Session form series of conferences during Data Relay (formerly SQL Relay) 2018 in Newcastle, Leeds, Birmingham, Reading, Bristol. The session contains only slides form the talk (no videos included).
Progress OpenEdge database administration guide and referenceVinh Nguyen
Progress OpenEdge database administration guide and reference
Contact us anytime: Think Next - QAD Partner in Vietnam
- Website: http://www.thinknext.vn
- Email: contact [at] thinknext.vn
This document describes a set of Progress OE parameters and show how they can impact a Progress OE database performance.
I wrote this document by an easy way so every one can understand it even if he's not a Progress OE DB administrator.
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
Symantec AutoSupport is a set of infrastructure, process, and systems that enhance the support experience through proactive monitoring of Symantec Appliance hardware and software, as well as providing automated error reporting and support case creation.
Through automation, internet access, and case management integration, Symantec can vastly improve the support process and give our support engineers the tools to solve problems faster. The AutoSupport infrastructure within Symantec analyzes the Call Home data from each appliance to provide proactive customer support and incident response for hardware failures thus reducing the need for an administrator to initiate support cases. It also enables Symantec to better understand how customers configure and use appliances, and where improvements would be most beneficial.
AutoSupport can also correlate the Call Home data with other site configuration data held by Symantec, for technical support and error analysis. With AutoSupport, Symantec greatly improves the customer support experience.
June 17th & 18th 2015. FREE. Online. On-demand. On your device.
Over 60 sessions in 2 days. Starting at 11:00 EDT on the 17th June, SPBiz brings insights and knowledge to help your business benefit from SharePoint, wherever you are. If you want to get the most out of your SharePoint platform, this is THE conference for you. Free to attend as a delegate, bringing influential speakers and direction setters in the SharePoint community directly to your device.
2AM. We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
Progress OpenEdge database administration guide and referenceVinh Nguyen
Progress OpenEdge database administration guide and reference
Contact us anytime: Think Next - QAD Partner in Vietnam
- Website: http://www.thinknext.vn
- Email: contact [at] thinknext.vn
This document describes a set of Progress OE parameters and show how they can impact a Progress OE database performance.
I wrote this document by an easy way so every one can understand it even if he's not a Progress OE DB administrator.
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
Symantec AutoSupport is a set of infrastructure, process, and systems that enhance the support experience through proactive monitoring of Symantec Appliance hardware and software, as well as providing automated error reporting and support case creation.
Through automation, internet access, and case management integration, Symantec can vastly improve the support process and give our support engineers the tools to solve problems faster. The AutoSupport infrastructure within Symantec analyzes the Call Home data from each appliance to provide proactive customer support and incident response for hardware failures thus reducing the need for an administrator to initiate support cases. It also enables Symantec to better understand how customers configure and use appliances, and where improvements would be most beneficial.
AutoSupport can also correlate the Call Home data with other site configuration data held by Symantec, for technical support and error analysis. With AutoSupport, Symantec greatly improves the customer support experience.
June 17th & 18th 2015. FREE. Online. On-demand. On your device.
Over 60 sessions in 2 days. Starting at 11:00 EDT on the 17th June, SPBiz brings insights and knowledge to help your business benefit from SharePoint, wherever you are. If you want to get the most out of your SharePoint platform, this is THE conference for you. Free to attend as a delegate, bringing influential speakers and direction setters in the SharePoint community directly to your device.
2AM. We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
VMworld 2013: vSphere Data Protection 5.5 Advanced VMware Backup and Recovery...VMworld
VMworld Europe 2013
Mauricio Barra, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Jeff Hunter, VMware
How to fix IO problems for faster SQL Server performanceSolarWinds
How do you determine the impact of I/O on poor performance? Learn the fundamentals of SQL Server storage and how it impacts performance, including:
*the difference between latency, throughput, IOPS, and how they relate
*performance characteristics of different storage solutions
*techniques for analyzing storage subsystem performance
*new features in SolarWinds Database Performance Analyzer that will help you more accurately pinpoint and resolve I/O issue
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...Symantec
In this technical session we will share a few customer tested blueprints for implementing DR strategies with NetBackup appliances showing support for onsite and offsite disaster recovery. This includes the architecture design with Symantec best practices, down to execution of the wizards and command lines needed to implement the solution.
Watch the recording of this Google+ Hangout: http://bit.ly/13oTjvp
Find and fix SQL Server performance problems fasterSolarWinds
Great DBAs must be able to quickly identify problems with SQL Server instances. In this presentation, you will learn how to quickly identify where your problems are using tools such as:
*Dynamic Management Views
*Query Execution Plans
*Windows Performance Monitor
*Extended Events
*Third-party tools (including SolarWinds Database Performance Analyzer)
Exadata has been around since 2008 and the software features are being enhanced each release. This Presentation talks about the 12.1.x.x series of Software updates and some of the things you can now do with Exadata
DataStax | DSE: Bring Your Own Spark (with Enterprise Security) (Artem Aliev)...DataStax
Connecting Apache Spark to C* is easy, thanks to DataStax Spark Cassandra Connector. But what about Security?
The DSE bring Enterprise security and Kerberos support to C*. Latest Hadoop distribution has Spark support and also support Kerberos. So now you can add a Cassandra to you Hadoop infrastructure with integrated security and build reliable speed level and streaming applications by combining data from both worlds.
This presentation will show all that fun around security configurations
1. DSE client with SSL and Kerberos
2. Connect from Hadoop Spark to DSE
3. Connect DSE Spark to HDFS sources.
4. And all above even with Widows DC :)
About the Speaker
Artem Aliev Software Developer, DataStax
Artem Aliev is a software developer in the DataStax Analytics team. He works on integrating C* database with analytics solution like Spark and Hive.
C15LV: Ins and Outs of Concurrent Processing Configuration in Oracle e-Busine...Maris Elsins
Concurrent processing is a critical functionality in any e-Business Suite system. DBAs will recognize problems like jammed concurrent manager queues, failover problems, load balancing issues causing one node to be more loaded that another, performance overhead or even an unwanted bounce of the managers when incompatibility rules change. It is important to understand the configuration of a reliable concurrent processing environment, therefore, topics like PCP, node affinity, load balancing, optimal cache size and sleep time settings, separation of manager duties, request groups and others will be discussed.
Session from SQLDay 2016 Conference in Wroclaw.
2 AM. We're sleeping well and our mobile is ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talking about the potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Does virtual or physical SQL Server matter? We talk about systems, databases, people, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server environment are critical and how to be prepared for disaster. In some documents, I'll show You how to be BEST prepared.
• We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: And what NOW? New version old my old well-known session updated for whole changes which happened in DBA World in last two-three years.
• So, from the ground to the Sky and further - everything for surviving disaster. Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users.
• In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
VMworld 2013: vSphere Data Protection 5.5 Advanced VMware Backup and Recovery...VMworld
VMworld Europe 2013
Mauricio Barra, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Jeff Hunter, VMware
How to fix IO problems for faster SQL Server performanceSolarWinds
How do you determine the impact of I/O on poor performance? Learn the fundamentals of SQL Server storage and how it impacts performance, including:
*the difference between latency, throughput, IOPS, and how they relate
*performance characteristics of different storage solutions
*techniques for analyzing storage subsystem performance
*new features in SolarWinds Database Performance Analyzer that will help you more accurately pinpoint and resolve I/O issue
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...Symantec
In this technical session we will share a few customer tested blueprints for implementing DR strategies with NetBackup appliances showing support for onsite and offsite disaster recovery. This includes the architecture design with Symantec best practices, down to execution of the wizards and command lines needed to implement the solution.
Watch the recording of this Google+ Hangout: http://bit.ly/13oTjvp
Find and fix SQL Server performance problems fasterSolarWinds
Great DBAs must be able to quickly identify problems with SQL Server instances. In this presentation, you will learn how to quickly identify where your problems are using tools such as:
*Dynamic Management Views
*Query Execution Plans
*Windows Performance Monitor
*Extended Events
*Third-party tools (including SolarWinds Database Performance Analyzer)
Exadata has been around since 2008 and the software features are being enhanced each release. This Presentation talks about the 12.1.x.x series of Software updates and some of the things you can now do with Exadata
DataStax | DSE: Bring Your Own Spark (with Enterprise Security) (Artem Aliev)...DataStax
Connecting Apache Spark to C* is easy, thanks to DataStax Spark Cassandra Connector. But what about Security?
The DSE bring Enterprise security and Kerberos support to C*. Latest Hadoop distribution has Spark support and also support Kerberos. So now you can add a Cassandra to you Hadoop infrastructure with integrated security and build reliable speed level and streaming applications by combining data from both worlds.
This presentation will show all that fun around security configurations
1. DSE client with SSL and Kerberos
2. Connect from Hadoop Spark to DSE
3. Connect DSE Spark to HDFS sources.
4. And all above even with Widows DC :)
About the Speaker
Artem Aliev Software Developer, DataStax
Artem Aliev is a software developer in the DataStax Analytics team. He works on integrating C* database with analytics solution like Spark and Hive.
C15LV: Ins and Outs of Concurrent Processing Configuration in Oracle e-Busine...Maris Elsins
Concurrent processing is a critical functionality in any e-Business Suite system. DBAs will recognize problems like jammed concurrent manager queues, failover problems, load balancing issues causing one node to be more loaded that another, performance overhead or even an unwanted bounce of the managers when incompatibility rules change. It is important to understand the configuration of a reliable concurrent processing environment, therefore, topics like PCP, node affinity, load balancing, optimal cache size and sleep time settings, separation of manager duties, request groups and others will be discussed.
Session from SQLDay 2016 Conference in Wroclaw.
2 AM. We're sleeping well and our mobile is ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talking about the potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Does virtual or physical SQL Server matter? We talk about systems, databases, people, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server environment are critical and how to be prepared for disaster. In some documents, I'll show You how to be BEST prepared.
• We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: And what NOW? New version old my old well-known session updated for whole changes which happened in DBA World in last two-three years.
• So, from the ground to the Sky and further - everything for surviving disaster. Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users.
• In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
2AM. We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
Run MongoDB with Confidence Using MongoDB Management Service (MMS)MongoDB
MongoDB Management Service (MMS) is the application for managing MongoDB, created by the engineers who develop MongoDB. MMS provides visibility into the performance of your cluster, alerting when key metrics are out of range and backup and recovery of your mission critical data. This session will provide you with an overview of MMS, including installation and setup and a walk through of metrics and alerts. Then we'll compare and contrast the various different backup strategies, with a deep dive on using MMS to back up your MongoDB data.
When planning for Disaster Recovery it is essential to have a clearly defined set of objectives that are based on your businesses needs .InTechnology's Product Director for Data & Cloud Services, Stefan Haase, provides tips for any business to consider when putting together their disaster recovery plan. http://www.intechnology.co.uk/resource-centre/webcast-disaster-recovery-planning.aspx
Slides from data MindsConnect 2018 Conference hosted at Ghelamnco Arena in Ghent by Belgian SQL Server USer Grup. SECDev(OPS) How to embrace your security.
Backup? Who cares! Now and Then? We store our data in the cloud. Somewhere in the Cloud. Which Cloud? Who cares! But we are still SQL Server Professionals, so… are we need backup? Should we use newest opportunities or old methods? Are we going a step further or step back? On my session, I will try to find answers for all of those (and more) questions. Demos, cases, and examples from the world of backup. And of course worst practices.
Our data should be secure. And our environment too. What we can do for maximizing security in a hybrid environment, where SQL Server exist in two forms: premise and cloud. How to organize our job, how to control our data if we use Windows Azure SQL Database - The Cloud Database. physical security, policy-based management, auditing, encryption, federation, access and authorization. All of those subjects will be covered during my session.
On my first session I would to introduce everyone to formerly known SQL Azure (actually Windows Azure SQL Database). Under Tips and Trick session I will show which points, features, compatibility and non-compatibility for SQL Azure are important for DBA's. I will cover functionalities, performance, cost, and sla and security aspects.
After break I will show how we can work with our data in the Cloud using SQL Azure, Blob Storage, what functionality of backup, restore, encryption and availability are available for us, how we can implement hybrid environment and when an why it is (or not) good practice.
And finally I hope we will find few minutes for discussion about Future of the DBA (not only in AD 2016)
SQLSaturday je jednodňová konferencia určená pre SQL Server profesionálov a aj pre tých, ktorí sa chcú dozvedieť niečo o SQL Servri. Na konferencii budú prednášať domáci aj zahraniční prednášatelia a vďaka našim sponzorom je vstup na konferenciu voľný. Podmienkou je len registrácia. Konferencia sa uskutoční dňa 20. júna 2015 v priestoroch spoločnosti Microsoft Slovakia, Apollo Business Center II, Prievozská 4D, 821 09 Bratislava.
SQLSaturday is a training event for SQL Server professionals and those wanting to learn about SQL Server. This event will be held Jun 13 2015 at Hochschule Bonn-Rhein-Sieg, Grantham-Allee 20, St. Augustin, Rheinland, 53757, Germany. Admittance to this event is free, all costs are covered by donations and sponsorships. Please register soon as seating is limited, and let friends and colleagues know about the event.
###
Maintenance Plans for Beginners (but not only) | Each of experienced administrators used (to some extent) what is called Maintenance Plans - Plans of Conservation. During this session, I'd like to discuss what can be useful for us to provide functionality when we use them and what to look out for. Session at 200 times the forward-300, with the opening of the discussion.
DELIVERED: Whitehall Media’s 3rd Enterprise Security and Risk Management conference | April, 28th London {http://www.whitehallmedia.co.uk/esrm/}
ABSTRACT: Cloud Computing is ready. Industry and government are already embarking on a journey towards Cloud. But… Trust is the Primer. How much trust can we place in cloud providers? What is the nature of this trust? How important is it and what is the future of trust?
Microsoft released SQL Azure more than two years ago - that's enough time for testing (I hope!). So, are you ready to move your data to the Cloud? If you’re considering a business (i.e. a production environment) in the Cloud, you need to think about methods for backing up your data, a backup plan for your data and, eventually, restoring with Red Gate Cloud Services. In this session, you’ll see the differences, functionality, restrictions, and opportunities in SQL Azure and On-Premise SQL Server 2008/2008 R2/2012. We’ll consider topics such as how to be prepared for backup and restore, and which parts of a cloud environment are most important: keys, triggers, indexes, prices, security, service level agreements, etc.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
4. 2:00 am … in a dreams…
• Your best time for dreaming … is the best time for Disaster
• Your mobile phone ringing and ringing…
• And Your husband / wife say…….
5. 2:15 am … in a car
• What’s happen with my server?
• When I made last backup?
• Where is my backup?
• Have I ever tried to restore?
− If yes – I hope that all in a team (about team soon) remember
about (me?)
− If not – who can help me NOW?
6. 2:40 am … in a server room
• $#$$@$^^#^&^@!#
• Is Windows Server alive?
− YES (thanks all saints)
− or NOT (damn)
− who is responsible for it?
• Is my SQL Server alive?
− YES (why phones ringing)
− or NOT (…)
− why I’m responsible for it?
7. a disaster – what is it
CAUSES OF
DISASTER?
NATURAL
CAUSES
HUMAN
ERROR
INTENTIONAL
CAUSE
fire / flood / lightning / earthquake /
volcano
hurricane / tornado / temperature
sabotage / terrorism / vandalism / viruses /
theft / union activities / disgruntled
employees
programming errors / unauthorized
personel / improper maintenance / lack of
training / carelessness / cable cuts
10. best practice for surviving disaster
Backups (sql databases)
• about type of backup ( simple rm / full rm)
• about place for stored backup data
• about backup window
• about procedure used for backup
• about backup tools
• about backup of „backup logs”
• about estimated time for executing backup
• about REAL TIME of executing backup
IT’S ONLY ONE:
BE PREPARED
11. backup > extract from sop*
In the request, backup, should include the following information:
• Information about the operating system and application version for online
backup and installed updates for these components a file backup policy, in particular:
− a number of versions of a file stored
− the storage time of the next version of the file
− the frequency of execution of such incremental backups with the proposal of their
implementation
• Online Backup Policy
− the storage time of a full backup with storage time such an incremental backup
− the time of transaction log files
− the frequency of execution of a full backup with the proposal deadline for
its implementation
− the frequency of execution of the transaction log backup
• Information about trees directories / files that should be omitted
or included during backup tasks (include / exclude list)
• Number and type / model of physical processors,
• Does the node will use the connection to the SAN to implement backup
IT’S ONLY ONE:
BE PREPARED
12. backup (registry) > extract from sop*
This register contains information about a backup plan implemented.
Backup file space:
− number of versions of a file stored in a backup
− number of days that are kept more versions of a file
− number of versions of a file stored in the backup system after its removal from
client device
− number of days that will store the latest version of the deleted file from the client
device
− number of days that will be stored in the archive
The list of nodes defined in the system backup:
− Domain | Node name | IP address of the node
− The list of defined backup tasks (called schedule)
− name of the task (schedule) | execution time
− a period of at which the task is repeated
IT’S ONLY ONE:
BE PREPARED
13. SQL Server Backup Best Practices |
Posted on October 17, 2007 by Brent Ozar in SQL Server
> http://bit.ly/12oXm4h
➢ Never back up databases to local disk.
➢ Back up databases to a fileshare, then back the share up to tape.
➢ Cost justify the network share with lower licensing costs & simpler backups.
➢ Back up to a different SAN if possible.
➢ My sweet spot for the backup array is raid 10 SATA.
➢ Backup agents like NetBackup and Backup Exec mean giving up scheduling control.
➢ Do regular fire drill rebuilds and restores.
➢ Build a standalone restore testbed.
➢ Keep management informed on restore time estimates.
➢ Trust no one.
Best Practices by Brent Ozar
14. best practice for surviving disaster
Restore (sql databases)
• about type of backup ( simple rm / full rm)
• about place for stored backup data
• about the procedures of recovery
• about estimated time for recovery
• about REAL TIME for recovery
• about tools for recovery
• about Corporate Backup Manager
• about password for access to library
IT’S ONLY ONE:
BE PREPARED
15. restore > extract from sop*
Registery for Recovery/Restore/Replacement Tests
This register contains information about the tests and replacement of part or all of the
environment. It consists of the following fields:
• the date of commencement and completion of the recovery test
• client for which the test was performed recovery test
• servers involved in testing and replacement
• extent of testing and replacement
• people performing the recovery test
• person on the client side accepts the correctness of the recovery test
• subsequent to the recovery test
IT’S ONLY ONE:
BE PREPARED
16. best practice for surviving disaster
Performance best practices for SharePoint backup and restore operations
• Minimize latency between SQL Server and the backup location
• Avoid processing conflicts
• Keep databases small for faster recovery times
• Use incremental backups for large databases
• Use compression during backup
• Use RAID 10 if you use RAID
IT’S ONLY ONE:
BE PREPARED
17. best practice for surviving disaster
Procedures
• It is not about stored procedures!!!
• It’s about storing procedures with answers for the following:
− One piece of paper
− How to start restore
− Who can help
− How to processing a restore
− When we can finish
• It MUST be simple
IT’S ONLY ONE:
BE PREPARED
18. best practice for surviving disaster
Roles
• SharePoint Administrator / Farm Administrator
• Database Administrator / Windows Administrator
• Backup Administrator / Network Administrator
• Storage Administrator / Security Administrator
• Customer Key Account / Manager of branch
• Data Center Manager
• Nightshift Operator - BOFH
• Customer Administrator!!
IT’S ONLY ONE:
BE PREPARED
19. best practice for surviving disaster
PSO > USO > SLA
• PSO Planned System Outages – Planned System Unavailability
− Minimum planned unavailability, due to the need to carry out modernization work,
installing patches, replacement / extension of hardware,
− Agreed/accepted by/with the client and not affecting the provisions of the HA, and
SLA, until
• ...USO Unplaned System Outages – Unplanned System Unavailability
− an error that prevents a partial or total work environment in a tangible, measurable
customer
− resulting in high costs if you need repairs, as well as penalty payments for non-SLA
IT’S ONLY ONE:
BE PREPARED
20. Availability %
Downtime
per year
Downtime
per month*
Downtime
per week
90% 36.5 days 72 hours 16.8 hours
95% 18.25 days 36 hours 8.4 hours
98% 7.30 days 14.4 hours 3.36 hours
99% 3.65 days 7.20 hours 1.68 hours
99.5% 1.83 days 3.60 hours 50.4 min
99.8% 17.52 hours 86.23 min 20.16 min
99.9% ("three nines") 8.76 hours 43.2 min 10.1 min
99.95% 4.38 hours 21.56 min 5.04 min
99.99% ("four nines") 52.6 min 4.32 min 1.01 min
99.999% ("five nines") 5.26 min 25.9 s 6.05 s
99.9999% ("six nines") 31.5 s 2.59 s 0.605 s
in the search of nine...
IT’S ONLY ONE:
BE PREPARED
28. best practice for surviving disaster
Envelope
With ACTUAL!!! User names and passwords for:
• Windows Server Administrator
• SQL Server Administrator
• SQL Server Agent
• SQL Server Services (if You didn’t use default)
• SQL Server Applications Services
• Backup accounts
• SQL_Admin
• SQL_Engine
• SQL_Agent
• SQL_ReportingSRV
• SQL_AnalisysSRV
• SQL_InegrationSRV
• SP_Farm
• SP_Admin
• SP_Crawl
• SP_Install
• SP_WebApp
• SP_User
• SP_Content
• SP_SuperUser
• SP_SuperReader
IT’S ONLY ONE:
BE PREPARED
29. best practice for surviving disaster
Hardware
Some of the hard stuff for replacement:
• Server
• Motherboard
• Memory (RAM)
• Processor (CPU)
• Network Adapter (LAN/NIC)
• Fibre Channel Adapter
• Hard Disk (IDE/SATA/SAS/SSD…)
• RAID Controller
IT’S ONLY ONE:
BE PREPARED
30. best practice for surviving disaster
Support
Having actual list of actual support/maintenance things:
company (like hp, dell, cisco)
actual, checked contact details
type of support (nbd, 8x5, 8x7, extended)
the scope and details of the contract support
− Series number
− Serial number
− Repair warranty
− General warranty
first contacts to helpdesk and route for request
manager of „first contact”
executive power person for escalation
IT’S ONLY ONE:
BE PREPARED
31. best practice for surviving disaster
Software | x32, x64, ia64 | Standard, Enterprise, Data Center, Web, Express
Windows
− 2003 / 2003R2 / 2008 / 2008R2 / 2012 / 2012R2 / 2016 / 2019 ...
− SP 1, 2, 3, 4 +CU 1, 2, 3, …
− Standard, Enterprise, Data Center
SharePoint
− 2007 / 2010 / 2013 / 2016 / 2019…
− SP 1, 2 + CU March, April, May, November, …
SQL Server
− 2005, 2008, 2008R2, 2012, 2012R2, 2014, 2016, 2017...
− SP 1, 2, 3, 4 +CU 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16….
AGENT ORANGE
Linux? Docker? k8s?
IT’S ONLY ONE:
BE PREPARED
32. best practice for surviving disaster
Keys
Some keys which You need…
Serial keys
Rack keys
Server keys
Storage keys
Knife
Torchlight; torch; flashlight (lighter)
Phone
IT’S ONLY ONE:
BE PREPARED
33. best practice for surviving disaster
ENCRYPTION
If You use encryption (such a TDE)
TDE
− Create encryption key
− Export encryption key
− Backup encryption key
CA
− Remember about expiration date
Storage Encryption
BitLocker
but then:
➢ Always Encrypted
➢ Dynamic Data Masking
➢ Row Level Security
IT’S ONLY ONE:
BE PREPARED
34. best practice for surviving disaster
TEAM
You can work with disaster as:
Team Member
Team Leader
Last Samurai
IT’S ONLY ONE:
BE PREPARED
35. best practice for surviving disaster
MANAGERS
hmm...
IT’S ONLY ONE:
BE PREPARED
58. best practice for surviving disaster
➢ Backup&Restore for sql (and know-how about stored place, and restoring way)
➢ Backup&Restore for sp (tools, size, performance, site collection size, compression )
➢ Procedures (the short is better | one page is the best)
➢ Roles (who can help, who is necessary for access)
➢ SLA (90? 95? 99,99? in minutes, hours or days you have to recover)
➢ Envelope (with user names and passwords for all important accounts)
➢ Hardware (server, motherboard, CPU, RAM, LAN, HDD, SDD, USB)
➢ Support (maintenance contract, scope, contacts, responsibility)
➢ Software (Windows+SQLServer+SharePoint and SP+CU)
➢ Keys (serial numbers, physical keys, knife)
➢ Encryption (arrghhhhh!!! Certificates, keys, internal/external)
➢ Team (member, leader, samurai…)
➢ Managers (hmmm)
IT’S ONLY ONE:
BE PREPARED