Giuseppe Maxia presents on MySQL high availability using Continuent Tungsten. He discusses how Tungsten provides transparency and ease of use for database users by enabling features like easy and automated failover between database servers. It allows applications to continue working without changes even during a failover. Tungsten also makes it easy to manage high availability across multiple database sites. The presentation covers how Tungsten installations work and demonstrates high availability configurations for both single and multiple sites.
Replication enhancements in MySQL 5.6, including GTIDs, HA / Self-healing, multi-threaded slaves and more. Slides over design rationale, implementation and how to get started using these new capabilities
This presentation is designed to assist Developers, Architects and DBAs in navigating the complex waters of HA. It presents:
- Methodology for selecting the right HA solution to meet SLAs;
Tour of the leading certified HA solutions for MySQL;
Operational best practices to implement and support HA.
Playing in the Same Sandbox: MySQL and Oraclelynnferrante
SCaLE Linux presentation January2012 "Playing in the Same Sandbox: MySQL and Oracle" describes current and upcoming integrations between MySQL and other Oracle products like Oracle Database firewall, Audit Vault, Secure Backup, Goldengate, My Oracle Support and MySQL Enterprise Monitor
Implementing the Future of PostgreSQL Clustering with TungstenCommand Prompt., Inc
Robert Hodges
Users have traditionally used database clusters to solve database availability and performance requirements. However, clustering requirements are changing as hardware improvements make performance concerns obsolete for many users. In this talk I will discuss how the Tungsten project uses master/slave replication, group communications, and rules processing to develop easy-to-manage database clusters that solve database availability, protect data, and address hardware utilization. Our implementation is based on existing PostgreSQL capabilities like Londiste and WAL shipping, which we eventually plan to replace with our own log-based replication. Come see the future of database clustering with Tungsten!
Replication enhancements in MySQL 5.6, including GTIDs, HA / Self-healing, multi-threaded slaves and more. Slides over design rationale, implementation and how to get started using these new capabilities
This presentation is designed to assist Developers, Architects and DBAs in navigating the complex waters of HA. It presents:
- Methodology for selecting the right HA solution to meet SLAs;
Tour of the leading certified HA solutions for MySQL;
Operational best practices to implement and support HA.
Playing in the Same Sandbox: MySQL and Oraclelynnferrante
SCaLE Linux presentation January2012 "Playing in the Same Sandbox: MySQL and Oracle" describes current and upcoming integrations between MySQL and other Oracle products like Oracle Database firewall, Audit Vault, Secure Backup, Goldengate, My Oracle Support and MySQL Enterprise Monitor
Implementing the Future of PostgreSQL Clustering with TungstenCommand Prompt., Inc
Robert Hodges
Users have traditionally used database clusters to solve database availability and performance requirements. However, clustering requirements are changing as hardware improvements make performance concerns obsolete for many users. In this talk I will discuss how the Tungsten project uses master/slave replication, group communications, and rules processing to develop easy-to-manage database clusters that solve database availability, protect data, and address hardware utilization. Our implementation is based on existing PostgreSQL capabilities like Londiste and WAL shipping, which we eventually plan to replace with our own log-based replication. Come see the future of database clustering with Tungsten!
Get the best out of MySQL Cluster, presentation covers:
- Tuning and optimization to exploit the auto-sharded, distributed design of MySQL Cluster
- Using Adaptive Query Localization to scale cross-shard JOINs
- Data access patterns, schema and query optimizations
- Recommended tuning parameters
Tune in to the on-demand webinar: http://www.mysql.com/news-and-events/on-demand-webinars/display-od-719.html
Novell Identity Manager Tips, Tricks and Best PracticesNovell
This session covers the top tips, tricks and best practices for each component of Novell Identity Manager. You will receive experience by learning from the common mistakes made by others. The session focuses on the identity engine, connector set, Roles Based Provisioning Module and utilities that go into making any Identity Manager implementation easy. You will walk away with the knowledge of best practices for installation, configuration, and customization of Identity Manager. In addition, you will know how to create new policies to enhance your identity and access management solution by removing the barriers between applications, data stores and network platforms. A good understanding of Novell Identity Manager architectures and policies is highly recommended.
Escape From Amazon: Tips/Techniques for Reducing AWS DependenciesSoam Acharya
As more startups use Amazon Web Services, the following scenario becomes increasingly frequent - the startup is acquired but required by the parent company to move away from AWS and into their own data centers. Given the all encompassing nature of AWS, this is not a trivial task and requires careful planning at both the application and systems level. In this presentation, I recount my experiences at Delve, a video publishing SaaS platform, with our post acquisition migration to Limelight Networks, a global CDN, during a period of tremendous growth in traffic. In particular, I share some of the tips/techniques we employed during this process to reduce AWS dependence and evolve to a hybrid private/AWS global architecture that allowed us to compete effectively with other digital video leaders.
21st Century Service Oriented ArchitectureBob Rhubart
Service Oriented Architecture has evolved from concept to reality in the last decade. The right methodology coupled with mature SOA technologies has helped customers demonstrate success in both innovation and ROI. In this session you will learn how Oracle SOA Suite’s orchestration, virtualization, and governance capabilities provide the infrastructure to run mission critical business and system applications. And we’ll take a special look at the convergence of SOA & BPM using Oracle’s Unified technology stack.
(As presented by Samrat Ray at Oracle Technology Network Architect Day in Chicago, October 24, 2011.)
SQL Server 2012 : réussir la migration - Stéphane Haby - Antonio De Santo - d...dbi services
Une migration de base de données n'est pas toujours une tâche simple à réaliser. Découvrez quels sont les pièges à éviter, les problématiques que l'on peut rencontrer mais également les bonnes pratiques issues de notre expérience SQL Server 2012. Vous apprendrez tout ce qu'il faut savoir pour réussir une migration en toute sérénité.
Edition Based Redifinition, The key to onine application upgrade.
When upgrading an application or implementation based on PL/SQL
means in generally compile of the PL / SQL procedures.
During this compilationfase end users can not use the application:
they must wait until the entire change in the application is implemented.
During the implementation can be a bit unpredictable behavior.
In Oracle 11g Release 2, this problem is past: by utilizing Edition it is possible to live new code to implement and compile,
in one stroke current is made
Get the best out of MySQL Cluster, presentation covers:
- Tuning and optimization to exploit the auto-sharded, distributed design of MySQL Cluster
- Using Adaptive Query Localization to scale cross-shard JOINs
- Data access patterns, schema and query optimizations
- Recommended tuning parameters
Tune in to the on-demand webinar: http://www.mysql.com/news-and-events/on-demand-webinars/display-od-719.html
Novell Identity Manager Tips, Tricks and Best PracticesNovell
This session covers the top tips, tricks and best practices for each component of Novell Identity Manager. You will receive experience by learning from the common mistakes made by others. The session focuses on the identity engine, connector set, Roles Based Provisioning Module and utilities that go into making any Identity Manager implementation easy. You will walk away with the knowledge of best practices for installation, configuration, and customization of Identity Manager. In addition, you will know how to create new policies to enhance your identity and access management solution by removing the barriers between applications, data stores and network platforms. A good understanding of Novell Identity Manager architectures and policies is highly recommended.
Escape From Amazon: Tips/Techniques for Reducing AWS DependenciesSoam Acharya
As more startups use Amazon Web Services, the following scenario becomes increasingly frequent - the startup is acquired but required by the parent company to move away from AWS and into their own data centers. Given the all encompassing nature of AWS, this is not a trivial task and requires careful planning at both the application and systems level. In this presentation, I recount my experiences at Delve, a video publishing SaaS platform, with our post acquisition migration to Limelight Networks, a global CDN, during a period of tremendous growth in traffic. In particular, I share some of the tips/techniques we employed during this process to reduce AWS dependence and evolve to a hybrid private/AWS global architecture that allowed us to compete effectively with other digital video leaders.
21st Century Service Oriented ArchitectureBob Rhubart
Service Oriented Architecture has evolved from concept to reality in the last decade. The right methodology coupled with mature SOA technologies has helped customers demonstrate success in both innovation and ROI. In this session you will learn how Oracle SOA Suite’s orchestration, virtualization, and governance capabilities provide the infrastructure to run mission critical business and system applications. And we’ll take a special look at the convergence of SOA & BPM using Oracle’s Unified technology stack.
(As presented by Samrat Ray at Oracle Technology Network Architect Day in Chicago, October 24, 2011.)
SQL Server 2012 : réussir la migration - Stéphane Haby - Antonio De Santo - d...dbi services
Une migration de base de données n'est pas toujours une tâche simple à réaliser. Découvrez quels sont les pièges à éviter, les problématiques que l'on peut rencontrer mais également les bonnes pratiques issues de notre expérience SQL Server 2012. Vous apprendrez tout ce qu'il faut savoir pour réussir une migration en toute sérénité.
Edition Based Redifinition, The key to onine application upgrade.
When upgrading an application or implementation based on PL/SQL
means in generally compile of the PL / SQL procedures.
During this compilationfase end users can not use the application:
they must wait until the entire change in the application is implemented.
During the implementation can be a bit unpredictable behavior.
In Oracle 11g Release 2, this problem is past: by utilizing Edition it is possible to live new code to implement and compile,
in one stroke current is made
This presentation covers:
- Definition of APM
- Comparison of APM approaches & vendors (scenario, agent and network-based)
- Challenges of Cloud & Virtualization for APM vendors
- Performance Vision's Virtual Appliance offering
For more information, please visit: http://www.securactive.net
Ca partner day - application lifecycle optimization - milano e romaCA Technologies Italia
Sessione di approfondimento sulle soluzioni per eliminare i vincoli derivanti dallo sviluppo software tradizionale attraverso la virtualizzazione dei servizi.
Advanced MySQL Replication Architectures - Luis SoaresMySQL Brasil
Arquiteturas avançadas e usos curiosos do recurso nativo de replicação do MySQL. Também são detalhadas algumas novidades da versão 5.6 que elevam a Replicação MySQL a outro nível.
Full blown of useful and highly technical information on SQL Server 2005 and 2008 High Availabilty features.
Included benchmarks results on: SQL Server 2005 vs. 2008 and Conventional vs. Solid State Devices.
Harnessing the Power of Master/Slave Clusters to Operate Data-Driven Business...Continuent
Users seeking high availability, disaster recovery and zero downtime maintenance operation for business-critical MySQL applications face confusing choices. Is multi-master or master/slave clustering better? What about synchronous versus asynchronous replication? Using a plain vanilla, stock MySQL or a modified version of it? Which of these choices are right for data-driven businesses that depend on fast, reliable data access?
This no-BS webinar cuts through the FUD to explore the real trade-offs between the different clustering and replication methods, then show you how Continuent Tungsten asynchronous master/slave clusters support these important capabilities for business-critical applications:
- High application write rates
- Mixed workloads consisting of large and small transactions
- Data across multiple geographically distributed locations
- Failures and more importantly recovery from them
- Zero downtime maintenance and software upgrades
- Use of off-the-shelf MySQL/MariaDB to avoid application changes and allow clusters to improve as MySQL itself does.
We illustrate key points with demonstrations and case studies from deployed systems. Join us for an educational session on the cutting edge of MySQL data management!
Building Tungsten Clusters with PostgreSQL Hot Standby and Streaming ReplicationLinas Virbalas
Hot standby and streaming replication move the needle forward for high availability and scaling for a wide number of applications. Continuent Tungsten has earlier supported PostgreSQL clustering using warm standby. In this talk we will describe how to build clusters using the PostgreSQL 9 features and give our report from the trenches.
This talk will cover how PostgreSQL 9 hot standby and streaming replication work from a user perspective, then dive into a description of how Tungsten really makes them to shine.
We'll cover the following issues:
* Configuration of warm standby and streaming replication
* Provisioning new standby instances
* Strategies for balancing reads across primary and standby database
* Managing failover
Please join us for an enlightening presentation a set of PostgreSQL 9 features that are interesting to a wide range of PostgreSQL users.
Webinar slides: Replication Topology Changes for MySQL and MariaDBSeveralnines
A database replication topology is never written in stone - it evolves along with your application and data. Changes are usually needed to help scale out, to distribute your database across multiple regions or data centers, or to perform software/hardware maintenance operations. The initial setup of a replication topology is simple, but as soon as you start changing it, things can quickly get complex.
How do we fail-over our replication masters and slaves without affecting the availability and consistency of our data?
In this webinar, we discuss how to perform replication topology changes in MySQL / MariaDB, and what the failover process may look like. We also discuss some external tools you may find useful when dealing with those operations.
AGENDA
MySQL Replication topology changes
using GTID
using regular replication
Failover process
Using MaxScale for automatic re-routing of queries
Other external tools useful when dealing with failover
Forefront 2010 Unified Access Gateway with SharePoint 2010 takes considerable planning and considerations depending on your topology. Here are a few things to note about it, and at least one way to do it.
Tungsten University: Geographically Distributed Multi-Master MySQL ClustersContinuent
Do you need run multi-master MySQL database clusters across sites? In this webinar we build on the multi-master capabilities of Continuent Tungsten, covered in our advanced replication topologies course, to help you build and manage systems that spread data across dozens or even hundreds of sites. We cover topics such as large scale topologies, transaction filtering, security, and moving replication from simple data movement to application messaging.
Course Topics:
- Review of multi-master replication topologies
- Setting up Continuent Tungsten clusters for local site HA
- Linking Continuent Tungsten clusters across sites
- Security for cross-site replication
- Handling local as well as site-wide failures
- Off-the-shelf filters to improve multi-master replication
- Custom filter development to implement business rules for application messaging.
Oracle WebLogic Server 12.2.1 Do More with LessEd Burns
Oracle WebLogic Server 12.2.1 (WLS) is the most significant release of WLS since Oracle added WLS to its product portfolio with the acquisition of BEA in 2008. This session by WebLogic developer and JCP Specification Lead Ed Burns goes behind the buzzwords and explains the enterprise value-add brought by WLS 12.2.1 in plain English. Ed infuses his decades long experience in web technologies throughout the presentation, addressing such topics as why app servers are still useful, what role standards play in transitioning to the cloud, and what is the difference between "full stack" and "monolith".
See an interview about this topic at <https: />.
Ed introduces the new version of WLS by taking a tour of two big ticket new features: multitenancy and Java EE 7. Other features such as continuous availability, REST management, and Docker/devops features will also be included.
The multitenancy features in WebLogic Server offer extreme efficiency, full isolation, application portability, and full automation, all in an easy to adopt format.
Java EE 7 is the latest version of the Java standard full stack of loosely coupled, highly cohesive technologies for building enterprise software. EE 7 features new versions of popular standards such as JAX-RS (REST), CDI, Servlet, JSF, JSON, WebSocket, JMS, and more.
WLS 12.2.1 delivers these and other new features, while continuing the promise of stability and scale developers expect.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. About me
• Giuseppe Maxia, a.k.a. The Data Charmer
• Worked in the MySQL team (2006-2010)
A
• Now QA Director, Continuent, Inc
• Using MySQL since 2001
• Creator and maintainer of MySQL Sandbox
• Community Contributor of the year (2006, 2011)
• Oracle ACE (2011)
• Oracle ACE Director (2012)
• BLOG: http://datacharmer.blogspot.com
Wednesday, December 05, 12 2