Sequence und Audit Spalten in Oracle 12R1. Anhand von live Beispielen wird gezeigt, wie ein Before Row Insert Trigger in 12c aussehen sollte. Es werden die typischen Aufgaben des Triggers analysiert und durch neue 12c Features ersetzt.
12c new features:
- identity columns und default values
- Kontexte verstehen und nutzen (sys_context)
- Performance Vergleich der verschiedenen Konzepte
Random stability in systemVerilog and UVM based testbenchKashyap Adodariya
All about random stability in sv and UVM based testbench including examples. Represent through example and dig. Also explain how any process get seed for randomize.
Random stability in systemVerilog and UVM based testbenchKashyap Adodariya
All about random stability in sv and UVM based testbench including examples. Represent through example and dig. Also explain how any process get seed for randomize.
Por qué usar Spock en lugar de JUnit / Mockito para tus tests Java - Codemoti...Andrés Viedma Peláez
Puede que hayas oído hablar de Spock, el framework basado en Groovy que te permite hacer tus tests Java más legibles y expresivos. Pero seguramente no hayas visto una comparación de código real de tests hechos en librerías de test típicas como son JUnit y Mockito y cómo se harían en Spock, algo que realmente te haga consciente de lo que ganas, y lo que pierdes, al hacer tus tests con Spock.
En esta charla no solo mostraremos eso, sino que repasaremos algunas recomendaciones de buenas prácticas típicas para los tests unitarios o de integración en Java, y veremos cómo se ven afectadas al usar Spock. Cómo algunas pierden importancia y hasta sentido, y otras nuevas aparecen para reemplazarlas. Cómo ahora puedes pensar más en el qué que en el cómo, cómo todo es más sencillo. Y cómo pierdes también cosas por el camino.
¿Te atreves a cambiar la forma de hacer tus tests?
Slides from a talk on getting started with testing in Perl. The presentation was given at Frozen Perl 2008. This slideshow is a preview of a course taught be Stonehenge Consulting (http://www.stonehenge.com)
// All_tasks.cpp
C++ program: gather 4 tasks programmers
task(1) shows the sizes of all variables in C++ in bytes
task(2) ordering numbers: even, odd & prime (descending-ascending)
task(3) factorial
task(4) shows the day of the week by date given.
programming C++.
using functions
In this presentation speaker considered theoretical basics of using the redux-saga library, which was created for facilitating the organization of the so-called “side effects” (for example, asynchronous operations). The event participants obtained practical tips on using saga in real-life projects.
This presentation by Igor Nesterenko (Lead Software Engineer, Consultant, GlobalLogic, Kharkiv) was delivered at GlobalLogic Kharkiv JS TechTalk #2 on August 17, 2018.
Pablo Magaz | ECMAScript 2018 y más allá | Codemotion Madrid 2018Codemotion
ECMAScript 2018 o simplemente ES2018, es la última revisión de nuestro lenguaje favorito y ha llegado con interesantes novedades que, sin lugar a dudas, cambiarán la forma en la que trabajaremos con el lenguaje en los próximos años. A lo largo de la charla repasaremos, no solo las novedades incluidas en la especificación ES2018 si no que echaremos un vistazo a las propuestas de la próxima especificación ES2019. Una mirada al futuro de JavaScript.
Find out more presentations at https://madrid2018.codemotionworld.com/speakers/
These slides have been presented in a lecture about promises at the Front Clouders meetup on on May 28th 2019.
Author: Mateusz Bryła (https://www.linkedin.com/in/mateusz-bryła-78aa1572/)
Dreamer, programmer, consultant, trainer. Founder at Lingmates, Team Lead at Codete.
Не так давно Гор Нишанов представил свой доклад: C++ Coroutines a negative overhead abstraction. В этом докладе Гор упомянул, что предложенный дизайн корутин позволяет их использовать практически в любых окружениях, в том числе и с "бедным" C++ рантаймом.
Я решил попробовать запустить корутины в следующих окружениях: обычное приложение, драйвер ОС Windows, EFI приложение. Только в одном из этих окружений есть полноценный C++ рантайм и поддержка исключений, в остальных ничего этого нет. Более того, EFI приложение вообще выполняется до старта ОС.
Я хочу рассказать о том, как мне удалось запустить корутины в этих окружениях, поговорим о том, какие проблемы существуют в асинхронном системном программировании и как их можно обойти.
Por qué usar Spock en lugar de JUnit / Mockito para tus tests Java - Codemoti...Andrés Viedma Peláez
Puede que hayas oído hablar de Spock, el framework basado en Groovy que te permite hacer tus tests Java más legibles y expresivos. Pero seguramente no hayas visto una comparación de código real de tests hechos en librerías de test típicas como son JUnit y Mockito y cómo se harían en Spock, algo que realmente te haga consciente de lo que ganas, y lo que pierdes, al hacer tus tests con Spock.
En esta charla no solo mostraremos eso, sino que repasaremos algunas recomendaciones de buenas prácticas típicas para los tests unitarios o de integración en Java, y veremos cómo se ven afectadas al usar Spock. Cómo algunas pierden importancia y hasta sentido, y otras nuevas aparecen para reemplazarlas. Cómo ahora puedes pensar más en el qué que en el cómo, cómo todo es más sencillo. Y cómo pierdes también cosas por el camino.
¿Te atreves a cambiar la forma de hacer tus tests?
Slides from a talk on getting started with testing in Perl. The presentation was given at Frozen Perl 2008. This slideshow is a preview of a course taught be Stonehenge Consulting (http://www.stonehenge.com)
// All_tasks.cpp
C++ program: gather 4 tasks programmers
task(1) shows the sizes of all variables in C++ in bytes
task(2) ordering numbers: even, odd & prime (descending-ascending)
task(3) factorial
task(4) shows the day of the week by date given.
programming C++.
using functions
In this presentation speaker considered theoretical basics of using the redux-saga library, which was created for facilitating the organization of the so-called “side effects” (for example, asynchronous operations). The event participants obtained practical tips on using saga in real-life projects.
This presentation by Igor Nesterenko (Lead Software Engineer, Consultant, GlobalLogic, Kharkiv) was delivered at GlobalLogic Kharkiv JS TechTalk #2 on August 17, 2018.
Pablo Magaz | ECMAScript 2018 y más allá | Codemotion Madrid 2018Codemotion
ECMAScript 2018 o simplemente ES2018, es la última revisión de nuestro lenguaje favorito y ha llegado con interesantes novedades que, sin lugar a dudas, cambiarán la forma en la que trabajaremos con el lenguaje en los próximos años. A lo largo de la charla repasaremos, no solo las novedades incluidas en la especificación ES2018 si no que echaremos un vistazo a las propuestas de la próxima especificación ES2019. Una mirada al futuro de JavaScript.
Find out more presentations at https://madrid2018.codemotionworld.com/speakers/
These slides have been presented in a lecture about promises at the Front Clouders meetup on on May 28th 2019.
Author: Mateusz Bryła (https://www.linkedin.com/in/mateusz-bryła-78aa1572/)
Dreamer, programmer, consultant, trainer. Founder at Lingmates, Team Lead at Codete.
Не так давно Гор Нишанов представил свой доклад: C++ Coroutines a negative overhead abstraction. В этом докладе Гор упомянул, что предложенный дизайн корутин позволяет их использовать практически в любых окружениях, в том числе и с "бедным" C++ рантаймом.
Я решил попробовать запустить корутины в следующих окружениях: обычное приложение, драйвер ОС Windows, EFI приложение. Только в одном из этих окружений есть полноценный C++ рантайм и поддержка исключений, в остальных ничего этого нет. Более того, EFI приложение вообще выполняется до старта ОС.
Я хочу рассказать о том, как мне удалось запустить корутины в этих окружениях, поговорим о том, какие проблемы существуют в асинхронном системном программировании и как их можно обойти.
Календарне планування з рос. мови для 5 кл. ІІ семестр (перший рік вивчення м...Adriana Himinets
Календарне планування складене відповідно до програми: Курач Л.І., Корсаков В.О., Фідкевич О.Л., Кошкіна Ж.О., Ґудзик І.П.
Підручник: Корсаков В.А. Русский язык: Учебник для 5 кл. общеобразоват. учеб. заведений с обучением на украинском языке (первый год обучения)
(параграфи у календарному плануванню подані за цим підручником)
Формат: doc., брошура
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)Predix
http://predixtransform.com
See how Machine Learning algorithms and video analytics, powered by Predix, has been used to detect defects in railways tracks. View demos build using Python and OpenCV, and an actual field video showing different cases of anomaly detection.
Гобсек (фр. Gobseck) — повість Оноре де Бальзака, надрукована уперше у 1830. Пізніше увійшла до циклу «Людська комедія» як частина «Сцен приватного життя». Основною темою твору є влада грошей, а основним персонажем, навколо якого побудована фабула — лихвар Гобсек.
Data Lake, Virtual Database, or Data Hub - How to Choose?DATAVERSITY
Data integration is just plain hard and there is no magic bullet. That said, three new data integration techniques do ameliorate the misery, making silo-busting possible, if not trivial. The three approaches – data lakes, virtual databases (aka federated databases), and data hubs – are a boon to organizations big enough to have separate systems, separate lines of business, and redundant acquired or COTS data stores. Each approach has its place, but how do you make the right decision about which data silo integration approach to choose and when?
This webinar describes how you can use the key concepts of data Movement, Harmonization, and Indexing to determine what you are giving up or investing in, and make the best decision for your project.
A Practical Guide to Selecting a Stream Processing Technology confluent
Presented by Michael Noll, Product Manager, Confluent.
Why are there so many stream processing frameworks that each define their own terminology? Are the components of each comparable? Why do you need to know about spouts or DStreams just to process a simple sequence of records? Depending on your application’s requirements, you may not need a full framework at all.
Processing and understanding your data to create business value is the ultimate goal of a stream data platform. In this talk we will survey the stream processing landscape, the dimensions along which to evaluate stream processing technologies, and how they integrate with Apache Kafka. Particularly, we will learn how Kafka Streams, the built-in stream processing engine of Apache Kafka, compares to other stream processing systems that require a separate processing infrastructure.
Oracle 11g new features for developersScott Wesley
Abstract: There are a wealth of new features available in the 11g database release. This presentation touches on SQL & PL/SQL features I found of interest, and concentrates particularly on virtual columns.
Relevant scripts found at my blog
http://grassroots-oracle.com/2009/07/presentations.html#11gNewFeatures
Another year goes by, and most likely, another data access framework has been invented. It will claim to be the fastest, smartest way to talk to the database, and just like all those that came before it, it will not be. Because the best database access tool has been there for more than 30 years now, and that is PL/SQL. Although we all sometimes fall prey to the mindset of “Oh look, a shiny new tool, we should start using it," the performance and simplicity of PL/SQL remain unmatched. This session looks at the failings of other data access languages, why even a cursory knowledge of PL/SQL will make you a better developer, and how to get the most out of PL/SQL when it comes to database performance.
Too many of us have been taught that views are nothing more than stored SQL statements. The goal of this presentation is to challenge this notion. Or, to be precise, to take you one step further, from technicalities to the huge role that well-designed views can play in contemporary database solutions.
Current views are very advanced. They can be built on top of user-defined functions; they can utilize extremely complex INSTEAD-OF triggers (including composite ones), and they can even have indexes! As a result, with all of this added functionality views can serve as an isolation level between UI-driven data representation (heavily denormalized and customized) and DBA-driven data representation (normalized with referential integrity constraints and foreign keys).
Contemporary IT solutions often take this transformation completely out of the database, usually moving it to the middle-tier. This presentation will show that keeping business logic IN the database provides you with much greater flexibility, manageability, and performance. Of course, there are some traps and pitfalls, but these are also avoidable. Real-world examples will be provided to show that the role of views is seriously underestimated.
While compute becomes faster and cheaper we are tempted to abandon sanity and shield ourselves from reality and laws of physics. The resulting mess of monstrous Slack instances rampaging across our RAM should makes us stop (because our computers did it already) and wonder where did we go wrong? Rising developer salaries and time to market pace are tempting us to abandon all hope for optimising our code and understanding our systems.
Contrary to what casual reader could think this is a deeply technical presentation. We will gaze into hardware counters, NUMA nodes, vector registers and that darkness will stare back at us.
All this to get a taste of what is possible on current hardware, to learn the COST of scalability and forever change how you feel when accessing invoice list in your local utilities provider UI so that after 20s of waiting all 12 elements will be displayed (surely Cthulhu must be eating their compute because it is NOT possible Tauron hosts it’s billing services on FIRST GEN IPHONE).
How I Built a Power Debugger Out of the Standard Library and Things I Found o...doughellmann
Smiley demonstrates how to use Python's native tracing capabilities to monitor not just what parts of your program run, but the data flowing through the program as it runs. All of the data is recorded for study after the program exits, which means you can pass different inputs and then compare the results of the runs. In this presentation, I describe the evolution of Smiley, from concept through internal API changes as I worked on the implementation. I also talk about tracing Python programs in general, and explain how the trace code in Smiley can be used to send trace data to different output destinations.
1
Database Security
Lab 2 – Virtual Private Databases
2019
Part I: Implementing VPD by Views
This lab shows an example of implementing access control through views and triggers. Notice:
In this lab and the following ones, only the SYS user is the SYSDBA, the DBSEC user is a
normal user.
What to submit: Your answers to the questions in steps 5(a), 6, and 7.
1. Create DBSEC account. (using Database Control Tool)
(a) For the sake of simplicity, set its password as dbsec.
(b) Assign the following systems privileges to DBSEC.
CREATE ANY CONTEXT
CREATE PROCEDURE
CREATE SESSION
CREATE SEQUENCE
CREATE TABLE
CREATE TRIGGER
CREATE USER
CREATE VIEW
GRANT ANY OBJECT PRIVILEGE
GRANT ANY PRIVILEGE
GRANT ANY ROLE
(c) Assign Quotas to DBEC. Click Quotas Select Unlimited for USERS.
2. Create a user SCOTT. For the sake of simplicity, set its password as dbsec. Assign the
following system privileges to SCOTT:
CREATE SESSION
3. Logon as DBSEC and execute the following commands
drop table employee;
create table employee (
empID number(3) primary key,
Fname varchar2(25),
Lname varchar2(25),
Email varchar2(50),
Tel char(11),
Hdate Date,
JobID varchar2(10),
Salary number(6),
ManagerID number(3),
DeptID number(3),
ctl_upd_user varchar2(25));
2
drop view employee_view1;
create view employee_view1 as
select empID, Fname, Lname, Email, Tel, Hdate, JobID, Salary, managerID,
deptID, ctl_upd_user user_name
from employee
where ctl_upd_user = user;
grant select, insert, delete, update on employee_view1 to scott;
insert into employee_view1 values (100,'Sam','Doe', 'sdoe', '501-1112222',
sysdate, 'job1','60000', 199, 1, user);
commit;
4. Logon as SYS, and execute the following commands:
create or replace trigger TRG_EMPLOYEE_VIEW1_BF_INS
instead of insert on dbsec.EMPLOYEE_VIEW1
for each row
begin
insert into dbsec.EMPLOYEE values
(:new.empID, :new.Fname, :new.Lname, :new.Email, :new.Tel, :new.Hdate, :new.J
obID, :new.Salary, :new.ManagerID, :new.deptID, user);
end;
5. Logon as SCOTT and execute the following commands:
insert into dbsec.employee_view1 values (101,'Julia','Rice', 'sdoe', '501-
1013333', sysdate, 'job_julia','50000', 299, 1, user);
commit;
select *
from dbsec.employee_view1;
(a) Did the above query output the only rows that Scott is allowed to see?
6. Read the code of create or replace trigger TRG_EMPLOYEE_VIEW1_BF_INS. (in step 4)
(a) It differs from the create trigger syntax that we discussed in PL/SQL review. Google the
internet for the key words “instead of” and “trigger”, and explain what is instead of
trigger mainly used for.
(b) Explain what does Oracle do when Scott performs
insert into dbsec.employee_view1 values (101,'Julia','Rice', 'sdoe', '501-
1013333', sysdate, 'job_julia','50000', 299, 1, user);
commit;
3
(c) Create a trigge ...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.