This document provides information about Venkatesan Prabu Jayakantham (Venkat), the Managing Director of KAASHIVINFOTECH, a software company in Chennai. It outlines Venkat's experience in Microsoft technologies and certifications. It also describes KAASHIVINFOTECH's inplant training programs for students in fields like engineering, electronics, and mechanical. The training focuses on developing technical skills through hands-on demos and projects.
What is advanced SQL Injection? InfographicJW CyberNerd
SQL injection is a technique used to take advantage of un-sanitized input vulnerabilities to pass SQL commands through a web application for execution by a backend database. It is a basic attack used to either gain unauthorized access to a database or retrieve information directly from the database.
Learn how SQL injection works, and explore advanced SQL injection attacks: https://iclass.eccouncil.org/product/web-application-hacking-security/
Microsoft Information Protection Implementation using C# and PowerShellAditya Sharma
In this article we will see how to set azure classification label to an excel/word/pdf file at the time of its creation during runtime programmatically. This solution is targeted for developers, architects, COE working on automating business processes that involves MS Office documents, PDFs
Presentation to expose web hacking techniques attack and defense. Look into OWASP Top 10 and perform some demos in real world and in a managed vulnerable web commerce.
XSS, SQLi, LFI and upload webshell were some cool demos :)
What is advanced SQL Injection? InfographicJW CyberNerd
SQL injection is a technique used to take advantage of un-sanitized input vulnerabilities to pass SQL commands through a web application for execution by a backend database. It is a basic attack used to either gain unauthorized access to a database or retrieve information directly from the database.
Learn how SQL injection works, and explore advanced SQL injection attacks: https://iclass.eccouncil.org/product/web-application-hacking-security/
Microsoft Information Protection Implementation using C# and PowerShellAditya Sharma
In this article we will see how to set azure classification label to an excel/word/pdf file at the time of its creation during runtime programmatically. This solution is targeted for developers, architects, COE working on automating business processes that involves MS Office documents, PDFs
Presentation to expose web hacking techniques attack and defense. Look into OWASP Top 10 and perform some demos in real world and in a managed vulnerable web commerce.
XSS, SQLi, LFI and upload webshell were some cool demos :)
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
1. KAASHIV INFOTECH
The Asia, India, Tamil Nadu Book Of Record
Holders
SQL SERVER –Booklet 8
- Gives you the interview tips in SQL Server
SQL SERVER Interview Questions-2014
2. KAASHIV INFOTECH
Welcomes you to the Expert Voice Corner
Mr.J.Venkatesan Prabu
Venkatesan Prabu Jayakantham (venkat) has more than 8 years experience in the
Microsoft Technologies such as VB.Net, ASP.Net, C#.net, SSIS, SSAS, ADO.Net, etc.,
He is the Managing Director of KAASHIVINFOTECH
(http://www.kaashivinfotech.com/),a software company in Chennai. Before that, he
worked in HCL Technologies (India and Australia) for six years as Project Lead. As a
service motive, Venkat contributed more than 700 articles which is read by the
developers in 170 countries (400 developers per day)
(http://venkattechnicalblog.blogspot.com/). Aligned with KaaShiv InfoTech’s mission,he
met more than 20,000 young minds and spreaded Microsoft Technologies / Career
guidance programs. Venkat won many awards in his career, which includes Prestigious
Microsoft MVP (Most Valuable Professional) award for the years
2008,2009,2010,2011,2012,2013 and won many awards. List of other awards in his
career,
3. Microsoft certified Smart .Net Candidate in 2004
Most valuable member for dotnetspider site in 2007
HCL SQL Subject Matter expert (SME - SQL Server) for the year (2008,2009)
HCL Special contribution award winner on Dotnet skills for year(2008) HCL SQL
Knowledge Champion for the year 2009
Mind Cracker MVP on SQLServer –2010 for the year 2010,2011
INETA champion - Gold Member – 2010 for the year 2010 HCL Service
Contribution Award for the year 2010
Leading Lights "Rising Star" award from Common Wealth Bank, Australia for the
year 2010
TECHNICAL CERTIFICATION
Cisco certified Network Associate (CCNA) – 2004
Microsoft Certified Application Developer (MCAD) – 2005
4. ACKNOWLEDGEMENT
I would like to thank my family members for their support and encouragement.
Without their support it would be impossible for me to publish this e-book. I would
also like to thank my KaaShiv InfoTech team for their support to publish this e-
book.
DISCLAIMER
All rights reserved. No part of this book may be copied, adapted, abridged or
stored in any retrieval system, computer system, photographic or other system or
transmitted in any form or by any means without the prior written permission of
the copyright holders. Any breach will entail legal action and permission without
further notice.
5. 1. What is the difference between UNION and UNION ALL?
UNION The UNION command is used to select related information from two
tables, much like the JOIN command. However, when using the UNION
command all selected columns need to be of the same data type. With UNION,
only distinct values are selected.
UNION ALL The UNION ALL command is equal to the UNION command,
except that UNION ALL selects all values.
The difference between Union and Union all is that Union all will not eliminate
duplicate rows, instead it just pulls all rows from all tables fitting your query
specifics and combines them into a table.
2. What is B-Tree?
The database server uses a B-tree structure to organize index information. B-
Tree generally has following types of index pages or nodes:
root node: A root node contains node pointers to branch nodes which can be
only one.
branch node: A branch node contains pointers to leaf nodes or other branch
nodes which can be two or more.
6. leaf nodes: A leaf node contains index items and horizontal pointers to other
leaf nodes which can be many.
3. What is the difference between lock, block and deadlock?
Lock: DB engine locks the rows/page/table to access the data which is worked
upon according to the query.
Block: When one process blocks the resources of another process then blocking
happens.
Blocking can be identified by using
SELECT * FROM sys.dm_exec_requests where blocked <> 0
SELECT * FROM master..sysprocesses where blocked <> 0
Deadlock: When something happens as follows: Error 1205 is reported by SQL
Server for deadlock.
4.What is the meaning of lock escalation and why/how to stop this?
When the DB engine would try to lock page first and then it escalates locks to
page and then table. If we understand that whole table would be locked for the
processing thenn this is better to use TABLOCK hint and get complete table
blocked. This is a nice way to avoid the wastage of sql server DB engine
processing for lock escalation. Somewhere you may also need to use
TABLOCKX when you want an exclusive lock on the table in the query.
7. 5. How to truncate the log in sql server 2008?
BACKUP LOG TestDB WITH TRUNCATE_ONLY is gone. SQL server doesn’t
allow you to truncate the log now otherwise whole purpose of a DB is defeated.
6. What changes in the front end code is needed if mirroring is
implemented for the high availability?
You need to add only FAILOVER PARTNER information in your front end code.
“Data Source=ServerA;Failover Partner=ServerB;Initial
Catalog=AdventureWorks;Integrated Security=True;”.
7. Where does the copy job runs in the logshipping… Primary or
secondary?
Secondary server. This question is basically asked to find out whether you have
a handson work on logshipping or not. I came through many cases when
candidates have mentioned logshipping experience in many projects and they
can’t answer this question. I never selected any candidate if he/she don’t
answer these kind of small questions.
8. 8. What are the ways to find what code is running for any spid?
Well there are many ways to do this.
1. find the spid which you want to analyze. An spid is assigned as soon as a
client connection is established with the SQL server. To find the spid you can
run any of the following command:
a) SP_WHO2 ‘ACTIVE’ — This will give you only active spids.
b) SELECT * FROM sys.dm_exec_requests
2. Get the spid from above two queries and use any of the following query to get
what is happening behind that spid.
a) dbcc inputbuffer(<spid>)
b) sql2005 and sql2008 – SELECT * FROM sys.dm_exec_sql_text(<sqlhandle of
that spid>)
c) sql2005 and sql2008 – SELECT * FROM fn_get_sql(<sqlhandle of that spid>)
9. 9. When you get following error? Error 3154: The backup set holds
a backup of a database other than the existing database.
The error comes when you are trying to restore the DB which already exists.
Use WITH REPLACE option to restore the DB with a different name.
10. Does DBCC CHECKDB requires DB to be in SINGLE_USER
mode?
Yes and No. This is tricky question. If you are using repair option with
CHECKDB then you have to have the DB in single user mode. Following is the
method to have your DB in a single user mode.
Use master
go
sp_dboption dbname, single, true
Following is the error which you get when you run the DBCC CHECKDB with
repair option wo having the DB in single user mode.
10. 11. How to view the error log for any specific instance?
There are many ways but I prefer following method. Take a scenario when you
want to find the error log when the DB was put in a single user mode.
CREATE TABLE #Errorlog (Logdate Datetime, Processinfo VARCHAR(20),Text
VARCHAR(2000))
INSERT INTO #Errorlog
EXEC xp_readerrorlog
SELECT * FROM #Errorlog
WHERE Text Like ‘%SINGLE%USER%’
12. What does the NOLOCK query hint do?
Table hints allow you to override the default behavior of the query optimizer for
statements. They are specified in the FROM clause of the statement. While
overriding the query optimizer is not always suggested, it can be useful when
many users or processes are touching data.
11. The NOLOCK query hint is a good example because it allows you to read data
regardless of who else is working with the data; that is, it allows a dirty read of
data -- you read data no matter if other users are manipulating it. A hint like
NOLOCK increases concurrency with large data stores.
SELECT * FROM table_name (NOLOCK)
13. What are the new features in SQL Server 2005 when compared
to SQL Server 2000?
There are quite a lot of changes and enhancements in SQL Server 2005. Few of
them are listed here :
Database Partitioning
Dynamic Management Views
System Catalog Views
Resource Database
Database Snapshots
SQL Server Integration Services
Support for Analysis Services on a a Failover Cluster.
Profiler being able to trace the MDX queries of the Analysis Server.
12. Peer-toPeer Replication
Database Mirroring
14. What are the High-Availability solutions in SQL Server
and differentiate them briefly.
Failover Clustering, Database Mirroring, Log Shipping and Replication are the
High-Availability features available in SQL Server.
15. How do you troubleshoot errors in a SQL Server Agent Job?
Inside SSMS, in Object explorer under SQL Server Agent look for Job Activity
Monitor. The job activity monitor displays the current status of all the jobs on the
instance. Choose the particular job which failed, right click and choose
view history from the drop down menu. The execution history of the job is
displayed and you may choose the execution time (if the job failed multiple times
during the same day). There would information such as the time it took to
execute that Job and details about the error occurred.
13. KaaShiv InfoTech Offers Best Inpant Training in Chennai.
The training at KAASHIV INFOTECH focus on developing the
technical oriented concepts that turn graduates into employable assets. Handled only by
professionals from MNC companies, we know how to equip you with strong technologies
fundamentals.
INPLANT TRAINING SCHEDULE FOR CSE/IT/MCA STUDENTS
Day Programme
Day 1 BigData (Practical Demos)
Day 2
Windows 8 App Development (Practical
Demos)
Day 3
Ethical Hacking (Facebook
Hack,Server/Website Hacking(20
Attacks)
Day 4
Cloud Computing (Live Server
Demo,Live Pjt Implementation)
Day 5
CCNA (-Networking-Router
Configurations Practical Demo)
14. INPLANT TRAINING SCHEDULE FOR
ELECTRONIC/ELECTRICAL/EIE STUDENTS:
Day Programme
Day 1 Embedded System (Embedded Program Designing ,Chip Burning)
Day 2
Wireless System (Device Designing,Controlling Fans with Wireless
Sensors)
Day 3 CCNA (-Networking-Router Configurations Practical Demo)
Day 4 Ethical Hacking (Facebook Hack,Server/Website Hacking(20 Attacks)
Day 5 Matlab (Capture Image,Processing, Animate Images-Practical Demos)
15. MECHANICAL/CIVIL INPLANT TRAINING SCHEDULE:
Day Programme
Day 1 Aircraft Designing
Day 2
Vehicle Movement in
Airports
Day 3 3D Packaging Designs
Day 4 3D Modeling
Day 5 3D Window Shading
16. Tags: inplanttraining in chennai,Best inplanttraining Program in Chennai
Anna Nagar,Best and Effective inplanttraining Program in Chennai at Anna
Nagar ,inplanttraining Program for Engineering Students , inplanttraining Program for Arts
and Science Students , inplanttraining Program for BE Students , inplanttraining Program
for Information Technology Students ,inplanttraining Program in Chennai , Best and
Effective inplanttraining Program in Chennai,Best and good inplanttraining Program in
Chennai,inplanttraining Program for Computer Science Students, inplanttraining Program
for Electronics and Communication Students,inplanttraining Program for Electrical and
Electronics Students , inplanttraining Program for Engineering Studentsin anna nagar ,
inplanttraining Program for Arts and Science Students in anna nagar,Effective
inplanttraining Program,Effective and Free inplanttraining Program,best inplanttraining in
chennai near rountana,best inplanttraining for engineering students in chennai,best
inplanttraining in anna nagar,inplanttraining for arts and science students in tamil nadu,best
inplanttraining for arts and science students in anna nagar near rountana,best
inplanttraining for ug graduates,best inplanttraining for pg graduates,best inplanttraining for
b.e/b.tech students,best inplanttraining for ug graduates in chennai,best inplanttraining for
ug graduates in anna nagar,best inplanttraining for ug graduates in tamil nadu,best
inplanttraining for pg graduates in chennai,
17. best inplanttraining for pg graduates in anna nagar,best inplanttraining for pg graduates in
tamil nadu,inplanttraining for cse students,inplanttraining for it students,inplanttraining for ece
students,inplanttraining for eee students,inplanttraining on android in chennai,inplanttraining
on java in chennai,inplanttraining on embedded systems in chennai,inplanttraining on matlab
in chennai,inplanttraining on .net in chennai,inplanttraining on android in anna
nagar,inplanttraining on java in anna nagar,inplanttraining on embedded systems in anna
nagar,inplanttraining on matlab in anna nagar,inplanttraining on .net in anna nagar,best
summer inplanttraining for arts and science ug graduates in chennai,best summer
inplanttraining for arts and science pg graduates in chennai,best summer inplanttraining for
engineering ug graduates in chennai,best summer inplanttraining for engineering pg
graduates in chennai,best summer inplanttraining for arts and science ug graduates in anna
nagar,best summer inplanttraining for arts and science pg graduates in anna nagar,best
summer inplanttraining for engineering ug graduates in anna nagar,best summer
inplanttraining for engineering pg graduates in anna nagar,best inplanttraining for mba
graduates in chennai,best inplanttraining fo mca graduates in chennai,best inplanttraining for
mba graduates in anna nagar,best inplanttraining for mca graduates in anna nagar,best
summer inplanttraining for mba graduates in chennai,best summer inplanttraining for mca
graduates in chennai,best summer inplanttraining for mba graduates in anna nagar, best
summer inplanttraining for mba graduates near rountana,best summer inplanttraining for mca
graduates near rountana
18. Address:
KAASHIV INFO TECH
Shivanantha Building,
X41, 5th Floor,2nd Avenue,
(Near Ayyappan Temple)
Anna Nagar, Chennai = 600040.
Send Us Your Request Email To arun@kaashivinfotech.com,
kaashiv.info@gmail.com,
venkat@kaashivinfotech.com
Contact Number : 9840678906 ;; 9003718877 ;; 9962345637 ;
Visit our other websites:
http://inplanttrainingchennai.com/ - Inplant Training Portal
http://inplanttrainingchennai.com/ - Internship Portal
jobsanddumps.com – Job Portal
https://plus.google.com/u/0/108546120202591604585
https://plus.google.com/u/0/b/110228862465265998202/dashboard/overvie
https://plus.google.com/u/0/b/117408505876070870512/dashboard/overvie