The document provides an overview and instructions for developing applications with MySQL Connector/Python. It introduces the connector's main classes and objects for connecting to MySQL and executing queries. It also covers downloading, installing, and basic usage of the connector, including fetching and manipulating data, handling transactions, and some tips to improve performance. Finally, it discusses how the connector is used by various MySQL and Python projects and frameworks.
Development of Fault-Tolerant Failover Tools with MySQL Utilities - MySQL Con...Paulo Jesus
The occurrence of failures and crashes can compromise the high availability of your database system, affecting your revenue and reputation. Therefore, it is fundamental to minimize downtime and have an efficient strategy for crash recovery. Replication and failover are commonly applied to deal with those situations, but what if failures occur during the recovery process? This can really be a headache, so it is better to be prepared. This session discusses the development of fault-tolerant failover solutions using the MySQL utilities library and covers the following topics:
• Issues during failover/switchover
• Fault-tolerant failover solutions
• Using the MySQL utilities library to provide your own solution
Install and upgrade Oracle grid infrastructure 12.1.0.2Biju Thomas
1) The document describes upgrading an Oracle Grid Infrastructure installation from 12.1.0.1 to 12.1.0.2. There were issues with the rootupgrade script, but moving the ASM SPFILE location resolved it.
2) Key steps included running the Grid Infrastructure 12.1.0.2 installation, applying the PSU patch 19791375, and verifying the services started up successfully from the new Oracle home.
3) Applying the latest OPatch version 12.1.0.1.5 prior to installing the PSU is also documented.
This document provides an introduction to MySQL InnoDB Cluster, which is MySQL's solution for high availability and scaling. It discusses how Group Replication, the heart of MySQL InnoDB Cluster, allows data to be written simultaneously across cluster nodes while maintaining consistency through techniques like conflict detection and resolution. The document also explains how Group Replication provides automatic recovery from failures and makes high availability easy for users to setup and manage.
The document is a presentation in French on the new features of MySQL 8.0. It discusses improvements to SQL functionality with Common Table Expressions, Window Functions, and LATERAL queries. It also covers new JSON functions and indexing, improved performance, and new management features in areas like replication, security, and error logging. The presentation provides examples and emphasizes that MySQL now supports both transactional SQL and NoSQL operations on JSON data, combining the benefits of both approaches.
FOSDEM MySQL & Friends Devroom, February 2018 MySQL Point-in-Time Recovery l...Frederic Descamps
The document describes how to perform point-in-time recovery (PITR) with MySQL to restore data to a past state. It requires binary logs to be enabled and backups kept along with binlogs. The procedure involves restoring the last backup, finding the binlog position, and replaying binlog events from that position up to the desired point in time. An example demonstrates restoring data after an accidental update, identifying the binlog position to recover to using SHOW BINLOG EVENTS.
MySQL Document Store - when SQL & NoSQL live together... in peace!Frederic Descamps
Frédéric Descamps gave a demonstration of MySQL Document Store, showing how it allows both SQL and NoSQL functionality. He migrated sample data from MongoDB to MySQL Document Store and performed queries and CRUD operations. The conclusion is that MySQL Document Store provides the best of both worlds by combining schemaless and flexible data with ACID compliance, SQL capabilities, and data integrity.
Open Source 101 2022 - MySQL Indexes and HistogramsFrederic Descamps
Nobody complains that the database is too fast. But when things slow down, the complaints come quickly. The two most popular approaches to speeding up queries are indexes and histograms. But there are so many options and types on indexes that it can get confusing. Histograms are fairly new to MySQL but they do not work for all types of data. This talk covers how indexes and histograms work and show you how to test just how effective they are so you can measure the performance of your queries.
Development of Fault-Tolerant Failover Tools with MySQL Utilities - MySQL Con...Paulo Jesus
The occurrence of failures and crashes can compromise the high availability of your database system, affecting your revenue and reputation. Therefore, it is fundamental to minimize downtime and have an efficient strategy for crash recovery. Replication and failover are commonly applied to deal with those situations, but what if failures occur during the recovery process? This can really be a headache, so it is better to be prepared. This session discusses the development of fault-tolerant failover solutions using the MySQL utilities library and covers the following topics:
• Issues during failover/switchover
• Fault-tolerant failover solutions
• Using the MySQL utilities library to provide your own solution
Install and upgrade Oracle grid infrastructure 12.1.0.2Biju Thomas
1) The document describes upgrading an Oracle Grid Infrastructure installation from 12.1.0.1 to 12.1.0.2. There were issues with the rootupgrade script, but moving the ASM SPFILE location resolved it.
2) Key steps included running the Grid Infrastructure 12.1.0.2 installation, applying the PSU patch 19791375, and verifying the services started up successfully from the new Oracle home.
3) Applying the latest OPatch version 12.1.0.1.5 prior to installing the PSU is also documented.
This document provides an introduction to MySQL InnoDB Cluster, which is MySQL's solution for high availability and scaling. It discusses how Group Replication, the heart of MySQL InnoDB Cluster, allows data to be written simultaneously across cluster nodes while maintaining consistency through techniques like conflict detection and resolution. The document also explains how Group Replication provides automatic recovery from failures and makes high availability easy for users to setup and manage.
The document is a presentation in French on the new features of MySQL 8.0. It discusses improvements to SQL functionality with Common Table Expressions, Window Functions, and LATERAL queries. It also covers new JSON functions and indexing, improved performance, and new management features in areas like replication, security, and error logging. The presentation provides examples and emphasizes that MySQL now supports both transactional SQL and NoSQL operations on JSON data, combining the benefits of both approaches.
FOSDEM MySQL & Friends Devroom, February 2018 MySQL Point-in-Time Recovery l...Frederic Descamps
The document describes how to perform point-in-time recovery (PITR) with MySQL to restore data to a past state. It requires binary logs to be enabled and backups kept along with binlogs. The procedure involves restoring the last backup, finding the binlog position, and replaying binlog events from that position up to the desired point in time. An example demonstrates restoring data after an accidental update, identifying the binlog position to recover to using SHOW BINLOG EVENTS.
MySQL Document Store - when SQL & NoSQL live together... in peace!Frederic Descamps
Frédéric Descamps gave a demonstration of MySQL Document Store, showing how it allows both SQL and NoSQL functionality. He migrated sample data from MongoDB to MySQL Document Store and performed queries and CRUD operations. The conclusion is that MySQL Document Store provides the best of both worlds by combining schemaless and flexible data with ACID compliance, SQL capabilities, and data integrity.
Open Source 101 2022 - MySQL Indexes and HistogramsFrederic Descamps
Nobody complains that the database is too fast. But when things slow down, the complaints come quickly. The two most popular approaches to speeding up queries are indexes and histograms. But there are so many options and types on indexes that it can get confusing. Histograms are fairly new to MySQL but they do not work for all types of data. This talk covers how indexes and histograms work and show you how to test just how effective they are so you can measure the performance of your queries.
Inexpensive Datamasking for MySQL with ProxySQL - data anonymization for deve...Frederic Descamps
The document discusses using ProxySQL as a solution for anonymizing data in MySQL databases. It describes how ProxySQL can mask specific columns by replacing values with partial values and characters like X. Rules are created in ProxySQL to match SQL statements and regular expressions are used to modify the statements by replacing column values with the masked values. Examples of SQL statements and the masking applied are also provided.
GoldenGate is a replication utility that provides flexible data propagation between databases. It consists of extract, replicat, and data pump processes that access trail files containing change data. An extract process mines source database redo logs and writes changes to trail files. A replicat process reads from trail files and applies changes to target database tables. The demo will show two scenarios for replicating data from a Windows source database to a Linux target database using different GoldenGate configuration methods.
MySQL Tech Café #8: MySQL 8.0 for Python DevelopersFrederic Descamps
Usually it seems Python developers don't always think about MySQL as their first choice.... However when test test it with the right connector and MySQL 8.0 they love it !
Join this talk to learn how Python with mysql-connector-python can take advantages of MySQL 8.0.
This means using Standard MySQL Protocol but much nicer the X Protocol. During this session you will see how you can use MySQL Document Store and MySQL as RDBMS on the same session to benefits from both worlds.
This document summarizes Frédéric Descamps' journey to add a user to the router_rest_accounts table to authenticate with the MySQL Router REST API. After several failed attempts using generated or external passwords, he learns directly from the MySQL Router development team that the REST API supports using the default MySQL 8.0 authentication string or the modular_crypt_format for password hashes, allowing simple password insertion.
The document provides an overview of MySQL 8.0 and its features. It discusses how MySQL is the most popular open source and developer database. MySQL 8.0 includes new SQL features like common table expressions, window functions, and JSON support. It also improved performance through a new iterator executor and hash joins. MySQL now provides high availability solutions like InnoDB Cluster and ReplicaSet for easy deployment of fault-tolerant distributed MySQL databases.
The document discusses MySQL Shell and how it can help database administrators (DBAs) with common tasks like deploying architectures, preparing upgrades, dumping and loading data, and managing users. MySQL Shell provides tools like the Admin API for configuring MySQL clusters and replicasets, an upgrade checker utility to validate upgrades to MySQL 8.0, and parallel dump and load functionality to backup, migrate, and reset data.
This document provides an overview of Debian package management. It discusses the key tools used to install, remove, and manage packages including dpkg, apt-get, and aptitude. Specific functions of these tools are described such as installing packages and resolving dependencies with dpkg, retrieving package information with apt-cache, and listing installed files with dpkg -L. The document also covers force options, package status, and how to find which package installed a specific file.
This document provides an overview of Debian package management. It discusses the key tools used to install, remove, and manage packages including dpkg, apt-get, and aptitude. Specific functions of these tools are described such as installing packages and resolving dependencies with dpkg, obtaining package information with apt-cache, and listing installed files with dpkg -L. The document also covers force options, package status, and how to find which package installed a specific file.
The document discusses Debian package management tools. It describes how to use dpkg to install, remove, and get information about packages. Key points covered include using dpkg to install and remove packages and their dependencies, force package installation or removal, get package information and list files installed by a package. The document also discusses using dpkg to view package status, list installed packages, and find which package installed a specific file.
Trivadis is a market leader in IT consulting, system integration, solution engineering, and IT services focusing on technologies in Switzerland, Germany, Austria and Denmark. It offers services in strategic business fields including Trivadis Services which takes over the interactive operation of IT systems. Trivadis has over 600 employees across 14 branches in Europe.
RMAN was used to clone an Oracle 10g RAC database from a source database SOURCEC3 to a target database TARGETC3 using the DUPLICATE DATABASE feature. The procedure involved preparing the source and target databases, identifying necessary archive log backups, restoring the database to a single-instance target, and then converting it to a RAC database by adding redo logs and enabling cluster functionality. Post-clone tasks verified the successful conversion to a RAC database and started required processes.
This document provides instructions for replicating data from an Oracle multitenant container database (CDB) to another CDB using Oracle GoldenGate. It outlines prerequisites, tasks to prepare the databases and environment, and steps for initial load and ongoing replication of data changes in near real-time. Key steps include creating GoldenGate users, adding supplemental logging, configuring Extract and Replicat processes, and monitoring replication status. The goal is to familiarize the reader with setting up a basic Oracle to Oracle replication setup using GoldenGate in a multitenant environment.
RAC-Installing your First Cluster and DatabaseNikhil Kumar
RAC - Installing your First RAC
Abstract : Oracle Real Application Clusters have been one of the hottest technologies in the market since 2001 prior this is know OPS in 8i. Oracle has brought revolution in the field of database by enhancing RAC technologies in it each version. This presentation will give introduction of RAC and features introduced in each version of RAC. This presentation contains the demo of building Oracle clusterware from the scratch. Also we will discuss the new components and its features during installation. This presentation and demo will be done on version 11GR2. Which will be used as a base for our next presentation Viz. Upgradation of RAC 11GR2 to 12C RAC.
This presentation will give brief insight information of RAC infrastructure setup. Sometimes DBA doesn’t fully aware of prerequisite and verification steps that needs to perform before installing clusterware, So this session will cover thing to consider before installing clusterware and best practices followed during the whole process.
Agenda
Introduction of RAC
Installation of Clusterware.
Creating diskgroup / Adding disk to Diskgroup using ASMCA.
Creation of ACFS Volume.
Installation of RAC Database using DBCA.
The document discusses optimization of Real Application Clusters (RAC) in Oracle 12c. It provides background on the author and outlines common root causes of RAC performance issues such as CPU/memory starvation, network issues, and excessive dynamic remastering. The document then presents golden rules for RAC diagnostics including avoiding focusing only on top wait events, eliminating infrastructure issues, identifying problem instances, examining both send and receive side metrics, and using histograms. Specific techniques are described for analyzing wait events like gc buffer busy.
Setup oracle golden gate 11g replicationKanwar Batra
How to setup Oracle Goldengate Replication between 11gR2 RAC or Single node instances. For RAC setup the GoldenGate custom cluster service . Not part of this document
The document describes messages related to problems accessing and modifying the cluster registry (OCR) and cluster database configuration. Common causes include the OCR being inaccessible or invalid configuration entries. Actions include verifying the OCR configuration and permissions, and ensuring the clusterware resources are configured correctly.
Trivadis is a market leader in IT consulting, system integration and IT services focusing on technologies in Switzerland, Germany and Austria. It offers services in IT consulting, system integration, application management and infrastructure outsourcing. Trivadis has over 600 specialists across 11 branches in Europe. The document discusses an upcoming presentation on Oracle globalization support, character sets, Unicode, and database migration tools.
The document describes Performance Schema and ps_helper. Performance Schema is a feature in MySQL that collects runtime performance data and ps_helper is a tool that makes Performance Schema data easier to understand. It provides views, functions and stored procedures to summarize Performance Schema data for common use cases like analyzing user activity and statements.
Inexpensive Datamasking for MySQL with ProxySQL - data anonymization for deve...Frederic Descamps
The document discusses using ProxySQL as a solution for anonymizing data in MySQL databases. It describes how ProxySQL can mask specific columns by replacing values with partial values and characters like X. Rules are created in ProxySQL to match SQL statements and regular expressions are used to modify the statements by replacing column values with the masked values. Examples of SQL statements and the masking applied are also provided.
GoldenGate is a replication utility that provides flexible data propagation between databases. It consists of extract, replicat, and data pump processes that access trail files containing change data. An extract process mines source database redo logs and writes changes to trail files. A replicat process reads from trail files and applies changes to target database tables. The demo will show two scenarios for replicating data from a Windows source database to a Linux target database using different GoldenGate configuration methods.
MySQL Tech Café #8: MySQL 8.0 for Python DevelopersFrederic Descamps
Usually it seems Python developers don't always think about MySQL as their first choice.... However when test test it with the right connector and MySQL 8.0 they love it !
Join this talk to learn how Python with mysql-connector-python can take advantages of MySQL 8.0.
This means using Standard MySQL Protocol but much nicer the X Protocol. During this session you will see how you can use MySQL Document Store and MySQL as RDBMS on the same session to benefits from both worlds.
This document summarizes Frédéric Descamps' journey to add a user to the router_rest_accounts table to authenticate with the MySQL Router REST API. After several failed attempts using generated or external passwords, he learns directly from the MySQL Router development team that the REST API supports using the default MySQL 8.0 authentication string or the modular_crypt_format for password hashes, allowing simple password insertion.
The document provides an overview of MySQL 8.0 and its features. It discusses how MySQL is the most popular open source and developer database. MySQL 8.0 includes new SQL features like common table expressions, window functions, and JSON support. It also improved performance through a new iterator executor and hash joins. MySQL now provides high availability solutions like InnoDB Cluster and ReplicaSet for easy deployment of fault-tolerant distributed MySQL databases.
The document discusses MySQL Shell and how it can help database administrators (DBAs) with common tasks like deploying architectures, preparing upgrades, dumping and loading data, and managing users. MySQL Shell provides tools like the Admin API for configuring MySQL clusters and replicasets, an upgrade checker utility to validate upgrades to MySQL 8.0, and parallel dump and load functionality to backup, migrate, and reset data.
This document provides an overview of Debian package management. It discusses the key tools used to install, remove, and manage packages including dpkg, apt-get, and aptitude. Specific functions of these tools are described such as installing packages and resolving dependencies with dpkg, retrieving package information with apt-cache, and listing installed files with dpkg -L. The document also covers force options, package status, and how to find which package installed a specific file.
This document provides an overview of Debian package management. It discusses the key tools used to install, remove, and manage packages including dpkg, apt-get, and aptitude. Specific functions of these tools are described such as installing packages and resolving dependencies with dpkg, obtaining package information with apt-cache, and listing installed files with dpkg -L. The document also covers force options, package status, and how to find which package installed a specific file.
The document discusses Debian package management tools. It describes how to use dpkg to install, remove, and get information about packages. Key points covered include using dpkg to install and remove packages and their dependencies, force package installation or removal, get package information and list files installed by a package. The document also discusses using dpkg to view package status, list installed packages, and find which package installed a specific file.
Trivadis is a market leader in IT consulting, system integration, solution engineering, and IT services focusing on technologies in Switzerland, Germany, Austria and Denmark. It offers services in strategic business fields including Trivadis Services which takes over the interactive operation of IT systems. Trivadis has over 600 employees across 14 branches in Europe.
RMAN was used to clone an Oracle 10g RAC database from a source database SOURCEC3 to a target database TARGETC3 using the DUPLICATE DATABASE feature. The procedure involved preparing the source and target databases, identifying necessary archive log backups, restoring the database to a single-instance target, and then converting it to a RAC database by adding redo logs and enabling cluster functionality. Post-clone tasks verified the successful conversion to a RAC database and started required processes.
This document provides instructions for replicating data from an Oracle multitenant container database (CDB) to another CDB using Oracle GoldenGate. It outlines prerequisites, tasks to prepare the databases and environment, and steps for initial load and ongoing replication of data changes in near real-time. Key steps include creating GoldenGate users, adding supplemental logging, configuring Extract and Replicat processes, and monitoring replication status. The goal is to familiarize the reader with setting up a basic Oracle to Oracle replication setup using GoldenGate in a multitenant environment.
RAC-Installing your First Cluster and DatabaseNikhil Kumar
RAC - Installing your First RAC
Abstract : Oracle Real Application Clusters have been one of the hottest technologies in the market since 2001 prior this is know OPS in 8i. Oracle has brought revolution in the field of database by enhancing RAC technologies in it each version. This presentation will give introduction of RAC and features introduced in each version of RAC. This presentation contains the demo of building Oracle clusterware from the scratch. Also we will discuss the new components and its features during installation. This presentation and demo will be done on version 11GR2. Which will be used as a base for our next presentation Viz. Upgradation of RAC 11GR2 to 12C RAC.
This presentation will give brief insight information of RAC infrastructure setup. Sometimes DBA doesn’t fully aware of prerequisite and verification steps that needs to perform before installing clusterware, So this session will cover thing to consider before installing clusterware and best practices followed during the whole process.
Agenda
Introduction of RAC
Installation of Clusterware.
Creating diskgroup / Adding disk to Diskgroup using ASMCA.
Creation of ACFS Volume.
Installation of RAC Database using DBCA.
The document discusses optimization of Real Application Clusters (RAC) in Oracle 12c. It provides background on the author and outlines common root causes of RAC performance issues such as CPU/memory starvation, network issues, and excessive dynamic remastering. The document then presents golden rules for RAC diagnostics including avoiding focusing only on top wait events, eliminating infrastructure issues, identifying problem instances, examining both send and receive side metrics, and using histograms. Specific techniques are described for analyzing wait events like gc buffer busy.
Setup oracle golden gate 11g replicationKanwar Batra
How to setup Oracle Goldengate Replication between 11gR2 RAC or Single node instances. For RAC setup the GoldenGate custom cluster service . Not part of this document
The document describes messages related to problems accessing and modifying the cluster registry (OCR) and cluster database configuration. Common causes include the OCR being inaccessible or invalid configuration entries. Actions include verifying the OCR configuration and permissions, and ensuring the clusterware resources are configured correctly.
Trivadis is a market leader in IT consulting, system integration and IT services focusing on technologies in Switzerland, Germany and Austria. It offers services in IT consulting, system integration, application management and infrastructure outsourcing. Trivadis has over 600 specialists across 11 branches in Europe. The document discusses an upcoming presentation on Oracle globalization support, character sets, Unicode, and database migration tools.
The document describes Performance Schema and ps_helper. Performance Schema is a feature in MySQL that collects runtime performance data and ps_helper is a tool that makes Performance Schema data easier to understand. It provides views, functions and stored procedures to summarize Performance Schema data for common use cases like analyzing user activity and statements.
Enterprise manager 13c -let's connect to the Oracle CloudTrivadis
Martin Berger gives a presentation on connecting Oracle Enterprise Manager 13c to the Oracle Cloud. The presentation covers the Oracle Cloud stack, configuring a database as a service and backup, installing a Hybrid Cloud Agent, and using Enterprise Manager to manage targets in the cloud. Trivadis offers consulting services to optimize infrastructure using Oracle Cloud services for disaster recovery and high availability.
The document provides an overview of mysql-js, a MySQL connector for Node.js. It discusses mysql-js' architecture and APIs for connecting to MySQL/MySQL Cluster from Node.js applications, performing CRUD operations on data using sessions and batches, and executing queries. Code samples are provided for common operations like find, persist, update, remove and transactions. Instructions for getting mysql-js from GitHub and running a Twitter-like demo application are also included.
The document provides an overview of developing Python applications with MySQL Connector/Python:
- It introduces MySQL Connector/Python and its features like dual licensing, supported MySQL server versions, and choice of three APIs including the traditional PEP249 API and new X DevAPI.
- It demonstrates how to install MySQL Connector/Python using pip or MySQL Installer and covers other installation methods. Basic usage examples are provided for the traditional and X DevAPIs.
- Tips are given like using prepared statements to protect against SQL injection, checking for warnings, and recommendations for character sets and user privileges. The new MySQL X DevAPI for SQL and NoSQL is also overviewed.
MySQL Proxy. A powerful, flexible MySQL toolbox.Miguel Araújo
MySQL-Proxy is a software application that, as the name suggests, sits between your client and MySQL server(s) allowing you to monitor, analyse or transform that communication. It communicates over the network using the MySQL network protocol and as so, in its the most basic configuration, Proxy simply interposes itself between the server and clients, passing queries from the client to the server and its responses on the other way around. This opens the possibility of changing the communication packets when needed, allowing thus being used for multiple purposes being the most remarkable query analysis, query filtering and modification, load balancing, failover, query injection and pooling.
On this session I'll present and give you a global overview of MySQL-Proxy and the concepts behind it. Use-cases, technical overview and architecture will follow. And of course, everyone will want to see it working so that'll be included as well in parallel with detailed explanation on how you can use it to fulfill your needs.
Microservices refers to a software design architecture where applications are made of independently deployable services. The document discusses setting up a microservices architecture using Java, Jetty, Jersey, databases, caching, and Swagger. It provides code examples for configuring Jetty and Jersey to create a REST API, using databases through DbUtils, implementing caching with Caffeine, and generating Swagger documentation with annotations.
The document provides an overview of using Python to connect to and query a MySQL database configured for high availability. It discusses MySQL replication, group replication, and connectors that enable multi-host connections. It also demonstrates connecting to MySQL from Python, executing queries, handling errors, and implementing a simple web application using Flask that connects to MySQL to call a stored procedure.
This presentation discusses MySQL administration and monitoring. It covers basic command line tools for MySQL, internal schemas like mysql and information_schema, backup and recovery options like mysqldump and replication. GUI tools like MySQL Workbench are presented for administration. MySQL Enterprise Monitor is discussed for distributed monitoring of MySQL environments.
Java API for WebSocket 1.0: Java EE 7 and GlassFishArun Gupta
This document discusses building WebSocket applications in Java using JSR 356. It begins with an introduction to WebSockets and their advantages over traditional HTTP for interactive web applications. It then covers the JSR 356 specification for a Java API for WebSocket, including annotated and programmatic endpoints. The document provides examples of basic "hello world" clients and servers. It also discusses more advanced topics like custom payloads, URI template matching, security, and relationships with dependencies and Servlet APIs.
The State of the Dolphin, MySQL Keynote at Percona Live Europe 2019, Amsterda...Geir Høydalsvik
This document provides an overview of the state of MySQL 8.0 including new features like hash joins, EXPLAIN ANALYZE, CLONE, and InnoDB Cluster. It discusses how CLONE enables fast instance provisioning and how InnoDB Cluster automates this process. The document demonstrates using MySQL Shell to configure, create, and manage an InnoDB Cluster deployment.
The document provides an overview of MySQL including:
- MySQL is an open-source relational database management system that runs as a server providing multi-user access to databases.
- MySQL 5.6 introduced improvements to performance, scalability, InnoDB, optimization, replication, and added new capabilities like NoSQL access to InnoDB and a MySQL Hadoop applier.
- MySQL Enterprise Edition offers additional high availability, security, scalability, and monitoring features over the community version through components like the MySQL Thread Pool which improves scalability as user connections grow.
Instrumenting plugins for Performance SchemaMark Leith
This document discusses how to instrument plugins for the MySQL Performance Schema to provide visibility into plugin operations and avoid "black holes" in performance data. It covers the main interfaces for instrumenting threads, file/memory/network operations. An example audit plugin is provided that instruments mutexes, files, stages. The Performance Schema output shows the staged, waited events for a query.
Oracle OpenWorld 2013 - HOL9737 MySQL Replication Best PracticesSven Sandberg
This document provides an overview and best practices for MySQL replication. It begins with the basics of replication including the binary log, replication components and architecture. It then covers crash-safe slaves using replication metadata in system tables, online data verification with replication event checksums, tuning row-based replication, improving slave scalability with multi-threaded slaves, and automated failover using global transaction IDs. Hands-on examples are also provided to demonstrate setting up replication between a master and slave server.
The document discusses developing a storage plug-in for CloudStack that integrates with the SolidFire storage system. It provides details on the key components needed - a provider, life cycle, and driver class. The provider implements interfaces to return metadata. The life cycle handles storage system creation and management. The driver focuses on volume creation and deletion by adding/removing database records. Code snippets demonstrate implementing these interfaces to build the plug-in.
This document contains a presentation on MySQL Workbench. It discusses MySQL Workbench 6.3, its advanced features like the SQL IDE, modeling, administration capabilities. It also discusses how Workbench can be used to do more through Python scripting, SSH tunneling and Fabric. Finally, it outlines some new features in MySQL 5.7 RC like support for JSON, GIS and other enhancements.
The document outlines new features in Oracle Solaris 11.1, including enhancements to installation, system configuration, virtualization, security, networking, data management, and the kernel/platform. Over 300 performance and feature enhancements are included. Specific improvements mentioned are parallel zone updates for faster maintenance, zones on shared storage for easy mobility, per-zone file system statistics for monitoring individual zones, and network features like edge virtual bridging and data center bridging.
This document provides an overview and agenda for a presentation on Python and the MySQL Document Store. The presentation introduces JSON and how MySQL works with JSON documents, the MySQL Document Store and X DevAPI, and provides code examples for interacting with document collections using Connector/Python, including creating a collection, adding, finding, modifying, and removing documents.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .