This document provides an overview of load and performance testing, including definitions of different types of load tests (stress, load, soak, spike). It also discusses tuning various components involved in load testing a SOA infrastructure, including the JVM, WebLogic Server, BPEL engine, technology adapters, and databases. Specific areas covered include thread management, network I/O, data sources, transactions, logging, and schema tuning. The document provides reference information and best practices for load test planning, data collection, and analysis.
This document provides an overview of load and performance testing, including definitions of different types of load tests. It also discusses tuning various components like the Java Virtual Machine (JVM), WebLogic Server, BPEL engine, databases, and other technologies to optimize performance. Specific areas covered include thread management, network I/O, data sources, timeouts, logging, schemas, and technology adapters. The document also provides guidance on collecting performance data before, during, and after load tests to analyze system behavior and identify bottlenecks.
This document provides an overview and guidelines for running a Mutants & Masterminds roleplaying game focused on supernatural horror. It includes discussions of different horror genres and styles, character creation options ranging from normal humans to legendary heroes, guidelines for investigations and confronting fears, and templates for playing monster characters. The document aims to help gamemasters design supernatural horror campaigns and adventures at a variety of power levels.
Mike Brooks
Mike’s bestselling book of phone scripts gives you the essential skills and winning techniques to help you breeze past gatekeepers, establish rapport with decision makers and close more sales.
Pluripotent stem-cell-handbook-from-nature-and-thermoscienceAmira M. Heniedy
This document is a handbook about pluripotent stem cells. It contains sections on reprogramming cells into a pluripotent state, engineering pluripotent stem cells using tools like CRISPR-Cas9 and TALENs, culturing pluripotent stem cells in feeder-dependent and feeder-free systems, differentiating pluripotent stem cells into various cell types, and characterizing pluripotent stem cells and their differentiated progeny. The handbook provides information and protocols for working with pluripotent stem cells from initial reprogramming through differentiation and characterization.
This document provides an overview of load and performance testing, including definitions of different types of load tests (stress, load, soak, spike). It also discusses tuning various components involved in load testing a SOA infrastructure, including the JVM, WebLogic Server, BPEL engine, technology adapters, and databases. Specific areas covered include thread management, network I/O, data sources, transactions, logging, and schema tuning. The document provides reference information and best practices for load test planning, data collection, and analysis.
This document provides an overview of load and performance testing, including definitions of different types of load tests. It also discusses tuning various components like the Java Virtual Machine (JVM), WebLogic Server, BPEL engine, databases, and other technologies to optimize performance. Specific areas covered include thread management, network I/O, data sources, timeouts, logging, schemas, and technology adapters. The document also provides guidance on collecting performance data before, during, and after load tests to analyze system behavior and identify bottlenecks.
This document provides an overview and guidelines for running a Mutants & Masterminds roleplaying game focused on supernatural horror. It includes discussions of different horror genres and styles, character creation options ranging from normal humans to legendary heroes, guidelines for investigations and confronting fears, and templates for playing monster characters. The document aims to help gamemasters design supernatural horror campaigns and adventures at a variety of power levels.
Mike Brooks
Mike’s bestselling book of phone scripts gives you the essential skills and winning techniques to help you breeze past gatekeepers, establish rapport with decision makers and close more sales.
Pluripotent stem-cell-handbook-from-nature-and-thermoscienceAmira M. Heniedy
This document is a handbook about pluripotent stem cells. It contains sections on reprogramming cells into a pluripotent state, engineering pluripotent stem cells using tools like CRISPR-Cas9 and TALENs, culturing pluripotent stem cells in feeder-dependent and feeder-free systems, differentiating pluripotent stem cells into various cell types, and characterizing pluripotent stem cells and their differentiated progeny. The handbook provides information and protocols for working with pluripotent stem cells from initial reprogramming through differentiation and characterization.
(Springer optimization and its applications 37) eligius m.t. hendrix, boglárk...ssuserfa7e73
This document provides an introduction to the book "Introduction to Nonlinear and Global Optimization" by Eligius M.T. Hendrix and Boglárka G.-Tóth. It discusses the aims and scope of the book, which is to provide undergraduate and graduate textbooks focusing on algorithms for solving nonlinear optimization problems and their applications. The introduction also notes that optimization has expanded rapidly in recent decades with new techniques developed and its use diffusing into other disciplines. The book will cover topics like nonlinear optimization, network flow problems, stochastic optimization, and more.
This document provides a tutorial for building ontologies using the Protege-OWL plugin. It introduces OWL ontology concepts and demonstrates how to construct classes, properties, and relationships in Protege-OWL. The tutorial builds an example OWL-DL pizza ontology and uses a reasoner to check for inconsistencies and automatically compute the class hierarchy. It also describes other OWL constructs and features of Protege-OWL like namespaces, importing ontologies, and annotation properties. The overall aim is to guide users through practical exercises for developing OWL ontologies using Protege-OWL's graphical interface and reasoning capabilities.
Leaving addie for sam field guide guidelines and temst learning experiences Jamri Dafrizal
Make your foray into successive approximations successful and as easy as possible.
In the 2012 bestseller, Leaving ADDIE for SAM, learning professionals were introduced to the Successive Approximation Model (SAM) and the Savvy Start—the key to a successful project kick-off. Together, these concepts incorporate contemporary Agile processes that simplify design and development, yielding more energetic and effective learning experiences. This companion Field Guide provides the job aids, tools, and templates you need to put the SAM methodology in motion and take your ISD practice to new heights. Complete with a foreword by Michael Allen, this book is an essential resource to create better, faster training products and “move the needle” on current training efforts
This document contains an English practice exam with questions about vocabulary, grammar, and a passage about Scotland. The vocabulary questions involve matching words to sentences, explaining words in context, and completing sentences with collocations. The grammar questions cover using modal verbs to complete sentences and sentences with modal verbs and verb tenses. The passage about Scotland is to be completed with vocabulary words describing attractions, activities, and places one might encounter when visiting Scotland.
This document contains information about the ChucK programming language, including:
- The authors and developers of ChucK, led by Ge Wang and Perry Cook.
- Links to documentation, tutorials, code repositories, and more.
- An overview of the ChucK Manual, which covers topics like installation, language basics, concurrency, and events.
This document outlines the Next Generation Science Standards for elementary through high school. It begins with introductions for each grade level (K-5) followed by the performance expectations and core ideas for each standard. These are organized by physical sciences, life sciences, earth and space sciences, and engineering design. The document then provides the storylines and standards for middle school and high school levels with the same organization.
This document presents 66 techniques for inducing astral projection. It begins with brief descriptions of several techniques, such as focusing on the third eye, setting an early morning alarm, using affirmations before sleep, and focusing on a fixed point outside the body. The majority of the document consists of 1-3 sentence summaries of each technique, numbered 1 through 66. It concludes by listing sources for further information.
This document discusses women's empowerment in India. It provides context on the patriarchal structure that governs communities and hinders women's rights. While policies exist, there are gaps in implementation at the local level. Rural women face greater inequality in health, education, decision-making and economic opportunities compared to urban women. Factors like caste, class, education and age further impact women's empowerment. Government initiatives aim to promote women's rights, but face challenges of corruption and lack of resources. Overall, empowering women requires addressing discrimination and the social constructs that restrict women's access, choices and status in society.
This document summarizes research evaluating the sustained impact of an extreme poverty reduction program in Colombia called ZOLIP. The researchers conducted qualitative interviews and focus groups to understand stakeholder perspectives, and quantitative analysis of income levels and a weighted poverty index over time. Key findings include:
- Stakeholders reported positive impacts on dimensions like education, health and income but felt more could be done.
- Income levels increased overall but some families fell back into poverty.
- The weighted poverty index showed a reduction in multiple deprivations but some families still faced challenges in certain areas like housing.
- External economic and social factors influenced the sustainability of impacts.
The document provides a geotechnical baseline report for the Caldecott Improvement Project's Fourth Bore tunnel (Bore No. 4) in California. It summarizes that Bore No. 4 will be constructed through sedimentary and volcanic rock formations between 13-8 million years old, including the Sobrante Formation, Claremont Formation, and Orinda Formation. The tunnel alignment crosses a seismically active region with major faults like the Hayward fault nearby. The report establishes ground classes that describe anticipated tunnel ground conditions to aid tunnel construction.
This document appears to be the table of contents for a 5th grade grammar practice book. It lists the chapter titles and page numbers for units on sentences, nouns, verbs and other parts of speech. Some chapter topics include sentence types, subjects and predicates, common and proper nouns, verb tenses, and run-on sentences. Exercises on mechanics, proofreading, and tests are included for each topic. The document provides an overview of the content that will be covered to help students practice and reinforce their grammar skills.
Opinion Formation about Childhood Immunization and Disease Spread on NetworksZhao Shanshan
This thesis examines opinion formation about childhood immunization and disease spread on networks. The author develops an agent-based model using MATLAB to simulate disease spread on a biological network of households and information diffusion on an overlapping social network. In the model, households are connected via two overlapping Erdos-Renyi networks representing biological contacts and social information sharing. The model simulates a disease spreading via the SIR model on the biological network. At the same time, opinions about vaccination spread on the social network according to an information cascade process. The results examine how disease incidence, length and vaccination rates are impacted by parameters like infection rate and social influence. The model aims to understand the relationship between disease spread and evolving views on immunization transmitted socially
This document discusses the Greasemonkey scripting tool. It covers getting started with Greasemonkey, creating a basic "Hello World" script, debugging scripts, common scripting patterns, case studies of existing scripts, and advanced topics. The chapters discuss installing and managing Greasemonkey and scripts, adding metadata to scripts, coding and editing scripts, debugging with the JavaScript console, DOM inspector, and other tools, executing scripts on domains and subdomains, testing for elements and attributes, inserting/removing content, styling elements, and more.
This document contains a table of contents that outlines topics in biology, including: the scientific method, theories of evolution and the modern view of evolution, Darwinian evolution, the diversity of life, characteristics of living things, levels of organization, the structure of cells and their components, cell transport, the cell cycle, mitosis and meiosis, cellular respiration and photosynthesis, heredity and genetics, genes and chromosomes, and the structure of DNA. The table of contents provides an overview of the chapters and sections in the full document.
This thesis examines absenteeism at Airport & Aviation Services (Sri Lanka) Limited Bandaranaike International Airport. It aims to measure and manage absenteeism through understanding its causes. A survey was conducted to analyze the impact of personal and workplace factors on employees' willingness to be absent. The results found attitudes, age, gender, culture, motivation, learning environment, and stress affected absenteeism. The conclusion recommends benchmarking absenteeism, improving leadership, motivation, recruitment, training, and communication to manage it. Introducing absenteeism policies, return to work interviews, employee assistance programs and stress strategies can help control absenteeism.
Hacker techniques, exploit and incident handlingRafel Ivgi
This document introduces ethical hacking and discusses various hacking techniques. It covers topics like footprinting, scanning, enumeration, cracking passwords, viruses/worms, sniffers, social engineering, denial of service attacks, session hijacking, hacking web servers, web application vulnerabilities, SQL injection, wireless hacking, physical security, Linux hacking, evading detection, buffer overflows, and cryptography. The document provides information on hacking laws and describes many hacking methods and tools in detail.
This document appears to be a book about energy and fatigue that is divided into two parts. Part one discusses the science of energy including topics like energy metabolism, cellular respiration, symptoms of fatigue, and medical management of fatigue. Part two outlines an "energy program plan" with chapters focused on hydration, sleep, stress management, diet, supplements, exercise, and stimulants. The document provides an overview of the causes and treatment of fatigue through lifestyle and dietary changes.
Advanced web application hacking and exploitationRafel Ivgi
This document introduces advanced web hacking techniques and methods for securing websites against attacks. It covers reconnaissance methods like detecting website statistics, IP addresses, subdomains, and server details. It then discusses various attacks like XSS, session hijacking, SQL injection, and ways to bypass web application firewalls. Finally, it provides recommendations for secure website architecture with multi-tier systems and hardening guides for platforms like IIS, Apache, and Tomcat.
This document is a textbook for learning Python programming. It covers topics such as variables, expressions, statements, functions, conditionals and more. Each chapter introduces a new concept and includes examples and exercises to help readers learn. It aims to teach readers how to think like computer scientists by learning the Python language.
This document is a cookbook for developing multiplex assays using Luminex xMAP technology. It provides information on assay design, reagents, equipment, and protocols for coupling proteins, antibodies, peptides and nucleic acids to xMAP microspheres. It also describes common immunoassay and nucleic acid assay formats such as sandwich immunoassays, competitive immunoassays, and SNP genotyping assays. The document aims to guide researchers in optimizing and validating new xMAP assays for proteomic and genomic applications.
Advanced Analytical Techniques in Dairy Chemistry.pdfANAYNALLELYLAPON
Springer Protocols Handbooks collects a diverse range of step-by-step laboratory methods and protocols from across the life and biomedical sciences. Each protocol is provided in the Springer Protocol format: readily-reproducible in a step-by-step fashion. Each protocol opens with an introductory overview, a list ofthe materials and reagents needed to complete the experiment, and is followed by a detailed procedure supported by a helpful notes section offering tips and tricks ofthe trade as well as troubleshooting advice. With a focus on large comprehensive protocol collections and an international authorship, Springer Protocols Handbooks are a valuable addition to the laboratory
This document outlines the contents of a course on neural networks and deep learning across multiple weeks. It covers topics such as neural network basics including logistic regression and activation functions, deep neural networks, improving networks through techniques like regularization and optimization algorithms, convolutional neural networks including applications to object detection, and face recognition. Specific algorithms and architectures discussed include residual networks, Inception networks, YOLO, R-CNN, and Siamese networks.
(Springer optimization and its applications 37) eligius m.t. hendrix, boglárk...ssuserfa7e73
This document provides an introduction to the book "Introduction to Nonlinear and Global Optimization" by Eligius M.T. Hendrix and Boglárka G.-Tóth. It discusses the aims and scope of the book, which is to provide undergraduate and graduate textbooks focusing on algorithms for solving nonlinear optimization problems and their applications. The introduction also notes that optimization has expanded rapidly in recent decades with new techniques developed and its use diffusing into other disciplines. The book will cover topics like nonlinear optimization, network flow problems, stochastic optimization, and more.
This document provides a tutorial for building ontologies using the Protege-OWL plugin. It introduces OWL ontology concepts and demonstrates how to construct classes, properties, and relationships in Protege-OWL. The tutorial builds an example OWL-DL pizza ontology and uses a reasoner to check for inconsistencies and automatically compute the class hierarchy. It also describes other OWL constructs and features of Protege-OWL like namespaces, importing ontologies, and annotation properties. The overall aim is to guide users through practical exercises for developing OWL ontologies using Protege-OWL's graphical interface and reasoning capabilities.
Leaving addie for sam field guide guidelines and temst learning experiences Jamri Dafrizal
Make your foray into successive approximations successful and as easy as possible.
In the 2012 bestseller, Leaving ADDIE for SAM, learning professionals were introduced to the Successive Approximation Model (SAM) and the Savvy Start—the key to a successful project kick-off. Together, these concepts incorporate contemporary Agile processes that simplify design and development, yielding more energetic and effective learning experiences. This companion Field Guide provides the job aids, tools, and templates you need to put the SAM methodology in motion and take your ISD practice to new heights. Complete with a foreword by Michael Allen, this book is an essential resource to create better, faster training products and “move the needle” on current training efforts
This document contains an English practice exam with questions about vocabulary, grammar, and a passage about Scotland. The vocabulary questions involve matching words to sentences, explaining words in context, and completing sentences with collocations. The grammar questions cover using modal verbs to complete sentences and sentences with modal verbs and verb tenses. The passage about Scotland is to be completed with vocabulary words describing attractions, activities, and places one might encounter when visiting Scotland.
This document contains information about the ChucK programming language, including:
- The authors and developers of ChucK, led by Ge Wang and Perry Cook.
- Links to documentation, tutorials, code repositories, and more.
- An overview of the ChucK Manual, which covers topics like installation, language basics, concurrency, and events.
This document outlines the Next Generation Science Standards for elementary through high school. It begins with introductions for each grade level (K-5) followed by the performance expectations and core ideas for each standard. These are organized by physical sciences, life sciences, earth and space sciences, and engineering design. The document then provides the storylines and standards for middle school and high school levels with the same organization.
This document presents 66 techniques for inducing astral projection. It begins with brief descriptions of several techniques, such as focusing on the third eye, setting an early morning alarm, using affirmations before sleep, and focusing on a fixed point outside the body. The majority of the document consists of 1-3 sentence summaries of each technique, numbered 1 through 66. It concludes by listing sources for further information.
This document discusses women's empowerment in India. It provides context on the patriarchal structure that governs communities and hinders women's rights. While policies exist, there are gaps in implementation at the local level. Rural women face greater inequality in health, education, decision-making and economic opportunities compared to urban women. Factors like caste, class, education and age further impact women's empowerment. Government initiatives aim to promote women's rights, but face challenges of corruption and lack of resources. Overall, empowering women requires addressing discrimination and the social constructs that restrict women's access, choices and status in society.
This document summarizes research evaluating the sustained impact of an extreme poverty reduction program in Colombia called ZOLIP. The researchers conducted qualitative interviews and focus groups to understand stakeholder perspectives, and quantitative analysis of income levels and a weighted poverty index over time. Key findings include:
- Stakeholders reported positive impacts on dimensions like education, health and income but felt more could be done.
- Income levels increased overall but some families fell back into poverty.
- The weighted poverty index showed a reduction in multiple deprivations but some families still faced challenges in certain areas like housing.
- External economic and social factors influenced the sustainability of impacts.
The document provides a geotechnical baseline report for the Caldecott Improvement Project's Fourth Bore tunnel (Bore No. 4) in California. It summarizes that Bore No. 4 will be constructed through sedimentary and volcanic rock formations between 13-8 million years old, including the Sobrante Formation, Claremont Formation, and Orinda Formation. The tunnel alignment crosses a seismically active region with major faults like the Hayward fault nearby. The report establishes ground classes that describe anticipated tunnel ground conditions to aid tunnel construction.
This document appears to be the table of contents for a 5th grade grammar practice book. It lists the chapter titles and page numbers for units on sentences, nouns, verbs and other parts of speech. Some chapter topics include sentence types, subjects and predicates, common and proper nouns, verb tenses, and run-on sentences. Exercises on mechanics, proofreading, and tests are included for each topic. The document provides an overview of the content that will be covered to help students practice and reinforce their grammar skills.
Opinion Formation about Childhood Immunization and Disease Spread on NetworksZhao Shanshan
This thesis examines opinion formation about childhood immunization and disease spread on networks. The author develops an agent-based model using MATLAB to simulate disease spread on a biological network of households and information diffusion on an overlapping social network. In the model, households are connected via two overlapping Erdos-Renyi networks representing biological contacts and social information sharing. The model simulates a disease spreading via the SIR model on the biological network. At the same time, opinions about vaccination spread on the social network according to an information cascade process. The results examine how disease incidence, length and vaccination rates are impacted by parameters like infection rate and social influence. The model aims to understand the relationship between disease spread and evolving views on immunization transmitted socially
This document discusses the Greasemonkey scripting tool. It covers getting started with Greasemonkey, creating a basic "Hello World" script, debugging scripts, common scripting patterns, case studies of existing scripts, and advanced topics. The chapters discuss installing and managing Greasemonkey and scripts, adding metadata to scripts, coding and editing scripts, debugging with the JavaScript console, DOM inspector, and other tools, executing scripts on domains and subdomains, testing for elements and attributes, inserting/removing content, styling elements, and more.
This document contains a table of contents that outlines topics in biology, including: the scientific method, theories of evolution and the modern view of evolution, Darwinian evolution, the diversity of life, characteristics of living things, levels of organization, the structure of cells and their components, cell transport, the cell cycle, mitosis and meiosis, cellular respiration and photosynthesis, heredity and genetics, genes and chromosomes, and the structure of DNA. The table of contents provides an overview of the chapters and sections in the full document.
This thesis examines absenteeism at Airport & Aviation Services (Sri Lanka) Limited Bandaranaike International Airport. It aims to measure and manage absenteeism through understanding its causes. A survey was conducted to analyze the impact of personal and workplace factors on employees' willingness to be absent. The results found attitudes, age, gender, culture, motivation, learning environment, and stress affected absenteeism. The conclusion recommends benchmarking absenteeism, improving leadership, motivation, recruitment, training, and communication to manage it. Introducing absenteeism policies, return to work interviews, employee assistance programs and stress strategies can help control absenteeism.
Hacker techniques, exploit and incident handlingRafel Ivgi
This document introduces ethical hacking and discusses various hacking techniques. It covers topics like footprinting, scanning, enumeration, cracking passwords, viruses/worms, sniffers, social engineering, denial of service attacks, session hijacking, hacking web servers, web application vulnerabilities, SQL injection, wireless hacking, physical security, Linux hacking, evading detection, buffer overflows, and cryptography. The document provides information on hacking laws and describes many hacking methods and tools in detail.
This document appears to be a book about energy and fatigue that is divided into two parts. Part one discusses the science of energy including topics like energy metabolism, cellular respiration, symptoms of fatigue, and medical management of fatigue. Part two outlines an "energy program plan" with chapters focused on hydration, sleep, stress management, diet, supplements, exercise, and stimulants. The document provides an overview of the causes and treatment of fatigue through lifestyle and dietary changes.
Advanced web application hacking and exploitationRafel Ivgi
This document introduces advanced web hacking techniques and methods for securing websites against attacks. It covers reconnaissance methods like detecting website statistics, IP addresses, subdomains, and server details. It then discusses various attacks like XSS, session hijacking, SQL injection, and ways to bypass web application firewalls. Finally, it provides recommendations for secure website architecture with multi-tier systems and hardening guides for platforms like IIS, Apache, and Tomcat.
This document is a textbook for learning Python programming. It covers topics such as variables, expressions, statements, functions, conditionals and more. Each chapter introduces a new concept and includes examples and exercises to help readers learn. It aims to teach readers how to think like computer scientists by learning the Python language.
This document is a cookbook for developing multiplex assays using Luminex xMAP technology. It provides information on assay design, reagents, equipment, and protocols for coupling proteins, antibodies, peptides and nucleic acids to xMAP microspheres. It also describes common immunoassay and nucleic acid assay formats such as sandwich immunoassays, competitive immunoassays, and SNP genotyping assays. The document aims to guide researchers in optimizing and validating new xMAP assays for proteomic and genomic applications.
Advanced Analytical Techniques in Dairy Chemistry.pdfANAYNALLELYLAPON
Springer Protocols Handbooks collects a diverse range of step-by-step laboratory methods and protocols from across the life and biomedical sciences. Each protocol is provided in the Springer Protocol format: readily-reproducible in a step-by-step fashion. Each protocol opens with an introductory overview, a list ofthe materials and reagents needed to complete the experiment, and is followed by a detailed procedure supported by a helpful notes section offering tips and tricks ofthe trade as well as troubleshooting advice. With a focus on large comprehensive protocol collections and an international authorship, Springer Protocols Handbooks are a valuable addition to the laboratory
This document outlines the contents of a course on neural networks and deep learning across multiple weeks. It covers topics such as neural network basics including logistic regression and activation functions, deep neural networks, improving networks through techniques like regularization and optimization algorithms, convolutional neural networks including applications to object detection, and face recognition. Specific algorithms and architectures discussed include residual networks, Inception networks, YOLO, R-CNN, and Siamese networks.
This document provides an overview and introduction to using Biopython, an open source Python library for biological sequence analysis. It covers topics such as installing Biopython, working with sequence objects, parsing sequence files, connecting to biological databases, multiple sequence alignments, and BLAST searches. The goal is to explain the key capabilities and functionalities available in Biopython through examples and tutorials.
This document is a Python tutorial that provides an overview of the Python programming language. It covers topics like using the Python interpreter, basic syntax like variables and data types, control flow tools like if/else statements and for loops, defining functions, working with data structures like lists, tuples and dictionaries, modules and packages, input/output functions, exceptions and errors, and an introduction to classes. The tutorial is intended to help new Python programmers get started with the basics of the language.
This document is a cookbook for developing multiplex assays using Luminex xMAP technology. It provides protocols for developing proteomic and genomic assays, including coupling proteins, antibodies, peptides and nucleic acids to xMAP microspheres. It also describes common immunoassay and nucleic acid assay formats and considerations for optimizing and validating the assays.
This document summarizes the features of the Bash shell version 4.3, last updated in February 2014. It provides definitions of key terms, an overview of basic shell features like syntax, commands, parameters and expansions. It also describes shell scripting, builtin commands, variables and other Bash-specific features. The manual is intended as a reference for using and programming with the Bash shell.
This document is the thesis of Alessandro Adamo submitted for a PhD in Mathematics and Statistics for Computational Sciences. The thesis proposes a new algorithm called LIMAPS (Lipschitzian Mappings for Sparse recovery) for solving underdetermined linear systems based on nonconvex Lipschitzian mappings. Chapter 1 provides theoretical foundations on sparse recovery and compressive sensing. Chapter 2 introduces LIMAPS and its iterative scheme for sparse representation and sparsity minimization. Chapters 3 and 4 apply LIMAPS to face recognition and ECG signal compression respectively, demonstrating its effectiveness on real-world applications.
This document provides an overview of the book "Static Timing Analysis for Nanometer Designs" by J. Bhasker and Rakesh Chadha. The book covers static timing analysis (STA) concepts and methodologies for digital integrated circuit designs in modern nanometer technologies. It describes CMOS logic design principles, standard cell library modeling, interconnect parasitics representation, and delay calculation techniques used in STA. The goal of the book is to provide a practical guide to performing STA for nanometer designs.
This document provides a feasibility study and basic design for the Dolok Dam in 2015. It includes tables of contents, tables, figures, and chapters covering topics like the project background, site description, review of previous studies, hydrological analysis, selection of alternative locations, topographical surveys, and geological investigations and soil mechanics. The main objectives are to analyze the hydrological conditions, select the best dam location alternative, conduct topographical surveys of the selected site, and investigate the local geology and soil conditions.
This document is a user's guide for WIEN2k, an augmented plane wave plus local orbitals program for calculating crystal properties. It describes WIEN2k, a computational software package that uses density functional theory to calculate the electronic structure of crystals and molecules. The guide provides an overview of the basic concepts behind the program, including the augmented plane wave method and density functional theory. It also gives instructions for getting started with the program, running calculations, and calculating various material properties.
This document is a preface and table of contents for a book titled "Picking Up Perl" that teaches Perl programming to new users. The preface outlines that the book is a tutorial intended for beginners to learn Perl version 5.6.0. It also covers the book's purpose, acknowledgments, obtaining updates, intended audience, materials covered, and conventions used. The table of contents provides an overview of the 7 chapters and their sections that make up the content of the book, covering topics like scalars, arrays, control structures, hashes, regular expressions and subroutines.
This document is a preface and table of contents for a book titled "Picking Up Perl" that teaches Perl programming to new users. The preface outlines that the book is a tutorial intended for beginners to learn Perl version 5.6.0. It also covers the book's purpose, acknowledgments, obtaining updates, intended audience, topics covered, and conventions used. The table of contents provides an overview of the 7 chapters and their sections that make up the content of the book, including getting started, scalars, arrays, control structures, hashes, regular expressions, and subroutines.
Proposal of an Advanced Retrieval System for Noble Qur’anAssem CHELLI
Noble Quran is different of all documents that we have known. It’s the sacred book
of Muslims. It contains knowledge of all aspects of life. With this huge quantity of
information, we can extract only a small part manually and this is considered insuffi-
cient compared to the size of knowledge contained by Quran. That raises the need for
a method to extract those information because currently there is no efficient method
except many printed lexicons and many tools of simple sequential search with regular
expression. Due to this limitation, the Quran requires us to find new ways to interact.
The goal through this work is to propose a system for advanced research in all of
the information contained in the Quran by considering the morphology of the Arabic
language and the properties of the Qur’anic text. It should be based on modern meth-
ods of information retrieval for good stability and high speed search. It would be very
useful for researchers and could be generalized to cover all the content in Arabic.
This document provides a summary and introduction to a professional programmer's guide to Fortran77. It discusses the early development and standardization of Fortran. It also provides an overview of the contents of the guide, which aims to cover the entire Fortran77 language as defined by standards at the time. The guide has been converted to digital format and made freely available online as the original published version is now out of print.
This document provides an overview of R's internal structures and programming concepts. It discusses topics such as SEXPs (the basic R data structure), environments and variable lookup, attributes, contexts, argument evaluation, autoprinting, serialization formats, encodings, warnings and errors, S4 objects, memory allocation, and graphics devices. The document is intended for developers and advanced users who want to understand how R works under the hood.
This document is a product manual for the Seagate Cheetah 15K.5 SCSI hard disk drive. It provides detailed specifications on the drive's performance, reliability, physical characteristics, and environmental limits. The manual describes the drive's standard features, capacities, interfaces, error rates, warranty and compliance with various industry standards.
Similar to BPEL PM 11g performance tuning - 5 (20)
Nimble Framework has evolved over time period while working across various industry domains and varying technology platforms in agile projects and programs. Nimble is accumulation of experiences and learnings.
I intend to talk about “Nimble framework - Software architecture & design in agile era” which can give insight into how to create and manage software architecture with proper mix of intentional and emergence.
Key concepts center around:
a. Handling of architecture and design in new product development, maintenance of a product, technology refresh, and major functionality revamp
b. Thought process while dealing with architecture and design
c. Development of team capability with respect to architecture and design
NoSQL databases provide a way for storing and retrieving data that is distributed but doesn't require the rigid schemas of a relational database. NoSQL databases are often optimized for specific uses like document, key-value, graph or wide-column stores. These databases aim to be highly available with weaker consistency guarantees and are often used for big data and real-time web applications.
The document describes MapReduce, a programming model for processing large datasets in a distributed computing environment. It explains the map and reduce functions, providing examples of doubling array elements with map and summing array elements with reduce. General forms are given for map and reduce, showing how arbitrary functions can be passed to each. Benefits are that code only needs to replace the map and reduce implementations rather than be rewritten when run on multiple machines. Hadoop is introduced as an implementation of MapReduce that is parallel, distributed, fault-tolerant and aware of network topology.
NaiBoli is a new gesture language being developed to provide a comprehensive notation for gesture modeling that is independent of device, platform, programming language, and natural language. It divides gestures into base elements, tools used, actions, transformations, and resultant gestures. The language is intended to be easy to learn and use, and evolvable as gesture recognition technology advances. This document outlines the initial version of the NaiBoli language elements in each category.
JourneyToSuccess is board game designed to learn various strategies for numerous business and technology related area. This file consists of playing rules and items needed to play in various setting. These are various files having cards for different settings such as Scum, Social Marketing, Business Strategy, etc.
JourneyToSuccess is board game designed to learn various strategies for numerous business and technology related area. This file consists of playing rules and items needed to play in various setting. These are various files having cards for different settings such as Scum, Social Marketing, Business Strategy, etc.
In a typical integration project, integration team is barraged from boundary systems. Inverted funnel model brings order in this chaotic communication and information flow.
This document provides contact information for someone named Tusjain, including an email address and blog link. It contains brief sections titled "My Story", "Continuous Improvement", and "They pay attention, when I do this" that likely relate to Tusjain's experiences, but no other contextual details are provided in the document.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
6. 10.4 SECUREFILES........................................................................................................................................ 96
10.4.1 Enable SecureFiles for SOAINFRA schema .................................................................................... 97
10.4.2 Enabling Encryption .................................................................................................................... 101
10.5 SQL PLAN ......................................................................................................................................... 103
11 REFERENCE................................................................................................................................ 103
EM FUSION MIDDLEWARE CONTROL AND WLS ADMIN CONSOLE..... ERROR! BOOKMARK NOT DEFINED.
1
2
3
4
5
6
7
8
9
10
11
12
STUCK THREAD MAX TIME....................................................................... ERROR! BOOKMARK NOT DEFINED.
STUCK THREAD TIMER INTERVAL ............................................................... ERROR! BOOKMARK NOT DEFINED.
TUNE DUMP CONFIGURATION ................................................................... ERROR! BOOKMARK NOT DEFINED.
DATA DISPLAY OPTION FOR EM CONSOLE ................................................... ERROR! BOOKMARK NOT DEFINED.
CACHE TIMEOUT FOR DISCOVERY ............................................................... ERROR! BOOKMARK NOT DEFINED.
PERMSIZE OF ADMIN SERVER ................................................................... ERROR! BOOKMARK NOT DEFINED.
DMS’S FREQUENCY................................................................................ ERROR! BOOKMARK NOT DEFINED.
UN-TARGET DMS FROM SERVERS ............................................................. ERROR! BOOKMARK NOT DEFINED.
BPEL RECOVERY CONSOLE OPTION ............................................................. ERROR! BOOKMARK NOT DEFINED.
INDEX CREATION.................................................................................. ERROR! BOOKMARK NOT DEFINED.
DB MANUAL STATS COLLECTION ............................................................. ERROR! BOOKMARK NOT DEFINED.
REFERENCE......................................................................................... ERROR! BOOKMARK NOT DEFINED.
DATA COLLECTION .......................................................................... ERROR! BOOKMARK NOT DEFINED.
1 BEFORE LNP TEST .................................................................................. ERROR! BOOKMARK NOT DEFINED.
1.1 INFRASTRUCTURE ...................................................................................... ERROR! BOOKMARK NOT DEFINED.
1.2 JVM-HOTSPOT-<<MANAGEDSERVER>> AND JVM-JROCKIT-<<MANAGEDSERVER>> ....... ERROR! BOOKMARK NOT
DEFINED.
1.3 WLS-THREADING-<<MANAGEDSERVER>> ................................................... ERROR! BOOKMARK NOT DEFINED.
1.4 WLS-NETWORKIO-<<MANAGEDSERVER>> .................................................. ERROR! BOOKMARK NOT DEFINED.
1.5 WLS-DATASOURCE-<<MANAGEDSERVER>>................................................. ERROR! BOOKMARK NOT DEFINED.
1.6 BPEL PM-<<MANAGEDSERVER>> .............................................................. ERROR! BOOKMARK NOT DEFINED.
1.7 TECHNOLOGY ADAPTERS............................................................................. ERROR! BOOKMARK NOT DEFINED.
1.8 BPEL PM – COMPOSITE ............................................................................ ERROR! BOOKMARK NOT DEFINED.
1.9 DATABASE ................................................................................................ ERROR! BOOKMARK NOT DEFINED.
2 DURING LNP TEST ................................................................................. ERROR! BOOKMARK NOT DEFINED.
2.1 CPU AND RAM USAGE AND MEMORY AVAILABILITY ........................................ ERROR! BOOKMARK NOT DEFINED.
2.2 JVM’S HEAP USAGE, GARBAGE COLLECTION AND ANY MEMORY LEAK IF ANY ........ ERROR! BOOKMARK NOT DEFINED.
2.3 DATABASE CONNECTIONS AVAILABILITY AND USAGE ........................................ ERROR! BOOKMARK NOT DEFINED.
2.4 AVAILABILITY OF PERIPHERAL RESOURCES LIKE JMS QUEUES, AQ AND THEIR USAGE PATTERN .... ERROR! BOOKMARK
NOT DEFINED.
3 AFTER LNP TEST .................................................................................... ERROR! BOOKMARK NOT DEFINED.
3.1 GET FULL DUMP OF FEW IMPORTANT TABLES.................................................. ERROR! BOOKMARK NOT DEFINED.
3.2 EXECUTE SQL QUERIES AS AND WHEN REQUIRED ............................................ ERROR! BOOKMARK NOT DEFINED.
6
7. 3.3 ANALYSIS OF AWR REPORT ........................................................................ ERROR! BOOKMARK NOT DEFINED.
3.4 ANALYSIS OF SOA SERVER MEMORY USAGE ................................................... ERROR! BOOKMARK NOT DEFINED.
4 REFERENCE .......................................................................................... ERROR! BOOKMARK NOT DEFINED.
LNP TEST CASE DESIGN AND LOAD TEST SELECTION ......................... ERROR! BOOKMARK NOT DEFINED.
1 LNP TEST CASE DESIGN ........................................................................... ERROR! BOOKMARK NOT DEFINED.
2 DESIGN OF EXPERIMENT .......................................................................... ERROR! BOOKMARK NOT DEFINED.
3 REFERENCE .......................................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDIX A: WEBLOGIC SERVER OVERVIEW ................................... ERROR! BOOKMARK NOT DEFINED.
1
2
3
4
5
6
7
8
9
WLS CONFIGURATION ............................................................................ ERROR! BOOKMARK NOT DEFINED.
DOMAIN ............................................................................................. ERROR! BOOKMARK NOT DEFINED.
SERVER ............................................................................................... ERROR! BOOKMARK NOT DEFINED.
ADMINISTRATION SERVER ....................................................................... ERROR! BOOKMARK NOT DEFINED.
MANAGED SERVER ................................................................................ ERROR! BOOKMARK NOT DEFINED.
ADMINISTRATION SERVER TO MANAGED SERVER INTERACTION ........................ ERROR! BOOKMARK NOT DEFINED.
CLUSTER .............................................................................................. ERROR! BOOKMARK NOT DEFINED.
NODE MANAGER................................................................................... ERROR! BOOKMARK NOT DEFINED.
MACHINE ............................................................................................ ERROR! BOOKMARK NOT DEFINED.
APPENDIX B: AUDITING IN BPEL PM ................................................ ERROR! BOOKMARK NOT DEFINED.
1 AUDIT LEVELS ....................................................................................... ERROR! BOOKMARK NOT DEFINED.
2 ORDER OF PRECEDENCE FOR AUDIT LEVEL SETTINGS ........................................ ERROR! BOOKMARK NOT DEFINED.
APPENDIX C: ANTI PATTERNS .......................................................... ERROR! BOOKMARK NOT DEFINED.
1
2
3
4
5
6
7
8
9
10
SYNCHRONOUS – ASYNCHRONOUS ............................................................ ERROR! BOOKMARK NOT DEFINED.
OVER USE OF ASYNCHRONOUS PROCESSES ................................................... ERROR! BOOKMARK NOT DEFINED.
OVER USE OF DURABLE PROCESSES ............................................................. ERROR! BOOKMARK NOT DEFINED.
NO FAULT HANDLING ............................................................................. ERROR! BOOKMARK NOT DEFINED.
SYNCHRONOUS FAULT HANDLING .............................................................. ERROR! BOOKMARK NOT DEFINED.
TO MANY RETRIES .................................................................................. ERROR! BOOKMARK NOT DEFINED.
CHATTING BPEL PROCESS (CALL BACK) ....................................................... ERROR! BOOKMARK NOT DEFINED.
OVER USE OF FLOWN ............................................................................. ERROR! BOOKMARK NOT DEFINED.
LOOPS AND MORE LOOPS......................................................................... ERROR! BOOKMARK NOT DEFINED.
SYNCHRONOUS AND ASYNCHRONOUS PROCESSES ON SAME MANAGED SERVER/CLUSTER ... ERROR! BOOKMARK NOT
DEFINED.
11 DURABLE AND TRANSIENT PROCESSES ON SAME MANAGED SERVER/CLUSTER...... ERROR! BOOKMARK NOT DEFINED.
12 STICKY LOAD BALANCER ......................................................................... ERROR! BOOKMARK NOT DEFINED.
7
8. 13 NOT KEEPING ASPECT RATIO ................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDIX D: SQL QUERIES .............................................................. ERROR! BOOKMARK NOT DEFINED.
1 EM CONSOLE SQL QUERIES ..................................................................... ERROR! BOOKMARK NOT DEFINED.
1.1 RECOVERY CONSOLE QUERIES ...................................................................... ERROR! BOOKMARK NOT DEFINED.
1.2 RECENT FAULT AND REJECTED MESSAGES QUERY ............................................. ERROR! BOOKMARK NOT DEFINED.
1.3 RECENT COMPOSITE INSTANCE QUERY........................................................... ERROR! BOOKMARK NOT DEFINED.
1.4 INSTANCE TAB PAGE QUERY ......................................................................... ERROR! BOOKMARK NOT DEFINED.
1.5 INSTANCE TAB PAGE SEARCH QUERY BASED ON NAME VS TITLE QUERY ................ ERROR! BOOKMARK NOT DEFINED.
1.6 FAULT AND REJECTED MESSAGE TAB PAGE QUERIES ......................................... ERROR! BOOKMARK NOT DEFINED.
1.6.1 Parent query ...................................................................................... Error! Bookmark not defined.
1.6.2 Child query ......................................................................................... Error! Bookmark not defined.
2 MISCELLANEOUS ................................................................................... ERROR! BOOKMARK NOT DEFINED.
2.1 STORED PROCEDURE TO CONVERT BLOB IN STRING .......................................... ERROR! BOOKMARK NOT DEFINED.
2.2 QUERY TO FIND PERCENTAGE OF FREE SPACE .................................................. ERROR! BOOKMARK NOT DEFINED.
2.3 QUERY TO FIND THE WAIT EVENTS FOR LGWR USING ITS SID ........................... ERROR! BOOKMARK NOT DEFINED.
2.4 QUERY TO MONITOR ‘REDO BUFFER ALLOCATION RETRIES’................................ ERROR! BOOKMARK NOT DEFINED.
2.5 SQL STATEMENT TO RECLAIM SPACE AFTER PURGING....................................... ERROR! BOOKMARK NOT DEFINED.
2.6 QUERY TO FIND OUT TOTAL SESSIONS ON A DATABASE ..................................... ERROR! BOOKMARK NOT DEFINED.
2.7 QUERY TO FIND OUT UTILIZATION OF PROCESSES AND SESSIONS IN A DATABASE ... ERROR! BOOKMARK NOT DEFINED.
2.8 FIND OUT THE PROCESS INSTANCE FROM A CONVERSATION ID WHEN THERE IS NO INSTANCE NUMBER SHOWING IN
THE LOG FILE (BPEL INSTANCE ID FOR A TIMES OUT ITEM) ....................................... ERROR! BOOKMARK NOT DEFINED.
2.9 QUERY TO GET AUDIT DETAILS FROM AUDIT_DETAILS TABLE .............................. ERROR! BOOKMARK NOT DEFINED.
2.10 QUERY TO GET AUDIT DETAILS FROM AUDIT_TRAIL TABLE ............................... ERROR! BOOKMARK NOT DEFINED.
2.11 QUERY TO GET XML MESSAGE WITH THE GIVEN INSTANCE ID ......................... ERROR! BOOKMARK NOT DEFINED.
2.12 QUERY TO GET XML MESSAGE WITH A GIVEN INSTANCE NAME........................ ERROR! BOOKMARK NOT DEFINED.
2.13 QUERY TO GET PAYLOAD SIZE OF MESSAGE ................................................... ERROR! BOOKMARK NOT DEFINED.
2.14 QUERY TO GET EXECUTION TIME OF BPEL INSTANCES .................................... ERROR! BOOKMARK NOT DEFINED.
2.15 QUERY TO GET THE EXECUTION TIME OF BPEL INSTANCES AND TO FIND THE PARENT THAT HAS INITIALIZED THE
COMPOSITE ....................................................................................................... ERROR! BOOKMARK NOT DEFINED.
2.16 QUERY TO IDENTIFY ALL THE FAULTS FOR THE MESSAGES THAT WERE SITTING IN BPEL ENGINE LEVEL RECOVERY AS
UNDELIVERED INVOKES ........................................................................................ ERROR! BOOKMARK NOT DEFINED.
APPENDIX E: BIG OR LARGE OR HUGE PAGES ................................... ERROR! BOOKMARK NOT DEFINED.
1
2
3
4
LINUX ................................................................................................. ERROR! BOOKMARK NOT DEFINED.
WINDOWS ........................................................................................... ERROR! BOOKMARK NOT DEFINED.
SOLARIS .............................................................................................. ERROR! BOOKMARK NOT DEFINED.
REFERENCE: ......................................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDIX F: ORA-01438: VALUE LARGER THAN SPECIFIED PRECISION ALLOWED .... ERROR! BOOKMARK
NOT DEFINED.
8
9. 5
6
7
8
WHAT IS THE ERROR IN LOGS? .................................................................. ERROR! BOOKMARK NOT DEFINED.
EFFECTS............................................................................................... ERROR! BOOKMARK NOT DEFINED.
CAUSE ................................................................................................ ERROR! BOOKMARK NOT DEFINED.
SOLUTION ............................................................................................ ERROR! BOOKMARK NOT DEFINED.
APPENDIX G: LOBS IN THE SOAINFRA SCHEMA ................................ ERROR! BOOKMARK NOT DEFINED.
APPENDIX H: AWR, ADDM, & ASH REPORTS .................................... ERROR! BOOKMARK NOT DEFINED.
1 AWR REPORT ...................................................................................... ERROR! BOOKMARK NOT DEFINED.
2 ADDM REPORT .................................................................................... ERROR! BOOKMARK NOT DEFINED.
3 ASH REPORT ........................................................................................ ERROR! BOOKMARK NOT DEFINED.
4 AWR REPORT ANALYSIS ......................................................................... ERROR! BOOKMARK NOT DEFINED.
4.1 SQL STATEMENTS ORDERED BY ELAPSED TIME ............................................... ERROR! BOOKMARK NOT DEFINED.
4.2 SQL STATEMENTS ORDERED BY CPU TIME..................................................... ERROR! BOOKMARK NOT DEFINED.
4.3 SQL STATEMENTS ORDERED BY GETS ............................................................ ERROR! BOOKMARK NOT DEFINED.
4.4 SQL STATEMENTS ORDERED BY READS .......................................................... ERROR! BOOKMARK NOT DEFINED.
4.5 SQL STATEMENTS ORDERED BY EXECUTIONS .................................................. ERROR! BOOKMARK NOT DEFINED.
4.6 SQL STATEMENTS ORDERED BY PARSE CALLS ................................................. ERROR! BOOKMARK NOT DEFINED.
5 REFERENCE .......................................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDIX I: MONITORING SCRIPTS ................................................. ERROR! BOOKMARK NOT DEFINED.
1 DATABASE MONITORING ......................................................................... ERROR! BOOKMARK NOT DEFINED.
2 JMS MONITORING ................................................................................ ERROR! BOOKMARK NOT DEFINED.
3 AQ MONITORING .................................................................................. ERROR! BOOKMARK NOT DEFINED.
APPENDIX J: HOW TO MONITOR SOA SERVER MEMORY USAGE ....... ERROR! BOOKMARK NOT DEFINED.
1
2
3
4
SETUP: JCONSOLE OR VISUALVM (INSTALLED LOCALLY)................................... ERROR! BOOKMARK NOT DEFINED.
SETUP: JVISUALVM (INSTALLED AT REMOTE MACHINE) ................................... ERROR! BOOKMARK NOT DEFINED.
SETUP: JROCKIT MISSION CONTROL (INSTALLED AT REMOTE MACHINE) .............. ERROR! BOOKMARK NOT DEFINED.
REFERENCE .......................................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDIX K: HEAP DUMP FILES ANALYSIS: JROCKIT AND HOTSPOT JVMS ....... ERROR! BOOKMARK NOT
DEFINED.
1 EXAMPLE ANALYSIS OF A HEAP DUMP FILE USING ECLIPSE MEMORY ANALYZER ... ERROR! BOOKMARK NOT DEFINED.
2 REFERENCE .......................................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDIX L: CAPACITY PLANNING................................................... ERROR! BOOKMARK NOT DEFINED.
9
10. 1 CAPACITY PLANNING FOR BPEL PM .......................................................... ERROR! BOOKMARK NOT DEFINED.
1.1 DETERMINING PERFORMANCE GOALS AND OBJECTIVES – CURRENT & FUTURE.... ERROR! BOOKMARK NOT DEFINED.
1.2 MEASURING PERFORMANCE METRICS .......................................................... ERROR! BOOKMARK NOT DEFINED.
1.3 IDENTIFYING BOTTLENECKS ......................................................................... ERROR! BOOKMARK NOT DEFINED.
1.4 IMPLEMENTING A CAPACITY MANAGEMENT PLAN .......................................... ERROR! BOOKMARK NOT DEFINED.
2 REFERENCE .......................................................................................... ERROR! BOOKMARK NOT DEFINED.
Exhibits
Exhibit 1: Stress, Load, Soak, Spike Tests Load Profiles ................... Error! Bookmark not defined.
Exhibit 2: LnP Testing Life Cycle and SDLC ....................................... Error! Bookmark not defined.
Exhibit 3: BPEL Processes ................................................................. Error! Bookmark not defined.
Exhibit 4: JVM Tuning Tradeoffs ...................................................... Error! Bookmark not defined.
Exhibit 5: JVM's Garbage Collection and Throughput ..................... Error! Bookmark not defined.
Exhibit 6: jRockit Attributes ............................................................. Error! Bookmark not defined.
Exhibit 7: HostSpot Attributes ......................................................... Error! Bookmark not defined.
Exhibit 8: WLS internal applications at startup - 1 ......................... Error! Bookmark not defined.
Exhibit 9: WLS internal applications at startup - 2 ......................... Error! Bookmark not defined.
Exhibit 10: WLS internal applications at startup - 3 ....................... Error! Bookmark not defined.
Exhibit 11: WLS internal applications at startup - 4 ........................ Error! Bookmark not defined.
Exhibit 12: WLS internal applications at startup - 5 ........................ Error! Bookmark not defined.
Exhibit 13: WLS internal applications at startup - 6 ........................ Error! Bookmark not defined.
Exhibit 14: SOAWorkManager - 1 .................................................... Error! Bookmark not defined.
Exhibit 15: SOAWorkManager - 2 .................................................... Error! Bookmark not defined.
Exhibit 16: SOAWorkManager - 3 .................................................... Error! Bookmark not defined.
Exhibit 17: WLS Muxers ................................................................... Error! Bookmark not defined.
Exhibit 18: FMC Login.................................................................................................................... 17
Exhibit 19: FMC Farm Summary.................................................................................................... 17
Exhibit 20: FMC Performance Summary - 1 .................................................................................. 18
Exhibit 21: FMC Performance Summary - 2 .................................................................................. 19
Exhibit 22: FMC Performance Summary - 3 .................................................................................. 19
Exhibit 23: Dynamic Memory Service ........................................................................................... 20
Exhibit 24: BPEL Engine Threading Model .................................................................................... 21
Exhibit 25: Dispatcher Maximum Request Depth - 1.................................................................... 22
Exhibit 26: Dispatcher Maximum Request Depth - 2.................................................................... 23
Exhibit 27: InvokeMessages In Cache ........................................................................................... 23
Exhibit 28: syncMaxWaitTime - 1 ................................................................................................. 25
Exhibit 29: syncMaxWaitTime - 2 ................................................................................................. 25
Exhibit 30: syncMaxWaitTime - 3 ................................................................................................. 26
Exhibit 31: syncMaxWaitTime – 4 ................................................................................................. 26
Exhibit 32: BPEL EJBs - 1 ................................................................................................................ 27
10
16. BPEL Engine Tuning
In very simplistic terms, BPEL Engine is a J2EE application. This application also acts as a
container for hosting BPEL processes/composites. This application also has UI component to
facilitate human interaction. While talking about tuning of BPEL we will keep this picture in
view. Our focus will be tuning of BPEL engine though we will consider few points which also
cover UI part as well.
From tuning perspective BPEL engine can be broken into:
1.
2.
3.
4.
EJBs
Threading Model
Database part
Fusion Middleware Control ( UI part)
BPEL Process Manager provides several property settings that can be configured from
Enterprise Manager Fusion Middleware Control to optimize performance for response times,
throughput, and concurrency. The BPEL PM can be tuned at either at the infrastructure, service
engine, composite or the process level.
To tune a BPEL engine, it is absolutely essential to know type of processes/composites
deployed, cluster topology, WLS topology, load pattern, and JVM configuration. Processes can
be categorized by the nature of their interfaces, for example, asynchronous, push based, or
synchronous. They can also be durable (long running) or transient (short lived). Again, in any of
these processes, there may be activities that are idempotent (retry-able, such as the Assign and
Invoke activities) or invocations that are non-blocking (happening in parallel). A process can
also have a breakpoint wherein its state is saved in the dehydration store or the state is not
stored at all. All these factors have to be taken into consideration when tuning the BPEL PM.
1 Real Time Viewing of Performance Metrics
To monitor the performance metrics at real time, one has following options.
1.1 Fusion Midddleware Control
Fusion Midddleware Control (FMC) provides facility to view various matrices related to
resources consumption and performance.
1. Login to FMC (http://<<serverName>>:<port>>/em)
16
17. Exhibit 1: FMC Login
2. Summary page of Farm will appear.
Exhibit 2: FMC Farm Summary
This page shows CPU usage for Admin server and managed server under which BPEL Engine is
running.
3. Expand “SOA” from left hand side panel and invoke contextual menu by right clicking on
one of the managed server. Select Monitoring Performance Summary
17
18. Exhibit 3: FMC Performance Summary - 1
FMC will display partitions for the managed server in left panel and few of the statistics in right
panel.
18
19. Exhibit 4: FMC Performance Summary - 2
4. Click on “Show Metric Palette” button. Metric Palette appears at right side of screen.
Exhibit 5: FMC Performance Summary - 3
From BPEL Engine and deployed BPEL Processes/composite perspective, experiment with
various matrices. Once matrices of interest are identified from infrastructure set up and
composites deployed perspective, observe them and note down the important observations.
But FMC shows the matrices in real time only which restricts its utility from historical analysis
perspective. Some time it is difficult to operate FMC during heavy load.
1.2 Dynamic Memory Service
The Dynamic Monitoring Service (DMS) enables Fusion Middleware components to provide
administration tools, such as Oracle Enterprise Manager, with data regarding the component's
performance, state and on-going behavior. Fusion Middleware Components push data to DMS
and in turn DMS publishes that data through a range of different components. Specifically, DMS
is used by Oracle WebCache, Oracle HTTP Server (OHS), Oracle Application Development
Framework (ADF), WebLogic Diagnostic Framework (WLDF), and JDBC. DMS measures and
reports metrics trace events and system performance and provides a context correlation
service for these components.
19
20. One can also monitor (but in real time) various matrices using DMS (Dynamic Memory Service)
servlet (http://<<host>>:<<port>>/dms/Spy). soainfra_component is good place to start in
DMS Servlet to play with.
Exhibit 6: Dynamic Memory Service
For historical data collection perspective one has two options:
1. Use Enterprise Manager Grid Control
2. Use custom scripts and sql queries
This book will be going by second approach because it cannot be assumed that everyone has
Enterprise Manger Grid in infrastructure mix.
2 BPEL Engine Threading Model
BPEL Engine’s threading model is based on common sense. Before tuning it, one needs to
understand the same. BPEL Engine has three thread pools. Each thread pool holds threads of
specific type to manage various types of work in BPEL engine.
First pool consists of system threads which does all plumbing work required to BPEL Engine
keep on running. Essentially these threads do general clean up tasks like releasing stateful
beans to pool. These threads are processed by BPEL Engine on high priority. Couples of these
types of threads are sufficient even for heavily loaded BPEL Engine. These threads are called
Dispatcher System Threads and their number is managed by dspSystemThreads property in
FMC.
The default value of dspSystemThreads is 2. Its value cannot be set 0 or negative. Any value
less than 1 is set to default.
The second pool holds Dispatcher Invoke Threads. These threads are responsible for taking any
incoming message and initiating a new instance. Numbers of Dispatcher Invoke Threads in the
pool are controlled by dspInvokeThreads property which can be accessed via FMC. Dispatcher
Invoke Threads are also responsible for processing of synchronous processes.
20
21. If BPEL Engine is hosting lot of synchronous processes, increasing value of
dspInvokeThreads will improve the performance but higher value of
dspInvokeThreads also lead to greater CPU utilization due to context switching.
The default value of dspInvokeThreads is 20. Its value cannot be set 0 or negative. Any value
less than 1 is set to default.
The third pool holds Dispatcher Engine Threads. These threads are responsible for processing
asynchronous messages. Numbers of Dispatcher Engine Threads in the pool are controlled by
dspEngineThreads property which can be accesses via FMC.
The default value of dspEngineThreads is 30. Its value cannot be set 0 or negative. Any value
less than 1 is set to default.
The pictorial representation of threading model of BPEL Engine is in following exhibit:
Exhibit 7: BPEL Engine Threading Model
21
22. 2.1 Dispatcher Maximum Request Depth
BPEL Engine threading model also consists of a property which controls the number of inmemory activities in processes should be processed within a transaction. This property is
labeled as dspMaxRequestDepth. Once the process activity chain has reached this depth,
instance is dehyderated and next activity is performed in separate transaction.
The default value of dspMaxRequestDepth is 600. Its value cannot be set 0 or negative. Any
value less than 1 is set to default.
If dspMaxRequestDepth value is set very low, number of data base calls increases
which affects performance and also instance processing time may exceed
application server transaction time out limit. If value is set two high, server may
face out of memory error.
Exhibit 8: Dispatcher Maximum Request Depth - 1
22
23. Exhibit 9: Dispatcher Maximum Request Depth - 2
2.2 InvokeMessages In Cache
The MaximumNumberOfInvokeMessagesInCache property specifies the number of invoke
messages that can be kept in the in-memory cache. Once the engine hits this limit, the message
is pushed to dispatcher in-memory cache. The saved messages can be recovered using a
recovery job. Use value -1 to disable. The default value is 100000.
High value of MaximumNumberOfInvokeMessagesInCache increases performance
but may result is out-of-memory issues.
Exhibit 10: InvokeMessages In Cache
23
24. 3 Transaction Timeout
3.1 syncMaxWaitTime
syncMaxWaitTime specifies the maximum time the process receiver waits for getting the
response. If the BPEL process service component does not receive a reply within the specified
time, then the activity fails. The syncMaxWaitTime property applies to durable synchronous
(having breakpoint activities which forces dehyderation) processes called in a synchronous
manner.
A breakpoint activity is an activity in which BPEL Engine must wait for a timer to expire or for
any incoming messages. The BPEL process instance is dehydrated by the BPEL Server when it
encounters a breakpoint activity and the state of the process is saved in the database.
The following activities are considered to be breakpoint activities:
a.
b.
c.
d.
e.
Receive (except if it is the first activity of the process)
Wait
Pick (onAlarm, onMessage)
Checkpoint
Reply
Durable processes are those processes which have one or more breakpoint activities. Durable
processes are normally long-lived. They must wait for some event to occur or some time to get
expired.
This parameter is only for the Synchronous process with breakpoint activities. This
configuration is not for the asynchronous process since in case of async BPEL no receiver thread
is waiting to timeout.
Do not co-relate this parameter for the synchronous transaction to the external system from
Asynchronous BPEL/composite process. Users expect a Sync invocation to external system
Webservice should timeout if it’s taking more time than configure for syncMaxWaitTime
period. This parameter is not applicable for this scenario, try to implement httpReadTimeout
and httpConnTimeout property within composite itself
If one observes following exception, consider configuring syncMaxWaitTime property:
The transaction was rolled back
or
Transaction Rolledback.: weblogic.transaction.internal.TimedOutException:
Transaction timed out
1. Login into FMC
24
25. Exhibit 11: syncMaxWaitTime - 1
2. Navigate to soa-infra
SOA Administration
BPEL Properties
Exhibit 12: syncMaxWaitTime - 2
25
26. 3. Click on "More BPEL Configuration Properties..." hyperlink
Exhibit 13: syncMaxWaitTime - 3
4. Locate syncMaxWaitTime and change it.
Exhibit 14: syncMaxWaitTime – 4
26
27. 5. Click on Apply button.
3.2 BPEL EJBs
The timeout properties for the EJBs control the particular timeout setting for the SOA
application, overriding the global setting specified by the JTA timeout (See step 3).
Note: Prior to changing BPEL EJBs transaction time out values, ensure to shutdown SOA
managed server. Otherwise errors will popup.
1. Log into WLS Administration Console.
Exhibit 15: BPEL EJBs - 1
2. Click “Deployments”
27
28. Exhibit 16: BPEL EJBs - 2
3. Scroll down and navigate to soa-infra
EJBs.
4. Click on individual an EJB
5. Navigate “Configuration” Tab
28
29. Exhibit 17: BPEL EJBs - 3
6. Using Lock & Edit, update “Transaction Timeout”
7. Click on “Save” and “Release Configuration”.
8. Repeat above steps for following EJBs:
BPELActivityManagerBean
BPELDeliveryBean
BPELDispatcherBean
BPELEngineBean
BPELFinderBean
BPELInstanceManagerBean
BPELProcessManagerBean
BPELSensorValuesBean
BPELServerManagerBean
9. Start SOA Managed Server
29
30. 3.3 Global transaction timeout at Weblogic Domain Level
This property specifies the maximum amount of time, in seconds; an active transaction is
allowed to be in the first phase of a two-phase commit transaction. If the specified amount of
time expires, the transaction is automatically rolled back.
In case of single phase transactions, if the transaction is still in the "active" state after this time,
it is automatically rolled back.
Minimum value: 1
Maximum value: 2147483647
1. Log into WLS Administration Console.
Exhibit 18: Global transaction timeout at WLS Domain Level - 1
2. Click on “JTA”
3. Navigate to Configuration
JTA tab
30
31. Exhibit 19: Global transaction timeout at WLS Domain Level - 2
4. Using Lock & Edit, update “Transaction Timeout”
5. Change the value of Timeout Seconds.
6. Click on “Save” and “Release Configuration”.
7. Restart WLS.
3.4 Webservice Read and connection timeout
When an http request has been made to external system using web service httpReadTimeout,
httpConnTimeout, and optimization properties can be used to timeout that transaction.
These values are identified in milliseconds and this configuration only applicable for http
protocol based web service invocation.
One can define httpReadTimeout, httpConnTimeout, and optimization in composite.xml
for the service for which timeout has to set.
<reference name="Service1"
ui:wsdlLocation="http://localhost:90101/soainfra/services/default/Child_1.0/Child.wsdl">
<interface.wsdl
interface="http://xmlns.oracle.com/test/Child/Child#wsdl.interface(Child)"/>
<binding.ws
port="http://xmlns.oracle.com/test/Child/Child#wsdl.endpoint(child_client_ep/
Child_pt)"
31
32. location="http://localhost:9010/soainfra/services/default/Child_1.0/child_client_ep?WSDL">
<property name="oracle.webservices.local.optimization">false</property>
<property name="oracle.webservices.httpReadTimeout" type="xs:string"
many="false">10000</property>
<property name="oracle.webservices.httpConnTimeout" type="xs:string"
many="false">5000</property>
</binding.ws>
</reference>
Snippet 1: composite.xml
oracle.webservices.local.optimization parameter value could be true/false, make it false if
service which user is going to invoke reside in same WLS Instance to avoid execution of SOAP
stack
In the BPEL process one can add a Catch branch for a RemoteFault if wants to catch this error.
Note: When using this parameter it will return a "bpelx:timeout" Fault, and not a
RemoteFault.
3.5 Relationship among Timeout parameters
If the invocation pattern is like this:
Request - Consumer invokes
SOA Load balancer
SOA Managed Server
Provider System
Response - Consumer invokes OA Load balancer SOA Managed Server Provider System
Then as a general rule, keep the following relation between the timeout parameters:
Consumer system/API Timeout > SOA Load Balancer Timeout (If applicable) >
Global Transaction Timeout JTA > BPEL EJB's transaction timeout >
syncMaxWaitTime OR composite Level Timeout > Provider System/API timeout
Note: This recommendation is only applicable to sync Processes. Additionally the default
Timeout setting that comes with SOA 11g installation does not comply with this rule. One might
need to adjust the setting according to particular business and technical requirements.
3.6 WLS Timeout parameters
There are few more parameters related to timeout which may also affect performance.
Let us consider first at general protocol level for a managed server.
1. Login into WLS console
2. Navigate to <<Domain Name>>
Environment
Servers
32
33. Exhibit 20: WLS Timeout parameters - 1
3. Click on a particular managed server
33
34. Exhibit 21: WLS Timeout parameters - 2
4.
Navigate to Protocol
General tab
34
35. Exhibit 22: WLS Timeout parameters - 3
At this page one can tune few of the timeout parameters.
3.6.1 Complete Message Timeout
CompleteMessageTimeout defines the maximum number of seconds that this server waits for a
complete message to be received. Each network channel can override this value if configured.
CompleteMessageTimeout affects the HTTP Response, such that if WLS discovers sockets
inactive for longer than the CompleteMessageTimeout, the server will close these sockets.
Though original intent of this attribute is guard against a denial of service attack but can be
used to timeout long messages to improve throughput of WLS.
Minimum value: 0
Maximum value: 480
3.6.2 Idle Connection Timeout:
The maximum number of seconds that a connection is allowed to be idle before it is closed by
the server.
IdleConnectionTimeout defines the maximum number of seconds that a connection is
allowed to be idle before it is closed by the server. The T3 and T3S protocols ignore this
attribute. Each network channel can override this value if configured
35
36. This timeout helps guard against server deadlock through too many open connections.
Minimum value: 0
Typical value: 65
3.6.3 Tunneling Client Timeout
The amount of time (in seconds) after which a missing tunneled client is considered dead. Each
network channel can override this value if configured
Minimum value: 1
Let us move to HTTP tab:
1. Login into WLS console
2. Navigate to <<Domain Name>>
Environment
Servers
Exhibit 23: Tunneling Client Timeout - 1
36
37. 3.
Click on a particular managed server
Exhibit 24: Tunneling Client Timeout - 2
4. Navigate to Protocol
HTTP tab
37
38. Exhibit 25: Tunneling Client Timeout - 3
Few more parameters to tune here.
3.6.4 Post Timeout
Timeout (in seconds) for reading HTTP POST data in a servlet request. If the POST data is
chunked, the amount of time the server waits between the end of receiving the last chunk of
data and the end of receiving the next chunk of data in an HTTP POST before it times out.
Though original intent of this attribute is guard against a denial of service attack but can be
used to timeout long messages to improve throughput of WLS.
Minimum value: 0
Maximum value: 120
Typical value: 30
3.6.5 Duration
The amount of time this server waits before closing an inactive HTTP connection. Number of
seconds to maintain HTTP keep-alive before timing out the request.
38
39. Minimum value: 5
Maximum value: 3600
Typical value: 30
3.6.6 Tunneling Client Timeout
The amount of time (in seconds) after which a missing tunneled client is considered dead. Each
network channel can override this value if configured.
Minimum value: 1
4 BPEL PM Audit and Logging
In BPEL Engine, Audit and Logging are clearly demarcated.
Auditing answers the question:
•
Who did what and why?
Logging is focuses on:
•
What's happening and how?
Auditing is about recording domain-level events: a transaction is created; messages under
processing, etc. Audit trail is recorded in database. Audit trail is important from business
perspective.
Logging means the recording of implementation level events that happen as the BPEL Engine is
running: such as general health of BPEL Engine, any exception/error thrown by BPEL Engine or
process/composite, etc. Logging is recorded in file system. Generally technical team is more
interested in logging.
4.1 Audit Tuning
Audit information is used for viewing the state of the process from FMC.
4.1.1 SOA Infrastructure level
The properties set at SOA Infrastructure level impacts all deployed composites, except those
composites for which explicitly different audit or payload validation values are set at the
composite application level.
a. Log in to FMC
b. Navigate to <<farmName>>
SOA
<<managedServer>>
SOA Administration
Common Properties
39
41. Exhibit 27: SOA Infrastructure level audit tuning - 2
4.1.1.1 Audit Level
The auditLevel property controls the audit trail logging level. This configuration property is
applicable to both durable and transient processes.
AuditLevel property has following possible values:
Table 1: AuditLevel
Value
Production
Development
Off
Description
Composite instance tracking is collected, but Mediator engine will not collect
payload details and BPEL engine will not collect payload details for assign
activities (payload details for other BPEL activities are collected). This level is
optimal for most normal production operations. This is default value.
Allows both the composite instance tracking and payload detail tracking.
However it may impact the performance. This level is useful mostly for testing
and debugging purposes.
No logging is performed. Composite instance tracking and payload details are
not collected.
41
42. In production environment, AuditLevel should be set to Production or Off.
4.1.1.2 Capture Composite Instance State
This attributes enables tracking for "running" instances.
Enabling this feature may impact the performance negatively.
4.1.1.3 Payload Validation
Selecting this field validates incoming and outgoing XML documents using Schema validation.
Nonschema-compliant payload data is intercepted and displayed as a fault. This property is
applicable to both durable and transient processes.
Enabling XML payload validation can impact performance negatively.
4.1.1.4 AuditConfig
This attribute is collection of few properties but only following are important from performance
perspective.
a. instanceTrackingAuditTrailThreshold: This property sets the maximum size (in
kilobytes) of an audit trail details string which will be stored in audit_trail table. If audit
trail string is larger than instanceTrackingAuditTrailThreshold then it stored in
audit_details table.
Data from audit_details is not immediately loaded when the audit trail is initially
retrieved in FMC but a hyper link is displayed which on click shows the string stored.
instanceTrackingAuditTrailThreshold value affect performance of BPEL Engine
while processing messages but also UI component (FMC) as well.
b. When to audit: By default, audit data is logged to the database synchronously. By
switching the audit policy to deferred, all audit operations are invoked asynchronously
Capture Composite Instance State must be disabled.
Set following values:
policies/Element_0/name:
Set this value to Immediate
policies/Element_0/isActive:
policies/Element_1/name:
Set this value to false
Set this value to Deferred
policies/Element_1/isActive:
set this value to True
Set this value to maxThreads
policies/Element_1/properties/Element_0/value: Set this value to <<number>>
policies/Element_1/properties/Element_1/name: Set this value to flushDelay
policies/Element_1/properties/Element_0/name:
42
43. Set this value to <<seconds>>
policies/Element_1/properties/Element_2/name: Set this value to batchSize
policies/Element_1/properties/Element_2/value: Set this value to <<number>>
policies/Element_1/properties/Element_1/value:
1.
Click on More SOA Infra Advanced Configuration Properties...
Exhibit 28: AuditConfig - 1
2.
Click on AutoConfig
43
46. 4.1.2 BPEL Engine Level
4.1.2.1 AuditLevel
The auditLevel property controls the audit trail logging level. This configuration property is
applicable to both durable and transient processes.
AuditLevel property has following possible values:
Table 2: BPEL Engine - AuditLevel
Value
Inherit
Off
Minimal
Error
Production
Development
Description
Inherits the audit level from infrastructure level.
No audit events (activity execution information) are persisted and no logging is
performed
All events are logged; however, no audit details (variable content) are logged.
Logs only serious problems that require immediate attention from the
administrator and are not caused by a bug in the product.
All events are logged. The audit details for assign activities are not logged; the
details for all other activities are logged.
All events are logged; all audit details for all activities are logged.
Performance improvement is observed if auditLevel is set to off or Minimal or Error.
4.1.2.2 AuditDetailThreshold
The auditdetailthreshold property sets the maximum size (in kilobytes) of an audit trail
details string which will be stored in audit_trail table. If audit trail string is larger than
auditdetailthreshold then it stored in audit_details table.
Data from audit_details is not immediately loaded when the audit trail is initially retrieved in
FMC but a hyper link is displayed which on click shows the string stored.
.
The default value is 50000 (50 kilobytes).
auditdetailthreshold value affect performance of BPEL Engine while processing messages
but also UI component (FMC) as well.
4.1.2.3 Payload Validation
validateXML setting to true or selecting Payload Validation checkbox validates incoming
and outgoing XML documents using Schema validation. Nonschema-compliant payload data is
intercepted and displayed as a fault. This property is applicable to both durable and transient
processes.
Enabling XML payload validation can impact performance negatively.
46
48. Exhibit 34: Payload Validation - 2
4.1.3 AuditStorePolicy
This property specifies the strategy to persist the BPEL audit data.
Table 3: AuditStorePolicy
Value
Description
Audit Trail and dehydration are persisted to DB in one transaction.
syncMultipleWrite Audit Trail and dehydration are persisted in the same thread but
separate transactions.
async
Audit Trail and dehydration are persisted by separate threads and
separate transactions.
syncSingleWrite
By default, audit messages are stored as part of the main BPEL transaction. In scenarios where
a large number of audit logs are accumulated as part of a single transaction like looping, may
lead to an out-of-memory and/or time out issue for BPEL main transaction.
One may consider using syncMultipleWrite or async to store the audit message separately
from the main transaction. When using syncMultipleWrite or async, for auditStorePolicy
one needs tune AuditFlushByteThreshold and AuditFlushEventThreshold properties as
well.
48
49. Exhibit 35: AuditStorePolicy - 1
Exhibit 36: AuditStorePolicy - 2
4.1.4 AuditFlushByteThreshold
This property controls how often the engine should flush the audit events, after adding an
event to the current batch, the engine checks to see if the current batch byte size is greater
than this value or not.
AuditFlushByteThreshold need to be tuned if auditStorePolicy
syncMultipleWrite or async.
is set to
4.1.5 AuditFlushEventThreshold
This property controls how often the engine should flush the audit events, when it reaches to
mentioned limit of the number of events, the engine would trigger a call to persist audit data.
49
50. AuditFlushEventThreshold need to be tuned if auditStorePolicy
syncMultipleWrite or async.
is set to
4.1.6 AsyncAuditPersisterThreads
When auditStorePolicy is set to async, the audit data will be put in an in-memory queue
and a separate pool of that performs the persistence of the audit data. This property sets size of
this pool.
AsyncAuditPersisterThreads value needs to be tuned based on how much audit log being
generated and CPU utilization.
4.1.7 AsyncAuditQueueSize
When auditStorePolicy is set to async, the audit data will be put in an in-memory queue.
AsyncAuditQueueSize sets upper bound of the queue, controlling maximum number of
entries in the queue.
AsyncAuditQueueSize value needs to be tuned based on how much audit log being generated
and free memory.
4.2 Logging Tuning
There are two types of loggers:
1. Persistence Logger
2. Runtime Logger
Persistent loggers become active when the component is started. The log levels for these
loggers are persisted across component restarts.
Runtime loggers are automatically created during runtime and become active when a particular
feature area is exercised.
BPEL Engine records logs in flat files on the file system. The logs typically reside under
$MW_HOME/<<project>> /domains/<<domainName>>/servers/<<ServerName>>/logs.
Set the log levels to ERROR: 1 (SEVERE) across the board. This will reduce the
amount of information logged and will give a slight improvement on performance.
These log levels can be adjusted and enabled to higher levels of auditing at runtime, if
additional debugging information is ever required.
To set the log levels:
1. Log in to FMC.
2. Navigate till
50
52. Exhibit 38: Logging Tuning - 2
Exhibit 39: Logging Tuning - 3
4. In right hand side panel, select the dropdown named View with value With
Persistent Log Level State.
52
53. Exhibit 40: Logging Tuning - 4
5. Expand Root Logger Node and apply log level ERROR: 1 (SEVERE)
6. Click on Apply button.
5 BPEL Engine Database Schema
The SOA Suite database requires sufficient memory to be available in order to support the
enterprise class installation. To approximate the memory requirements on the machine where
the database is installed, the following demands should be taken into consideration:
•
•
•
•
•
Oracle Database overhead.
Size of System Global Area
Number of concurrent users
Any non-database software that has to run on the machine.
Growth in usage over planned lifetime of SOA Suite
BPEL Engine and deployed composites/processes are transaction intensive applications, tuning
of underlying database results in major performance boost.
5.1 Two Schemas
SOA Suite uses two database schemas.
Table 4: SOA Schemas
Component
BPEL Process
Manager
Schema
SOAINFRA
Description
Contains the design and run-time repository of BPEL
PM and BPM.
The design repository has modeling metadata and
profile data for composites. This data describe the
behavior of composites and sequence of steps
53
54. required to execute the composite.
MDS
Oracle Metadata
Services
SOA Infrastructure
MDS
SOAINFRA
Once the composite is deployed, the run-time
repository contains the metadata to execute the
composite.
Contains process definitions and configuration
reference data.
Contains metadata for composites that use MDS.
Contains metadata related to B2B, BPEL PM,
Workflow, Sensor, Mediator, and CEP.
Tables in SOAINFRA Schema do not enforce referential integrity; Components of SOA Suite
manages referential integrity via code.
Within SOAINFRA schema following are important tables used by SOAP Infrastructure and BPEL
PM:
Table 5: SOAINFRA Tables
Fusion
Component
Table
COMPOSITE_INSTANCE
COMPOSITE_INSTANCE_FAULT
Description
Stores information related to composites.
Stores stack trace for system level exceptions for
composites.
SOA Infrastructure
column error_category represents business and technical faults.
REFERENCE_INSTANCE
COMPOSITE_SENSOR_VALUE
COMPONENT_INSTANCE
REJECTED_MESSAGE
REJECTED_MSG_NATIVE_PAYLOA
D
INSTANCE_PAYLOAD
COMPOSITE_INSTANCE_ASSOC
CLUSTER_NODE
BPEL Process
Manager
CLUSTER_MASTER
CUBE_INSTANCE
Stores cluster related information on which BPEL PM is
running.
Stores cluster’s master node info.
Stores the processes instance metadata for every
instance that is being initiated, under execution and
executed successfully/faulted.
CI_INDEXES
CUBE_SCOPE
Stores the scope data of an instance. All the variables
declared in the BPEL flow and some internal objects to
help route logic throughout the flow are stored in this
54
55. table.
DOCUMENT_CI_REF
AUDIT_TRAIL
AUDIT_DETAILS
DLV_SUBSCRIPTION
WORK_ITEM
Stores cube instance references to data stored in the
XML_DOCUMENT table.
Stores the audit trail for instances which can be
viewed in FMC. As an instance is executed, each
activity writes events to the audit trail as XML.
Stores audit details that can be logged through the
API. Activities such as an assign activity log the
variables as audit details by default.
If instanceTrackingAuditTrailThreshold is set
audit trail is stored here.
Stores delivery subscriptions for an instance.
Whenever an instance expects a message from a
partner (for example, receive or onMessage activity)
a subscription is written out for that specific receive
activity.
Stores each activity’s metadata in an instance. This
table includes the metadata for the activity (current
state, label, and expiration date (used by wait
activities)).
AUDIT_COUNTER
WI_FAULT
DLV_MESSAGE
HEADERS_PROPERTIES
DOCUMENT_DLV_MSG_REF
XML_DOCUMENT
Stores incoming (invocation) and callback messages
metadata upon receipt. It also stores pending
messages.
Stores headers and properties information.
Stores references to DLV_MESSAGE documents stored
in the XML_DOCUMENT table.
Stores all large objects in the system (e.g.
DLV_MESSAGE documents). This table stores the data
as binary large objects (BLOBs). Separating the
document storage from the metadata enables the
metadata to change frequently without being
impacted by the size of the documents.
Table 6: MDS Schema tables
Fusion
Component
Table
MDS
MDS_PARTITIONS
MDS_PATHS
Description
Stores details of SOA components installed using this
repository
Stores details of components/composites deployed on
55
56. MDS_NAMESAPCES
this installation.
Stores name spaces referred by this deployment
Table 7: CUBE_INSTANCE
CUBE_INSTANCE
Column
CIKEY
CREATION_DATE
MODIFY_DATE
STATE
Description
Primary Key. Acts as Foreign Key (logically but not physically) in
lot of other tables
Date Time stamp indicating initiated date time of an instance.
Date Time stamp to indicate latest change in an instance
Current state of an instance.
0: STATE_INITIATED: An instance that has just been created.
1: STATE_OPEN_RUNNING: An instance that has been created
and has active activities executing. The instance is not in an
exception or error condition.
2: STATE_OPEN_SUSPENDED: An instance that is unavailable.
Performers of any of the activities that belong to this instance
cannot take any action until the instance has returned to the
running state.
3: STATE_OPEN_FAULTED: An instance that has an activity that
has thrown an exception. When an activity throws an
exception, the instance is flagged as being in an exception state
until the exception is bubbled up, caught and handled.
4: STATE_CLOSED_PENDING_CANCEL: An instance that has
started its cancellation procedure. Since cancelling an instance
may involve a great deal of business logic, the amount of time
the entire cancellation process may take from seconds to days.
During this time, the instance is said to be pending
cancellation; an instance may not be acted upon during this
time.
5: STATE_CLOSED_COMPLETED: An instance that has been
completed. All activities belonging to this instance have also
been completed.
6: STATE_CLOSED_FAULTED: An instance that has an activity
that has thrown an exception while the instance is being
cancelled. This state is equivalent to STATE_OPEN_FAULTED
except that when the exception is resolved, the state
transitions back to CLOSED_PENDING_CANCEL rather
than STATE_OPEN_RUNNING
7: STATE_CLOSED_CANCELLED: An instance that has been
cancelled. All activities belonging to this instance have also
been cancelled.
56
57. TITLE
STATUS
CONVERSATION_ID
PARENT_ID
ECID
8: STATE_CLOSED_ABORTED: An instance that has been aborted
due to administrative control. All activities belonging to this
instance are also moved to the aborted state.
9: STATE_CLOSED_STALE: An instance who's process has been
changed since the process was last accessed. No actions may
be performed on the instance. All activities that belong to this
instance are also moved to the stale state
10: STATE_CLOSED_ROLLED_BACK
Current instance title (as specified in composite, no engine
impact)
Current status (as specified in composite)
Identifier associated with instance, e.g. passed in via WSAddressing or user specified custom key
CMPST_ID or CIKEY of the parent instance that created this
instance, instance at the top of the tree will null value
Foreign key (logical only not physical)from
COMPOSITE_INSTANCE table COMPOSITE_INSTANCE.ECID
CMPST_ID
COMPONENTTYPE
COMPOSITE_NAME
DOMAIN_NAME
COMPONENT_NAME
COMPOSITE_REVISION
CREATE_CLUSTER_NODE_ID
Name of composite
Application name
Name of component
Version number of composite
Node ID on which this composite if executed.
CLUSTER_NODE.IP_ADDRESS
CPST_INST_CREATED_TIME
Table 8: CUBE_SCOPE
CUBE_SCOPE
Column
CIKEY
Description
It is primary key. This column ensures one to one foreign key
relationship from CUBE_INSTANCE.CIKEY
BINARY_FORMAT
MODIFY_DATE
SCOPE_BIN
Date scope last modified
Scope bytes
Table 9: COMPOSITE_INSTANCE
COMPOSITE_INSTANCE
Column
ECID
Description
Primary Key
ID
PARENT_ID
57
58. CONVERSATION_ID
COMPOSITE_DN
SOURCE_NAME
SOURCE_TYPE
SOURCE_ACTION_TYPE
SOURCE_ACTION_NAME
BATCH_ID
BATCH_INDEX
BUSINESS_STATUS
TITLE
TAGS
STATE
0: Running
1: Completed
2: Running with faults
3: Completed with faults
4: Running with recovery required
5: Completed with recovery required
6: Running with faults and recovery required
7: Completed with faults and recovery required
8: Running with suspended
9: Completed with suspended
10: Running with faults and suspended
11: Completed with faults and suspended
12: Running with recovery required and suspended
13: Completed with recovery required and suspended
14: Running with faults, recovery required, and suspended
15: Completed with faults, recovery required, and suspended
16: Running with terminated
17: Completed with terminated
18: Running with faults and terminated
19: Completed with faults and terminated
20: Running with recovery required and terminated
21: Completed with recovery required and terminated
22: Running with faults, recovery required, and terminated
23: Completed with faults, recovery required, and terminated
24: Running with suspended and terminated
25: Completed with suspended and terminated
26: Running with faulted, suspended, and terminated
27: Completed with faulted, suspended, and terminated
28: Running with recovery required, suspended, and
terminated
29: Completed with recovery required, suspended, and
terminated
30: Running with faulted, recovery required, suspended, and
terminated
58
59. 31: Completed with faulted, recovery required, suspended, and
terminated
32: Unknown
34: Open and Faulted
36: Running with recovery required and unknown state
64: Stale
LIVE_INSTANCES
STATE_COUNT
HAS_ASSOC
VERSION
Version of composite
Table 10: COMPOSITE_INSTANCE_FAULT
COMPOSITE_INSTANCE_FAULT
Column
ECID
ID
Description
COMPOSITE_INSTANCE.ECID
PARENT_ID
COMPOSITE_INSTANCE_ID
COMPOSITE_DN
UNIQUE_ID
BATCH_ID
CREATED_TIME
client
SERVICE_NAME
BINDING_TYPE
binding.ws
PROTOCOL_MESSAGE_ID
PROTOCOL_CORRELATION_ID
ERROR_CATEGORY
s d
ERROR_CODE
ERROR_MESSAGE
STACK_TRACE
RETRY_COUNT
MESSAGE_ORIGIN_REFERENCE
ADDITIONAL_PROPERTIES
Table 11: AUDIT_TRAIL
AUDIT_TRAIL
Column
CIKEY
COUNT_ID
BLOCK
Description
CUBE_INSTANCE.CIKEY
Many audit trail entries may be made for each instance;
this column is incremented for each entry per instance.
When the instance is dehydrated, the batched audit trail
59
60. BLOCK_CSIZE
BLOCK_USIZE
LOG
entries up to that point are written out. This block ties together
all rows written out at one time.
Compressed size of block in bytes
Uncompressed size of block in bytes
Block bytes
NUM_OF_EVENTS
Table 12: AUDIT_DETAILS
AUDIT_DETAILS
Column
CIKEY
DETAIL_ID
Description
CUBE_INSTANCE.CIKEY
BLOCK_CSIZE
BLOCK_USIZE
Part of composite key, means of identifying particular
detail from the audit trail
Compressed size of detail in bytes
Uncompressed size of detail in bytes
DOC_REF
BIN
Detail bytes
Table 13: DLV_MESSAGE
DLV_MESSAGE
Column
CONV_ID
CONV_TYPE
MESSAGE_GUID
Description
Conversation id (correlation id) for the message. This
value is used to correlate the message to the subscription.
internal use
Unique identifier for the message...each message
received by the engine is tagged with a message guid.
PARTNER_LINK
OPERATION_NAME
Operation name for callback port.
EVENT_NAME
RECEIVE_DATE
STATE
date message was received by engine
Current state of message
0: STATE_UNRESOLVED: State value for a
message/subscriber inserted into system but has not been
correlated with its corresponding subscriber/message.
1: STATE_RESOLVED: State value for a message/subscriber
has been correlated with its corresponding
subscriber/message but has not been processed by
the BPEL domain (callback).
2: STATE_HANDLED: State value for a message/subscriber
has been processed by the BPEL domain (callback).
3: STATE_CANCELLED: State value for a message/subscriber
has been cancelled, will not be processed by the BPEL
process.
60
61. RES_SUBSCRIBER
4: STATE_MAX_RECOVERED:
Identifier for matching subscription once found.
EXT_STRING1
EXT_STRING2
EXT_INT1
DLV_TYPE
1: Invoke Message: New Message
2: DLV Message: Callback Message
MASTER_CONV_ID
PRIORITY
COMPOSITE_NAME
DOMAIN_NAME
COMPONENT_NAME
COMPOSITE_LABEL
COMPOSITE_REVISION
COMPONENT_TYPE
CIKEY
RECOVER_COUNT
HEADER_PROPERTIES_BIN_FORMAT
ECID
CLUSTER_NODE_ID
CLUSTER_NODE_KEY
CACHE_VERSION
PROPERTIES
HEADERS_REF_ID
Table 14: DLV_SUBSCRIPTION
DLV_SUBSCRIPTION
Column
CONV_ID
CONV_TYPE
Description
Conversation id for subscription, used to help correlate
received delivery messages.
internal use
CIKEY
PARTNER_LINK
CUBE_INSTANCE.CIKEY
PROCESS_GUID
guid for process this subscription belongs to
operation name for subscription (receive, onMessage
operation name)
Null
The work item composite key that this subscription
is positioned at (key for receive, onMessage work item).
internal use
date subscription was created
Current state of subscription
0: STATE_UNRESOLVED: State value for a
message/subscriber inserted into system but has not been
61
OPERATION_NAME
EVENT_NAME
SUBSCRIBER_ID
SERVICE_NAME
SUBSCRIPTION_DATE
STATE