SQL knowledge isn't required to make your appliances do all of the things you need them to, but it might be very useful! Let's take a look through how SQL can enhance your productivity, and how the K1000 database is structured. Learn more: http://dell.to/1GDYpr8
There are so many hidden jewels in the inventory, we'll take a deeper look at what's in there, how it's useful, and what's not in there and how to get it in there. Learn more: http://dell.to/1GDYpr8
In this class we will take a structured approach to understanding troubleshooting skills to help you figure out what went wrong. Whether it's a task that isn't doing what you want, or a bigger issue- understanding how to debug is a skill all admins should hone regularly. Learn more: http://dell.to/1GDYpr8
This intermediate course will go beyond the basics and look at some unconventional wisdom when it comes to deploying software. Large installers, complex installers, repackaging, and more- we'll take a look at best practices that fit. Learn more: http://dell.to/1GDYpr8
K2000 Keeping Your Deployments Up-to-DateDell World
In this session we will demonstrate methods for keeping your OS deployments current with the latest greatest Windows updates. Learn more: http://dell.to/1GDYpr8
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
This presentation is intended to provide an overview of vulnerabilities and attack techniques that are popular in penetration testing at the moment. Vulnerabilities related to the application, network, and server layers will be covered along with current anti-virus bypass and privilege escalation techniques used by attackers and penetration testers. This presentation should be interesting to security professionals and system administrators looking for more insight into real world attacks.
This is the version modified for the OWASP meeting in June of 2014.
In this session we will cover the advantages and use cases for utilizing Scripted Installs when deploying Windows. We will look into how to create, modify, and deploy scripted installs also. Learn more: http://dell.to/1GDYpr8
In this session we will talk to how to utilize the Recover Console to the fullest. This session is sure to include tricks, tweaks, and other useful tools. Learn more:
There are so many hidden jewels in the inventory, we'll take a deeper look at what's in there, how it's useful, and what's not in there and how to get it in there. Learn more: http://dell.to/1GDYpr8
In this class we will take a structured approach to understanding troubleshooting skills to help you figure out what went wrong. Whether it's a task that isn't doing what you want, or a bigger issue- understanding how to debug is a skill all admins should hone regularly. Learn more: http://dell.to/1GDYpr8
This intermediate course will go beyond the basics and look at some unconventional wisdom when it comes to deploying software. Large installers, complex installers, repackaging, and more- we'll take a look at best practices that fit. Learn more: http://dell.to/1GDYpr8
K2000 Keeping Your Deployments Up-to-DateDell World
In this session we will demonstrate methods for keeping your OS deployments current with the latest greatest Windows updates. Learn more: http://dell.to/1GDYpr8
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
This presentation is intended to provide an overview of vulnerabilities and attack techniques that are popular in penetration testing at the moment. Vulnerabilities related to the application, network, and server layers will be covered along with current anti-virus bypass and privilege escalation techniques used by attackers and penetration testers. This presentation should be interesting to security professionals and system administrators looking for more insight into real world attacks.
This is the version modified for the OWASP meeting in June of 2014.
In this session we will cover the advantages and use cases for utilizing Scripted Installs when deploying Windows. We will look into how to create, modify, and deploy scripted installs also. Learn more: http://dell.to/1GDYpr8
In this session we will talk to how to utilize the Recover Console to the fullest. This session is sure to include tricks, tweaks, and other useful tools. Learn more:
In this session we will explore K2000 Imaging. Exercises will include what’s needed to be done prior to capturing an image and after it is applied. Learn more: http://dell.to/1GDYpr8
This is a high level presentation I delivered at BIWA Summit. It's just some high level thoughts related to today's NoSQL and Hadoop SQL engines (not deeply technical).
Our engineers will help you understand what's under the covers of your K1000 and dig into some advanced topics, so you can have a deeper understanding of this systems management platform: http://dell.to/1GDYpr8
In this class we will take a structured approach in building some troubleshooting skills to help you figure out what went wrong. Whether it's a task that isn't doing what you want, or a bigger issue- understanding how to debug is a skill all admins should hone regularly. Learn more: http://dell.to/1GDYpr8
The more components a system has, the more challenging its maintenance becomes. Oracle Exadata marries storage with computation through a fast, reliable network, and patching all of these seems daunting. Many companies seem to struggle with it, with some even avoiding it altogether by keeping it “pending.” This session presents tested, applied, and working tips to make the Oracle Exadata patching experience smooth as silk, like vacationing in Hawaii.
1084: Planning and Completing an IBM Connections UpgradeGabriella Davis
So we have IBM Connections installed, but now it’s time to consider what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, or database scheme. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade, test when it’s complete and what things can trip you up along the way. All of this is based on lessons learned over hundreds of deployments.
Learn how to be more efficient with the K2000. Attend this session to see how to take advantage of all the features to optimize your workflow. Find out more: http://dell.to/1GDYpr8
Planning and Completing an IBM Connections UpgradeGabriella Davis
So you have IBM Connections installed, but now you need to decide what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, a database schema or an entirely new version. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade regardless of its size, and test when it’s complete. We’ll also discuss what things can trip you up along the way.
Let’s face it: Best Practices are too many to really know them all and choose which ones should be applied first. Does your telephone ring all the time? Do your users ask for that “quick report” that instead takes ages and keeps changing every time you think it’s done? Have you ever thought that in dire times avoiding Worst Practices could be a good starting point and you can leave fine tuning for a better future? If the answer is “yes”, then this session is for you: we will discover together how not to torture a SQL Server instance and we will see how to avoid making choices that in the long run could turn out to be not as smart as they looked initially.
If SQL Server is heart of our environment, his health should be very important, right? If SQL Server is important, his availability for our businesses (internal and external) is important to. For our customers doesn't matter where data are stored, how are stored and what we do with those data. Especially for our managers. The data must be available on demand, on time, at he moment of request. High Availability is our responsibility. How we can prepare our environment for HA? How HA is connected for with SLA? And why Service Level Agreement are important for us? In this session I want to discuss about HA options for SQL Server (2008, 2012), about our different customers, and about Service Level Agreement (formal or not).
In this session (reloaded and remastered for HCL Notes V11), you will learn how easy it can be to maximize Notes client performance. Let Christoph show you, what can be tuned and how to resolve the best possible performance for your HCL Notes client infrastructure. Discover tips and tweaks - how to debug your Notes client, deal with outdated ODS, network latency and application performance issues and the measurable benefit that provides to your users. You’ll discover the current best practices for streamlining location and connection documents and why the catalog.nsf is still so important. You will leave the session with the knowledge you need to improve your HCL Notes V11 client installations and to provide a better experience for happier administration and happier end-users!
Engage 2020 - Kubernetes for HCL Connections Component Pack - Build or Buy?panagenda
HCL Connections V7 will be based on Kubernetes only! A parallel WebSphere environment won't be necessary any longer. Martin and Christoph collected the basics and differences in building a Kubernetes environment of your choice. They show you a comparison of an on-premises deployment versus a hosted cloud environment (Amazon EKS). After this session you have the basics to size and build a Kubernetes cluster for Component Pack, so you can start learning the new technology to take off with Connections V7 and become a Kubernaut.
IBM Connect 2016 - 60+ in 60 - Admin Tips Power HourChris Miller
See the full slides at http://idonot.es/60in60for2016
With a guaranteed minimum of 60 administration tips in 60 minutes you will walk out with a list of items to immediately help you tune your collaboration environment. Covering IBM Domino, Sametime, Connections, Traveler and more will have you eager to get back and implement some of the ideas. We will take best practices from the my SocialBizUg Admin Tips newsletter, customer case stories and other best practices. Have no fear, we will move faster that you can write so everything will be available for you to download. This is an ode to the hundreds of tips brought to you by the letters M and G (Mooney and Gab) over the years.
This presentation will provide a high level overview of the current role that desktop applications play in enterprise environments, and the general risks associated with different deployment models. It will also cover common methodologies, techniques, and tools used to identify vulnerabilities in typical desktop application implementations. Although there will be some technical content. The discussion should be interesting and accessible to both operational and management levels.
More security blogs by the authors can be found @
https://www.netspi.com/blog/
IBM Connections administration – keep your systems running the right wayLetsConnect
You have IBM Connections installed but now you are unsure what you need to do to keep the lights on the servers running smoothly.
User account synchronization, Database maintenance, reviewing the log files for errors, …
There are many of tasks for an IBM Connections admin – let us tell you how to schedule them into daily, weekly, monthly or even quarterly tasks.
Learn what you need to deal with immediately and which tasks you can schedule for later.
Take home some useful scripts, life saving settings and a sample schedule for your admin work
In this session we will explore K2000 Imaging. Exercises will include what’s needed to be done prior to capturing an image and after it is applied. Learn more: http://dell.to/1GDYpr8
This is a high level presentation I delivered at BIWA Summit. It's just some high level thoughts related to today's NoSQL and Hadoop SQL engines (not deeply technical).
Our engineers will help you understand what's under the covers of your K1000 and dig into some advanced topics, so you can have a deeper understanding of this systems management platform: http://dell.to/1GDYpr8
In this class we will take a structured approach in building some troubleshooting skills to help you figure out what went wrong. Whether it's a task that isn't doing what you want, or a bigger issue- understanding how to debug is a skill all admins should hone regularly. Learn more: http://dell.to/1GDYpr8
The more components a system has, the more challenging its maintenance becomes. Oracle Exadata marries storage with computation through a fast, reliable network, and patching all of these seems daunting. Many companies seem to struggle with it, with some even avoiding it altogether by keeping it “pending.” This session presents tested, applied, and working tips to make the Oracle Exadata patching experience smooth as silk, like vacationing in Hawaii.
1084: Planning and Completing an IBM Connections UpgradeGabriella Davis
So we have IBM Connections installed, but now it’s time to consider what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, or database scheme. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade, test when it’s complete and what things can trip you up along the way. All of this is based on lessons learned over hundreds of deployments.
Learn how to be more efficient with the K2000. Attend this session to see how to take advantage of all the features to optimize your workflow. Find out more: http://dell.to/1GDYpr8
Planning and Completing an IBM Connections UpgradeGabriella Davis
So you have IBM Connections installed, but now you need to decide what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, a database schema or an entirely new version. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade regardless of its size, and test when it’s complete. We’ll also discuss what things can trip you up along the way.
Let’s face it: Best Practices are too many to really know them all and choose which ones should be applied first. Does your telephone ring all the time? Do your users ask for that “quick report” that instead takes ages and keeps changing every time you think it’s done? Have you ever thought that in dire times avoiding Worst Practices could be a good starting point and you can leave fine tuning for a better future? If the answer is “yes”, then this session is for you: we will discover together how not to torture a SQL Server instance and we will see how to avoid making choices that in the long run could turn out to be not as smart as they looked initially.
If SQL Server is heart of our environment, his health should be very important, right? If SQL Server is important, his availability for our businesses (internal and external) is important to. For our customers doesn't matter where data are stored, how are stored and what we do with those data. Especially for our managers. The data must be available on demand, on time, at he moment of request. High Availability is our responsibility. How we can prepare our environment for HA? How HA is connected for with SLA? And why Service Level Agreement are important for us? In this session I want to discuss about HA options for SQL Server (2008, 2012), about our different customers, and about Service Level Agreement (formal or not).
In this session (reloaded and remastered for HCL Notes V11), you will learn how easy it can be to maximize Notes client performance. Let Christoph show you, what can be tuned and how to resolve the best possible performance for your HCL Notes client infrastructure. Discover tips and tweaks - how to debug your Notes client, deal with outdated ODS, network latency and application performance issues and the measurable benefit that provides to your users. You’ll discover the current best practices for streamlining location and connection documents and why the catalog.nsf is still so important. You will leave the session with the knowledge you need to improve your HCL Notes V11 client installations and to provide a better experience for happier administration and happier end-users!
Engage 2020 - Kubernetes for HCL Connections Component Pack - Build or Buy?panagenda
HCL Connections V7 will be based on Kubernetes only! A parallel WebSphere environment won't be necessary any longer. Martin and Christoph collected the basics and differences in building a Kubernetes environment of your choice. They show you a comparison of an on-premises deployment versus a hosted cloud environment (Amazon EKS). After this session you have the basics to size and build a Kubernetes cluster for Component Pack, so you can start learning the new technology to take off with Connections V7 and become a Kubernaut.
IBM Connect 2016 - 60+ in 60 - Admin Tips Power HourChris Miller
See the full slides at http://idonot.es/60in60for2016
With a guaranteed minimum of 60 administration tips in 60 minutes you will walk out with a list of items to immediately help you tune your collaboration environment. Covering IBM Domino, Sametime, Connections, Traveler and more will have you eager to get back and implement some of the ideas. We will take best practices from the my SocialBizUg Admin Tips newsletter, customer case stories and other best practices. Have no fear, we will move faster that you can write so everything will be available for you to download. This is an ode to the hundreds of tips brought to you by the letters M and G (Mooney and Gab) over the years.
This presentation will provide a high level overview of the current role that desktop applications play in enterprise environments, and the general risks associated with different deployment models. It will also cover common methodologies, techniques, and tools used to identify vulnerabilities in typical desktop application implementations. Although there will be some technical content. The discussion should be interesting and accessible to both operational and management levels.
More security blogs by the authors can be found @
https://www.netspi.com/blog/
IBM Connections administration – keep your systems running the right wayLetsConnect
You have IBM Connections installed but now you are unsure what you need to do to keep the lights on the servers running smoothly.
User account synchronization, Database maintenance, reviewing the log files for errors, …
There are many of tasks for an IBM Connections admin – let us tell you how to schedule them into daily, weekly, monthly or even quarterly tasks.
Learn what you need to deal with immediately and which tasks you can schedule for later.
Take home some useful scripts, life saving settings and a sample schedule for your admin work
This chapter covers the following:
- What is SQL
- Categories of SQL statements
- History of SQL
- Relational Database Structure
- MySQL Setup for practice
- SQL Basics (Lexical elements, Data types, Literals)
Presentation provides an overview of Dell Data Center Networking portfolio overview and product offerings. Content includes
Discussion on Dell Open Networking strategy and Dell reference architectures for Data Center Networking.
Operational costs and complexity can grow exponentially as storage capacity increases. In this session learn how Dell Storage SC automates the most common storage tasks, and Enterprise Manager™ software delivers centralized management of all local and remote Storage Center™ environments.
Dell Networking Wired, Wireless and Security Solutions LabDell World
The Dell Networking wired, wireless and security solutions lab demonstrates employee and guest wireless access with policies and content filtering. Each lab station represents a remote site, incorporating a SonicWALL TZ300 for security, an X-Series X1008P or X1018P switch for Ethernet connectivity, and an Instant Access Point IAP-205 for wireless device access. Learn more: http://dell.com/networking
Dell Networking’s Unified Network Architecture enables customers to build campus networks in a new way. The C9010 and C1048P convert your entire Enterprise network into a single switching entity, simplifying initial configuration and on-going operational aspects. Learn more: http://dell.to/1WtTO33
Dell PowerEdge zero touch provisioning with Auto Config speeds and simplifies server deployment. Using Server Configuration Profiles and your existing data center infrastructure, deploy one or thousands of PowerEdge servers reliably and repeatably. Learn more: http://www.dell.techcenter.com/LC
Learn how to Deploy, Virtualize, Manage, Maintain, and Automate with the OpenManage Suite. Use products like iDRAC, Dell Repository Manager, OpenManage Essentials, Microsoft System Center Integrations, and VMware integrations to maximize productivity in your datacenter operations. Learn more: Dell.com/OpenManage
Channel Partners: Lead with Dell Software SolutionsDell World
Deliver real value to your customers as you expand your reach and increase your revenue with Dell Software (For Channel partners only).
Your customers are facing monumental challenges on managing and securing applications, data and their infrastructure. These challenges are driving cost and complexity into the IT environment. Dell Software’s end to end portfolio allows channel partners to expand their sales of solutions and services to both existing new customers while demonstrating tangible value by:
• Improving the efficiency of IT organizations through the centralized management and security
• Speeding the pace of business through better application availability, data protection and rapid recovery
• Enabling cloud and mobile application delivery through modernizing infrastructure software
• Securing the endpoint, the data and the network
Join Roy Appelbaum for this interactive break out session on how the Dell Software portfolio provides you the blueprint to help your customers build the future ready enterprise.
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
The way educators teach and students learn is fundamentally changing. Flexible, blended, and personalized learning environments are replacing the one-size-fits-all classroom approach. Dell builds educational technology solutions that enable innovation in this new environment while keeping IT affordable to implement and easy to manage
Executing on the promise of the Internet of Things (IoT)Dell World
As sensors spread across almost every industry, the Internet of Things is triggering a massive influx of data. Data is coming from all directions – machinery, train tracks, shipping containers, and power stations. As we go from isolated systems to an integrated network of smart devices, enterprises need to develop smart data integration and analytics techniques to generate insights quickly. Not all data collected from sensors needs to be stored and analyzed in the cloud or data center. This session will discuss smart ways of integrating multiple data sources and using analytics techniques at the edge to enable faster decision making.
Are your backups are too big, and do they take too long? Are you worried you won’t get all of your data back? Do you waste hours managing complicated, temperamental backup implementations? Join is as we discuss innovative ways to improve your backups, make them more predictable, shrink backup windows, over-perform on SLAs, and reliably recover your data—every time, on time. Hear how other organizations are developing smarter backup strategies that align their recovery requirements to their business objectives, reduce stored data by up to 95% while boosting backup speeds as much as 200%.
NVMe PCIe and TLC V-NAND It’s about TimeDell World
With an explosion in data and the relentless growth in demand for information, identifying a much more efficient means of storage has become extremely important. In this session, we will cover the key drivers behind the need for faster and more efficient storage. NVMe, a standardized protocol for PCIe-based storage, is giving users the huge leap in bandwidth required for demanding applications. Samsung, who makes the fastest NVMe SSDs on the market, will cover the benefits enabled by such technology, in areas such as fraud prevention and surgical procedures.
The technology behind flash drives – NAND memory – will be spotlighted in this presentation. Memory manufacturers have improved NAND’s value by migrating from single-level-cell to multi-level-cell designs, but the most significant evolution will be a marriage of triple-level-cell and V-NAND flash manufacturing technologies. Samsung will also provide an overview of the prospects for TLC V-NAND with mobile device manufacturers, while examining the strong potential for a much wider TLC V-NAND market in data centers.
Key Security Insights: Examining 2014 to predict emerging threats Dell World
Cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this session, we’ll present the most common attacks Dell SonicWALL observed since 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises moving forward. This session is perfect for anybody who is interested in learning more about the state of the union in security.
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
The way you implement Identity and Access Management (IAM) can make or break your security and compliance strategies. Based on Dell’s experience helping customers deploy IAM properly, we have identified common themes that run through these successful projects. In this session, one of Dell’s IAM experts will present a maturity model that will help you gauge the correct place to start your deployment, highlight the course corrections that may be necessary, and help you determine the path to IAM that’s right for you.
Client Security Strategies To Defeat Advanced ThreatsDell World
With the workplace changing, job responsibilities are being met at home, at customer locations, even in public spaces like coffee shops. Does your security strategy protect you from the damaging costs of a data breach while providing end users seamless access to data and apps on any device, anywhere, at any time? From protecting data on any device, in the cloud, and over public WiFi, to managing access control and governance on networks, we will discuss Dell's approach to securing company data while enabling productivity and mobility.
What a data-centric strategy gives you that others do notDell World
People are now walking data centers, and the front lines of data security aren’t just blurred – they no longer exist. How do you put information in the hands of your workforce when and where they need it while mitigating risk? We’ll walk through a day in the life of a piece of data as it makes its way throughout your organization and the world. With a data-centric strategy that connects four foundational functions of IT security: network, identity and access management, data, endpoint, mobile, and security services, you can reap the rewards of mobility while keeping data safe and your organization compliant.
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
Outsourcing IT to the public cloud may seem cheap and easy, but is it? Data shows that on-premises private and hybrid cloud can deliver superior ROI. Explore methodologies and TCO analysis that can help you build a better business case for your organization, while meeting a "cloud first" objective.
Cloud security: Accelerating cloud adoption Dell World
Organizations now have an opportunity to more rapidly overcome their security concerns by using third-party cloud platforms. In this session, Dell SecureWorks security experts discuss the Shared Security Responsibility model, how organizations need to think about security architecture in the cloud, and new Dell SecureWorks services that are helping organizations plan, architect, manage and respond to threats in the cloud.
Detecting advanced and evasive threats on the networkDell World
Threat actors are increasingly employing evasive tactics that bypass traditional security controls, including more advanced technologies such as sandboxing. In this session, Dell SecureWorks will share examples of tactics used, their impact, what this means for organizations and new capabilities for addressing the risk posed by these threats.
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
Moving from infrastructure-centric IT to efficient, software-driven private or hybrid cloud requires more than gluing together knobs and gears. In addition to the infrastructure considerations, special attention needs to be paid to tying business workflows and organizational processes to IT processes to optimize application delivery and increase productivity for your users and customers. How you approach cloud-building to make it really usable by the business is the key to success.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Kace & SQL
1. Dell World User Forum
UFIL521: KACE and SQL
Brooks Roberts, Learning Development
Michael Klocek, Learning Development
Dell World
User Forum
2. Dell World User Forum
Presenters
• Brooks Roberts
– Dell KACE Learning Development
– 16 Years at Dell
– 4 Years with KACE
• Michael Klocek
– Dell KACE Learning Development
– 11 Years at Dell
– 4 Years with KACE
3. Dell World User Forum
Agenda
• SQL - Why Should I Care
• SQL Table Structure
• SQL Query Structure
• Connecting the Appliance
• Exploring the Database
• Wizards
• The “Easy” Way
5. Dell World User Forum
SQL – Why Should I Care
• What are some things you might use your appliance for?
• What are some things that the appliance stores in SQL?
• What are some daily administrative tasks that interface with the database?
Hint: SQL is everywhere…
6. Dell World User Forum
SQL – Why Should I Care
Things that the K1000 uses SQL for:
Assets
Inventory
Labels
Reporting
Service Desk
What others can you think of?
7. Dell World User Forum
Don’t I Have Wizards For All That Stuff?
You do indeed…
8. Dell World User Forum
Don’t I Have Wizards For All That Stuff?
Then why do I care about learning a new language?
Speed
Accuracy
Efficiency
12. Dell World User Forum
SQL Basics – Table Structure
Database
Tables serve as the building blocks of a database.
13. Dell World User Forum
SQL Basics – Table Structure
TABLE1
ID DATA1 DATA2
Tables consist of columns…
and fields.
Tables will always have a
Primary Key.
Other columns may or may
not be a Foreign Key.
14. Dell World User Forum
SQL Basics – Table Structure
ID DATA1 DATA2 ID DATA1 DATA2
BITS BOBS
15. Dell World User Forum
SQL Basics – Table Structure
ID DATA1 DATA2 ID DATA1 DATA2BITS_ID BOBS_ID
BITS BOBSBITS_BOBS_JT
17. Dell World User Forum
SQL Basics – Table Structure
Group By
Having
Select
From
Where
Order By
Group By is used to condense
results. This is useful for
aggregate functions like Count().
Having is used to further filter
results that have been passed
through a Group By statement.
Select specifies what you want
returned from the query and
the order of the columns.
From indicates what tables will be used in the gathering of
your desired data.
This section includes any joins that you wish to use.
The where clause allows you to filter the data
that is returned against a condition you set.
Order by allows you to sort the
results, by column, in ascending or
descending order.
18. Dell World User Forum
SQL Basics – Table Structure
Group By
Having
Select
From
Where
Order By
Let’s order them the way
they should be written.
21. Dell World User Forum
SQL Basics – Joins
Not all data is stored in one table
Join groups tables together into a virtual table for the purposes of your query.
Many different kinds, but the most basic, and often the most efficient are LEFT JOIN or RIGHT JOIN
• Left join SOFTWARE on MACHINE_SOFTWARE_JT.SOFTWARE_ID = SOFTWARE.ID
22. Dell World User Forum
SQL Basics – Joins
TABLE_1 TABLE_2
1 C
2 D
3 A
4 B
A 11
B 12
C 13
D 14
5 B E 15
ID T2_ID ID DATA
LEFT JOIN
TABLE_2
ON
TABLE_1.T2_ID
= TABLE_2.ID
B 12
23. Dell World User Forum
SQL Basics – Joins
2 D
3 A A 11
D 14
TABLE_1 TABLE_2
1 C C 13
ID T2_ID ID DATA
4 B
B 125 B
B 12
TABLE_3
A 689
T 45
C 168
X 254
ID DATA
R 734
NULL NULL NULL NULL
NULL NULL NULL NULL
NULL NULL NULL NULL
35. Dell World User Forum
KACE Support Portal Migrating to Dell Software Support Portal
• Starting in November, all KACE
Support Portal material will be
migrated to the Dell Software Support
Portal
• All service requests will be submitted
online or by phone
• Same great content
– Knowledge base articles
– Video tutorials
– Product documentation
– JumpStart training
• Check out the Support Portal Getting
Started videos
Editor's Notes
I’m Brooks Roberts and this is Michael Klocek.
Just a couple of notes about myself…
And Mike…
Today we’re going to cover a lot of ground…
We’re going to start off by talking about what SQL is and why you should care.
Table Structure in general
Basic Query structure
How to connect third party applications to the database
How to use the wizards to help you learn
And finally, how to put all that knowledge together and build queries in what I like to call, “The Easy Way”.
So… Why should you care at all?
Well, let’s ask the room….
In general, here’s a short list of important things that the appliance uses SQL for…
What others can you think of?
I know some of you may be asking. Don’t I have Wizards for all of that stuff?!
Indeed you do…
Then why would I bother to learn a new language….?
Three main things drive the need/desire in my mind…
So, for those of you who may not be familiar with SQL in the room, lets start with some basics.
First off… What is SQL?
SQL stands for Structured Query Language.
This is the language that we use to interact with the database…
SQL is a standard and hence, most SQL applications have interchangeable terminology and functions.
At its most basic level, what makes up a database?
Tables… So let’s talk about the structure of tables.
As we said, tables are the building blocks of a database. Without tables, you have a pointless container with a name.
Once you start adding tables to the database, that shell suddenly becomes useful as it houses data.
As databases are made of tables, tables are made of columns and those columns are made of fields.
A Table will always have a primary key…
May or may not have a foreign key…
Now.. The main point of a database, in my mind, is to house relational data. But how do we know what fields in BITS, relates to what data in BOBS? Without relational information we cannot make that assumption. This is where foreign keys come into play in most situations.
One of the things you will notice with the K-Appliances are the lack of foreign keys in most of the major databases.
Instead of foreign keys we use what we call Join Tables.
Throughout the database, you will see tables that end in _JT. Within that same name are two other table names. For example here we have BITS_BOBS_JT which just in its name tells us that it is the Join Table for BITS and BOBS.
BITS.ID relates to BITS_BOBS_JT.BITS_ID and BOBS.ID relates to BITS_BOBS_JT.BOBS_ID
With all three tables we then know how BITS relates to BOBS.
Now that we know how tables relate to each other within the appliance, lets look at how to build queries.
Select Queries are built of the following items.
Select
From
Where
Group By
Having
Order By
Let’s put them all in the correct written order.
Looking at a basic query, you can see the order and that all commands are not necessarily mandatory… some can be inferred and some are only necessary in certain situations.
For example, it is possible to only use Select, although its data set is highly limited without declaring FROM what it is pulling data.
And, If you just want all results, Where is optional…
It takes practice, but you quickly learn what all is necessary and in what circumstances.
Arguably, the most important part of using SQL with a K-Appliance is understanding Joins. Joins make it possible to get that relational data that you are most assuredly after.
We need to understand and utilize joins because…
We use joins to group tables together into large virtual tables for the purposes of the query.
There are many different kinds of joins: Inner, Outer, Cross, Self, etc… The most basic and often the most efficient are Left and Right Joins.
When we left join a table to another table, it maintains the integrity of the data in the table to the left…
For these two tables, the left join would be…
And the following would be the resultant data set.
As you can see, it maintained the data integrity of the table to the left…
If I took that data set and then RIGHT joined another table to it, you will see how a right join will maintain the integrity of the data in the table to the RIGHT.
As you can see… anywhere the data does not match up, the mismatched data falls away and we’re left with null values in those fields.
Okay, we’ve learned the basics and we want to start playing with the database… We need tools!
You can connect to the appliance with all kinds of tools. You can use Query browsers, Microsoft Access and Crystal Reports as a few examples… If you’re more comfortable using one over the other, there’s no problem.
Most Query browsers now days, have native connections that allow you to connect and start querying.
Microsoft applications need a special ODBC connector for MySQL. Crystal reports uses a JDBC connector.
We’re going to be working with two applications that use a native connection, MySQL Workbench and Toad for MySQL.
You can get MySQL Workbench from MySQL.COM.
Scroll down and you’ll see a Downloads (GA) section on the page.
From here, click MySQL Workbench
Then select the Installer file you want.
Toad can be found at http://www.quest.com/toad-for-mysql/
Click download the free trial, enter some personal information and….
Acquire the freeware via the download link.
Before we start exploring the database. Let’s setup and configure both applications.
<setup, configure, explore>