information management. It uses a zero-footprint design that allows users to access the system from any device with a web browser. The system's layers include web servers, application servers, database servers, and optional reporting servers. It leverages standard technologies like Java, HTML, and SQL for flexibility and integration. The architecture is designed for reliability, security, and to easily scale for increased user loads through clustering of servers.
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael NoelMichael Noel
This document discusses security layers in a SharePoint environment. It covers 5 layers of security: infrastructure security, data security, transport security, edge security, and rights management. For infrastructure security, it discusses service account setup, Kerberos authentication, and physical security. For data security, it covers role-based access control, SQL transparent data encryption, and antivirus. It also provides steps for configuring Kerberos and SQL TDE. The document then discusses transport security using SSL and IPSec, edge security with UAG/TMG, and rights management with Active Directory Rights Management Services.
The document discusses Microsoft workgroups and domain networks. A workgroup has no central authority, with each computer storing its own local user accounts. This requires setting up the same account on each machine. A domain network uses directory services like Active Directory to centrally manage user accounts across multiple servers and client computers, providing a more scalable solution for large organizations. Hash tables and functions are also discussed as a method for mapping user names to account information in a directory service database.
Kautilya is a powerful enterprise reporting, business intelligence, and analytics tool that provides dynamic web-based reports, dashboards, and real-time data access and analysis capabilities. It includes features such as report scheduling, exporting, security, and connecting to multiple data sources. Kautilya also offers unique functions like building analytics directly from transactional data using its state-of-the-art in-memory analytics engine and combining existing reports to create new reports or comparisons.
The document provides an introduction to JBoss Application Server, including its history, architecture, components, installation process, directory structure, and how to start and stop the server. It also discusses the JBoss Administration Console and JMX Console for managing and monitoring the application server.
The document provides an overview of JBoss Application Server 7. Key points include:
- JBoss AS 7 has a modular, lightweight architecture compared to previous versions. It uses a modular service container (MSC) for fast startup and classloading.
- Modules isolate dependencies and allow different versions to coexist. The server and deployments are implemented as modules.
- JBoss AS 7 is certified for Java EE 6 Web Profile and aims to be small, fast, manageable, and embeddable compared to previous versions.
- New releases will continue adding functionality toward a full Java EE 6 implementation while maintaining the goals of performance and modularity.
This document discusses JBoss Enterprise Application Platform (EAP) 6 and its capabilities for easing into cloud deployments. EAP 6 implements the full Java EE 6 specification and is designed with a cloud-ready architecture featuring high automation, flexible management, and dynamic resource usage. It provides fast performance, modular design, and centralized configuration. EAP 6 supports developer productivity with Maven integration and sample applications.
Integrating Novell Collaboration Products with SugarCRM, Salesforce.com and S...Novell
Third-party application support for products like Novell GroupWise and Novell Teaming is among the top customer enhancement requests—and critical to user productivity. In this session, we'll show you how we've done it with our upcoming data synchronization product, Novell Data Synchronizer. We'll introduce you to the product and take a detailed look at the way it enables integration between Novell collaboration products and SugarCRM, Salesforce.com and Microsoft SharePoint.
JBoss Application Server 7 provides a more manageable and performant platform compared to previous versions. It features two operational modes: standalone for development and domain for managing multiple servers. The domain mode uses separate processes for the process controller, host controller, and server instances which allows for centralized management of the servers.
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
The webinar will review a multi-layered framework for PostgreSQL security, with a deeper focus on limiting access to the database and data, as well as securing the data.
Using the popular AAA (Authentication, Authorisation, Auditing) framework EnterpriseDB will cover:
- Best practices for authentication (trust, certificate, MD5, Scram, etc).
- Advanced approaches, such as password profiles.
- Deep dive of authorisation and data access control for roles, database objects (tables, etc), view usage, row-level security, and data redaction.
- Auditing, encryption, and SQL injection attack prevention
Service Oriented Architecture (SOA) [2/5] : Enterprise Service BusIMC Institute
The document discusses enterprise service buses (ESBs). It defines an ESB as middleware that acts as a mediator between different, often incompatible protocols and middleware products. The core capabilities of an ESB include web services support, adapters, invocation, mediation, routing, transformation, orchestration, and security. Java Business Integration (JBI) is introduced as an open standard for ESBs. OpenESB, which implements JBI, and its integration with GlassFish are also summarized. Finally, a sample usage scenario of using an ESB for loan processing is presented.
CETPA INFOTECH PVT LTD is one of the IT education and training service provider brands of India that is preferably working in 3 most important domains. It includes IT Training services, software and embedded product development and consulting services.
http://www.cetpainfotech.com
The document discusses Enterprise Service Bus (ESB) and Java Business Integration (JBI). It defines ESB as middleware that acts as a mediator between different protocols and products. JBI is a specification that defines a standard architecture and container for pluggable integration components. OpenESB is an open source implementation of an ESB runtime based on JBI. It provides tools for developing, deploying, and managing composite applications. The document presents examples of how OpenESB and GlassFish can be used to implement a loan processing application using components like BPEL, JavaEE, and XSLT within a JBI architecture.
The document compares the architecture of Cognos 8.2, OBIEE 10g, and OBIEE 11g across several features. Some key differences include:
- OBIEE 10g and 11g are based on N-tier architectures while Cognos uses a web-based service-oriented architecture.
- OBIEE 10g and 11g require desktop tools for repository development and management while Cognos 8.2 is platform independent.
- OBIEE 11g improved support for clustering, load balancing, and in-memory capabilities compared to earlier versions.
- All three support integration with external applications, single sign-on, and LDAP integration for security. However,
Enterprise Java Beans (EJB) is a platform for building portable, reusable, and scalable business applications using the Java programming language.
EJB allows application developers to focus on building business logic without having to spend time on building infrastructure code for services such as transactions, security, automated persistence, and so on.
This presentation introduces EJB 3.0 concepts with code examples.
During this brief walkthrough of the setup, configuration and use of the toolset we will show you how to find the trees from the forest in today's modern cloud environments and beyond.
Oracle BI Architecture consists of four main components: Oracle BI Web/Client, Oracle BI Presentation Server, Oracle BI Server, and Oracle BI Scheduler. The Oracle BI Server is the core component that communicates with the Presentation Server and connects to various data sources using metadata to generate dynamic SQL queries and cache query results.
This document describes the development of a virtual classroom system. The system will provide an integrated e-learning environment for university students and distance learners. Key aspects include:
- The system will allow students, instructors, and administrators to access academic resources over the internet.
- The initial architecture used a Java Swing client, Tomcat servlet container, and PostgreSQL database. This was later changed to use Enterprise JavaBeans for transaction management, persistence, security and caching.
- Requirements include supporting courses, quizzes, grades, and user accounts for students, instructors and an administrator. The timeline and challenges of learning new technologies like EJBs are also outlined.
A market leader in technical training has organized a workshop on Oracle technology to help students build careers as engineers. The workshop will cover the physical and logical structure of Oracle databases, administrative tasks, features for managing storage, data, availability, security and performance. Specific topics will include backup methods, Oracle tasks like cold backups, information about Oracle Corporation, Automatic Storage Management, partitioning, XML capabilities and security products. The goal is to help students gain the knowledge and skills needed to work with Oracle databases.
This document provides an overview and agenda for Oracle Business Intelligence 11g architecture and internals. It discusses the key features of OBIEE 11g, including the integration with Oracle Fusion Middleware. The basic architecture includes system components managed by Oracle Process Manager and Notification Server, and Java components managed by Oracle WebLogic Server. It also compares OBIEE 11g to the previous 10g version.
Bank Data Frank Peterson DB2 10-Early_Experiences_pdfSurekha Parekh
DB2 for z/OS update seminar focused on Bankdata's experiences testing DB2 10 during the beta process. Key items tested included hash access to data, XML engine schema validation, XML multi-versioning, and other new features. Testing revealed surprises around administrative overhead and challenges completing performance tests. Results showed hash access provided CPU savings compared to non-hash access when data is relatively static. XML schema validation was moved to the engine for improved performance.
"SQL Server Storage Configuration for SharePoint" presented to the Silicon Valley SQL Server User Group on January 13, 2010
Presenter: Burzin Patel, author and Solutions Architect at StorSimple
Learn about the Top Five SQL Server storage configuration best practices for SharePoint, including:
•Disk sizing and configuration •Externalizing BLOB storage •Common maintenance tasks •Performance tuning
Log Analysis for WAS Liberty and WAS TraditionalDon Bourne
This document discusses options for analyzing logs from WebSphere Application Server (WAS) Liberty and traditional environments. It describes:
1. ELK (Elasticsearch, Logstash, Kibana) as an open source log analysis solution that can be set up on-premises or using IBM Cloud Product Insights.
2. Configuring WAS Liberty servers to send logs and events to an on-premises or IBM-hosted Logstash using the logstashCollector or bluemixLogCollector features.
3. Setting up WAS traditional and IHS servers to send logs to IBM-hosted ELK using a Filebeat configuration generated by a Python script.
The document provides guidance on using
The document discusses Oracle E-Business Suite technology priorities and guidance. It focuses on leveraging the latest Oracle and industry technologies to offer ease of use, facilitate identity management, simplify integration, and deliver business intelligence while reducing cost of ownership. Specific technologies highlighted include the Oracle database, Fusion Middleware, and leveraging SOA.
The document discusses new features in Exchange 2013 that improve client access through a redesigned client access architecture using load balancing at the network layer, role evolution through consolidation of server roles, and cross-version interoperability principles. It also outlines changes to the Exchange architecture that improve hardware efficiency and simplify deployments through the use of database availability groups and a single master model for public folders.
1) The document discusses options for migrating to Microsoft SharePoint 2013, including upgrading existing SharePoint farms or sites to SharePoint 2013 on-premises or in Office 365.
2) It outlines the farm upgrade process for an on-premises migration to SharePoint 2013 and considerations for the different upgrade approaches.
3) Third party migration tools like AvePoint are presented as alternatives that can automate migrations, retain metadata and security settings, and reduce downtime compared to manual upgrades. The document demonstrates AvePoint's migration capabilities through an example project.
WebLogic Diagnostic Framework Dr. Frank Munz / munz & more WLS11gInSync Conference
This document provides an overview of the WebLogic Diagnostic Framework (WLDF). It discusses how WLDF can be used to monitor WebLogic Server and applications through features like instrumentation, diagnostic archives, watches and notifications. Specific WLDF components are explained like collected metrics, diagnostic modules, and actions. Examples are given around monitoring method invocation statistics and using dye injection. The document recommends WLDF as being well designed, well documented, and quick to apply once there is a learning period. It suggests some areas for improvement in WLDF documentation and hot swap functionality.
2015: Whats New in MySQL 5.7, At Oracle Open World, November 3rd, 2015 Geir Høydalsvik
MySQL 5.7 includes many new features and improvements such as faster performance, easier configuration and management, and enhanced security. It provides benefits like increased speed for queries, replication, and data compression as well as new capabilities for JSON data, spatial indexing, and instrumentation. Oracle presented benchmarks showing MySQL 5.7 is up to 6 times faster than previous versions.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Adam bloom bi_server_diag
1.
2. <Insert Picture Here>
How To Blow Up The BI Server – A Case Study For Diagnosis Of
Performance Issues
Adam Bloom
BI Product Manager, Oracle
3. The focus of this session is around a case study of a
poorly performing BI Applications installation. The
case study covers mainly BI Server performance with
some information on database performance and
general sizing hints and tips.
4. Part I - The Problem
2008-07-25 08:04:56
[nQSError: 12002] Socket communication error at
call=send: (Number=9) Bad file descriptor
2008-07-25 08:04:56
[43031] : Oracle BI Server shutdown.
Several dashboards with large reports in them.
With 10 users logged in and running reports/dashboards the BI Server dies but does not give
an error.
What could the causes of this be? The CPU usage in top goes to 99% and stays there and
then the BI Server process dies.
5. Oracle BI Applications Architecture
Oracle BI
BI Presentation Services:
Dashboards by Role
Presentation • 10.1.3.3 on Linux 32bit
Services
Reports, Analysis / Analytic
Workflows
Administration
Metrics / KPIs BI Server:
Metadata
• 10.1.3.3 on Linux 32bit
Oracle BI
Logical Model / Subject Areas
Server • SuSELinux 2.6.5-7.244-bigsmp
• 8-CPU
Physical Map
• 32 GB RAM
Data Warehouse /
Data Model
Database Server:
Direct
Access to Load Process • Oracle 10g on Linux 64bit
DAC
Source
Data Staging Area ETL
Extraction Process
Security Model:
• Users based in E-Business Suite only.
• No RPD users.
• Integrated EBS SSO in place.
Oracle SAP R/3 Siebel PSFT EDW
• OOTB BI Apps Security filters
Other
Federated Data Sources enhanced by custom requirements.
6. The Problem Continued
The problem seems to have something to do with the integrated
security with EBS.
There are two initialization blocks that look up the GL security rules that the
EBS responsibility has access to.
The initialization blocks populate row-wise session variables which are used
in the where clause of security filters
These return around 300 values in some cases and are used most reports to
secure data
If these init blocks are disabled the server does not crash, but
there are still some performance issues.
However, the security filters are required.
7. The Security Filters
Could it be because the Security Filters are applied to
the Fact tables rather than the Dimension Tables?
Could it be due to the complexity of the Logical Model
that results in so many pieces of Physical SQL?
Is the problem with the Init Blocks or the Security
Filters?
What is causing the crashing? Is it the same cause
for the performance issue?
8. Quick reminder on OOTB Security Integration with
EBS
2
store ICX navigate to
session 3 BI EE
cookie in
browser
Web OBIEE OBIEE
Oracle EBS
Browser PS Server
user 1 4
ICX Cookie value
log in to EBS populates a BI EE
Session Variable
validate session
5 via the ICX
cookie using a
6 Init Block retrieves security SQL function
information from EBS specific
to the User/Responsibility
9. Tell the Presentation Services to expect an ICX
cookie rather than using the standard logon page.
<Auth>
<ExternalLogon enabled="true">
<ParamList>
<Param name="NQ_SESSION.ICX_SESSION_COOKIE"
source="cookie"
nameInSource="EBSAppsDatabaseSID"/>
<Param name="NQ_SESSION.ACF"
source="url"
nameInSource="ACF"/>
</ParamList>
</ExternalLogon>
</Auth>
10. Set up a Connection Pool against the EBS database. Use an
‘on connect’ script to send the ICX cookie to EBS and open a
database session based on the User’s context.
call /* valueof(NQ_SESSION.ACF) */
APP_SESSION.validate_icx_session('valueof(NQ_SESSION.
ICX_SESSION_COOKIE)')
11. Create an Initialization Block (an Authentication Init Block) to first
invoke this script, then run SQL to populate BI EE Session Variables.
In particular the USER and Responsibility are retrieved.
select FND_GLOBAL.RESP_ID,
FND_GLOBAL.RESP_APPL_ID,
FND_GLOBAL.SECURITY_GROUP_ID,
FND_GLOBAL.RESP_NAME,
FND_GLOBAL.USER_ID,
FND_GLOBAL.EMPLOYEE_ID,
FND_GLOBAL.USER_NAME from dual
Map this to
the USER
variable
12. In Summary:
The EBS user and responsibility are obtained through
the EBS Single Sign on Block
Then EBS is queried for the Business Areas, Ledgers
and Companies that the user has access too, via
three other init blocks.
These lists of values are stored in Row-wise Session
variables (EBS_COMPANY, EBS_BUSINESS_AREA
and the OTB LEDGER).
These are then given permissions to the secured
facts in the Permissions Security Filter of the group
"GL Security Rules", which all the EBS security
groups are a member of.
13. Part II – The Test
What happens when we kick off some Dashboards?
16. nmon Output During Testing
• Massive
CPU usage
• It’s the BI
Server
using both
CPU and
memory
• Memory
1.2GB
17. • Settles to 1
CPU
• Still
relatively
small
amounts of
I/O
• Memory up
to 1.6GB for
the BI Server
18. Is one thread blocking everything else?
How many requests
do we have running?
18 Requests of which
13 are executing, but
all on one CPU…?
19. Observations
• We did not observe much network traffic suggesting
that we were not retrieving lots of data for the BI
Server to knit back together. We could have used
netstat to log these stats in more detail.
• Database logs showed very little SQL being issued
to the Db, and not much data or load on the
database.
• Here’s a clue: If we’ve got a Physical Query in the BI
Server log, it means the BI server has done its work
and is then waiting for data to be returned. (unless
the data is returned and the BI Server is busy
stitching together data from multiple
sources/queries).
20. What happens when you Issue an Answers Request
Logical SQL Request
Logical Request
(before navigation)
Logical Execution Plan
Send Physical SQL
Sort results in BI Server
21. Time to blow it up – typically around 34 concurrent
requests
• Kick-off
several
Dashboards
• All CPUs
light up
again
• Memory
reaches 2.3
GB at peak
22. Observations
Note that no Answers Request got as far as returning
any data.
However, if we ran any one Answers Request on its
own, it would run to completion.
23. Coredumps and Stack Traces
To enable a coredump on Linux:
ulimit –c unlimited
On Suse use gdb
This reads the coredump assuming you have relevant
libraries
We had more luck with strace tool
In the strace output we saw the following:
30317 <... mmap2 resumed> ) = -1 ENOMEM
(Cannot allocate memory)
30310 --- SIGABRT (Aborted) @ 0 (0) ---
This means we ran out of memory…
24. Part III – The Diagnosis
What are the options for solving these problems?
1. Use the coredump to find out the cause of the crash and
attempt to solve crashing by manipulating number of threads
and Stack size
2. Add more BI Servers so we can use more memory and CPU
3. Create a RAM disk – in case we are retrieving a lot of data
from the database
4. Seed cache so we don’t have to hit the database as much
5. Analyze individual queries for complexity and volume of data
6. Cut to the chase and re-write the security filters
25. 1. Threads and Stack Size parameters
SERVER_THREAD_STACK_SIZE
DB_GATEWAY_THREAD_STACK_SIZE
SORT_MEMORY_SIZE
SORT_BUFFER_INCREMENT_SIZE
VIRTUAL_TABLE_PAGE_SIZE
Your machine might have 32 GB, 1 TB or even 1 PB of memory but your process
is limited to only 3 GB (assuming this is a 32-bit machine). If you are not getting
an out of stack error then adjusting the *_STACK_SIZE won’t make any
difference in stability and definitely not in speed.
For the rest of the parameters, none of them will have an effect on stability. On
the other hand, if you are running out of the allotted 3 GB, then reducing the
parameters size may help alleviate the memory issues.
At the end of the day, these parameters made very little difference to stability or
performance. We tried larger and smaller values, but still it crashed.
26. We sent our coredumps and stack traces to an
‘expert’…
In the coredump, we could see over a hundred
threads – more than we were expecting. Our expert
did pick through these, but was unable to pinpoint any
single thread that was causing our issue.
Our ‘expert’ confirmed we had run out of memory and
suggested we move to 64bit platform and reduce our
number of threads and Stack sizes to give the Heap
more memory.
27. 2. Add more BI Servers
This addresses the symptom rather than the cause.
In any case, on a 32bit operating system we had
constraints.
We did have another machine available to us and had
made plans for another BI server, but the issue would
only have eaten all the CPU and memory on that box
as well.
28. 3. Create a RAM disk
This technique is useful if lots of data is being
returned to the BI Server to speed up the sort area.
However, this was not the case. I also wonder if we
would have reduced the memory available to us
further had we taken this course of action.
29. 4. Seed the cache
We did notice that the cache was filling up, so we
increased the cache size to:
100000 Max Rows
100MB Max entry size
1200 max cache entries
This stopped our cache from filling up, but did nothing
to solve our performance and crashing issues.
30. 5. Analyze individual queries for complexity and
volume of data
Any single Answers Request would run on its own. The
performance and crashing issues occurred when running lots of
requests at the same time.
What could be happening in the Answers Requests to consume
so much CPU and memory?
In the stress test we had seen little or no data being returned by
the database, so we could rule out the BI Server having to stitch
together vast amounts of data.
We turned Logging on (Level 3) and ran a single Answers
Request.
31. A typical Report
• Our sample request
created 1 Logical
Query, but 17
Physical queries
• The Grand Total and
sub-totals created
some of these
Physical queries
• YTD measures used
We did not find anything to TO_DATE
functionality and
complain about. typically created a
single Physical
The BI Server seemed to be query per source
Fact table
making good decisions. • Full Year measures
were ‘level-based’
and created a single
Physical query
covering several
measures at the
same grain from the
same underlying
table
32. Part IV – The Solution
• Something is
looping
• If we are not
using memory
storing data
from physical
queries or
stitching this
data back
together, we
must be using
memory to
compile the
Logical
queries.
• Use Loglevel 7
to see Logical
Execution
Plan
33.
34. Query Summary Stats
-------------------- Physical Query Summary Stats:
Number of physical queries 17, Cumulative time 6,
DB-connect time 0 (seconds)
-------------------- Logical Query Summary Stats: Elapsed
time 108, Response time 108, Compilation time 100
(seconds)
35. The Original Security Filter
CASE WHEN VALUEOF(NQ_SESSION."EBS_COMPANY") = 'X'
THEN 'X' ELSE Core."Dim - GL Company"."Company Level 20
Code" END = VALUEOF(NQ_SESSION."EBS_COMPANY") AND
…
36. The New Improved Security Filter
CASE WHEN
((VALUEOF(NQ_SESSION."EBS_COMPANY_FULL")
= 'X' OR Core."Dim - GL Company"."Company Level 20
Code" =
VALUEOF(NQ_SESSION."EBS_COMPANY") ) AND…
38. Final Database Tuning
Partitioning.
db_file_multiblock_read_count = 32 set to 16 or 8
Changing cursor_sharing = similar
setting the maximum optimizer permutations to a large number in QA to
see if the execution plans change.
SQL Tuning - Because the SQL queries are complex, there is a need for
a tool such as OEM and the performance pack to assist in the execution
plan analysis.
SQL Access advisor to recommend indexes and materialized views.
There is also a Technote for performance parameters relevant to BI
Applications and new performance-related instructions in the BI Apps
7.9.6 Installation guide.
39. Summary learning points
It is fair to expect a single CPU BI Server to support several hundred concurrent
requests under normal circumstances for even complex queries.
Note that we did not heavily load the Presentation Services due to the design of
the reports.
The BI Server is multi-threaded.
You can do a fairly reasonable performance test using a single user if you have
suitable Dashboards.
Performance Tuning of the BI Server should aim to pass the load to the
underlying data source.
When you analyze BI Server logs, think about the Logical Request, the Logical
Execution Plan (Compile time) as well as the Physical SQL that is fired and the
work the BI Server has do to join results sets.
The amount of memory consumed by the BI Server is initially related to the size
of the RPD. In our case, for a customized BI Apps RPD this started at around
500MB.
Once running correctly, we found it very difficult to throw enough work at the BI
Server in order for it to consume much more than 2GB.
Once running correctly, we found it hard to use more than one or two CPUs on
the BI Server as we were unable to build up sufficient workload.
40. The preceding is intended to outline our general
product direction. It is intended for information
purposes only, and may not be incorporated into any
contract. It is not a commitment to deliver any
material, code, or functionality, and should not be
relied upon in making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.