An introduction to Figaro, the XML Database for the .NET Framework, and a solution overview of an ASP.NET MembershipProvider built with the XML database.
Cache is King: Get the Most Bang for Your Buck From RubyMolly Struve
Sometimes your fastest queries can cause the most problems. I will take you beyond the slow query optimization and instead zero in on the performance impacts surrounding the quantity of your datastore hits. Using real world examples dealing with datastores such as Elasticsearch, MySQL, and Redis, I will demonstrate how many fast queries can wreak just as much havoc as a few big slow ones. With each example I will make use of the simple tools available in Ruby to decrease and eliminate the need for these fast and seemingly innocuous datastore hits.
This document provides information about an individual named Jarek Ratajski. It lists that he works for CSS Versicherung as a developer and wizard. It provides his email and Twitter handle. It then lists the various programming languages and technologies he has experience with. The rest of the document appears to be about architecture and challenges in scaling applications. It discusses using non-blocking architectures to process many events using few threads. It provides an overview of Lagom, a framework from Lightbend for building reactive microservices applications. It discusses entity components in Lagom like commands, events and state. It also covers reading from Cassandra and implementing read models.
The document discusses session tracking in web applications. A session allows servers to track interactions with clients over time. Traditionally, sessions were tracked using hidden form fields, URL rewriting, or persistent cookies. The Java servlet API provides an easier session tracking mechanism using HttpSession objects. The API handles associating session data on the server with clients using cookies or URL parameters. Servlets access session data by calling getSession on the HttpRequest to retrieve an HttpSession object, then calling setAttribute and getAttribute to store and retrieve objects in the session. This allows servlets to maintain shopping carts and other stateful data across multiple requests.
Java. Explicit and Implicit Wait. Testing Ajax ApplicationsМарія Русин
This document provides information on explicit and implicit waits in Selenium. It discusses the differences between explicit and implicit waits, provides code examples for each, and covers related topics like WebDriverWait and ExpectedConditions. Key points include:
- Explicit waits are code defined waits for a certain condition, like using Thread.sleep(). Implicit waits set a default wait time for finding elements.
- WebDriverWait can be used with ExpectedConditions to wait for elements to meet a certain condition like being clickable.
- Implicit waits set a default timeout for finding elements across all searches during the WebDriver session.
- There are convenience methods like elementToBeClickable to avoid writing custom ExpectedCondition classes.
- Screenshots can be
JS Fest 2019. Thomas Watson. Post-Mortem Debugging in Node.jsJSFestUA
Post-Mortem debugging is a really powerful technique that allows you, through the use of several tools, to take a memory dump when an issue occurs in your application and later analyze it offline.
The talk will primarily focus on llnode and how you can use this tool to better understand why a Node.js process is behaving odd or is crashing.
Security and performance designs for client-server communicationsWO Community
This document provides an overview of security and performance designs for client-server communications. It discusses using WebObjects without an extra web server, login authentication options like MD5 and RSA encryption, setting native process security, and designing Java WO to native server protocols. It also covers streaming content to web clients, server-based preview generation, and XML communication between iOS apps and WebObjects.
C* Summit 2013: The World's Next Top Data Model by Patrick McFadinDataStax Academy
The document provides an overview and examples of data modeling techniques for Cassandra. It discusses four use cases - shopping cart data, user activity tracking, log collection/aggregation, and user form versioning. For each use case, it describes the business needs, issues with a relational database approach, and provides the Cassandra data model solution with examples in CQL. The models showcase techniques like de-normalizing data, partitioning, clustering, counters, maps and setting TTL for expiration. The presentation aims to help attendees properly model their data for Cassandra use cases.
This document provides an overview and examples of modeling data in Apache Cassandra. It begins with an introduction to thinking about data models and queries before modeling, and emphasizes that Cassandra requires modeling around queries due to its limitations on joins and indexes. The document then provides examples of modeling user, video, and other entity data for a video sharing application to support common queries. It also discusses techniques for handling queries that could become hotspots, such as bucketing or adding random values. The examples illustrate best practices for data duplication, materialized views, and time series data storage in Cassandra.
Cache is King: Get the Most Bang for Your Buck From RubyMolly Struve
Sometimes your fastest queries can cause the most problems. I will take you beyond the slow query optimization and instead zero in on the performance impacts surrounding the quantity of your datastore hits. Using real world examples dealing with datastores such as Elasticsearch, MySQL, and Redis, I will demonstrate how many fast queries can wreak just as much havoc as a few big slow ones. With each example I will make use of the simple tools available in Ruby to decrease and eliminate the need for these fast and seemingly innocuous datastore hits.
This document provides information about an individual named Jarek Ratajski. It lists that he works for CSS Versicherung as a developer and wizard. It provides his email and Twitter handle. It then lists the various programming languages and technologies he has experience with. The rest of the document appears to be about architecture and challenges in scaling applications. It discusses using non-blocking architectures to process many events using few threads. It provides an overview of Lagom, a framework from Lightbend for building reactive microservices applications. It discusses entity components in Lagom like commands, events and state. It also covers reading from Cassandra and implementing read models.
The document discusses session tracking in web applications. A session allows servers to track interactions with clients over time. Traditionally, sessions were tracked using hidden form fields, URL rewriting, or persistent cookies. The Java servlet API provides an easier session tracking mechanism using HttpSession objects. The API handles associating session data on the server with clients using cookies or URL parameters. Servlets access session data by calling getSession on the HttpRequest to retrieve an HttpSession object, then calling setAttribute and getAttribute to store and retrieve objects in the session. This allows servlets to maintain shopping carts and other stateful data across multiple requests.
Java. Explicit and Implicit Wait. Testing Ajax ApplicationsМарія Русин
This document provides information on explicit and implicit waits in Selenium. It discusses the differences between explicit and implicit waits, provides code examples for each, and covers related topics like WebDriverWait and ExpectedConditions. Key points include:
- Explicit waits are code defined waits for a certain condition, like using Thread.sleep(). Implicit waits set a default wait time for finding elements.
- WebDriverWait can be used with ExpectedConditions to wait for elements to meet a certain condition like being clickable.
- Implicit waits set a default timeout for finding elements across all searches during the WebDriver session.
- There are convenience methods like elementToBeClickable to avoid writing custom ExpectedCondition classes.
- Screenshots can be
JS Fest 2019. Thomas Watson. Post-Mortem Debugging in Node.jsJSFestUA
Post-Mortem debugging is a really powerful technique that allows you, through the use of several tools, to take a memory dump when an issue occurs in your application and later analyze it offline.
The talk will primarily focus on llnode and how you can use this tool to better understand why a Node.js process is behaving odd or is crashing.
Security and performance designs for client-server communicationsWO Community
This document provides an overview of security and performance designs for client-server communications. It discusses using WebObjects without an extra web server, login authentication options like MD5 and RSA encryption, setting native process security, and designing Java WO to native server protocols. It also covers streaming content to web clients, server-based preview generation, and XML communication between iOS apps and WebObjects.
C* Summit 2013: The World's Next Top Data Model by Patrick McFadinDataStax Academy
The document provides an overview and examples of data modeling techniques for Cassandra. It discusses four use cases - shopping cart data, user activity tracking, log collection/aggregation, and user form versioning. For each use case, it describes the business needs, issues with a relational database approach, and provides the Cassandra data model solution with examples in CQL. The models showcase techniques like de-normalizing data, partitioning, clustering, counters, maps and setting TTL for expiration. The presentation aims to help attendees properly model their data for Cassandra use cases.
This document provides an overview and examples of modeling data in Apache Cassandra. It begins with an introduction to thinking about data models and queries before modeling, and emphasizes that Cassandra requires modeling around queries due to its limitations on joins and indexes. The document then provides examples of modeling user, video, and other entity data for a video sharing application to support common queries. It also discusses techniques for handling queries that could become hotspots, such as bucketing or adding random values. The examples illustrate best practices for data duplication, materialized views, and time series data storage in Cassandra.
- Cookies allow servers to identify repeat visitors and customize websites by storing small amounts of data on a user's device. They help enable e-commerce sessions and avoid requiring usernames and passwords. However, they also raise privacy concerns if sensitive personal information is stored in cookies or they are shared across sites.
- Cookies are created and sent by servers using the addCookie method and stored by browsers. On subsequent requests, browsers return cookies to servers which can then be retrieved using the getCookies method. Cookies have attributes like names, values, expiration times and paths.
The document summarizes the speaker's experiences with using Core Data and MagicalRecord for building a concurrent iOS application. Some key points include:
1. Core Data objects are not thread-safe and cannot be shared across threads, which can cause concurrency issues.
2. MagicalRecord hides some of the complexity of Core Data but its defaults are not optimal for multithreaded apps and can cause subtle concurrency bugs.
3. Nested managed object contexts introduced in iOS 5 provide a better solution by keeping contexts and their objects confined to individual dispatch queues, avoiding the need for manual thread synchronization.
This is a two part talk in which we'll go over the architecture that enables Apache Cassandra’s linear scalability as well as how DataStax Drivers are able to take full advantage of it to provide developers with nicely designed and speedy clients extendable to the core.
The document discusses dependency injection (DI) and how Dagger can be used to implement DI. It begins with an example Android application that manages a lock dashboard. The code to create dependencies is complex and error-prone. Dagger addresses this by generating code to manage object creation and injection. It works by analyzing how objects relate via a directed acyclic graph (DAG) of their dependencies. Modules provide object instances to the graph, and components inject them where needed. This allows clean, testable separation of concerns and simplifies object creation.
Open Source Ajax Solution @OSDC.tw 2009Robbie Cheng
This document provides an overview of various open source Ajax solutions including jQuery + DWR, GWT, and ZK. jQuery is a JavaScript library that simplifies DOM manipulation and AJAX requests. DWR allows making remote procedure calls from JavaScript to Java. GWT compiles Java code to JavaScript and supports component-based development. ZK is a server-centric framework that uses XML markup and allows building rich web applications in pure Java without writing JavaScript.
This document provides information about handling cookies in Java web applications. It discusses sending cookies to clients, receiving incoming cookies, differentiating between session and persistent cookies, specifying cookie attributes, and simplifying cookie usage with utility classes. Example code is provided to demonstrate common cookie-related tasks like detecting first-time visitors, modifying cookie values, and remembering user preferences using cookies.
Introduction to Data Modeling with Apache CassandraDataStax Academy
This document provides an introduction to data modeling with Apache Cassandra. It discusses how Cassandra data models are designed based on the queries an application will perform, unlike relational databases which are designed based on normalization rules. Key aspects covered include avoiding joins by denormalizing data, using a partition key to group related data on nodes, and controlling the clustering order of columns. The document provides examples of modeling time series and tag data in Cassandra.
The document discusses defenses against SQL injection and cross-site scripting (XSS) attacks. It provides examples of query parameterization in different programming languages to prevent SQL injection and discusses contextual output encoding to prevent XSS attacks. It explains how to securely store passwords by using techniques like salting, hashing, and multiple iterations to make password cracking more difficult.
Hear about how Coursera uses Cassandra as the core of its scalable online education platform. I'll discuss the strengths of Cassandra that we leverage, as well as some limitations that you might run into as well in practice.
In the second part of this talk, we'll dive into how best to effectively use the Datastax Java drivers. We'll dig into how the driver is architected, and use this understanding to develop best practices to follow. I'll also share a couple of interesting bug we've run into at Coursera.
The document discusses the top 5 things that hinder scalability: 1) monolithic design, 2) misidentification of shared resources, 3) overreliance on shared scopes, 4) stupid developer tricks like lazy pagination and query loops, and 5) failure to design for cacheability. It provides examples of each anti-pattern and potential solutions like partitioning databases, using SQL joins instead of queries in loops, encapsulating data access, and implementing caching at various layers from HTTP responses to databases.
1) The document provides an overview of 5 key things developers should know about SQL Azure, including how to set up a connection string, issues of throttling and errors, tools for migration and management, and performance tuning tips.
2) Throttling occurs when a session acquires too many locks or resources and causes errors like 40501, and developers need retry logic to handle errors and disconnects.
3) Tools for SQL Azure include the SQL Azure Database Manager, SSMS 2008 R2, and the migration wizard.
4) Performance can be improved by addressing indexing, minimizing round trips, using connection pooling, and caching/batching data access.
http://highperformancecoredata.com/
Learn how to analyze, debug, and squeeze every last bit of performance out of Core Data. The standard Core Data implementation is very powerful and flexible but lacks performance. In this advanced session we will cover various performance analysis tools, model optimization, and various high performance concurrency models. This is an advanced discussion that assumes you have used Core Data before.
DataStax Enterprise (DSE) already offers a plethora of solid capabilities to make your distributed database dreams become more real than The NeverEnding Story. But are you aware of all of the crazy, quality of life updates and new features added in DataStax Enterprise 6? These include: significantly improved performance; anti-entropy improvements with DSE NodeSync; quality updates for DSE Search, Graph, Analytics, OpsCenter, Advanced Security, and Studio; metrics collection; and Kafka and Docker integrations. We’ll take a look at all of it, plus give you a sneak peek at some of the foundational changes coming in DataStax Enterprise 6.8 that will rock your world.
This document discusses cookies in PHP. It explains that persistent cookies are stored as files on the user's computer and remain even after the browser is closed. It provides the syntax for setting cookies using setcookie() and setrawcookie(), and explains that setrawcookie() does not encode the cookie value. It also discusses how to set persistent cookies by setting an expiration date, and how to delete cookies by setting the expiration date to the past. Finally, it presents an assignment to create a login panel that uses cookies to keep the user logged in even after closing the browser.
This document provides an overview of roles in MySQL 8.0, including:
- Roles were introduced in MySQL 8.0 to simplify user administration and centralize privilege handling. Roles are created and granted like users but do not require login credentials.
- The key aspects of using roles are: creating roles, granting privileges to roles, creating users, granting roles to users, and setting the default role for users.
- Roles simplify administration but also introduce some complexity, such as roles being stored as users without logins and the need to set a default role for a user's privileges to take effect. The document provides examples and best practices for working with roles.
This document provides steps to configure replication between an Oracle database and a MySQL database using Oracle GoldenGate. It outlines installing GoldenGate on the source Oracle and target MySQL databases, setting up the necessary directories, creating and loading sample tables on the Oracle source, and starting the GoldenGate Manager process on both databases. The replication process will then capture changes on the Oracle source and replicate them to the MySQL target in real-time.
This document provides instructions for using the SmartDataCenter (SDC) command line interface (CLI) and Ruby client to manage virtual machines. It describes how to install the CLI, generate SSH keys, provision a new machine, check its state, stop and delete machines. It also shows how to connect to SDC and find machines using the Ruby client, and configure the return type of variables.
Figaro Coffee is a Filipino chain of coffee shops/restaurants that aims to provide a European cafe experience. It offers specialty coffees and teas from around the world in a stylish setting. The name "Figaro" was chosen to fit the Italian/European theme and comes from the famous opera "The Barber of Seville". Figaro cafes have friendly staff, comfortable atmospheres suitable for couples or friends, and serve high quality coffee and presentable food.
The Figaro Coffee Company was established in 1993 by seven friends in the Philippines to share European coffee culture. It now has 64 cafes and offers franchising opportunities. Franchise packages range from full stores to kiosks to carts, requiring investments from ₱2-6.5 million. Franchisees receive training, support opening their store, and ongoing assistance through manuals, site visits and programs in exchange for royalties and marketing fees based on sales.
- Cookies allow servers to identify repeat visitors and customize websites by storing small amounts of data on a user's device. They help enable e-commerce sessions and avoid requiring usernames and passwords. However, they also raise privacy concerns if sensitive personal information is stored in cookies or they are shared across sites.
- Cookies are created and sent by servers using the addCookie method and stored by browsers. On subsequent requests, browsers return cookies to servers which can then be retrieved using the getCookies method. Cookies have attributes like names, values, expiration times and paths.
The document summarizes the speaker's experiences with using Core Data and MagicalRecord for building a concurrent iOS application. Some key points include:
1. Core Data objects are not thread-safe and cannot be shared across threads, which can cause concurrency issues.
2. MagicalRecord hides some of the complexity of Core Data but its defaults are not optimal for multithreaded apps and can cause subtle concurrency bugs.
3. Nested managed object contexts introduced in iOS 5 provide a better solution by keeping contexts and their objects confined to individual dispatch queues, avoiding the need for manual thread synchronization.
This is a two part talk in which we'll go over the architecture that enables Apache Cassandra’s linear scalability as well as how DataStax Drivers are able to take full advantage of it to provide developers with nicely designed and speedy clients extendable to the core.
The document discusses dependency injection (DI) and how Dagger can be used to implement DI. It begins with an example Android application that manages a lock dashboard. The code to create dependencies is complex and error-prone. Dagger addresses this by generating code to manage object creation and injection. It works by analyzing how objects relate via a directed acyclic graph (DAG) of their dependencies. Modules provide object instances to the graph, and components inject them where needed. This allows clean, testable separation of concerns and simplifies object creation.
Open Source Ajax Solution @OSDC.tw 2009Robbie Cheng
This document provides an overview of various open source Ajax solutions including jQuery + DWR, GWT, and ZK. jQuery is a JavaScript library that simplifies DOM manipulation and AJAX requests. DWR allows making remote procedure calls from JavaScript to Java. GWT compiles Java code to JavaScript and supports component-based development. ZK is a server-centric framework that uses XML markup and allows building rich web applications in pure Java without writing JavaScript.
This document provides information about handling cookies in Java web applications. It discusses sending cookies to clients, receiving incoming cookies, differentiating between session and persistent cookies, specifying cookie attributes, and simplifying cookie usage with utility classes. Example code is provided to demonstrate common cookie-related tasks like detecting first-time visitors, modifying cookie values, and remembering user preferences using cookies.
Introduction to Data Modeling with Apache CassandraDataStax Academy
This document provides an introduction to data modeling with Apache Cassandra. It discusses how Cassandra data models are designed based on the queries an application will perform, unlike relational databases which are designed based on normalization rules. Key aspects covered include avoiding joins by denormalizing data, using a partition key to group related data on nodes, and controlling the clustering order of columns. The document provides examples of modeling time series and tag data in Cassandra.
The document discusses defenses against SQL injection and cross-site scripting (XSS) attacks. It provides examples of query parameterization in different programming languages to prevent SQL injection and discusses contextual output encoding to prevent XSS attacks. It explains how to securely store passwords by using techniques like salting, hashing, and multiple iterations to make password cracking more difficult.
Hear about how Coursera uses Cassandra as the core of its scalable online education platform. I'll discuss the strengths of Cassandra that we leverage, as well as some limitations that you might run into as well in practice.
In the second part of this talk, we'll dive into how best to effectively use the Datastax Java drivers. We'll dig into how the driver is architected, and use this understanding to develop best practices to follow. I'll also share a couple of interesting bug we've run into at Coursera.
The document discusses the top 5 things that hinder scalability: 1) monolithic design, 2) misidentification of shared resources, 3) overreliance on shared scopes, 4) stupid developer tricks like lazy pagination and query loops, and 5) failure to design for cacheability. It provides examples of each anti-pattern and potential solutions like partitioning databases, using SQL joins instead of queries in loops, encapsulating data access, and implementing caching at various layers from HTTP responses to databases.
1) The document provides an overview of 5 key things developers should know about SQL Azure, including how to set up a connection string, issues of throttling and errors, tools for migration and management, and performance tuning tips.
2) Throttling occurs when a session acquires too many locks or resources and causes errors like 40501, and developers need retry logic to handle errors and disconnects.
3) Tools for SQL Azure include the SQL Azure Database Manager, SSMS 2008 R2, and the migration wizard.
4) Performance can be improved by addressing indexing, minimizing round trips, using connection pooling, and caching/batching data access.
http://highperformancecoredata.com/
Learn how to analyze, debug, and squeeze every last bit of performance out of Core Data. The standard Core Data implementation is very powerful and flexible but lacks performance. In this advanced session we will cover various performance analysis tools, model optimization, and various high performance concurrency models. This is an advanced discussion that assumes you have used Core Data before.
DataStax Enterprise (DSE) already offers a plethora of solid capabilities to make your distributed database dreams become more real than The NeverEnding Story. But are you aware of all of the crazy, quality of life updates and new features added in DataStax Enterprise 6? These include: significantly improved performance; anti-entropy improvements with DSE NodeSync; quality updates for DSE Search, Graph, Analytics, OpsCenter, Advanced Security, and Studio; metrics collection; and Kafka and Docker integrations. We’ll take a look at all of it, plus give you a sneak peek at some of the foundational changes coming in DataStax Enterprise 6.8 that will rock your world.
This document discusses cookies in PHP. It explains that persistent cookies are stored as files on the user's computer and remain even after the browser is closed. It provides the syntax for setting cookies using setcookie() and setrawcookie(), and explains that setrawcookie() does not encode the cookie value. It also discusses how to set persistent cookies by setting an expiration date, and how to delete cookies by setting the expiration date to the past. Finally, it presents an assignment to create a login panel that uses cookies to keep the user logged in even after closing the browser.
This document provides an overview of roles in MySQL 8.0, including:
- Roles were introduced in MySQL 8.0 to simplify user administration and centralize privilege handling. Roles are created and granted like users but do not require login credentials.
- The key aspects of using roles are: creating roles, granting privileges to roles, creating users, granting roles to users, and setting the default role for users.
- Roles simplify administration but also introduce some complexity, such as roles being stored as users without logins and the need to set a default role for a user's privileges to take effect. The document provides examples and best practices for working with roles.
This document provides steps to configure replication between an Oracle database and a MySQL database using Oracle GoldenGate. It outlines installing GoldenGate on the source Oracle and target MySQL databases, setting up the necessary directories, creating and loading sample tables on the Oracle source, and starting the GoldenGate Manager process on both databases. The replication process will then capture changes on the Oracle source and replicate them to the MySQL target in real-time.
This document provides instructions for using the SmartDataCenter (SDC) command line interface (CLI) and Ruby client to manage virtual machines. It describes how to install the CLI, generate SSH keys, provision a new machine, check its state, stop and delete machines. It also shows how to connect to SDC and find machines using the Ruby client, and configure the return type of variables.
Figaro Coffee is a Filipino chain of coffee shops/restaurants that aims to provide a European cafe experience. It offers specialty coffees and teas from around the world in a stylish setting. The name "Figaro" was chosen to fit the Italian/European theme and comes from the famous opera "The Barber of Seville". Figaro cafes have friendly staff, comfortable atmospheres suitable for couples or friends, and serve high quality coffee and presentable food.
The Figaro Coffee Company was established in 1993 by seven friends in the Philippines to share European coffee culture. It now has 64 cafes and offers franchising opportunities. Franchise packages range from full stores to kiosks to carts, requiring investments from ₱2-6.5 million. Franchisees receive training, support opening their store, and ongoing assistance through manuals, site visits and programs in exchange for royalties and marketing fees based on sales.
The document summarizes observations from visits to four Figaro Coffee Company locations on different dates in April 2011. It describes the number and demographics of customers observed, the drinks and foods purchased, location details within each mall or commercial area, and amenities available at each establishment such as comfort rooms, WiFi, and smoking areas. Key details on prices and specific drinks purchased are also provided for each location.
This document summarizes details about Figaro Coffee, a Filipino chain of coffee shops and restaurants designed as European-style cafés. It discusses Figaro's offerings of specialty coffees and coffee paraphernalia. The document also describes Figaro's European café ambiance, with friendly staff, presentable food, and one of the best coffees in the area. Figaro aims to have a romantic atmosphere suitable for couples or friends.
The document summarizes a market analysis of three major coffee shops - Figaro, UCC, and Starbucks - located in Robinsons Place Manila. It describes the typical customers, locations, and offerings of each coffee shop. Figaro caters mostly to businessmen and has a small location but variety of food. UCC has a larger location and more diversified menu but higher prices. Starbucks has the biggest location and caters to a wide range of customers, though it focuses more on coffee than food. The success of these coffee shops depends on understanding their target markets, location, and quality of service. This competition is beneficial to both customers and the coffee industry.
Nokia is facing tough competition from rivals like Apple and is losing market share. A SWOT analysis identifies strengths like experience but also weaknesses such as a slow response to new competition. Opportunities exist in growing markets for smartphones and mobile devices, but threats include rivals taking market share with more popular products like the iPhone. Nokia hopes its new N8 phone can address weaknesses and threats by utilizing strengths and opportunities like upgraded Symbian software and growing demand for social networking.
The speaker discusses the global coffee industry and opportunities for Filipino baristas. Some key points:
1) The coffee industry has become a global phenomenon and billion dollar business, with coffee shops being the fastest growing restaurant segment.
2) The Philippines has a strong coffee culture, with Filipinos consuming coffee similarly to rice. The native 'Barako' coffee bean is unique with the largest beans in the world.
3) Proper training is important for baristas to gain competitive skills and take advantage of opportunities both locally and abroad in the growing coffee industry.
The document discusses observational studies conducted at two coffee shops, The Coffee Bean and Tea Leaf and Starbucks Coffee, located in Rockwell Power Plant Mall. It provides details on the customer demographics, behaviors, menus, facilities, and estimated sales and earnings of each coffee shop based on observations made from 4-5:30pm on September 15, 2012. Limitations of the study included only observing customers and personnel without conducting interviews.
Santosian Cafe aims to become the leading beverage service provider in India through quality, cleanliness, and friendly staff. Their marketing plan involves differentiating themselves from competitors by offering an aqua zone and no silent zone. Their target market is students and young professionals aged 16-35 in and around Mumbai. Their strategy is to position themselves as offering something unique compared to competitors through promotions using social media, events, and word of mouth.
Content doesn't have to go viral to be a success. Aiming to go viral might even be stifling your content marketing. Stephen will look at better measures of success and demonstrate what you really get when you go viral.
Situational analysis, Business strategy and BCG matrixPinnakk Paul
The document discusses situational analysis and two methods for conducting situational analysis: 5Cs analysis and Porter's five forces analysis. 5Cs analysis examines a company, customers, competitors, collaborators, and the broader climate/environment. Porter's five forces model analyzes the threat of new entrants, threat of substitutes, bargaining power of suppliers and customers, and competitive rivalry within an industry. The document provides details on how to apply each method and examples of factors to consider for each element of the analyses.
This document defines key terms related to theoretical and conceptual frameworks, including concepts, constructs, variables, conceptual framework, and theoretical framework. It explains that a conceptual framework consists of concepts and proposed relationships between concepts, while a theoretical framework is based on existing theories. The purposes of conceptual and theoretical frameworks are to clarify concepts, propose relationships between concepts, provide context for interpreting findings, and stimulate further research and theory development.
The document provides information about Starbucks, including its history, mission, CEO Howard Schultz, marketing strategies, and global expansion efforts. It began in 1971 in Seattle as a small coffee bean roaster and retailer. Under CEO Howard Schultz, Starbucks rapidly expanded across the US and internationally, becoming the world's largest coffeehouse chain with over 15,000 stores in 50 countries. The document discusses Starbucks' marketing mix, target customers, positioning as a premium brand, and strategies for global growth despite risks of market saturation at home.
This document provides information about an upcoming Box Guy event, including sponsors, speakers and sessions. On the first day, there will be a presentation on FusionReactor at 12:30pm and a podcast at 6:30pm. The second day will feature a lunch with Pete Freitag at 12:30pm. Attendees can enter raffles by tweeting with #intothebox. The event also promotes Ortus' consulting services and modernization approach for CFML applications.
Docker Logging and analysing with Elastic StackJakub Hajek
Collecting logs from the entire stateless environment is challenging parts of the application lifecycle. Correlating business logs with operating system metrics to provide insights is a crucial part of the entire organization. What aspects should be considered while you design your logging solutions?
Docker Logging and analysing with Elastic Stack - Jakub Hajek PROIDEA
Collecting logs from the entire stateless environment is challenging parts of the application lifecycle. Correlating business logs with operating system metrics to provide insights is a crucial part of the entire organization. We will see the technical presentation on how to manage a large amount of the data in a typical environment with microservices.
This document discusses setting up an ELK stack for log aggregation and analytics. It describes collecting logs from various sources using syslog-ng and Nxlog, parsing and transforming logs with Logstash, storing them in Elasticsearch for search and analysis, and visualizing logs in Kibana. OSSEC is also mentioned as a security information and event management tool that can integrate with the ELK stack.
This document discusses advanced usage of OpenCms' multi-site functionality. It describes how to configure a single OpenCms installation to manage multiple websites with individual domains, templates, and user permissions. Key aspects covered include using virtual hosts and rewrite rules in Apache to route requests to the appropriate OpenCms site, configuring sites and templates in OpenCms, and injecting site-specific content through JSPs. The document provides examples of implementing multi-site solutions for a hosted OpenCms platform and large student union website network.
This session introduces tools that can help you analyze and troubleshoot performance with SharePoint 2013. This sessions presents tools like perfmon, Fiddler, Visual Round Trip Analyzer, IIS LogParser, Developer Dashboard and of course we create Web and Load Tests in Visual Studio 2013.
At the end we also take a look at some of the tips and best practices to improve performance on SharePoint 2013.
Node is used to build a reverse proxy to provide secure access to internal web resources and sites for mobile clients within a large enterprise. Performance testing shows the proxy can handle over 1000 requests per second with latency under 1 second. Code quality analysis tools like Plato and testing frameworks like Jest are useful for maintaining high quality code. Scalability is achieved through auto-scaling virtual machine instances with a load balancer and configuration management.
DSLing your System For Scalability Testing Using Gatling - Dublin Scala User ...Aman Kohli
The power of Gatling is the DSL it provides to allow writing meaningful and expressive tests. We provide an overview of the framework, a description of their development environment and goals, and present their test results.
Source code available https://github.com/lawlessc/random-response-time
This presentation was prepared for a Webcast where John Yerhot, Engine Yard US Support Lead, and Chris Kelly, Technical Evangelist at New Relic discussed how you can scale and improve the performance of your Ruby web apps. They shared detailed guidance on issues like:
Caching strategies
Slow database queries
Background processing
Profiling Ruby applications
Picking the right Ruby web server
Sharding data
Attendees will learn how to:
Gain visibility on site performance
Improve scalability and uptime
Find and fix key bottlenecks
See the on-demand replay:
http://pages.engineyard.com/6TipsforImprovingRubyApplicationPerformance.html
This document summarizes different caching options available in Azure, including in-role caching for cloud services, the Azure Cache Service, and the preview Azure Redis Cache. It provides an overview of each option's features, pricing, and how to configure and monitor caches. Demos are shown of creating and using in-role caching and the Azure Cache Service. The document recommends using a mix of caching solutions based on needs and discusses common caching architectures in Azure applications.
Talk about add proxy user in Spark Task execution time given in Spark Summit East 2017 by Jorge López-Malla and Abel Ricon
full video:
https://www.youtube.com/watch?v=VaU1xC0Rixo&feature=youtu.be
Whatever it takes - Fixing SQLIA and XSS in the processguest3379bd
This document discusses techniques for preventing SQL injection and cross-site scripting (XSS) vulnerabilities. It proposes using prepared statements with separate data and control planes as a "safe query object" approach. It also discusses policy-based sanitization of HTML and focusing code reviews on defect detection through annotating suspicious code regions. The overall goal is to help developers adopt architectures and techniques that thoroughly apply technical solutions to recognize and fix security weaknesses.
The document discusses pre-patching steps for Exadata full stack patching, including:
1) Collecting software versions, firmware versions, and system status of compute and storage nodes.
2) Checking disk space, server uptime, SSH connectivity, and resolving any hardware alerts or issues.
3) Staging patch files in a shared location accessible to all nodes.
4) Verifying consistency of installed patches and identifying any custom RPMs.
5) Reviewing logs for issues and running Exacheck to resolve critical problems.
6) Opening a pre-emptive support request and providing diagnostic information.
OrientDB v2.2 introduces several new features including live queries, parallel queries, command caching, sequences, incremental backups, improved security features, an easier distributed configuration, load balancing strategies, and SQL commands for managing high availability configurations. It also introduces the Teleporter tool for migrating data from relational databases like Oracle, SQL Server, MySQL, and PostgreSQL into OrientDB.
Learn about structured logging with rsyslog and how it can be used to do actual format conversions. Include config samples for Linux and Windows log sources.
You can watch the replay for this Geek Sync webcast, Performance Tune Like an MVP, in the IDERA Resource Center, http://ow.ly/aDE250A4qdF.
The life of a DBA is evolving and your tuning skills should always be sharp. Tuning is one of the key components of a great DBA and developer. In this demo rich session we'll deep dive into performance tuning for on-premises, PaaS (platform as a service), and IaaS (infrastructure as a service). We'll discuss tips and techniques for troubleshooting bottlenecks and how to remediate them for hardware, OS, and the database.
Speaker: Daniel Janik has been supporting SQL Server for over 18 years. Six of those years were at Microsoft Corporation supporting SQL Server as a Senior Premier Field Engineer (PFE) where he supported over 287 different clients with both reactive and proactive database needs. Daniel has presented at many community events and SQL Saturdays.
Beyond Cookies, Persistent Storage For Web Applications Web Directions North ...BradNeuberg
This document discusses persistent storage options for web applications beyond cookies. It describes name/value storage, databases, static files, and how HTML5 specifications like localStorage, sessionStorage, databases, and the application cache provide similar persistent storage capabilities to older technologies like Gears and Flash. Use cases, code examples, and browser support are provided for each HTML5 storage mechanism.
AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...Amazon Web Services
In this series of 15-minute technical flash talks you will learn directly from Amazon CloudFront engineers and their best practices on debugging caching issues, measuring performance using Real User Monitoring (RUM), and stopping malicious viewers using CloudFront and AWS WAF.
This document discusses real-time analytics on streaming data. It describes why real-time data streaming and analytics are important due to the perishable nature of data value over time. It then covers key components of real-time analytics systems including data sources, stream storage, stream ingestion, stream processing, and stream delivery. Finally, it discusses streaming data processing techniques like filtering, enriching, and converting streaming data.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
3. What is Figaro?
• XML Database
– Application database
– Client or server
– < 7 MB (~6.34 MB)
– Holds up to 256 TB data
• Oracle Embedded Product
– Oracle Berkeley DB XML
– Licensed product
5. Product Editions
• Data Store (DS)
– Single reader, single writer
– High performance
• Concurrent Data Store (CDS)
– Multiple readers, single writer
• Transactional Data Store (TDS)
– Multiple readers and writers
– ACID transaction support
• High Availability
– Replication layer
– Coming soon to Figaro (late 2009)
7. Designing the Provider
• Single-app solution
– Data Store access (single reader/writer)
– Build up, then out
• CDS, TDS
• Object serialization
• One container per provider
– CDS, TDS scenarios can help create
SSO/centralized credential store
8. Membership Provider Key Objects
• FigaroMembershipProvider
• FigaroMembershipUser
– [Serializable]
– Intermediary to MembershipUser
• FigaroMembershipData
– DAL
9. Figaro Key Objects
• FigaroEnv
– Environment manager
– Not used in this example
• XmlManager
– Manage containers, object creation
• Container
– The database
– Node storage or ‘wholedoc’ storage
– Every entry has a ‘file name’ – either auto-generated or assigned
• QueryContext
– Assign variable values
– Set XML namespaces
• Figaro.BerkeleyDb.Xml.XmlDocument
– Not to be confused with System.Xml.XmlDocument
• (but you can explicitly convert to it)
– File name, Metadata
11. Adding Users
public MembershipCreateStatus CreateUser(FigaroMembershipUser user)
{
var status = MembershipCreateStatus.Success;
StartTimer();
try
{
var ms = new MemoryStream();
serializer.Serialize(ms, user);
ms.Seek(0, SeekOrigin.Begin);
var reader = XmlReader.Create(ms);
var doc = mgr.CreateDocument(reader);
doc.Name = user.UserName;
container.PutDocument(doc,mgr.CreateUpdateContext(),PutDocumentOptions.None);
}
catch (Exception ex)
{
status = MembershipCreateStatus.ProviderError;
var e = ExceptionHandler.HandleException(ex, source);
if (null != e) throw e;
}
finally
{
//you must sync or your data will disappear when you close the container!
container.Sync();
StopTimer(quot;CreateUser quot; + user.UserName);
}
return status;
}
12. Getting User Info
• GetUserPassword
– for $x in collection('membership') where
$x/FigaroMembershipUser/UserName = $user return
xs:string($x/FigaroMembershipUser/Password)
• GetNumberOfOnlineUsers
– for $x in collection('membership') where
xs:dateTime($x/FigaroMembershipUser/LastActivityDate) >=
$y return $x
13. How does it perform?
•
• MembershipData.CreateUser
MembershipData.Query
testuser995 completed in
completed in 0.0079436
0.0581908 seconds.
seconds.
• MembershipData.CreateUser
• MembershipData.GetUser testuser996 completed in
0.0749375 seconds.
completed in 0.0030428
• MembershipData.CreateUser
seconds.
testuser997 completed in
• MembershipData.Update 0.0581884 seconds.
completed in 0.0500253 • MembershipData.CreateUser
seconds. testuser998 completed in
0.0750547 seconds.
• MembershipData.UpdateUser
• MembershipData.CreateUser
completed in 0.0008002
testuser999 completed in
seconds. 0.0580407 seconds.
• •
ChangePasswordQuestionAndAns MembershipData.CreateUser
testuser1000 completed in
wer completed in 0.1160279
0.0582832 seconds.
seconds.
14. MembershipProvider Design:
Going Forward
• Concurrency
– CDS/TDS
– COM+ layer?
• Indexing
– The more users added, performance will slow
– “2 Gb Rule”
• Data Partitioning
– Keep roles, profile properties separate, or add to
membership container?
15. Planning for Concurrency
• Consider the Framework
• Consider the OS Features
– COM+
– MSDTC
• Consider the Figaro API
– Concurrent Data Store (CDS) switches
– Transactions
16. Benefits
• FLEXIBILITY
– Put whatever you want into your containers
– Change management just got a whole lot easier
• Scalability
– Concurrency
– Gigabytes, Terabytes
– Replication/HA*
• Security
– File
– Application layer
– AES Encryption support
• Performance
– Sub-millisecond operations
– ACID transaction support
– In-memory databases, log files (TDS)
• ROI
– Get more out of your XML
– Reduced need for resources (no database server!)
* Coming late 2009
17. Where do you want to go today?
• Client • Server
– Office – ASP.NET
• Custom OpenXML Packages – CMS (e.g. Oxite)
– Visual Studio – CodePlex Projects
• Developer tools – WCF, REST, Services SDKs
– WPF? – Cloud/Saas/Software +
– Search/Indexing Services
– ISV products – Server Products, Platforms
• Mobile/Embedded • MOSS, BizTalk
• Search Server
• Exchange?
– ISV Products