Being Epic: Best Practices for Android DevelopmentReto Meier
Turn good ideas into great apps by following some essential Android development best practices. Starting with an overview of the 5 deadly sins and 5 golden rules, you will learn how to build apps that users love and that are good citizens of the mobile environment. You will also learn specific best practices for background apps and location based services.
Building LLM Solutions using Open Source and Closed Source Solutions in Coher...Sri Ambati
Sandeep Singh, Head of Applied AI Computer Vision, Beans.ai
H2O Open Source GenAI World SF 2023
In the modern era of machine learning, leveraging both open-source and closed-source solutions has become paramount for achieving cutting-edge results. This talk delves into the intricacies of seamlessly integrating open-source Large Language Model (LLM) solutions like Vicuna, Falcon, and Llama with industry giants such as ChatGPT and Google's Palm. As the demand for fine-tuned and specialized datasets grows, it is imperative to understand the synergy between these tools. Attendees will gain insights into best practices for building and enriching datasets tailored for fine-tuning tasks, ensuring that their LLM projects are both robust and efficient. Through real-world examples and hands-on demonstrations, this talk will equip attendees with the knowledge to harness the power of both open and closed-source tools in a coherent and effective manner.
Taming the Legacy Beast: Turning wild old code into a sleak new thoroughbread.Chris Laning
Got a legacy application? Trying to turn into a modern one? This presentation, given by Chris Laning, takes you through a methodical process that helps you attack that seemingly insurmountable task and tame it like a pro! The presentation is ColdFusion focused, but many of the methods employed could be used by programmers in other languages. This presentation was given at NCDevCon on September 13, 2014 in Raleigh, NC.
Chris is a Senior WebDeveloper and has been doing web development since 1996.
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...Chetan Khatri
Pragmatic presentation on Penetration testing for Data-Driven Platforms.
Agenda:
- Motivation
- Information Security - Ethics.
- Encryption
- Authentication
- Information Security & Potential threats with Open Source World.
- Find vulnerabilities.
- Checklist before using any Open Source library.
- Vulnerabilities report.
- Penetration Testing for Data-Driven Developments.
Being Epic: Best Practices for Android DevelopmentReto Meier
Turn good ideas into great apps by following some essential Android development best practices. Starting with an overview of the 5 deadly sins and 5 golden rules, you will learn how to build apps that users love and that are good citizens of the mobile environment. You will also learn specific best practices for background apps and location based services.
Building LLM Solutions using Open Source and Closed Source Solutions in Coher...Sri Ambati
Sandeep Singh, Head of Applied AI Computer Vision, Beans.ai
H2O Open Source GenAI World SF 2023
In the modern era of machine learning, leveraging both open-source and closed-source solutions has become paramount for achieving cutting-edge results. This talk delves into the intricacies of seamlessly integrating open-source Large Language Model (LLM) solutions like Vicuna, Falcon, and Llama with industry giants such as ChatGPT and Google's Palm. As the demand for fine-tuned and specialized datasets grows, it is imperative to understand the synergy between these tools. Attendees will gain insights into best practices for building and enriching datasets tailored for fine-tuning tasks, ensuring that their LLM projects are both robust and efficient. Through real-world examples and hands-on demonstrations, this talk will equip attendees with the knowledge to harness the power of both open and closed-source tools in a coherent and effective manner.
Taming the Legacy Beast: Turning wild old code into a sleak new thoroughbread.Chris Laning
Got a legacy application? Trying to turn into a modern one? This presentation, given by Chris Laning, takes you through a methodical process that helps you attack that seemingly insurmountable task and tame it like a pro! The presentation is ColdFusion focused, but many of the methods employed could be used by programmers in other languages. This presentation was given at NCDevCon on September 13, 2014 in Raleigh, NC.
Chris is a Senior WebDeveloper and has been doing web development since 1996.
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...Chetan Khatri
Pragmatic presentation on Penetration testing for Data-Driven Platforms.
Agenda:
- Motivation
- Information Security - Ethics.
- Encryption
- Authentication
- Information Security & Potential threats with Open Source World.
- Find vulnerabilities.
- Checklist before using any Open Source library.
- Vulnerabilities report.
- Penetration Testing for Data-Driven Developments.
Decathlon’s mission is to make sport accessible to more people. Decathlon SportMeeting, its new social network, was created to take this one step further, allowing everyone to find people who share their sport and their passion.
DSM was defined from scratch to support the actual traffic with more than 100k registered users, 1000 active sport proposals for more than 30 sports.
This web platform is entirely built with Groovy & Grails but there are also applications in Android and iOS that use its RESTful API. Along the development process several plugins were created and open-sourced to the community.
In this talk Kaleidos will explain how the development of this platform was, some of the technical decisions that were made, lessons learned, pitfalls or how the infrastructure has been evolving for almost 3 years, and much more.
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...SAP Cloud Platform
Learn how to seamlessly combine open-source and cloud-native software with SAP technologies into a consistent, end-to-end programming model and development experience that guides application developers with best practices and relieves them from tedious boilerplate tasks, enabling them to focus on solving their domain problems. Get an overview of the key technologies and tools as well as an end-to-end walkthrough of developing business services and applications.
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamersjasonjfrank
This presentation, given at BSidesPittsburgh 2015, discusses free tools and techniques penetration testers use that can be translated to network defenders for immediate impact and value.
Load testing is an important part of the performance engineering process. It remains the main way to ensure appropriate performance and reliability in production. Still it is important to see a bigger picture beyond stereotypical last-moment load testing. There are different ways to create load; a single approach may not work in all situations. Many tools allow you to use different ways of recording/playback and programming. This session discusses pros and cons of each approach, when it can be used and what tool's features we need to support it.
Talk from Puppet Camp Paris 2015 by Nicolas Brousse and Julien Fabre, presenting a Continuous Delivery workflow used by the Operations Teams that allowed them to do over 10,000 puppet changes deployment in 2014.
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16AppDynamics
Monitoring is complicated, and in most organizations consists of far too many tools owned by too many teams. Fixing monitoring issues requires people, process, and technology. Hear common issues seen in the real world including what should be monitored or collected from a technology and a business perspective.
Investigate what instrumentation is most scalable and effective across languages, commonly used APIs, and possibilities for capturing data from common languages like Java, .NET, and PHP. Cover browser and mobile instrumentation techniques. Get tips on which APIs to use, what open source tools and frameworks can be leveraged, and how to coordinate and communicate requirements across your organization.
Key takeaways:
o What is instrumentation, and what to instrument, collect, and store
o How this can be accomplished on common software stacks
o How to work with application owners to collect business data
o How correlation works in custom open source or packaged monitoring tools
For more information, go to: www.appdynamics.com
Learn how Decisiv provides secure access to developers and deals with compliance hurdles. Senior Engineer Hunter Madison will talk about how Decisiv needed to quickly solve the pain of scaling the engineering team, migrating to AWS, maintaining ISO 27002 compliance, and a few of his key learnings from his two-year journey using Teleport.
Fighting legacy with hexagonal architecture and frameworkless phpFabio Pellegrini
Molto spesso capita di venire a contatto con applicazioni legacy piuttosto datate, i classici monoliti che sono cresciuti a dismisura nel tempo accumulando debito tecnologico.
A causa delle priorità di business delle aziende, non sempre si riesce ad allocare il budget e il tempo necessario per iniziare subito il processo di ristrutturazione architetturale e di rimodellazione dei dati che servirebbe.
In questo talk presenterò una soluzione che mi è capitato di adottare recentemente per iniziare a ridefinire la struttura di un progetto legacy, utilizzando un approccio basato su Domain Driven Design, architettura esagonale e l’utilizzo di PHP senza framework.
Vedremo come è stato creato un nuovo servizio “satellite” da zero, come sono state implementate le componenti principali, come si è tenuto il codice legacy ai margini dell’applicazione, come si è approcciato il testing, il tutto nell’ottica di poter spacchettare il monolite in microservizi in un secondo momento.
Description of some of the elements that go in to creating a PostgreSQL-as-a-Service for organizations with many teams and a diverse ecosystem of applications and teams.
PyCon AU 2012 - Debugging Live Python Web ApplicationsGraham Dumpleton
Monitoring tools record the result of what happened to your web application when a problem arises, but for some classes of problems, monitoring systems are only a starting point. Sometimes it is necessary to take more intrusive steps to plan for the unexpected by embedding mechanisms that will allow you to interact with a live deployed web application and extract even more detailed information.
KScope 21 Presentation on Groovy and Improving User Experiences, Presented by ODTUG
This presentation walks through how to improve the user experience of users in Planning.
NCOATUG Fall Training Day
Attendees will be exposed to what the REST API can do in EPM Cloud Planning. In this session, we'll walk through the documentation and build calculations that update metadata, import data from other systems, automate tasks, synchronize data, and send emails when user-initiated processes fail. The session will conclude with where to go to advance your Groovy and REST skills.
Decathlon’s mission is to make sport accessible to more people. Decathlon SportMeeting, its new social network, was created to take this one step further, allowing everyone to find people who share their sport and their passion.
DSM was defined from scratch to support the actual traffic with more than 100k registered users, 1000 active sport proposals for more than 30 sports.
This web platform is entirely built with Groovy & Grails but there are also applications in Android and iOS that use its RESTful API. Along the development process several plugins were created and open-sourced to the community.
In this talk Kaleidos will explain how the development of this platform was, some of the technical decisions that were made, lessons learned, pitfalls or how the infrastructure has been evolving for almost 3 years, and much more.
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...SAP Cloud Platform
Learn how to seamlessly combine open-source and cloud-native software with SAP technologies into a consistent, end-to-end programming model and development experience that guides application developers with best practices and relieves them from tedious boilerplate tasks, enabling them to focus on solving their domain problems. Get an overview of the key technologies and tools as well as an end-to-end walkthrough of developing business services and applications.
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamersjasonjfrank
This presentation, given at BSidesPittsburgh 2015, discusses free tools and techniques penetration testers use that can be translated to network defenders for immediate impact and value.
Load testing is an important part of the performance engineering process. It remains the main way to ensure appropriate performance and reliability in production. Still it is important to see a bigger picture beyond stereotypical last-moment load testing. There are different ways to create load; a single approach may not work in all situations. Many tools allow you to use different ways of recording/playback and programming. This session discusses pros and cons of each approach, when it can be used and what tool's features we need to support it.
Talk from Puppet Camp Paris 2015 by Nicolas Brousse and Julien Fabre, presenting a Continuous Delivery workflow used by the Operations Teams that allowed them to do over 10,000 puppet changes deployment in 2014.
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16AppDynamics
Monitoring is complicated, and in most organizations consists of far too many tools owned by too many teams. Fixing monitoring issues requires people, process, and technology. Hear common issues seen in the real world including what should be monitored or collected from a technology and a business perspective.
Investigate what instrumentation is most scalable and effective across languages, commonly used APIs, and possibilities for capturing data from common languages like Java, .NET, and PHP. Cover browser and mobile instrumentation techniques. Get tips on which APIs to use, what open source tools and frameworks can be leveraged, and how to coordinate and communicate requirements across your organization.
Key takeaways:
o What is instrumentation, and what to instrument, collect, and store
o How this can be accomplished on common software stacks
o How to work with application owners to collect business data
o How correlation works in custom open source or packaged monitoring tools
For more information, go to: www.appdynamics.com
Learn how Decisiv provides secure access to developers and deals with compliance hurdles. Senior Engineer Hunter Madison will talk about how Decisiv needed to quickly solve the pain of scaling the engineering team, migrating to AWS, maintaining ISO 27002 compliance, and a few of his key learnings from his two-year journey using Teleport.
Fighting legacy with hexagonal architecture and frameworkless phpFabio Pellegrini
Molto spesso capita di venire a contatto con applicazioni legacy piuttosto datate, i classici monoliti che sono cresciuti a dismisura nel tempo accumulando debito tecnologico.
A causa delle priorità di business delle aziende, non sempre si riesce ad allocare il budget e il tempo necessario per iniziare subito il processo di ristrutturazione architetturale e di rimodellazione dei dati che servirebbe.
In questo talk presenterò una soluzione che mi è capitato di adottare recentemente per iniziare a ridefinire la struttura di un progetto legacy, utilizzando un approccio basato su Domain Driven Design, architettura esagonale e l’utilizzo di PHP senza framework.
Vedremo come è stato creato un nuovo servizio “satellite” da zero, come sono state implementate le componenti principali, come si è tenuto il codice legacy ai margini dell’applicazione, come si è approcciato il testing, il tutto nell’ottica di poter spacchettare il monolite in microservizi in un secondo momento.
Description of some of the elements that go in to creating a PostgreSQL-as-a-Service for organizations with many teams and a diverse ecosystem of applications and teams.
PyCon AU 2012 - Debugging Live Python Web ApplicationsGraham Dumpleton
Monitoring tools record the result of what happened to your web application when a problem arises, but for some classes of problems, monitoring systems are only a starting point. Sometimes it is necessary to take more intrusive steps to plan for the unexpected by embedding mechanisms that will allow you to interact with a live deployed web application and extract even more detailed information.
KScope 21 Presentation on Groovy and Improving User Experiences, Presented by ODTUG
This presentation walks through how to improve the user experience of users in Planning.
NCOATUG Fall Training Day
Attendees will be exposed to what the REST API can do in EPM Cloud Planning. In this session, we'll walk through the documentation and build calculations that update metadata, import data from other systems, automate tasks, synchronize data, and send emails when user-initiated processes fail. The session will conclude with where to go to advance your Groovy and REST skills.
GETTING STARTED WITH GROOVY FOR THE NON-TECHNICAL SUPERSTARSKyle Goodfriend
Groovy is the icing on the cake, with pre-save validation on forms, real time consolidation and plan type synchronization, and execute calculations in ASO
Getting Started with Groovy for the Non-Technical SuperstarsKyle Goodfriend
Groovy is the icing on the cake, with pre-save validation on forms, real time consolidation and plan type synchronization, and execute calculations in ASO
Presentation for April ODTUG
October 2018 ODTUG Webinar - Getting Started with Groovy in EPBCSKyle Goodfriend
Groovy calculations add amazing functionality to ePBCS applications. Get started with tutorials on pre-save form validations, on the fly fix statements, sync only data that has changed, and validating RTPs. Get your toes wet today!
Take a look at what Groovy can do for your ePBCS implementation. Real-time reporting, pre-save validation - can be the difference between success and failure!
ePBCS Gridbuilder Deep Dive - Last Minute KScope SouvenirsKyle Goodfriend
I was asked to present at a "Last Minute ODTUG Kscope18 Planning Souvenirs You Will ACTUALLY Use!" presentation on Thursday. This will take you into deeper functional use cases of the Groovy GridBuilder.
Groovy is a game changer. It improves performance, allows for proactive user validation, can interact with the user in ways we haven’t been able to since the introduction of SmartView.
This session will provide an overview of Groovy functionality, including mind blowing performance improvements, how to interact with the planners, pre form save validation, and changing the form visuals. The session will take the attendees from start to finish on the basics of Groovy with interactive code reviews and live demos.
Attendees will leave this session with the knowledge and examples that will enable them to go back to their environments and implement Groovy calculations to take advantage of ground breaking advancements in the technology.
The presentation will be structured as follows:
• Introduction
• What is a Groovy calculation
• Basic Groovy syntax
• How to get help / where to learn
• Groovy integration with PBCS
» How to calculate only the cells that changed
» How to dynamically build and run Essbase calculations based on form changes and POV
» How to bypass BSO calculations enabling input directly to ASO
» How to customize form Smart Pushes to only include data that has changed
» How to copy data from BSO to ASO, ASO to BSO, and ASO to ASO
» How to perform proactive data validation
» How to execute tasks based on user feedback
» How to color code cells based on rules
» How to validation RTPs
• Live demo of all functionality
Top-Down and BottomS-Up Planning at Breakthru Beverage GroupKyle Goodfriend
Planners are always looking for real time reporting and faster feedback. They are looking to make the forecasting and planning process faster by using historical trends and the ability to enter data at any level, enter growth factors, and drive the results down to the lowest level of the business. They want instant feedback on consolidated results.
This session will highlight a customer success story using PBCS. This session will walk through the strategic benefits building a driver based budget and forecasting application with the ability to seed SKU level data and apply growth rates at any level of product or organization to effectively build a bottom up plan. The session will also discuss the work force planning application that includes the ability to allocate people over multiple cost centers and companies. It will also discuss the technical architecture and strategy to allow this to happen and integrate with the higher level P$L in real time. The session will be supported with live demonstrations.
Attendees will leave this session with an understanding of the business solutions and the strategic benefits of building a plan from historic trends. They will also leave with a complete understanding of the technical architecture, including the benefits of Groovy calculations, and how to implement a similar solution.
The presentation will be structured as follows:
• Introduction
• Application overview
• Overview of the business processes
» Process flow
» User functionality
» Benefits of PBCS
• Benefits and examples of allowing users to do top down or bottom up input
• Overview of the technical architecture and how it was implemented
• Live demo of working process, including
» Top down entry
» Bottom up entry
» Input validation
» Monthly phasing
• Overview of how Groovy was used to accomplish real time reporting
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
2. www.in2Hyperion.com www.Rolta.com
l More time with your family?
l More time to hang with friends?
l Less Stress?
l More opportunity for success?
l Higher customer confidence?
l How about a Best Buy gift card?
Appealing?
3. www.in2Hyperion.com www.Rolta.com
l Be interactive, interrupt me! (Really!)
l Tweet and share your thoughts #In2Hyperion or
#Kscope
l It is OK to text your notes
l Stretch – stand up if you get tired!
l None of us know everything there is to know –
please respect other perspectives
Rules For Today
4. www.in2Hyperion.com www.Rolta.com
l Share our collective knowledge
l Summarize and review utilities available
l Discuss scripting options
l Highlight Best Practices Guiding Principles
Session Objectives
6. www.in2Hyperion.com www.Rolta.com
l Career
● Finance
● Accounting
● Financial Reporting
● Education
● University Adjunct Faculty
● Management
● Financial Systems
Speaker Background
● Technical
● Hyperion
● SQL
● .NET/VB
● Corporate
● TheLimited
● Bank One /
JPMorgan Chase
● Rolta Solutions
7. www.in2Hyperion.com www.Rolta.com
l Industry Experience
● TV/Entertainment
● Financial
● Retail
● Technology/Software Development
● Travel/Air
● Civil Engineering
Speaker Background
8. www.in2Hyperion.com www.Rolta.com
l In2Hyperion
● Free Tools
● Creative Ideas
● Knowledge Sharing
l Published
● Wall Street Journal
● OAUG Insight
l Certification
● Hyperion / Microsoft
Speaker Background
9. www.in2Hyperion.com www.Rolta.com
l Automate production tasks
l Notify administrators of errors
l Communicate status to users
l Sync environments
l Backup data/metadata
Automation Ideas
10. www.in2Hyperion.com www.Rolta.com
l Fewer Mundane Tasks / More Time To Add
Value – Increased Productivity
l Decrease Human Error
l Improve Customer Satisfaction
l Improve System Stability
l Improve Job Satisfaction / Career
Advancement
Staff Benefits of Automation
11. www.in2Hyperion.com www.Rolta.com
l Hyperion Planning Application Areas of
Importance
1. EPMA batch utility
2. Planning command line utilities
3. Essbase scripting
4. Shared Services
Automation Area Summary
12. www.in2Hyperion.com www.Rolta.com
l Parameter Driven
l Strong Error Trapping
l Logging
l Notification
● User
● Administrator
l Consistency
l Environment Independent
Guiding Principles
19. www.in2Hyperion.com www.Rolta.com
// Exclude member 60780000 from application
Exclude Member
Properties(ApplicationName, DimensionName, ParentName,
MemberName)
Values('FinPln’, 'Account’, '60010000', '60780000');
// Make Member 10010000 NOT Valid For Plan2
Update Member
Properties(ApplicationName, DimensionName, ParentName,
MemberName, MemberValidForPlan2)
Values('FinPln’, 'Account’, '10000000', '10010000', 'False');
EPMA Batch Utility Member Management
20. www.in2Hyperion.com www.Rolta.com
// Delete member 10000 from application
Delete Member
Properties(ApplicationName, DimensionName , ParentName ,
MemberName , RemoveChildren)
Values('#Shared’, 'Department’, 'All_Departments' ,'10000’, 'true');
EPMA Batch Utility Member Management
22. www.in2Hyperion.com www.Rolta.com
l Location
● EPM_ORACLE_INSTANCEproductsFoundationBPMAEPMABatchClient
l Batch Client
● epma-batch-client.bat
l Command Line Options
● -C [Specifies the name of the script file to execute]
● -R [Specifies the name of the file to write the results to on your machine]
● -L [Specifies if commands are logged. The default value is 0]
● -S [Stops execution of the script if a command fails]
● -U [Specifies the user name]
● -P [Specifies the password]
EPMA Batch Utility Batch Client
26. www.in2Hyperion.com www.Rolta.com
l Export/Import Security
l Export/Import Forms
l Execute business rules and rulesets
l Create encrypted password files
l Export/Import Tasks
l HspUnlockApp
l Classic Planning Management
● Hierarchy Management
● Sort Members
● Import Metadata
● Migrate Security
● Cube Refresh
Planning Batch Utilities
27. www.in2Hyperion.com www.Rolta.com
Planning Utilities Import Security Load File
l All Planning specific security can be loaded
● Dimensional security
● Web form security
● Business rule security
● Task list security
l Required
● Named SecFile.txt
● Located in the same directory as the batch utility
28. www.in2Hyperion.com www.Rolta.com
Planning Utilities Import Security Load File
l Formatted in a 5 column delimited text file
● User/group
● Artifact name
● Access permissions
● Access flag
● Artifact type (required for web forms, rules and task
lists)
30. www.in2Hyperion.com www.Rolta.com
Planning Utilities Import Security Load File
l Access flag
● @CHILDREN
● @ICHILDREN
● @DESCENDANTS
● @IDESCENDANTS
● MEMBER
*Identifying a level 0 member with anything other than MEMBER
produces mixed results
31. www.in2Hyperion.com www.Rolta.com
Planning Utilities Import Security Load File
l Artifact type
● SL_FORM - for data forms
● SL_COMPOSITE - for composite data forms
● SL_TASKLIST - for task lists
● SL_CALCRULE - for Calculation Manager business
rules
33. www.in2Hyperion.com www.Rolta.com
Planning Utilities Import Security Batch Client
l The ImportSecurity utility is located in the
Planning directory on the Planning server
l Parameters
● Required
● Application name
● User executing the process
● Optional
● RUN_SILENT [default is 0, meaning no progress messages
displayed]
● SL_CLEARALL [clears all security prior to importing]
● -f:passwordFile
34. www.in2Hyperion.com www.Rolta.com
Planning Utilities Import Security Batch Client
l Example using default delimiter
ImportSecurity “WrkForce,admin”
l Example using default delimiter and password
file
ImportSecurity -f:EncryptedPassword.txt “WrkForce,admin”
35. www.in2Hyperion.com www.Rolta.com
Planning Utilities Export Security Batch Client
l Located in the Planning directory on the
Planning server
l ExportSecurity
l Parameters
● -f:encrypted password file
● /A=application
● /U=username
● /TO_FILE=”path”
36. www.in2Hyperion.com www.Rolta.com
Planning Utilities Export Security Sample
DATE=`date '+_%m-%d-%y_%H.%M.%S'`
ExportSecurity.sh -f:PassFile.txt
/A=FinPln, /U=admin,
/TO_FILE=
”c:backupdimSec_FinPln${DATE}.sec”
*Actual scripts should not be on multiple lines
41. www.in2Hyperion.com www.Rolta.com
Planning Utilities Business Rules Batch Client
l CalcMgrCmdLineLauncher located in the
planning directory
l Parameters
● -f:passwordFile
● /A:appname
● /U:username
● /D:database
● /R:business rule name OR |/S:business ruleset
name
● /F:runtime prompts file
42. www.in2Hyperion.com www.Rolta.com
Planning Utilities Batch Client Example
CalcMgrCmdLineLauncher -f:c:passfile.txt
/A:WrkForce /U:admin /D:Wrkforce
/R:agg_all /F:agg_all_prompts.xml
*Actual scripts should not be on multiple lines
44. www.in2Hyperion.com www.Rolta.com
Planning Utilities Encrypt Passwords
l Allows for hidden passwords
l Promotes environment independence in scripts
l PasswordEncryption.bat(sh) is located in a
number of areas depending on the components
installed
47. www.in2Hyperion.com www.Rolta.com
Life Cycle Management Overview
l Migration between environments
l Backup & restore
● Hierarchies (Shared/Local libraries)
● Planning application settings and overrides
● Shared Services security
● Essbase objects
48. www.in2Hyperion.com www.Rolta.com
Life Cycle Management Parameter XML File
l Creating XML
● Can be created manually
● Is created when an export is performed from Shared
Services
l Password will be added when the batch client is
executed the first time
50. www.in2Hyperion.com www.Rolta.com
Life Cycle Management Batch Client
l Located in
MIDDLEWARE_HOME/user_projects/epmsystem1/bin
l Parameters
● Xml file definition
● [-estimate]: Estimates the Number of Artifacts in a
Migration
● [-b]: Specifies the Base Path for the exports
● [-ls]: Lists EPM System Contents
57. www.in2Hyperion.com www.Rolta.com
l Set general variables
l Set logging
l Set script level variables
l Login
l Execute processes
l Run exit routine
MaxL Script Layout
59. www.in2Hyperion.com www.Rolta.com
l Compartmentalize reusable scripts
● Login
● Set global variables
● Processes used in many scripts
l Example Login (login.msh)
login $key ABC $key XYZ on "$(svrName)";
iferror 'errHandler';
l Include the login script
msh login.msh;
MaxL Script Concepts (Includes)
60. www.in2Hyperion.com www.Rolta.com
l Error handling
iferror 'errHandler'; (call after every command)
…
define label 'errHandler'; (define label)
spool off;
logout;
exit 1;
MaxL Script Concepts (Error Handling)
61. www.in2Hyperion.com www.Rolta.com
l Commonly used strings set in one place
set logPath = "/usr/appl/fpf/home/ftpfpf/Logs/";
set appName = "StaffPln";
set dbName = "StaffPln";
l Reference variables
spool stdout on to "$(logPath)errors.txt”;
execute calculation
"$(appName)".”$(dbName)"."pAgg";
MaxL Script Concepts (Variables)
62. www.in2Hyperion.com www.Rolta.com
l Use command line parameters when applicable
set procName = $(1);
set procDate = $(2);
l Reference command line parameters
spool stdout on to “$(1)$(2).txt”;
l Example
● essmsh script.msh processXYZ 2013_06_20
MaxL Script Concepts (Parameters)
Param Param
space
63. www.in2Hyperion.com www.Rolta.com
MaxL Import Data
import database $(appName).$(dbName) data
from local text data_file "$(dataPath)$(dataFile)" using
server rules_file "$(ruleFile)"
on error write to
"$(rejectPath)$(procName)_$(dataFile)$(procDate).err";
iferror 'errHandler';
67. www.in2Hyperion.com www.Rolta.com
l MaxL is a text file and can be written in any text editor
l Help getting started
● EAS MaxL editor (File/New/Scripts/MaxL)
● Auto complete
● Quick to build templates
● Verification
● Editors with user built addins
● Notepad++
● UltraEdit
Maxl Editors
68. www.in2Hyperion.com www.Rolta.com
l Email
● In2Hyperion@gmail.com
● Kyle.Goodfriend@Rolta.com
l In2Hyperion
● Sign up for email updates at www.In2Hyperion.com
● Follow us via Twitter (@In2Hyperion)
● Like us on Facebook
● Join the In2Hyperion LinkedIn group
● More than 2,000 people follow In2Hyperion through social
media
● More than 3,000 people visit In2hyperion daily
Stay In Touch
69. www.in2Hyperion.com www.Rolta.com
Other Collateral
l Collaborate 2011 – Business Presentation
● Download Presentation
l Kscope12 – Unlimited Custom Spreads
● Download Presentation
l OAUG Insight - Summer 2012 issue
● Download Article at ODTUG.com
● Request a copy by emailing me at
in2hyperion@gmail.com