This document provides a short primer on YANG, the data modeling language used in NETCONF. It describes some of the basic constructs in YANG including leaf nodes, leaf lists, containers, lists, choices, groupings and presence. Examples are given to illustrate how these constructs can be used to define the structure of configuration and state data and how the data is represented in XML.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
This document provides an overview of PL/SQL subprograms, including anonymous blocks, stored PL/SQL units like procedures and functions, and PL/SQL packages. It defines each component and provides examples. Anonymous blocks allow executing PL/SQL code without a name. Stored procedures and functions can be invoked by many users. Packages organize related objects and allow overloading subprograms. The document demonstrates package specifications that declare objects and package bodies that define objects and private components.
Architecture of Native XML Database Sednamaria.grineva
Sedna is a document database with APIs for C, Java, Scheme, OmniMark, Python, PHP, and .Net. The core C API allows for session management, transactions, query execution and result processing, and data loading. The Sedna architecture also includes an open socket protocol and extensibility of the basic C API to create new APIs.
Rendering refers to processing an XML document to present it with the desired formatting. A style sheet performs transformations and describes how information should be presented. There are three main types of style sheets: CSS, XSLT, and DSSSL. XSLT allows advanced formatting like reordering elements and is more complex than CSS, which only supports basic formatting. XSLT uses elements like value-of, for-each, and sort to select and format data from an XML document according to template rules.
This document provides an introduction to XML Path Language (XPath), which is a syntax for locating information in an XML document. It describes the different node types in an XML document and XPath tree, such as element nodes, attribute nodes, and text nodes. It also explains some basic XPath concepts like axes, node tests, and location paths that allow navigating the XPath tree using steps separated by axes and node tests. Some examples of XPath functions and operators for manipulating node sets returned from location paths are also presented. Finally, it provides sample XML documents and uses XPath to select nodes and extract information from them.
PL/SQL is a combination of SQL and procedural languages that enhances SQL's capabilities. It allows processing of SQL statements as a block. A PL/SQL block consists of optional declaration, mandatory execution, and optional exception sections. Variables, constants, records can be declared in the declaration section and used in the execution section. The execution section contains the main program logic. Exceptions are handled in the exception section. PL/SQL supports programming constructs like conditional statements and loops.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
This document provides an overview of PL/SQL subprograms, including anonymous blocks, stored PL/SQL units like procedures and functions, and PL/SQL packages. It defines each component and provides examples. Anonymous blocks allow executing PL/SQL code without a name. Stored procedures and functions can be invoked by many users. Packages organize related objects and allow overloading subprograms. The document demonstrates package specifications that declare objects and package bodies that define objects and private components.
Architecture of Native XML Database Sednamaria.grineva
Sedna is a document database with APIs for C, Java, Scheme, OmniMark, Python, PHP, and .Net. The core C API allows for session management, transactions, query execution and result processing, and data loading. The Sedna architecture also includes an open socket protocol and extensibility of the basic C API to create new APIs.
Rendering refers to processing an XML document to present it with the desired formatting. A style sheet performs transformations and describes how information should be presented. There are three main types of style sheets: CSS, XSLT, and DSSSL. XSLT allows advanced formatting like reordering elements and is more complex than CSS, which only supports basic formatting. XSLT uses elements like value-of, for-each, and sort to select and format data from an XML document according to template rules.
This document provides an introduction to XML Path Language (XPath), which is a syntax for locating information in an XML document. It describes the different node types in an XML document and XPath tree, such as element nodes, attribute nodes, and text nodes. It also explains some basic XPath concepts like axes, node tests, and location paths that allow navigating the XPath tree using steps separated by axes and node tests. Some examples of XPath functions and operators for manipulating node sets returned from location paths are also presented. Finally, it provides sample XML documents and uses XPath to select nodes and extract information from them.
PL/SQL is a combination of SQL and procedural languages that enhances SQL's capabilities. It allows processing of SQL statements as a block. A PL/SQL block consists of optional declaration, mandatory execution, and optional exception sections. Variables, constants, records can be declared in the declaration section and used in the execution section. The execution section contains the main program logic. Exceptions are handled in the exception section. PL/SQL supports programming constructs like conditional statements and loops.
PL/SQL is the procedural extension language for SQL. It allows developers to write reusable code by creating blocks, procedures, functions and packages. PL/SQL code can contain variable declarations, executable statements like SQL, and control structures. The PL/SQL compiler separates SQL statements from procedural logic, with SQL statements sent to the database and procedural code executed by the PL/SQL engine.
This document discusses how to call external C and Java programs from PL/SQL. It covers the benefits of using external procedures, how PL/SQL calls external C and Java code, and the development steps for creating and executing external C procedures and Java class methods. These include loading libraries and classes, publishing external routines in PL/SQL, and executing the PL/SQL code to invoke the external programs.
This chapter on PL/SQL programming introduces PL/SQL language fundamentals and basics with brief knowledge about its evolution and advantages.Practitioners Guide contains examples on the PL/SQL concepts explained in the slides.
PL/SQL is a block-structured language used for accessing and manipulating Oracle databases. A PL/SQL block contains three parts: a declarative section, executable section, and exception-handling section. PL/SQL supports both scalar and composite datatypes. Control structures include conditional statements like IF-THEN-ELSE and CASE, and iterative statements like LOOP, WHILE, and FOR. Database interaction is done through SQL statements and cursors, which allow processing of multiple rows returned from a query.
Sedna XML Database: Query Parser & Optimizing RewriterIvan Shcheklein
The document discusses Sedna, an XML query parser and optimizer. It describes:
1) The goals of supporting a wide range of queries while achieving high performance.
2) The query processing steps of parsing, analysis, optimization, and physical plan generation.
3) The optimizing rewriter removes unnecessary operations through rewriting rules like combining // steps or removing duplicate nodes.
This document provides an agenda and overview for a two-day PL/SQL Fundamentals training course. The agenda covers key PL/SQL concepts like language features, the DECLARE, BEGIN, and EXCEPTION clauses, explicit cursors, nested blocks, and declared subprograms. Students will learn to program with PL/SQL using a sample COMPANY database that will be set up on Oracle Database Express Edition. The course is a prerequisite for more advanced PL/SQL trainings.
This document discusses PL/SQL packages, which allow developers to group related code components together. Packages consist of a specification and body. The specification defines public components while the body contains private components and implementation details. Packages provide modularity, easier maintenance, and hiding of information from external code. They also enable performance benefits by loading all code into memory at once.
This document discusses creating and using stored functions in Oracle databases. It describes stored functions as named PL/SQL blocks that return a value and can be stored in the database for repeated execution. The document provides the syntax for creating functions, examples of creating and invoking functions, and restrictions on using functions in SQL statements. It also compares functions to procedures and describes how to remove functions from the database.
This document discusses Language Integrated Query (LINQ) in .NET, including LINQ building blocks, sequences, query operators and expressions, query expression trees, and LINQ to Objects. LINQ allows querying over various data sources like collections, databases, and XML documents using a SQL-like syntax. Query expressions are translated into expression trees which provide optimizations. LINQ to Objects refers to using LINQ directly over IEnumerable collections without an intermediate provider.
1. The document describes how to create and use stored procedures in Oracle, including defining parameters, parameter passing modes, and developing procedures.
2. Key aspects of procedures are that they promote reusability and maintainability, are created using the CREATE PROCEDURE statement, and can accept parameters to communicate data between the calling environment and the procedure.
3. Parameters can be defined using modes like IN, OUT, and IN OUT to determine how data is passed into and out of a procedure.
PACKAGES, Package Specification and Scope, Create Package Syntax, Declaring Procedures and Functions within a Package, Package Body, Create Package Body Syntax,Example –Package, Example– Package Body, Example – Calling Package Procedure, mResults of Calling Package Procedure, Cursors in Packages , cursor Example – Package Body, Example – Use Cursor Variable
Oracle PLSQL and D2K Interview Questions document contains information about various PLSQL concepts like NOCOPY, report types, anchors, user exits, triggers, parameters, cursors, exceptions, dynamic SQL, autonomous transactions, bulk binding and materialized views. The key topics covered are NOCOPY for improving performance with OUT and INOUT parameters, the different types of reports, using anchors to define object positioning, user exits for complex data manipulation, different types of triggers and their firing sequence, parameters and bind variables, implicit and explicit cursors, handling exceptions, writing dynamic SQL, autonomous transactions for independent processes, bulk binding for improved performance, and materialized views as replicas of master data.
1. NOCOPY is a compiler hint that can be used with OUT and IN OUT parameters to request to pass them by reference rather than by value for improved performance.
2. Report types include tabular, group left, group above, formlike, matrix, multi media, mailing label, and OLE reports.
3. Anchors define the relative position of an object to the object it is anchored to and are used to determine vertical and horizontal positioning of child objects within parent objects.
This document provides an overview of PL/SQL programming. It outlines an agenda that introduces PL/SQL and covers basic and advanced syntax. The introduction defines PL/SQL and outlines its advantages like block structures, procedural capabilities, and error handling. Basic syntax covers blocks, operators, comments, variables and data types. Advanced topics include cursors, procedures, functions, parameters, and exception handling. Triggers are also introduced as PL/SQL blocks triggered by data changes. Examples are provided throughout to illustrate key PL/SQL concepts.
This document provides an agenda for a presentation on XML DOM functionality in .NET. The presentation covers loading XML data into an XmlDocument object, working with child nodes, retrieving nodes that match criteria using XPath expressions, selecting single nodes, and retrieving node attributes. It demonstrates these concepts using a sample XML file representing a grocery store inventory. The conclusion emphasizes that the XmlDocument class represents an entire XML document in memory and supports loading, reading, and writing XML data using DOM functionality.
Project Lambda: Functional Programming Constructs in Java - Simon Ritter (Ora...jaxLondonConference
Presented at JAX London 2013
The big language features for Java SE 8 are lambda expressions (closures) and default methods (formerly called defender methods or virtual extension methods). Adding lambda expressions to the language opens up a host of new expressive opportunities for applications and libraries. You might assume that lambda expressions are simply a more syntactically compact form of inner classes, but, in fact, the implementation of lambda expressions is substantially different and builds on the invokedynamic feature added in Java SE 7.
The document discusses the pragmatic approach taken to implement OOXML support in OpenOffice/LibreOffice. Key aspects include:
1. Reusing existing binary filter code where possible to parse OOXML formats like DOCX, XLSX and PPTX for import and export.
2. Splitting monolithic filter classes into separate classes for data access and filter logic to allow reuse.
3. Abstracting common functionality like the Open Packaging Conventions container and attribute output.
4. Implementing new classes for DrawingML shape output and VML export for DOCX/PPTX while reusing existing Escher export code.
5. Separating MS file format filter code into independent
Chapter VI of Networking talks about IP protocol & Routing. It also covers aspects of socket programming used for converting servers into Linux Daemons.
This document discusses MXHR (Multipart XML Http Request) technology. It explains that MXHR allows making a single HTTP request to retrieve multiple parts with different content types such as text/html, text/css, image/jpeg. It provides details on how MXHR responses are formatted according to MIME and RFC specifications with boundaries to delineate parts. Examples are given of how MXHR can be used to retrieve template and data parts to perform client-side rendering for applications.
PL/SQL is the procedural extension language for SQL. It allows developers to write reusable code by creating blocks, procedures, functions and packages. PL/SQL code can contain variable declarations, executable statements like SQL, and control structures. The PL/SQL compiler separates SQL statements from procedural logic, with SQL statements sent to the database and procedural code executed by the PL/SQL engine.
This document discusses how to call external C and Java programs from PL/SQL. It covers the benefits of using external procedures, how PL/SQL calls external C and Java code, and the development steps for creating and executing external C procedures and Java class methods. These include loading libraries and classes, publishing external routines in PL/SQL, and executing the PL/SQL code to invoke the external programs.
This chapter on PL/SQL programming introduces PL/SQL language fundamentals and basics with brief knowledge about its evolution and advantages.Practitioners Guide contains examples on the PL/SQL concepts explained in the slides.
PL/SQL is a block-structured language used for accessing and manipulating Oracle databases. A PL/SQL block contains three parts: a declarative section, executable section, and exception-handling section. PL/SQL supports both scalar and composite datatypes. Control structures include conditional statements like IF-THEN-ELSE and CASE, and iterative statements like LOOP, WHILE, and FOR. Database interaction is done through SQL statements and cursors, which allow processing of multiple rows returned from a query.
Sedna XML Database: Query Parser & Optimizing RewriterIvan Shcheklein
The document discusses Sedna, an XML query parser and optimizer. It describes:
1) The goals of supporting a wide range of queries while achieving high performance.
2) The query processing steps of parsing, analysis, optimization, and physical plan generation.
3) The optimizing rewriter removes unnecessary operations through rewriting rules like combining // steps or removing duplicate nodes.
This document provides an agenda and overview for a two-day PL/SQL Fundamentals training course. The agenda covers key PL/SQL concepts like language features, the DECLARE, BEGIN, and EXCEPTION clauses, explicit cursors, nested blocks, and declared subprograms. Students will learn to program with PL/SQL using a sample COMPANY database that will be set up on Oracle Database Express Edition. The course is a prerequisite for more advanced PL/SQL trainings.
This document discusses PL/SQL packages, which allow developers to group related code components together. Packages consist of a specification and body. The specification defines public components while the body contains private components and implementation details. Packages provide modularity, easier maintenance, and hiding of information from external code. They also enable performance benefits by loading all code into memory at once.
This document discusses creating and using stored functions in Oracle databases. It describes stored functions as named PL/SQL blocks that return a value and can be stored in the database for repeated execution. The document provides the syntax for creating functions, examples of creating and invoking functions, and restrictions on using functions in SQL statements. It also compares functions to procedures and describes how to remove functions from the database.
This document discusses Language Integrated Query (LINQ) in .NET, including LINQ building blocks, sequences, query operators and expressions, query expression trees, and LINQ to Objects. LINQ allows querying over various data sources like collections, databases, and XML documents using a SQL-like syntax. Query expressions are translated into expression trees which provide optimizations. LINQ to Objects refers to using LINQ directly over IEnumerable collections without an intermediate provider.
1. The document describes how to create and use stored procedures in Oracle, including defining parameters, parameter passing modes, and developing procedures.
2. Key aspects of procedures are that they promote reusability and maintainability, are created using the CREATE PROCEDURE statement, and can accept parameters to communicate data between the calling environment and the procedure.
3. Parameters can be defined using modes like IN, OUT, and IN OUT to determine how data is passed into and out of a procedure.
PACKAGES, Package Specification and Scope, Create Package Syntax, Declaring Procedures and Functions within a Package, Package Body, Create Package Body Syntax,Example –Package, Example– Package Body, Example – Calling Package Procedure, mResults of Calling Package Procedure, Cursors in Packages , cursor Example – Package Body, Example – Use Cursor Variable
Oracle PLSQL and D2K Interview Questions document contains information about various PLSQL concepts like NOCOPY, report types, anchors, user exits, triggers, parameters, cursors, exceptions, dynamic SQL, autonomous transactions, bulk binding and materialized views. The key topics covered are NOCOPY for improving performance with OUT and INOUT parameters, the different types of reports, using anchors to define object positioning, user exits for complex data manipulation, different types of triggers and their firing sequence, parameters and bind variables, implicit and explicit cursors, handling exceptions, writing dynamic SQL, autonomous transactions for independent processes, bulk binding for improved performance, and materialized views as replicas of master data.
1. NOCOPY is a compiler hint that can be used with OUT and IN OUT parameters to request to pass them by reference rather than by value for improved performance.
2. Report types include tabular, group left, group above, formlike, matrix, multi media, mailing label, and OLE reports.
3. Anchors define the relative position of an object to the object it is anchored to and are used to determine vertical and horizontal positioning of child objects within parent objects.
This document provides an overview of PL/SQL programming. It outlines an agenda that introduces PL/SQL and covers basic and advanced syntax. The introduction defines PL/SQL and outlines its advantages like block structures, procedural capabilities, and error handling. Basic syntax covers blocks, operators, comments, variables and data types. Advanced topics include cursors, procedures, functions, parameters, and exception handling. Triggers are also introduced as PL/SQL blocks triggered by data changes. Examples are provided throughout to illustrate key PL/SQL concepts.
This document provides an agenda for a presentation on XML DOM functionality in .NET. The presentation covers loading XML data into an XmlDocument object, working with child nodes, retrieving nodes that match criteria using XPath expressions, selecting single nodes, and retrieving node attributes. It demonstrates these concepts using a sample XML file representing a grocery store inventory. The conclusion emphasizes that the XmlDocument class represents an entire XML document in memory and supports loading, reading, and writing XML data using DOM functionality.
Project Lambda: Functional Programming Constructs in Java - Simon Ritter (Ora...jaxLondonConference
Presented at JAX London 2013
The big language features for Java SE 8 are lambda expressions (closures) and default methods (formerly called defender methods or virtual extension methods). Adding lambda expressions to the language opens up a host of new expressive opportunities for applications and libraries. You might assume that lambda expressions are simply a more syntactically compact form of inner classes, but, in fact, the implementation of lambda expressions is substantially different and builds on the invokedynamic feature added in Java SE 7.
The document discusses the pragmatic approach taken to implement OOXML support in OpenOffice/LibreOffice. Key aspects include:
1. Reusing existing binary filter code where possible to parse OOXML formats like DOCX, XLSX and PPTX for import and export.
2. Splitting monolithic filter classes into separate classes for data access and filter logic to allow reuse.
3. Abstracting common functionality like the Open Packaging Conventions container and attribute output.
4. Implementing new classes for DrawingML shape output and VML export for DOCX/PPTX while reusing existing Escher export code.
5. Separating MS file format filter code into independent
Chapter VI of Networking talks about IP protocol & Routing. It also covers aspects of socket programming used for converting servers into Linux Daemons.
This document discusses MXHR (Multipart XML Http Request) technology. It explains that MXHR allows making a single HTTP request to retrieve multiple parts with different content types such as text/html, text/css, image/jpeg. It provides details on how MXHR responses are formatted according to MIME and RFC specifications with boundaries to delineate parts. Examples are given of how MXHR can be used to retrieve template and data parts to perform client-side rendering for applications.
The document discusses various XML processing models including DOM, SAX, StAX, and VTD-XML. VTD-XML uses a non-extractive parsing approach that encodes tokens as 64-bit integers to provide efficient random access parsing of XML documents with minimal memory usage. It has advantages over DOM and SAX such as being faster, using less memory, and allowing incremental updates to XML documents. Parallel DOM (ParDOM) is also discussed as an approach to parallelize DOM parsing across multiple CPU cores.
The document discusses various topics in C programming including structures, unions, pointers, I/O statements, debugging, and testing techniques. It provides examples to explain structures as a way to represent records by combining different data types. Unions allow storing different data types in the same memory location. Pointers are variables that store memory addresses. I/O statements like printf and scanf are used for input and output. Debugging methods include detecting incorrect program behavior and fixing bugs. Testing and verification ensure programs are built correctly according to requirements.
Pipes allow for inter-process communication by connecting the standard output of one process to the standard input of another. Named pipes, also called FIFOs, are similar to pipes but can be accessed using file names. The inode structure for pipes contains fields like wait queues, buffers, and counters for reading/writing processes. Ptrace is a system call that allows a process to debug another by controlling its execution and memory. Sockets provide communication via the network or locally using functions like socket, connect, listen, accept, and send/receive messages as datagrams or streams.
The document discusses C preprocessors and user-defined data types in C like structures and unions. It explains that the preprocessor is a program that processes code before compilation. Key preprocessor directives include #include, #define, #ifdef, and #line. Structures allow grouping of different data types while unions allocate space for the largest member. Typedefs create aliases for existing types. Enumerations define sets of named integer constants.
The document provides an overview of XML (eXtensible Markup Language) and web servers. It discusses why XML was created, its basic rules and structure, validation using DTDs and schemas, and parsers like SAX and DOM. Advantages of XML include being text-based, modular, and able to display data differently in various media. Disadvantages include being more complex than HTML and a historical lack of applications and browser support. The document also defines a web server's primary function of storing, processing and delivering web pages via HTTP. Common features, path translation, kernel vs user-mode implementations, and current market share leaders are summarized.
Sockets provide an interface between applications and the network. An application creates a socket which can be either connection-oriented or connectionless. The socket type determines the communication style. Once configured, the application can send and receive data through the socket to communicate over the network. There are two main socket types - SOCK_STREAM for reliable connections and SOCK_DGRAM for unreliable datagrams. Socket addresses contain the IP address and port number to identify the endpoint of communication.
Sockets identify endpoints in a network and allow a single computer to serve multiple clients simultaneously through the use of ports. Servers listen on ports until clients connect, and must be multithreaded to manage multiple connections. Networking uses protocols like IP, TCP, UDP, and HTTP. IP routes packets across networks, TCP reliably strings packets together, and UDP supports fast but unreliable transport. Internet addresses uniquely identify computers and have transitioned from IPv4 to IPv6. Domain names map to IP addresses through DNS for human-friendly access.
This document contains a summary of classes defined in a C++ header file for creating network sockets:
- The Socket class encapsulates creation of stream, datagram, multicast, or connected datagram sockets for a server or client application. It allows sending and receiving messages on the same socket.
- The Message class serializes data between a character buffer and sockets using insertion and extraction operators. It handles porting socket descriptors and addresses.
- The Stream, SocketInfo, and PortIpRequestBacklog classes provide supporting functionality for wrapping buffers, extracting socket peer/host addresses, and specifying socket configuration details.
This document discusses the key differences between ANSI C and K&R C. It covers four main points: 1) Function prototyping in ANSI C allows compilers to check for invalid function calls, unlike in K&R C. 2) ANSI C supports the const and volatile qualifiers. 3) ANSI C supports internationalization with wide characters and setlocale. 4) ANSI C allows function pointers to be used without dereferencing. The document provides examples to illustrate each point.
The document provides an overview of XML, XSLT, and XPath. It discusses the history and goals of XML, how to structure an XML document including elements, attributes, and namespaces. It also covers XML Schema, XPath, and how XSLT uses XPath to transform an XML document into another format.
Tshark pen testing, very good insight of the pent testclaudiu59
This document provides an overview of using the TShark network analyzer tool. It discusses what network traffic is, how to capture traffic using TShark, read from and write to files, use various output formats and display filters, and analyze endpoints. TShark can capture and analyze live network traffic or read from pcap files. It provides powerful decoding and filtering and can output data in several formats like XML, JSON, text for further analysis. Endpoint analysis generates statistics on devices in the captured traffic.
Wireshark course, Ch 03: Capture and display filtersYoram Orzach
This document provides an overview of capture and display filters in Wireshark. It describes the basics of filter syntax and examples of common filters. The objectives are to understand basic capture and display filters and how to perform packet filtering. It covers the structure and components of capture filters including primitives, operators, and examples. Display filters are explained along with field types, comparison operators, and combining expressions. The document concludes with case studies demonstrating filters for protocols like DCERPC and analyzing network issues like retransmissions.
The Datafiddler is a tool that allows users to analyze and visualize network traffic data stored in a MongoDB database by the Hatkit Proxy. It provides two primary views: a table view that displays raw data fields, and an aggregator view that shows aggregated data in a tree structure. Additional third-party plugins are planned to integrate other analysis frameworks.
The document discusses a generic programming toolkit called PADS/ML that can be used to parse, analyze, and transform semi-structured or "ad hoc" data from various domains. It describes how PADS/ML uses generated type representations and typecase analysis to write functions that can operate on any data format described by a PADS/ML type. Case studies of PADX and Harmony are presented, which use PADS/ML to build tools for querying and synchronizing different data formats.
This document provides an agenda and notes for an HBase training course. The agenda includes covering course credit, hands-on exercises for installing tm-puppet and writing CRUD codes, an overview of the Client API basics and advanced features, and references. The general notes section provides information on atomic mutations, thread safety with HTable instances, and configuration. The document then covers specifics of the Put, Get, Delete, batch operations, row locks, and scan methods of the Client API. It concludes with a hands-on exercise asking students to write CRUD code against an HBase table and describes requirements for completing and submitting the code.
Similar to Instant YANG - Tail-f Systems Technology Primer (20)
Synopsis: Introduction to working with the NETCONF northbound interface in ConfD. Configuration of NETCONF using the confd.conf configuration file. NETCONF log and NETCONF trace log. Use of netconf-console for basic NETCONF testing.
Tail-f Systems owns the copyright to this document from February 13, 2015. The document discusses operational data providers. It provides copyright information but no other contextual details in the content provided.
The document provides an introduction to the ConfD Database (CDB), which is a hierarchical, ACID-compliant database used by ConfD to store configuration and operational data modeled with YANG. CDB stores data both in-memory and persistently on disk, supports transactions, replication, and automatic schema upgrades. Managed objects use CDB APIs to read configuration data at startup and subscribe to relevant configuration changes via a subscription socket.
This document discusses C data types. C provides a variety of basic data types to store different types of data including integers, floating-point numbers, characters, and pointers. These data types allow programmers to declare variables that can hold specific types of values.
Module 7: Installation and Getting StartedTail-f Systems
Synopsis: This module introduces the basics of working with ConfD hands-on. Topics covered include installation of ConfD, a tour of what is where in the installation (docs, examples, etc.), setting environment variables for working with ConfD, a high-level tour of ConfD documentation, where to get started in the examples set, and building and running a first example.
Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
This document provides a summary of a YANG tutorial presentation on advanced YANG statements, including must statements, augment statements, when statements, choice statements, identity statements, feature statements, deviations, and YANG modeling strategies. It discusses topics like restricting valid values with XPath expressions in must statements, adding new data with augment statements, making data conditional with when statements, modeling related enumerations with identity statements, and marking data as optional with feature statements. The presentation aims to help people understand and properly apply these important YANG modeling constructs.
This document provides a tutorial on NETCONF and YANG, which are standards for network configuration and management. NETCONF was designed to address operators' requirements for easier network-wide configuration, validation of changes, and transactional management across multiple devices. It uses SSH for secure transport and XML encoding. YANG provides data models to define the configuration and state data. The tutorial covers the background and motivation for these standards, an overview of NETCONF operations and examples, and a demonstration of YANG data modeling. It explains how NETCONF enables network-wide atomic transactions, fulfilling a key operator need and improving the cost and complexity of network management.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
Tail-f Systems ConfD is a data-model driven network configuration and management system. It provides a core engine that supports multiple protocols like NETCONF, SNMP, REST, and CLIs. ConfD uses YANG data models to automatically render management interfaces and data stores. It also provides transactional configuration, validation, rollback management, and monitoring of operational data. ConfD aims to make network devices more manageable, programmable, and standards-compliant using model-driven development.
Webinar: Applying REST to Network Management – An Implementor’s View Tail-f Systems
This webinar gives an introduction to the principles of REST, shows how it can be used to expose programmable APIs on network elements and provides some real world examples from our implementation.
The principles of Representational State Transfer (REST) have gained a strong following since they were described by Roy Fielding in his doctoral dissertation written in 2000. REST’s strength lies in its scalability and generality, allowing it to be used for many types of applications.
The industry has already seen a number of implementations of network management applications that use REST interfaces on the infrastructure management layer, notably OpenStack Quantum and the Sun Cloud API. As a vendor to the vendors, we’ve seen a significant increase in interest around having REST interfaces exposed directly on the network element, be they hardware based or virtual.
http://www.tail-f.com
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
This Webinar is on the OF-CONFIG specification and how it applies to large scale OpenFlow switch management.
If you are interested in the management of OpenFlow switches and want to find out more about available specifications and tools to build and deploy such solutions, this webinar provides a useful overview.
Webinar Agenda:
-Step-by-step walkthrough of the OpenFlow Management and Configuration Protocol
-Demonstration of how to use of the YANG language to define the structure and semantics of OpenFlow switch configurations
-The role of NETCONF in implementing OF-CONFIG
Advantages of this approach to network device manufacturers and network operations teams needing to quickly develop and deploy state-of-the-art management solutions
-Short overview of Tail-f Systems’ applicable products and tools
http://www.tail-f.com
Tail f Systems Whitepaper - Top Ten Management Issues for ATCATail-f Systems
The document discusses the top ten issues for managing AdvancedTCA (ATCA) systems and how Tail-f Systems addresses them. It describes challenges like short product life cycles, supporting multiple management interfaces, integrating third party software, and ensuring high availability, security, performance and standards compliance. Tail-f Systems provides model-driven development tools that auto-generate management interfaces and integrate technologies to help vendors manage multi-vendor environments and automate service provisioning while reducing development time and costs.
Tail f Systems Whitepaper - EMS and NMS Platforms - Beyond Alarms and MapsTail-f Systems
While Element Management Systems have traditionally focused on alarm acknowledgement, maps, and IP discovery, Network Equipment Providers are now being asked to provide plug-n-play device configuration and automated service provisioning. This whitepaper addresses why it is important to take a broader view that includes configuration management and shows how Tail-f Systems’ NCS approaches these requirements.
This whitepaper:
- Introduces new challenges facing developers of EMS and NMS platforms
- Describes technical requirements for next generation platforms
- Overviews Tail-f Systems’ NCS platform in the context of these requirements
- Shows practical examples of real world scenarios and how NCS can solve them
- Demonstrates how to save development costs and turnaround new functionality faster
- Compares NCS to EMS Frameworks and IP Network Monitors
Developers, architects, product managers, and CTOs involved with EMS and NMS platforms will find this whitepaper a useful tool for planning and scoping future projects.
http://www.tail-f.com
Tail-f Systems Whitepaper - Configuration Management SimplifiedTail-f Systems
This paper shows how NETCONF and YANG can be employed to make next-generation configuration management systems considerably simpler, more understandable, and also more robust than current systems.
http://www.tail-f.com
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.