Come leggere e trarre utili informazioni dall'analisi di un NSD in caso di crash o hang del server Domino. Alcuni casi pratici ed un tool utile in fase di analisi. - Dominopoint Day 2008
This document provides information about Crysis 2, including system requirements, installation instructions, troubleshooting tips, and other useful information. It outlines the minimum required specifications, how to install from DVD or download, how to uninstall, where saved games are located, known issues, and firewall port information. It recommends ensuring video and audio drivers are up to date for best performance.
This lab shows how to optimize Java code to improve the performance of Java ME applications. The document describes an app called OptimizeMe that simulates a simple game loop to test performance. The app measures how long it takes to complete each loop iteration and displays the frame time. The goal is to optimize the code in the "work" portion of the loop to reduce frame times.
This summary provides an overview of key information from the document in 3 sentences:
The document discusses a media player application that uses augmented reality tracking to detect when a target is moving or stopped. It describes Java and JNI code for controlling audio playback based on the target's movement status. The media player uses OpenGL for 3D rendering and includes functions for starting, stopping, and seeking playback as well as detecting movement with a highpass filter.
Ведущие: Дмитрий Частухин и Дмитрий Юдин
Бла-бла-бла SAP. Бла-бла-бла крупные компании. Бла-бла-бла взлом на миллионы долларов. Вот так обычно начинается любой доклад о SAP. Но в этот раз все будет по-другому. Давненько не было рассказов о жестокой эксплуатации и необычных уязвимостях. Пришло время пуститься во все тяжкие! Докладчики расскажут (и покажут), как получить полный контроль над системой, используя ряд незначительных уязвимостей в службах SAP.
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгинodnoklassniki.ru
Crash dump as the block box of crashed JVM by Andrey Pangin. A talk from jokerconf.com.
Виртуальная машина Java способна отловить широкий спектр ошибок программирования. Результат она выдаст в виде исключения со стек-трейсом. Но что делать, если падает сама JVM, оставив лишь предсмертную записку под именем hs_err.log с загадочным содержимым?
В докладе я расскажу, что же зашифровано в аварийном дампе, и как эту информацию можно использовать для анализа проблемы и поиска причины. Мы рассмотрим ситуации, в которых JVM может сломаться, и в режиме живой демонстрации разберем примеры реальных падений, случившихся при разработке высоконагруженных приложений.
Building complex async applications is really hard. Whether you use callbacks, Promises, or EventEmitters, Error objects should have a place in your utility belt. They are indispensable when it comes to managing work flows in a highly asynchronous environment.
This talk covers patterns for using JavaScript Error (with a capital E) objects to build resilient applications, and introduce some modules that can be used to build errors with an elegant history of stack traces even through multiple asynchronous operations. Try/catch, callbacks, and other error handling mechanisms will be examined, revealing some potential deficiencies in the JavaScript language for dealing with errors.
Video: https://www.youtube.com/watch?v=PyCHbi_EqPs
The document appears to be a list of processes running on a system, including details like the process name, ID, memory usage, user, and window title if applicable. There are over 70 processes listed ranging from system idle processes to browser and application processes. The document provides a snapshot of all active processes, their resources used, and attributes at a single point in time on the system.
Bla-blah-blah SAP. Bla-blah-blah big companies. Bla-blah-blah hack multi-million dollar systems. This is how typical SAP Talks are started. But not this time. We are really missing hardcore exploitation stuff and unusual vulnerabilities, no matter where they are. Now it's time for real HARDCORE!
In our presentation, we will tell (and show) how by using a chain of minor vulnerabilities in different SAP services we can take complete control of an affected system. Have you ever heard that a denial of service vulnerability can be used for remote command execution? No, we are not talking about memory corruption. It's about how unexploitablea denial of service vulnerabilities can be exploited together with some minor issues to attack system in a way which you have never imagined.
You'll see the way from Anonymous to SAP_ALL, enjoy!
This document provides information about Crysis 2, including system requirements, installation instructions, troubleshooting tips, and other useful information. It outlines the minimum required specifications, how to install from DVD or download, how to uninstall, where saved games are located, known issues, and firewall port information. It recommends ensuring video and audio drivers are up to date for best performance.
This lab shows how to optimize Java code to improve the performance of Java ME applications. The document describes an app called OptimizeMe that simulates a simple game loop to test performance. The app measures how long it takes to complete each loop iteration and displays the frame time. The goal is to optimize the code in the "work" portion of the loop to reduce frame times.
This summary provides an overview of key information from the document in 3 sentences:
The document discusses a media player application that uses augmented reality tracking to detect when a target is moving or stopped. It describes Java and JNI code for controlling audio playback based on the target's movement status. The media player uses OpenGL for 3D rendering and includes functions for starting, stopping, and seeking playback as well as detecting movement with a highpass filter.
Ведущие: Дмитрий Частухин и Дмитрий Юдин
Бла-бла-бла SAP. Бла-бла-бла крупные компании. Бла-бла-бла взлом на миллионы долларов. Вот так обычно начинается любой доклад о SAP. Но в этот раз все будет по-другому. Давненько не было рассказов о жестокой эксплуатации и необычных уязвимостях. Пришло время пуститься во все тяжкие! Докладчики расскажут (и покажут), как получить полный контроль над системой, используя ряд незначительных уязвимостей в службах SAP.
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгинodnoklassniki.ru
Crash dump as the block box of crashed JVM by Andrey Pangin. A talk from jokerconf.com.
Виртуальная машина Java способна отловить широкий спектр ошибок программирования. Результат она выдаст в виде исключения со стек-трейсом. Но что делать, если падает сама JVM, оставив лишь предсмертную записку под именем hs_err.log с загадочным содержимым?
В докладе я расскажу, что же зашифровано в аварийном дампе, и как эту информацию можно использовать для анализа проблемы и поиска причины. Мы рассмотрим ситуации, в которых JVM может сломаться, и в режиме живой демонстрации разберем примеры реальных падений, случившихся при разработке высоконагруженных приложений.
Building complex async applications is really hard. Whether you use callbacks, Promises, or EventEmitters, Error objects should have a place in your utility belt. They are indispensable when it comes to managing work flows in a highly asynchronous environment.
This talk covers patterns for using JavaScript Error (with a capital E) objects to build resilient applications, and introduce some modules that can be used to build errors with an elegant history of stack traces even through multiple asynchronous operations. Try/catch, callbacks, and other error handling mechanisms will be examined, revealing some potential deficiencies in the JavaScript language for dealing with errors.
Video: https://www.youtube.com/watch?v=PyCHbi_EqPs
The document appears to be a list of processes running on a system, including details like the process name, ID, memory usage, user, and window title if applicable. There are over 70 processes listed ranging from system idle processes to browser and application processes. The document provides a snapshot of all active processes, their resources used, and attributes at a single point in time on the system.
Bla-blah-blah SAP. Bla-blah-blah big companies. Bla-blah-blah hack multi-million dollar systems. This is how typical SAP Talks are started. But not this time. We are really missing hardcore exploitation stuff and unusual vulnerabilities, no matter where they are. Now it's time for real HARDCORE!
In our presentation, we will tell (and show) how by using a chain of minor vulnerabilities in different SAP services we can take complete control of an affected system. Have you ever heard that a denial of service vulnerability can be used for remote command execution? No, we are not talking about memory corruption. It's about how unexploitablea denial of service vulnerabilities can be exploited together with some minor issues to attack system in a way which you have never imagined.
You'll see the way from Anonymous to SAP_ALL, enjoy!
SAP HANA Cloud Portal accelerates time-to-value and increases business agility:
- Build scalable and attractive cloud-based sites – quickly and easily
- Integrate existing content with custom widgets on an open platform
- Securely integrate varied content retrieved from SAP and non-SAP sources
- Consume a range of portal PaaS services to create and configure your sites
- Design branded sites, supporting out-of-the-box mobile consumption and social experience
SuperenaLOTUS: 6 numeri vincenti di Lotus Domino 8.5Fabio Pignatti
A distanza di 10 mesi dall’uscita della versione 8.5, scopriamo qual’è la combinazione dei 6 numeri vincenti di Lotus Domino 8 e 8.5. Prove sul campo ed esperienze dirette riportate fuori dai denti: da DAOS a Traveler, da SaaS a xPages. Per CIO, amministratori e sviluppatori.
Inoltre, per ogni numero tips&tricks inediti!
Energy and Climate – Dynamic Decision Tool Catalog and Community of Practice: Current implementations, Gap AnalysisOpen EI and energy.data.gov, Robert Bectel, DOE
A panoply of data, models, visualizations, analyses, software and decision tools of all sort exist across the –Verse. The problem is that many of these are not accessible, transparent, “open”, distributable, mobile, location aware, up-to-date, or even licensed for use outside of their single use development environment. Developers of these solutions, whether they are a Government Agency, NGO, or other interested group insist on building their solution within their zone of control with visibility and access available only through their single destination site.
OpenEI.org is an open source wiki media platform that leverages crowd sourcing to build an ecosystem for the transmission, storage, analysis and distribution of energy data and information. The system provides mapping and other visualization tools to transform that raw data into understanding.
By building an open, crowd sourced catalog of highly interactive resources and an engaged community of solution providers, OpenEI and Data.gov bring powerful distribution engines for use by anyone. Capable of connecting to virtually any data or Content source and conveying that access to other destinations, they transform understanding and access to knowledge and resources which otherwise would be inaccessible or at best diffused across the –Verse in such a way as to be nearly impossible to find.
This interactive conversation will focus on why we need to build open source, transparent and highly distributable solution sets; What value we can derive from the use of distribution accelerators like OpenEI and Data.Gov and; What the continued development of single destination sites based on the outdated theory of “If I build it they will come” means for those individuals, groups or Agencies attempting to assess the risks associated with energy related projects.
Softwatch Solutions Ltd is a Christchurch-based company with over 25 years of combined experience supporting businesses and education. They are experts in telecommuting, turning paper systems into databases, and creating intuitive applications. Softwatch uses FileMaker Pro to develop custom database solutions and applications like Trackit for patent management and SoftPOS for point-of-sale. Their solutions help clients like Inotek Pharmaceuticals and Keratec integrate systems across multiple countries and manage complex processes like patent applications and deadlines.
SlideShare allows students to collaborate on PowerPoint presentations from school or home, and for teachers to upload class notes for students to access remotely. It is also a valuable tool for students to maintain a portfolio of work to self-assess their progress, and teachers can use it to assign extra credit by having students research topics and upload presentations instead of writing papers.
Bestburtonmessiejune2012adaptationconjun25Peter Best
This document discusses using climate indices as underlyings for pan-continental index insurance. It proposes using 9 global climate indices (G) that represent major ocean-atmosphere modes as the underlyings. Insurance pricing would be based on long-term weather reanalysis data. The indices could help offset weather risks across continents and provide a basis for seasonal forecasting of extreme weather risks to help price insurance contracts. Regional dependencies on the climate indices are analyzed to identify climate risks.
Rachel McKnight graduated from the University of Ulster in 2003 with a degree in Fine and Applied Art specializing in jewelry. She operates laser cutting and general workshops out of her garage where she experiments with plastics like acrylic and polypropylene. McKnight draws inspiration from translucent colors, replicating simple origami shapes, and architecture. She has launched a new online shop located at www.rachelmcknight.com and can be found on social media under the handles @rachelmckdesign and rachelmck.
The document discusses various ways that an individual can earn money from online publishing about a topic they are passionate about, such as knitting. It outlines revenue models including advertising, sponsorships, affiliate marketing, creating and selling own products both online and offline through events and workshops, online training, and paid subscriptions. The key takeaways are to build an audience by providing great free content, try different monetization ideas creatively, and combine multiple streams for success.
This owner's manual provides instructions for operating instruments and controllers in the BYD L3 vehicle. It describes the keys and doors, seating, lighting, instruments, parking brake, multimedia system, air conditioning and other vehicle features. The manual instructs drivers to carefully read it for proper use and maintenance of the vehicle.
Down Syndrome occurs when there is an extra chromosome on the 21st chromosome. This leads to certain physical characteristics and health issues. While there is no cure, treatments can help address medical problems and therapy can help with skills. Research continues to seek a cure and help future patients.
The document discusses analyzing Linux kernel crash dumps. It covers various ways to gather crash data like serial console, netconsole, kmsg dumpers, Kdump, and Pstore. It then discusses analyzing the crashed kernel using tools like ksymoops, crash utility, and examining the backtrace, kernel logs, processes, and file descriptors. The document provides examples of gathering data from Pstore and using commands like bt, log, and ps with the crash utility to extract information from a crash dump.
A close encounter_with_real_world_and_odd_perf_issuesRiyaj Shamsudeen
This document discusses a performance issue where a database experienced high CPU usage in the kernel mode. Tracing tools identified that detaching from multiple shared memory segments during connection release was causing the high CPU. The database server had a NUMA architecture, causing the database instance to create multiple shared memory segments across NUMA nodes. Increasing the shared memory size limit did not resolve it, as the instance was optimizing for NUMA.
String Comparison Surprises: Did Postgres lose my data?Jeremy Schneider
Comparisons are fundamental to computing - and comparing strings is not nearly as straightforward as you might think. Come learn about the history, nuance and surprises of “putting words in order” that you never knew existed in computer science, and how that nuance impacts both general programming and SQL programming. Next, walk through a few actual scenarios and demonstrations using PostgreSQL as a user and administrator, which you can re-run yourself later for further study, including one way you could easily corrupt your self-managed PostgreSQL database if you aren't prepared. Finally we’ll dive into an explanation of the surprising behaviors we saw in PostgreSQL, and learn more about user and administrative features PostgreSQL provides related to localized string comparison.
Web 2.0 Performance and Reliability: How to Run Large Web Appsadunne
The document discusses operations engineering and monitoring systems. Some key points:
- Operations is often overlooked compared to product development and engineering, but it is a form of engineering and critical for ensuring systems run reliably.
- Effective monitoring involves collecting data, alerting on issues, and trend analysis to aid capacity planning. Tools mentioned include Nagios, Ganglia, Cricket, and custom Ganglia metrics.
- When debugging issues, follow best practices like understanding the system, methodically testing changes, keeping an audit trail, and ensuring the root cause is actually fixed.
- Automation is important for managing systems at scale. Tools like Puppet, Cobbler, Koan, and EC2 automation are recommended to
SAP HANA Cloud Portal accelerates time-to-value and increases business agility:
- Build scalable and attractive cloud-based sites – quickly and easily
- Integrate existing content with custom widgets on an open platform
- Securely integrate varied content retrieved from SAP and non-SAP sources
- Consume a range of portal PaaS services to create and configure your sites
- Design branded sites, supporting out-of-the-box mobile consumption and social experience
SuperenaLOTUS: 6 numeri vincenti di Lotus Domino 8.5Fabio Pignatti
A distanza di 10 mesi dall’uscita della versione 8.5, scopriamo qual’è la combinazione dei 6 numeri vincenti di Lotus Domino 8 e 8.5. Prove sul campo ed esperienze dirette riportate fuori dai denti: da DAOS a Traveler, da SaaS a xPages. Per CIO, amministratori e sviluppatori.
Inoltre, per ogni numero tips&tricks inediti!
Energy and Climate – Dynamic Decision Tool Catalog and Community of Practice: Current implementations, Gap AnalysisOpen EI and energy.data.gov, Robert Bectel, DOE
A panoply of data, models, visualizations, analyses, software and decision tools of all sort exist across the –Verse. The problem is that many of these are not accessible, transparent, “open”, distributable, mobile, location aware, up-to-date, or even licensed for use outside of their single use development environment. Developers of these solutions, whether they are a Government Agency, NGO, or other interested group insist on building their solution within their zone of control with visibility and access available only through their single destination site.
OpenEI.org is an open source wiki media platform that leverages crowd sourcing to build an ecosystem for the transmission, storage, analysis and distribution of energy data and information. The system provides mapping and other visualization tools to transform that raw data into understanding.
By building an open, crowd sourced catalog of highly interactive resources and an engaged community of solution providers, OpenEI and Data.gov bring powerful distribution engines for use by anyone. Capable of connecting to virtually any data or Content source and conveying that access to other destinations, they transform understanding and access to knowledge and resources which otherwise would be inaccessible or at best diffused across the –Verse in such a way as to be nearly impossible to find.
This interactive conversation will focus on why we need to build open source, transparent and highly distributable solution sets; What value we can derive from the use of distribution accelerators like OpenEI and Data.Gov and; What the continued development of single destination sites based on the outdated theory of “If I build it they will come” means for those individuals, groups or Agencies attempting to assess the risks associated with energy related projects.
Softwatch Solutions Ltd is a Christchurch-based company with over 25 years of combined experience supporting businesses and education. They are experts in telecommuting, turning paper systems into databases, and creating intuitive applications. Softwatch uses FileMaker Pro to develop custom database solutions and applications like Trackit for patent management and SoftPOS for point-of-sale. Their solutions help clients like Inotek Pharmaceuticals and Keratec integrate systems across multiple countries and manage complex processes like patent applications and deadlines.
SlideShare allows students to collaborate on PowerPoint presentations from school or home, and for teachers to upload class notes for students to access remotely. It is also a valuable tool for students to maintain a portfolio of work to self-assess their progress, and teachers can use it to assign extra credit by having students research topics and upload presentations instead of writing papers.
Bestburtonmessiejune2012adaptationconjun25Peter Best
This document discusses using climate indices as underlyings for pan-continental index insurance. It proposes using 9 global climate indices (G) that represent major ocean-atmosphere modes as the underlyings. Insurance pricing would be based on long-term weather reanalysis data. The indices could help offset weather risks across continents and provide a basis for seasonal forecasting of extreme weather risks to help price insurance contracts. Regional dependencies on the climate indices are analyzed to identify climate risks.
Rachel McKnight graduated from the University of Ulster in 2003 with a degree in Fine and Applied Art specializing in jewelry. She operates laser cutting and general workshops out of her garage where she experiments with plastics like acrylic and polypropylene. McKnight draws inspiration from translucent colors, replicating simple origami shapes, and architecture. She has launched a new online shop located at www.rachelmcknight.com and can be found on social media under the handles @rachelmckdesign and rachelmck.
The document discusses various ways that an individual can earn money from online publishing about a topic they are passionate about, such as knitting. It outlines revenue models including advertising, sponsorships, affiliate marketing, creating and selling own products both online and offline through events and workshops, online training, and paid subscriptions. The key takeaways are to build an audience by providing great free content, try different monetization ideas creatively, and combine multiple streams for success.
This owner's manual provides instructions for operating instruments and controllers in the BYD L3 vehicle. It describes the keys and doors, seating, lighting, instruments, parking brake, multimedia system, air conditioning and other vehicle features. The manual instructs drivers to carefully read it for proper use and maintenance of the vehicle.
Down Syndrome occurs when there is an extra chromosome on the 21st chromosome. This leads to certain physical characteristics and health issues. While there is no cure, treatments can help address medical problems and therapy can help with skills. Research continues to seek a cure and help future patients.
The document discusses analyzing Linux kernel crash dumps. It covers various ways to gather crash data like serial console, netconsole, kmsg dumpers, Kdump, and Pstore. It then discusses analyzing the crashed kernel using tools like ksymoops, crash utility, and examining the backtrace, kernel logs, processes, and file descriptors. The document provides examples of gathering data from Pstore and using commands like bt, log, and ps with the crash utility to extract information from a crash dump.
A close encounter_with_real_world_and_odd_perf_issuesRiyaj Shamsudeen
This document discusses a performance issue where a database experienced high CPU usage in the kernel mode. Tracing tools identified that detaching from multiple shared memory segments during connection release was causing the high CPU. The database server had a NUMA architecture, causing the database instance to create multiple shared memory segments across NUMA nodes. Increasing the shared memory size limit did not resolve it, as the instance was optimizing for NUMA.
String Comparison Surprises: Did Postgres lose my data?Jeremy Schneider
Comparisons are fundamental to computing - and comparing strings is not nearly as straightforward as you might think. Come learn about the history, nuance and surprises of “putting words in order” that you never knew existed in computer science, and how that nuance impacts both general programming and SQL programming. Next, walk through a few actual scenarios and demonstrations using PostgreSQL as a user and administrator, which you can re-run yourself later for further study, including one way you could easily corrupt your self-managed PostgreSQL database if you aren't prepared. Finally we’ll dive into an explanation of the surprising behaviors we saw in PostgreSQL, and learn more about user and administrative features PostgreSQL provides related to localized string comparison.
Web 2.0 Performance and Reliability: How to Run Large Web Appsadunne
The document discusses operations engineering and monitoring systems. Some key points:
- Operations is often overlooked compared to product development and engineering, but it is a form of engineering and critical for ensuring systems run reliably.
- Effective monitoring involves collecting data, alerting on issues, and trend analysis to aid capacity planning. Tools mentioned include Nagios, Ganglia, Cricket, and custom Ganglia metrics.
- When debugging issues, follow best practices like understanding the system, methodically testing changes, keeping an audit trail, and ensuring the root cause is actually fixed.
- Automation is important for managing systems at scale. Tools like Puppet, Cobbler, Koan, and EC2 automation are recommended to
The internal battle has been fought, and Cassandra is your group's NoSQL platform of choice! Hooray! But now what? Wouldn't it be great to know what NOT to do? Come to this talk to hear about some of the common Ops mistakes that new users make and what the better decision will be.
Beginning Operations: 7 Deadly Sins for Apache Cassandra OpsDataStax Academy
The internal battle has been fought, and Cassandra is your group's NoSQL platform of choice! Hooray! But now what? This talk will introduce you to all the basic operations concepts you need to know to start your foray into the wonderful world of Cassandra off right. Or even if you have already started but are looking for a solid holistic overview... this is the talk for you!
The document discusses preparing for and participating in the Defcon CTF qualifiers. It provides details on:
- Defcon CTF being one of the most prestigious CTF competitions, with only 10 teams qualifying. Teams get a FreeBSD box and must reverse, protect, and attack services. Points are earned through availability, reading other teams' keys, and overwriting keys.
- The qualifiers run from June 3rd to 6th, consisting of 5 categories with 5 progressively unlocked challenges each, over 53 non-stop hours. The scoreboard is a slow Java applet that can be bypassed by reversing the client class.
- One challenge involves a Ruby-based HTTP service with a vulnerable We
This document discusses how Varnish can be used for efficient web caching. It provides examples showing how Varnish uses few system calls and milliseconds to serve content from cache. Custom configurations were developed for Bild.de, including paywall integration, image normalization, clustering, and conditional requests to backends. The configurations are generated from Perl scripts to support various server roles and features across Bild.de's infrastructure. However, Bild.de still runs on an older Varnish version and plans are discussed to migrate to the current version.
Secrets of building a debuggable runtime: Learn how language implementors sol...Dev_Events
Bjørn Vårdal, J9VM Software Developer, IBM, @bvaardal
New language runtimes appear all the time, but most of them die young. Failure can be attributed to
different reasons, but an important factor is that lack of support can limit the community’s and
industry’s willingness to adopt the new language.
Quicker development and improved serviceability allows emerging languages to overcome this obstacle.
By building on the proven technology available in Eclipse OMR, language developers can get more than
performance and stability; you also get tools that help you quickly debug your language runtime,
allowing you to provide competitive serviceability.
From this presentation, you will learn how to enable Eclipse OMR’s mature debugging features in your
language runtime, and also how Eclipse OMR can assist with development and debugging
OSNoise Tracer: Who Is Stealing My CPU Time?ScyllaDB
In the context of high-performance computing (HPC), the Operating System Noise (osnoise) refers to the interference experienced by an application due to activities inside the operating system. In the context of Linux, NMIs, IRQs, softirqs, and any other system thread can cause noise to the application. Moreover, hardware-related jobs can also cause noise, for example, via SMIs.
HPC users and developers that care about every microsecond stolen by the OS need not only a precise way to measure the osnoise but mainly to figure out who is stealing cpu time so that they can pursue the perfect tune of the system. These users and developers are the inspiration of Linux's osnoise tracer.
The osnoise tracer runs an in-kernel loop measuring how much time is available. It does it with preemption, softirq and IRQs enabled, thus allowing all the sources of osnoise during its execution. The osnoise tracer takes note of the entry and exit point of any source of interferences. When the noise happens without any interference from the operating system level, the tracer can safely point to a hardware-related noise. In this way, osnoise can account for any source of interference. The osnoise tracer also adds new kernel tracepoints that auxiliaries the user to point to the culprits of the noise in a precise and intuitive way.
At the end of a period, the osnoise tracer prints the sum of all noise, the max single noise, the percentage of CPU available for the thread, and the counters for the noise sources, serving as a benchmark tool.
Here is a bpftrace program to measure scheduler latency for ICMP echo requests:
#!/usr/local/bin/bpftrace
kprobe:icmp_send {
@start[tid] = nsecs;
}
kprobe:__netif_receive_skb_core {
@diff[tid] = hist(nsecs - @start[tid]);
delete(@start[tid]);
}
END {
print(@diff);
clear(@diff);
}
This traces the time between the icmp_send kernel function (when the packet is queued for transmit) and the __netif_receive_skb_core function (when the response packet is received). The
Wszyscy zostaliśmy oszukani! Automatyczne zarządzanie pamięci rozwiąże wszystkie Wasze problemy, mówili. W zarządzanych środowiskach takich jak CLR JVM nie będzie wycieków pamięci, mówili! Właściwie pamięć jest tania i nie musisz się już nią nigdy więcej martwić. Wszyscy kłamali. Automatyczne zarządzanie pamięcią jest wygodną abstrakcją i bardzo często działa dobrze. Ale jak każda abstrakcja, wcześniej czy później "wycieka" ona. I to najczęściej w najmniej spodziewanym i przyjemnym momencie. W tej sesji spróbuję otworzyć oczy na fakt, że błoga nieświadomość nt. tej abstrakcji może być kosztowna. Pokażę jak może się objawić frywolne traktowanie pamięci i co możemy zyskać pisząc kod zdając sobie sprawę, że pamięć jednak nie jest nieskończona, tania i zawsze jednakowo szybka.
We all make mistakes while programming and spend a lot of time fixing them.
One of the methods which allows for quick detection of defects is source code static analysis.
We all make mistakes while programming and spend a lot of time fixing them.
One of the methods which allows for quick detection of defects is source code static analysis.
Application of Radare2 Illustrated by Shylock and Snakso.A AnalysisPositive Hack Days
This document describes the analysis of the Shylock/Caphaw.D Windows trojan and Snakso.A Linux rootkit using the radare2 reverse engineering framework. Key functions and techniques of each sample are dissected, such as the Shylock trojan obtaining the process heap, modifying memory permissions, and installing persistence via the registry. The Snakso rootkit is found to hide processes, patch kernel functions, and decrypt strings. Radare2 is used to visualize disassembly, identify strings, cross-references, and analyze file formats, imports, and execution flow to understand the malware behavior.
This document provides tips and best practices for achieving high performance with Java. It discusses measuring performance, optimizing I/O, using memory-mapped files, reusing database connections, and employing techniques like concurrency to improve scaling. The document also presents a case study where various optimizations were applied to analyze call detail records within the required one hour time budget, including splitting workload across threads.
This document provides an overview of programming for GPUs. It discusses how GPUs have many more cores than CPUs and are better suited for data-parallel work. The main challenges of GPU programming are different memory architectures, branch divergence, and complexity. It presents CUDA and OpenCL as common approaches for GPU programming and provides an example of a reduction kernel written in CUDA/OpenCL using shared memory and synchronization barriers between threads. Recent advances that help with GPU programming include kernel calls from the GPU, multi-GPU support, unified memory, task parallelism, better profilers, and C++ language support.
Presented at LISA18: https://www.usenix.org/conference/lisa18/presentation/babrou
This is a technical dive into how we used eBPF to solve real-world issues uncovered during an innocent OS upgrade. We'll see how we debugged 10x CPU increase in Kafka after Debian upgrade and what lessons we learned. We'll get from high-level effects like increased CPU to flamegraphs showing us where the problem lies to tracing timers and functions calls in the Linux kernel.
The focus is on tools what operational engineers can use to debug performance issues in production. This particular issue happened at Cloudflare on a Kafka cluster doing 100Gbps of ingress and many multiple of that egress.
The document discusses exploiting a vulnerability in Cisco ASA firewall devices. It begins with background on the target device and vulnerability, then outlines steps for getting access to the firmware, debugging the target, and identifying the vulnerability through static and dynamic analysis. The document then covers techniques for triggering the vulnerability and developing a controlled exploit to achieve remote code execution without user interaction.
Dangerous on ClickHouse in 30 minutes, by Robert Hodges, Altinity CEOAltinity Ltd
- The document summarizes a presentation about ClickHouse, an open source column-oriented database management system.
- It discusses how ClickHouse stores and indexes data to enable fast queries, how it scales horizontally across servers, and how different engines like MergeTree and ReplicatedMergeTree allow for high performance and fault tolerance.
- Examples are provided showing how ClickHouse can quickly analyze large datasets with SQL and optimize queries using its features like distributed processing, partitioning, and specialized functions.
Similar to Nsd, il tuo compagno di viaggio quando Domino va in crash (20)
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
5. Crash e hang, le differenze
Crash Hang
• Domino non risponde ai client • Domino non risponde ai client
•
Domino non risponde da console •
Domino risponde da console
• Il sistema operativo è vivo • Il sistema operativo è vivo
NSD NSD
Viene generato un NSD in Non viene generato un NSD in
automatico automatico ...
... ma possiamo generarlo noi!
6. Le cause
Il codice delle applicazioni
Teniamo a bada le teste calde!
Database corrotti
Problemi HW (spazio disco, network)
Software terze parti
Controllare la compatibilità delle
versioni!
http://www.flickr.com/photos/cayusa/2569878338/
6
8. NSD, cos'è e perchè serve (1/2)
Cos'è?
NSD = Notes System Diagnostics
Dove si trova?
$DOMINO_DATAIBM_TECHNICAL_SUPPORT
Come si legge?
È un file ASCII
È suddiviso in diverse sezioni
Oggi ci focalizziamo su ...
NSD7 (da 6.5.5 in poi) ...
... ma disponibile anche nelle precedenti
8
9. NSD, cos'è e perchè serve (2/2)
Perchè avere un NSD?
Strategia: dare strumenti di diagnostica per
garantire continuità e affidabilità del servizio
Altri esempi: DDM, ADC
Ok ma nel pratico perchè serve NSD?
Consente di mettere a fuoco le cause del crash e
potenzialmente di risolverle
Tornando alla stategia ...
#1233676 “NSD Fix List and NSD Update
Strategy”
http://www.flickr.com/photos/spacepotato/2450300968/
9
10.
11. Come decifrare un NSD – Le basi (1/4)
Traccia tutte le info di sistema
notes.ini
Processi
Memoria
File presenti nella domino directory
11
12. Come decifrare un NSD – Le basi (2/4)
Windows (nsd.exe)
nsd
nsd -detach (solo W2003 e XP)
GNU/Linux (nsd.sh)
nsd
Alcune opzioni
nsd -kill
nsd -batch (solo GNU/Linux)
nsd -info
nsd -monitor (solo W32)
12
13. Come decifrare un NSD – Le basi (3/4)
Formato del file
nsd_<Platform>_<ServerName>_YYYY_MM_DD@HH_MM_SS.log
Ummm ... e questi?
nsd_all_<Platform>_<Host>_MM_DD@HH_MM.log
nsd_kill*.log
nsd_info*.log (GNU/Linux)
sysinfo*.log (W32)
console*.log
13
15. Come decifrare un NSD – Process Information (1/3)
Vengono riportati tutti i processi del sistema
<@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>
Section: Notes Process Info (Time 07:34:25)
<@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>
<@@ ------ Notes Process Info -> Load Modules for Process :: [ nSERVER: 0864] (Time 07:34:28) ------ @@>
Base End Size Module
0x40000000 0x0043c000 245760 C:LotusDominonSERVER.EXE
0x7c800000 0x7c8c0000 786432 C:WINDOWSsystem32ntdll.dll
0x77e40000 0x77f42000 1056768 C:WINDOWSsystem32kernel32.dll
Nel dettaglio, le chiamate dei processi Domino
<@@ ------ Notes Process Info -> Call Stack for Process :: [ nSERVER: 0864] (Time 07:34:28) ------ @@>
############################################################
### thread 1/144: [ nSERVER: 0864: 0868]
### FP=0006f5a4, PC=7c8285ec, SP=0006f53c
### stkbase=00070000, total stksize=45056, used stksize=2756
############################################################
[ 1] 0x7c8285ec ntdll.KiFastSystemCallRet+0 (1388,0,6f5c4,6009668a)
[ 2] 0x77e424ed kernel32.Sleep+15 (1388,0,6f5d8,10003ba0)
15
25. LND come strumento di diagnostica (1/3)
Lotus Notes Diagnostic
È un database Notes integrato con il sistema operativo (W32)
2.6 alla data odierna
http://www-01.ibm.com/support/docview.wss?rs=899&uid=swg24019151
25
27. LND come strumento di diagnostica (3/3)
Cosa si ottiene?
Filtra l'NSD con le info più significative
Permette di navigare in modo “visuale” un NSD
Si collega alla KB IBM ed esegue per noi una ricerca!
Consente di copiare il thread con il fatal in modo veloce
Permette di confrontare vari NSD
27
29. Un caso reale: è lento (1/2)
Problema
Drrriiiiiiiiiiin!
“È lento! Aiuto!”
Ma sono passato la settimana scorsa e mi pareva performante ...
No, nessun cambiamento ... (ndr è in piedi da 2 gg la nuova procedura)
Si ma “quanto” è urgente?
MSPI
29
31. Tranquilli c'è Jamie!
Risoluzione dei problemi di prestazioni di applicazioni Lotus Domino
Jamie Magee
In sala Michelangelo dalle 15:20 alle 16:00
31
33. Un caso reale: è giù (1/4)
Problema
Drrriiiiiiiiiiin!
“È giù!”
...
MSPI
33
34. Un caso reale: è giù (2/4)
Domino opportunamente configurato
Nsd generato in automatico
Analisi, LND
Crash rilevato. Stringhe di ricerca per la KB ma ...
34
35. Un caso reale: è giù (3/4)
... nessun risultato trovato
Raffinando la ricerca:
SPR# BRIS5TXQJU - Fixed an HTTP crash during image conversion
under certain circumstances. This problem rarely occurs in 6.5x but
code changes make it more likely in 7.0.2 FP1.
SPR# COLY6Y2J3Q - Fixed an HTTP page rendering crash. This
regression was introduced in 7.0.2 FP1.
35
38. Bonus track!
Test degli applicativi
... non solo Domino!
Software terze parti
Manutenzione periodica degli archivi
Transaction logging
Censimento dei sistemi
... non solo Domino!
Alcune accortezze che non guastano
Unread marks
Indici FT
Quota
KIS, keep it simple
38