The goal of this talk is to educate developers on common security vulnerabilities, how they are exploited, and how to protect against them. We'll explore several of the OWASP Top 10 attack vectors like SQL injection, XSS, CSRF, session hijacking, and insecure direct object references. Each topic will be approached from the perspective of an attacker to see how these vulnerabilities are detected and exploited using several realistic examples. Once we've established an understanding of how these attacks work, we'll look at concrete steps you can take to secure web applications against such vulnerabilities. The knowledge gained from this talk can also be used for participating in "Capture the Flag" security competitions.
Hacking Your Way to Better Security - PHP South Africa 2016Colin O'Dell
This talk educates developers on common security vulnerabilities, how they are exploited, and how to protect against them. We'll explore several of the OWASP Top 10 attack vectors like SQL injection, XSS, CSRF, and more. Each topic will be approached from the perspective of an attacker to see how these vulnerabilities are detected and exploited using several realistic examples. We'll then apply this knowledge to see how web applications can be secured against such vulnerabilities.
https://speakerdeck.com/willroth/50-laravel-tricks-in-50-minutes - origin
Laravel 5.1 raised the bar for framework documentation, but there's much, much more lurking beneath the surface. In this 50-minute session, we'll explore 50 (yes, 50!) high-leverage implementation tips & tricks that you just won't find in the docs: the IoC Container, Blade, Eloquent, Middleware, Routing, Commands, Queues, Events, Caching — we'll cover them all! Join us as we drink from the fire hose & learn to take advantage of everything that Laravel has to offer to build better software faster!
The goal of this talk is to educate developers on common security vulnerabilities, how they are exploited, and how to protect against them. We'll explore several of the OWASP Top 10 attack vectors like SQL injection, XSS, CSRF, session hijacking, and insecure direct object references. Each topic will be approached from the perspective of an attacker to see how these vulnerabilities are detected and exploited using several realistic examples. Once we've established an understanding of how these attacks work, we'll look at concrete steps you can take to secure web applications against such vulnerabilities. The knowledge gained from this talk can also be used for participating in "Capture the Flag" security competitions.
Hacking Your Way to Better Security - PHP South Africa 2016Colin O'Dell
This talk educates developers on common security vulnerabilities, how they are exploited, and how to protect against them. We'll explore several of the OWASP Top 10 attack vectors like SQL injection, XSS, CSRF, and more. Each topic will be approached from the perspective of an attacker to see how these vulnerabilities are detected and exploited using several realistic examples. We'll then apply this knowledge to see how web applications can be secured against such vulnerabilities.
https://speakerdeck.com/willroth/50-laravel-tricks-in-50-minutes - origin
Laravel 5.1 raised the bar for framework documentation, but there's much, much more lurking beneath the surface. In this 50-minute session, we'll explore 50 (yes, 50!) high-leverage implementation tips & tricks that you just won't find in the docs: the IoC Container, Blade, Eloquent, Middleware, Routing, Commands, Queues, Events, Caching — we'll cover them all! Join us as we drink from the fire hose & learn to take advantage of everything that Laravel has to offer to build better software faster!
Dig Deeper into WordPress - WD Meetup CairoMohamed Mosaad
Dig deeper into WordPress is a presentation made for Web Designers Meetup in Cairo taken place on 17th Dec 2012.
Signup at WPMonkeys.com to get notified when awesome new WordPress related content is published.
Presentation given at OSCON 2009 and PostgreSQL West 09. Describes SQL solutions to a selection of object-oriented problems:
- Extensibility
- Polymorphism
- Hierarchies
- Using ORM in MVC application architecture
These slides are excerpted from another presentation, "SQL Antipatterns Strike Back."
Most iOS apps use one or more UITableViews for at least some portion of their user interface. Unfortunately, UITableViewController code can often be home to monstrous if/else constructs employed to handle cell configuration and user interaction. This talk will illustrate the typical issues encountered with table view code. Whether form-like table views with a fixed number of rows, such as those found in settings views or those used to edit object data, or dynamic tables with multiple sections and rows within each section, you'll learn how to produce concise, readable, and powerful code.
iOS Developers need a wide variety of skills and knowledge to perform their jobs well. These skills and knowledge have wide applications beyond iOS, especially when sticking within the realms of Mobile Application Development.
This deck of slides shows some common cases where an iOS Developer can with minimal effort use their existing skills to build Android apps.
Presented at iOSDevUK 2015.
Kozmetik ürünleri lojistiği, muhafaza ve taşıma özellikleriMurat Gülci
kozmetikte depo tasarımı, talep tahmini, depo yeri seçimi, araç park alanı ve rampa seçimi, depo işgücü seçimi, depo ekipman seçimi, depo raf ve depolama ekipmanı, depo alanı ve palet sayısı, zemin özellikleri, depo güvenlik önlemleri, depo asma kat,
Dig Deeper into WordPress - WD Meetup CairoMohamed Mosaad
Dig deeper into WordPress is a presentation made for Web Designers Meetup in Cairo taken place on 17th Dec 2012.
Signup at WPMonkeys.com to get notified when awesome new WordPress related content is published.
Presentation given at OSCON 2009 and PostgreSQL West 09. Describes SQL solutions to a selection of object-oriented problems:
- Extensibility
- Polymorphism
- Hierarchies
- Using ORM in MVC application architecture
These slides are excerpted from another presentation, "SQL Antipatterns Strike Back."
Most iOS apps use one or more UITableViews for at least some portion of their user interface. Unfortunately, UITableViewController code can often be home to monstrous if/else constructs employed to handle cell configuration and user interaction. This talk will illustrate the typical issues encountered with table view code. Whether form-like table views with a fixed number of rows, such as those found in settings views or those used to edit object data, or dynamic tables with multiple sections and rows within each section, you'll learn how to produce concise, readable, and powerful code.
iOS Developers need a wide variety of skills and knowledge to perform their jobs well. These skills and knowledge have wide applications beyond iOS, especially when sticking within the realms of Mobile Application Development.
This deck of slides shows some common cases where an iOS Developer can with minimal effort use their existing skills to build Android apps.
Presented at iOSDevUK 2015.
Kozmetik ürünleri lojistiği, muhafaza ve taşıma özellikleriMurat Gülci
kozmetikte depo tasarımı, talep tahmini, depo yeri seçimi, araç park alanı ve rampa seçimi, depo işgücü seçimi, depo ekipman seçimi, depo raf ve depolama ekipmanı, depo alanı ve palet sayısı, zemin özellikleri, depo güvenlik önlemleri, depo asma kat,
Deze presentatie is gegeven tijdens de KScope conferentie 2012
Spreker: Luc Bors
Titel: An ADF Special Report
Onderwerp: Fusion Middleware - Subonderwerp: ADF
Oracle ADF is zeer geschikt voor het bouwen van enterprise applicaties. ADF heeft echter geen ingebouwde oplossingen voor het maken van rapportages. Door het inbouwen van rapportage mogelijkheden is het niet nodig om externe rapportage tooling op te starten. Met één druk op de knop worden de rapportages getoond en krijg je snel inzicht in bedrijfskritische gegevens. In deze sessie leer je hoe je dit kunt oplossen door het gebruik van open source rapportage-tools en tools van Oracle.
Al Tobey (@AlTobey) is an Open Source Mechanic at DataStax. Prior to working at DataStax, Al was a Tech Lead of Compute and Data Services at Ooyala, which has been using Apache Cassandra since version 0.4 and these days uses Go in production.
Al will be presenting a brief introduction to Go (#golang) and Cassandra, and how they are a great fit for each other. This talk will include code samples and a live demo.
Oracle ADF is a very powerful framework for building enterprise applications. The framework, however, has no built-in solutions for reporting. In this session, you will learn how to fill this gap by using open source reporting solutions and solutions provided by Oracle.
When working with enterprise applications, you want to have the same user experience that you know from for instance office applications and browsers. People know how to use the features that can be found in browsers such as bookmarking, favorites, and working with tabs. The search mechanism provided by Google, that uses suggestions based on the text typed by the user, is so common that people expect this in every application. And there are more of these UI patterns. In this session, you will learn how to implement some of the common UI patterns in your ADF application.
Deze presentatie is gegeven tijdens de KScope conferentie 2012
Spreker: Luc Bors
Titel: How to Bring Common UI Patterns to ADF
Onderwerp: Fusion Middleware - Subonderwerp: ADF
Eindgebruikers van bedrijfsapplicaties eisen dezelfde gebruikerservaring die ze kennen van bijvoorbeeld office applicaties en applicaties op het internet. Functies zoals bookmarking, favorieten en het werken met tabs wordt graag gezien in de dagelijkse werk. Het zoekmechanisme van Google, dat suggesties toont op basis van de ingevoerde tekst, is zo ´gewoon´ dat mensen dit in elke applicatie terug willen zien. Twitter en Facebook geven automatisch aan dat je nieuwe berichten hebt zonder dat je daar zelf eerst om moet vragen, dat gebruikers de normaalste zaak van de wereld vinden. Er zijn nog veel meer van deze UI patterns. In deze sessie leer je hoe een aantal van deze UI patterns in je ADF applicatie kunt inbouwen waardoor de eindgebruiker beschikking krijgt over bekende en vanzelfsprekende features. Dit zal leiden tot een snellere acceptatie van de applicatie en prettigere gebruikerservaring.
n 2010, I told everyone how to start unit testing Zend Framework applications. In 2011, let’s take this a step further by testing services, work flows and performance. Looking to raise the bar on quality? Let this talk be the push you need to improve your Zend Framework projects.
Roman iovlev. Test UI with JDI - Selenium campРоман Иовлев
Presentation about JDI on Selenium Camp 2017 by Roman Iovlev
http://seleniumcamp.com/talk/test-ui-with-jdi-easy-simple-and-good/
JDI is a very powerful framework based on Selenium which realizes UI Objects (PageObjects + Typified elements) design pattern. We talked enough about it previous year on different conferences and want to do practical session this time, so each attendee could see how JDI helps to write test automation code faster and more clear, making test engineers to use best practices in test automation.
Introduction
Web Storage
WebSQL
IndexedDB
File System Access
Final Considerations
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2014.
http://www.ivanomalavolta.com
Introduction
Web Storage
WebSQL
IndexedDB
File System Access
Final Considerations
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2015.
http://www.ivanomalavolta.com
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Oracle helpdesk database shema
1. Veri Modelleme ve Iliskisel
Veritabanlari Dersi
Proje Dökümanı
Murat Gülci
Bu projede bir Helpdesk database’i tasarlandı ve
oluşturuldu. Kullanıcıların takibi, problemlerin ve problemin
geçmişinin takibi, envanter takibi ve Bilgi işlem
çalışanlarının yeteneklerinin takibi yapılabilmesi
sağlandı.Hazırlanan bütün sorgular, karşılaşılabilinecek
gerçek senaryolar düşünülerek hazırlandı.
Bahceşehir Üniversitesi
BEŞİKTAŞ
ALPER TUNGA
Veritabanı ve İlişkisel
Veritabanları
YZM5507
7. Query Result
ALTER TABLE "RESOLUTIONS" ADD CONSTRAINT
"RESOLUTIONS_FK" FOREIGN KEY ("PROBLEM_HISTORY_ID")
REFERENCES "PROBLEM_HISTORY"
("PROBLEM_HISTORY_ID") ENABLE;
Query Result
ALTER TABLE "USERS" ADD CONSTRAINT "USERS_FK" FOREIGN
KEY ("USER_TYPE_CODE")
REFERENCES "REF_USER_TYPES"
("USER_TYPE_CODE") ENABLE;
8. 4. Select Sorgular
a. En Sorunlu ürünler
Query
Select
REF_EQUIPMENT_TYPES.EQUIPMENT_TYPE_DESCRIPTION,
EQUIPMENT.EQUIPMENT_TYPE_CODE,
EQUIPMENT.EQUIPMENT_NAME,
EQUIPMENT.EQUIPMENT_DESCRIPTION,
PROBLEMS.EQUIPMENT_ID As EQUIPMENT_ID1,
Count(PROBLEMS.EQUIPMENT_ID) as "Problem Sayısı"
From
EQUIPMENT Inner Join
REF_EQUIPMENT_TYPES On EQUIPMENT.EQUIPMENT_TYPE_CODE =
REF_EQUIPMENT_TYPES.EQUIPMENT_TYPE_CODE Inner Join
PROBLEMS On PROBLEMS.EQUIPMENT_ID = EQUIPMENT.EQUIPMENT_ID
Where
PROBLEMS.EQUIPMENT_ID = EQUIPMENT.EQUIPMENT_ID
Group By
REF_EQUIPMENT_TYPES.EQUIPMENT_TYPE_DESCRIPTION, EQUIPMENT.EQUIPMENT_TYPE_CODE,
EQUIPMENT.EQUIPMENT_NAME, EQUIPMENT.EQUIPMENT_DESCRIPTION,
PROBLEMS.EQUIPMENT_ID
Order By
Count(PROBLEMS.EQUIPMENT_ID) Desc
Query 2:
select EQUIPMENT_ID, count(EQUIPMENT_ID)
from problems
group by EQUIPMENT_ID
having count(EQUIPMENT_ID)>1
order by count(EQUIPMENT_ID) desc
Result
Result 2
9. b. En çok sorun çözen IT elemanları
Query
Select
SUPPORT_STAFF.STAFF_ID,
SUPPORT_STAFF.STAFF_NAME,
SUPPORT_STAFF.STAFF_EMAIL,
REF_SKILL_CODES.SKILL_DESCRIPTION,
Count(PROBLEM_HISTORY.ASSIGNED_STAFF_ID) as "Sorun Sayısı"
From
PROBLEM_HISTORY Inner Join
SUPPORT_STAFF On PROBLEM_HISTORY.ASSIGNED_STAFF_ID = SUPPORT_STAFF.STAFF_ID
Inner Join
STAFF_SKILLS On STAFF_SKILLS.STAFF_ID = SUPPORT_STAFF.STAFF_ID Inner Join
REF_SKILL_CODES On STAFF_SKILLS.SKILL_CODE = REF_SKILL_CODES.SKILL_CODE
Group By
SUPPORT_STAFF.STAFF_ID, SUPPORT_STAFF.STAFF_NAME, SUPPORT_STAFF.STAFF_EMAIL,
REF_SKILL_CODES.SKILL_DESCRIPTION
Order By
Count(PROBLEM_HISTORY.ASSIGNED_STAFF_ID) Desc
Result
c. En sorunlu Kullanıcılar
Query
Select
USERS.USER_ID,
USERS.USER_FIRST_NAME,
USERS.USER_LAST_NAME,
USERS.USER_EMAIL,
REF_USER_TYPES.USER_TYPE_DESCRIPTION,
Count(PROBLEMS.USER_ID) As Problem_Count
From
PROBLEMS Inner Join
USERS On PROBLEMS.USER_ID = USERS.USER_ID Inner Join
REF_USER_TYPES On USERS.USER_TYPE_CODE = REF_USER_TYPES.USER_TYPE_CODE
Group By
USERS.USER_ID, USERS.USER_FIRST_NAME, USERS.USER_LAST_NAME, USERS.USER_EMAIL,
REF_USER_TYPES.USER_TYPE_DESCRIPTION
Order By
Count(PROBLEMS.USER_ID) Desc
Result
10. d. Açık Çağrılar Listesi
Query
Select
PROBLEM_HISTORY.PROBLEM_HISTORY_ID,
REF_PRIORITY_LEVELS.PRIORITY_LEVEL_DESCRIPTION,
SUPPORT_STAFF.STAFF_NAME,
PROBLEMS.PROBLEM_DESCRIPTION,
PROBLEM_HISTORY.PROBLEM_HISTORY_DESCRIPTION,
REF_PROBLEM_STATUS_CODE.PROBLEM_STATUS_DESCRIPTION
From
PROBLEM_HISTORY Inner Join
REF_PROBLEM_STATUS_CODE On PROBLEM_HISTORY.PROBLEM_STATUS_CODE =
REF_PROBLEM_STATUS_CODE.PROBLEM_STATUS_CODE Inner Join
SUPPORT_STAFF On PROBLEM_HISTORY.ASSIGNED_STAFF_ID = SUPPORT_STAFF.STAFF_ID
Inner Join
REF_PRIORITY_LEVELS On PROBLEM_HISTORY.PRIORITY_LEVEL_CODE =
REF_PRIORITY_LEVELS.PROBLEM_LEVEL_CODE Inner Join
PROBLEMS On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID
Where
PROBLEM_HISTORY.PROBLEM_STATUS_CODE = 803
Result
e. SLA süresinde çözülmeyen işler
Query
Select
PROBLEMS.PROBLEM_ID,
PROBLEMS.PROBLEM_REPORTED_DATETIME,
PROBLEM_HISTORY.FIX_DATETIME,
USERS.USER_FIRST_NAME,
USERS.USER_LAST_NAME,
PROBLEMS.PROBLEM_DESCRIPTION,
REF_PRIORITY_LEVELS.PRIORITY_LEVEL_DESCRIPTION
From
PROBLEMS Inner Join
PROBLEM_HISTORY On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID Inner Join
REF_PRIORITY_LEVELS On PROBLEM_HISTORY.PRIORITY_LEVEL_CODE =
REF_PRIORITY_LEVELS.PROBLEM_LEVEL_CODE Inner Join
USERS On PROBLEMS.USER_ID = USERS.USER_ID
Where
PROBLEM_HISTORY.FIX_DATETIME > PROBLEMS.PROBLEM_REPORTED_DATETIME
Result
11. f. 40000000007 no’lu problemin geçmiş detayı
Query
Select
PROBLEMS.PROBLEM_ID,
PROBLEMS.PROBLEM_DESCRIPTION,
REF_PRIORITY_LEVELS.PRIORITY_LEVEL_DESCRIPTION,
REF_PROBLEM_STATUS_CODE.PROBLEM_STATUS_DESCRIPTION,
PROBLEM_HISTORY.FIX_DATETIME,
SUPPORT_STAFF.STAFF_NAME,
PROBLEM_HISTORY.PROBLEM_HISTORY_DESCRIPTION
From
PROBLEMS Inner Join
PROBLEM_HISTORY On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID Inner Join
REF_PROBLEM_STATUS_CODE On PROBLEM_HISTORY.PROBLEM_STATUS_CODE =
REF_PROBLEM_STATUS_CODE.PROBLEM_STATUS_CODE Inner Join
REF_PRIORITY_LEVELS On PROBLEM_HISTORY.PRIORITY_LEVEL_CODE =
REF_PRIORITY_LEVELS.PROBLEM_LEVEL_CODE Inner Join
SUPPORT_STAFF On PROBLEM_HISTORY.ASSIGNED_STAFF_ID = SUPPORT_STAFF.STAFF_ID
Where
PROBLEMS.PROBLEM_ID = 4000000007
Result
g. Ahmet Kullanıcısının Çağrılarının detayları
Query
Select
USERS.USER_FIRST_NAME,
USERS.USER_LAST_NAME,
PROBLEMS.PROBLEM_DESCRIPTION,
PROBLEM_HISTORY.FIX_DATETIME,
PROBLEM_HISTORY.PROBLEM_HISTORY_DESCRIPTION,
REF_PRIORITY_LEVELS.PRIORITY_LEVEL_DESCRIPTION
From
USERS Inner Join
PROBLEMS On PROBLEMS.USER_ID = USERS.USER_ID Inner Join
PROBLEM_HISTORY On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID Inner Join
REF_PRIORITY_LEVELS On PROBLEM_HISTORY.PRIORITY_LEVEL_CODE =
REF_PRIORITY_LEVELS.PROBLEM_LEVEL_CODE
Where
USERS.USER_FIRST_NAME = 'Ahmet'
Query_2
select
PROBLEM_ID, PROBLEM_DESCRIPTION
from
problems p, users u
where
p.user_id = u.user_id and u.user_first_name like 'Ahme%'
Result
Result2
12. h. Geçen Seneki çağrıların toplamı
Query
Select
Count(Distinct PROBLEM_HISTORY.PROBLEM_ID) as "2011 Çağrı Adedi"
From
PROBLEMS Inner Join
PROBLEM_HISTORY On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID
Where
Extract(Year From PROBLEM_HISTORY.FIX_DATETIME) = 2011
Result
i. Atanmamış çağrılar
Query
Select
EQUIPMENT.EQUIPMENT_NAME,
USERS.USER_FIRST_NAME,
USERS.USER_LAST_NAME,
PROBLEMS.PROBLEM_REPORTED_DATETIME,
PROBLEMS.PROBLEM_DESCRIPTION
From
PROBLEMS Inner Join
EQUIPMENT On PROBLEMS.EQUIPMENT_ID = EQUIPMENT.EQUIPMENT_ID Inner Join
USERS On PROBLEMS.USER_ID = USERS.USER_ID
Where
PROBLEMS.PROBLEM_ID Not In (Select Distinct
(PROBLEM_HISTORY.PROBLEM_ID)
From
PROBLEM_HISTORY)
Result
13. j. Kapatılan Çağrılar
Query
Select
PROBLEMS.PROBLEM_ID,
USERS.USER_FIRST_NAME,
USERS.USER_LAST_NAME,
EQUIPMENT.EQUIPMENT_NAME,
REF_EQUIPMENT_TYPES.EQUIPMENT_TYPE_DESCRIPTION,
PROBLEM_HISTORY.PROBLEM_HISTORY_DESCRIPTION
From
PROBLEMS Inner Join
PROBLEM_HISTORY On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID Inner Join
USERS On PROBLEMS.USER_ID = USERS.USER_ID Inner Join
EQUIPMENT On PROBLEMS.EQUIPMENT_ID = EQUIPMENT.EQUIPMENT_ID Inner Join
REF_EQUIPMENT_TYPES On EQUIPMENT.EQUIPMENT_TYPE_CODE =
REF_EQUIPMENT_TYPES.EQUIPMENT_TYPE_CODE
Where
PROBLEM_HISTORY.PROBLEM_STATUS_CODE = 804
Result
k. Zor seviyesindeki çağrıların detay durumu
Query
Select
PROBLEMS.PROBLEM_ID,
USERS.USER_FIRST_NAME,
USERS.USER_LAST_NAME,
PROBLEMS.PROBLEM_DESCRIPTION,
PROBLEM_HISTORY.PROBLEM_HISTORY_DESCRIPTION,
SUPPORT_STAFF.STAFF_NAME
From
PROBLEM_HISTORY Inner Join
PROBLEMS On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID Inner Join
USERS On PROBLEMS.USER_ID = USERS.USER_ID Inner Join
SUPPORT_STAFF On PROBLEM_HISTORY.ASSIGNED_STAFF_ID = SUPPORT_STAFF.STAFF_ID
Where
PROBLEM_HISTORY.PRIORITY_LEVEL_CODE = 703
Result
14. l. Problem çözümü girilmiş problemlerin listesi
Query
Select Distinct
PROBLEM_HISTORY.PROBLEM_ID
From
PROBLEM_HISTORY
Order By
PROBLEM_HISTORY.PROBLEM_ID
Result
15. 5. Update sorguları
a. Açık çağrıların kapatılması
Query
update problem_history
set problem_status_code =
(select problem_status_code
from ref_problem_status_code
where problem_status_description='kapandı')
where
problem_status_code in
(select p.problem_status_code
from problem_history p, ref_problem_status_code s
where problem_status_description='açık' and
s.problem_status_code=p.problem_status_code)
Result
16. b. Çözüm girilen çağrıların kapatılması
Query
update problem_history
set problem_status_code =
(select problem_status_code
from ref_problem_status_code
where problem_status_description='kapandı')
where
problem_status_code in
(select h.problem_status_code
from problem_history h, resolutions r
where r.problem_history_id=h.problem_history_id)
Result
c. Support Elemanına skill ekleme ve tarihi güncelleme
Query
INSERT INTO ref_skill_codes VALUES (3006,'Senior Programmer');
update staff_skills
set (skill_code, date_skill_obtained) =
(select skill_code, to_date(sysdate, 'dd/mm/yyyy' )
from ref_skill_codes
where skill_description='Senior Programmer' )
where
skill_code =
(select st.skill_code
from staff_skills st, support_staff su
where st.staff_id=su.staff_id and su.staff_name='Murat');
Result
17. d. User’ın type’ı değişmesi(müdür olması)
Query
INSERT INTO ref_user_types VALUES (6000000006,'Muhasebe Müdürü')
update users
set USER_TYPE_CODE =
( select user_type_code from ref_user_types where
USER_TYPE_DESCRIPTION = 'Muhasebe Müdürü')
where
USER_TYPE_CODE =
(select USER_TYPE_CODE
from users
where user_id='30003' and user_first_name='Eyüp')
Result
1 row(s) updated. 0.00 seconds
select u.user_first_name, ru.USER_TYPE_DESCRIPTION
from users u, ref_user_types ru
where u.user_id='30003' and u.user_type_code=ru.user_type_code;
e. Prblem açıklaması değiştirilmesi
Query
update problems
set PROBLEM_DESCRIPTION = 'Yazıcıya yazdırırken yazdırılamadı şeklinde
hata veriyor. dün çalışıyordu,sorun yoktu'
where
problem_id = '4000000001'
Result
1 row(s) updated. 0.02 seconds
select problem_id, PROBLEM_DESCRIPTION from problems where problem_id='4000000001'
18. f. equipment_code(seri no) değiştirilmesi
Query
update EQUIPMENT
set EQUIPMENT_CODE = '2000000006'
where
EQUIPMENT_CODE = '2000000005' and EQUIPMENT_ID = '1000000005'
Result
1 row(s) updated. 0.03 seconds
select EQUIPMENT_ID, EQUIPMENT_CODE from EQUIPMENT where EQUIPMENT_ID =
'1000000005'
g. Support elemanlarına yeni sorun atanması
Query
select p.problem_id
from problems p
where p.problem_id not in (select problem_id from problem_history)
INSERT INTO problem_history VALUES
(5000000011,701,
(select p.problem_id from problems p where p.problem_id not in
(select problem_id from problem_history)),
802,1002, TO_DATE ('06/06/2011', 'dd/mm/yyyy'),'xc')
Result
1 row(s) inserted. 0.06 seconds
select p.problem_id from problems p where p.problem_id not in (select problem_id
from problem_history)
no data found
19. h. equipment silinmesi
Query
ALTER TABLE "PROBLEMS" disable CONSTRAINT "PROBLEMS_FK"
Table altered. 0.03 seconds
delete
from equipment
where EQUIPMENT_ID='1000000002'
Result
1 row(s) deleted. 0.01 seconds
i. user silinmesi
Query
ALTER TABLE "PROBLEMS" disable CONSTRAINT "PROBLEMS_CON"
Table altered. 0.08 seconds
delete
from users
where user_first_name='Ayşe' and user_last_name='Cebeci' and
user_id='30005'
Result
1 row(s) deleted. 0.01 seconds
j. Problem History Kaydı silinmesi
Query
delete
from problem_history
where PROBLEM_HISTORY_ID= '5000000006'
Result
1 row(s) deleted. 0.01 seconds
20. k. Support Stuff silinmesi
Query
delete
from support_staff
where staff_id='1001' and staff_name = 'Mustafa'
Result
1 row(s) deleted. 0.01 seconds
l. Sorun İstatistikleri
Query
select
min(count(p.ASSIGNED_STAFF_ID)) as "En az Sorunla İlgilenen",
max(count(p.ASSIGNED_STAFF_ID)) as "En Fazla Sorunla İlgilenen",
round(avg(count(p.ASSIGNED_STAFF_ID)),1) as "Ortama Sorunla İlgilenen"
from problem_history p
group by p.ASSIGNED_STAFF_ID
Result
21. m. Case kullanmak
Query
select
problem_history_id, PROBLEM_HISTORY_DESCRIPTION,
case
when ASSIGNED_STAFF_ID= '1001' then 'Mustafa ilgileniyor'
when ASSIGNED_STAFF_ID= '1002' then 'Dinçer ilgileniyor'
when ASSIGNED_STAFF_ID= '1003' then 'Şükrü ilgileniyor'
else 'Başkası ilgileniyor'
end as Kim_ilgileniyor
from problem_history
Result
22. 6. Extra Sorgular
a. Genel Bakış view oluşturma
Query
CREATE OR REPLACE VIEW genel_bakis
AS
Select
PROBLEM_HISTORY.PROBLEM_ID,
PROBLEM_HISTORY.PROBLEM_HISTORY_ID,
REF_PRIORITY_LEVELS.PRIORITY_LEVEL_DESCRIPTION,
REF_PROBLEM_STATUS_CODE.PROBLEM_STATUS_DESCRIPTION,
SUPPORT_STAFF.STAFF_NAME,
PROBLEM_HISTORY.FIX_DATETIME,
PROBLEM_HISTORY.PROBLEM_HISTORY_DESCRIPTION,
EQUIPMENT.EQUIPMENT_NAME,
USERS.USER_FIRST_NAME || ' ' || USERS.USER_LAST_NAME as Kullanıcı
From
PROBLEM_HISTORY Inner Join
REF_PROBLEM_STATUS_CODE On PROBLEM_HISTORY.PROBLEM_STATUS_CODE =
REF_PROBLEM_STATUS_CODE.PROBLEM_STATUS_CODE Inner Join
REF_PRIORITY_LEVELS On PROBLEM_HISTORY.PRIORITY_LEVEL_CODE =
REF_PRIORITY_LEVELS.PROBLEM_LEVEL_CODE Inner Join
SUPPORT_STAFF On PROBLEM_HISTORY.ASSIGNED_STAFF_ID = SUPPORT_STAFF.STAFF_ID
Inner Join
PROBLEMS On PROBLEM_HISTORY.PROBLEM_ID = PROBLEMS.PROBLEM_ID Inner Join
EQUIPMENT On PROBLEMS.EQUIPMENT_ID = EQUIPMENT.EQUIPMENT_ID Inner Join
USERS On PROBLEMS.USER_ID = USERS.USER_ID
Group By
PROBLEM_HISTORY.PROBLEM_ID, PROBLEM_HISTORY.PROBLEM_HISTORY_ID,
REF_PRIORITY_LEVELS.PRIORITY_LEVEL_DESCRIPTION,
REF_PROBLEM_STATUS_CODE.PROBLEM_STATUS_DESCRIPTION, SUPPORT_STAFF.STAFF_NAME,
PROBLEM_HISTORY.FIX_DATETIME, PROBLEM_HISTORY.PROBLEM_HISTORY_DESCRIPTION,
EQUIPMENT.EQUIPMENT_NAME, USERS.USER_FIRST_NAME, USERS.USER_LAST_NAME
Order By
PROBLEM_HISTORY.PROBLEM_ID
Result
23. b. Index Oluşturma
Query
CREATE INDEX problem__id_index ON problem_history(problem_id);
Result
Index created.
c. Sequence Oluşturma
Query
CREATE SEQUENCE EQUIPMENT_ID
INCREMENT BY 1
Result
Sequence created.
d. Select ile yedek almak
Query
select * into problems_backup from problems
Result
7. Sonuçlar
Görev Beklenen Yapılan
table oluşturma 6-7 tablo 13 tablo
Select sorgusu 10 12
Update/delete sorgusu 10 10
İndex oluşturma 0 1
View oluşturma 0 1
Sequence oluşturma 0 1