This document discusses various server-side configuration options that can improve ASP.NET application performance. It covers process model parameters, HTTP runtime settings, disabling unused HTTP modules, optimizing view state usage, turning off debugging modes in production, and SQL query optimization techniques. Configuring thread pool sizes, execution timeouts, and connection limits can optimize the server for the specific application needs and hardware configuration.
General configurations on apache directives included in the httpd.conf fileCognizant
This document summarizes key configuration directives in the httpd.conf file for Apache HTTP servers. It describes directives for server settings like ServerRoot, PidFile, and Timeout. It also covers directives for modules, server processes, ports and addresses, file inclusion, and directory configuration.
1. The document discusses objectives and concepts related to building web applications using servlets, including HTTP methods, the request and response objects, the servlet lifecycle, initialization parameters, and redirecting versus forwarding requests.
2. It provides examples of servlet configuration in web.xml and describes how the container processes requests and maps them to servlets.
3. Key aspects of the request and response objects are outlined, such as accessing headers, cookies, and input/output streams.
How To Disable IE Enhanced Security Windows PowerShellVCP Muthukrishna
This PowerShell script disables Internet Explorer Enhanced Security by modifying registry values. It checks the registry keys for IE Enhanced Security settings for the Admin and current user profiles. If the keys exist and the configuration is enabled, it sets the registry value to 0 to disable IE Enhanced Security. If the keys are already configured to be disabled, it outputs a message indicating no changes are needed. If the keys don't exist, it displays a message that the registry is not configured.
The document provides an overview of troubleshooting techniques for application servers and websites. It discusses common problems like unresponsive servers, crashing applications, hanging applications, and slow performance. It then describes how to troubleshoot issues at different layers of the application stack, including hardware, operating systems, web servers, databases, and mail servers. Specific tools are recommended for analyzing each layer like ping, netstat, and SQL Profiler.
This document describes a project to design a fault-tolerant distributed file system. It implements a mediator that communicates with multiple data servers to store file data redundantly. If a data server fails, the mediator can still retrieve the correct data from the remaining servers. It includes implementations of key functions like data storage, retrieval, and server failure handling. The system was tested by writing and reading files, listing file contents, corrupting data, and terminating servers to validate fault tolerance functionality and performance.
Monitors the external connection through Outlook Anywhere (RPC over HTTP Proxy) to Exchange mailing system. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=es&action=view_PUI&id_PUI=571
Celery is an asynchronous task queue/job queue based on distributed message passing. It allows tasks to be executed concurrently on one or more worker servers to minimize request times and offload intensive processes. Some key benefits are improved user experience through faster responses, scalability by adding more workers as needed, and flexibility through many customization points. Celery uses message brokers like RabbitMQ to handle task routing and can integrate with databases, caching, and other services.
General configurations on apache directives included in the httpd.conf fileCognizant
This document summarizes key configuration directives in the httpd.conf file for Apache HTTP servers. It describes directives for server settings like ServerRoot, PidFile, and Timeout. It also covers directives for modules, server processes, ports and addresses, file inclusion, and directory configuration.
1. The document discusses objectives and concepts related to building web applications using servlets, including HTTP methods, the request and response objects, the servlet lifecycle, initialization parameters, and redirecting versus forwarding requests.
2. It provides examples of servlet configuration in web.xml and describes how the container processes requests and maps them to servlets.
3. Key aspects of the request and response objects are outlined, such as accessing headers, cookies, and input/output streams.
How To Disable IE Enhanced Security Windows PowerShellVCP Muthukrishna
This PowerShell script disables Internet Explorer Enhanced Security by modifying registry values. It checks the registry keys for IE Enhanced Security settings for the Admin and current user profiles. If the keys exist and the configuration is enabled, it sets the registry value to 0 to disable IE Enhanced Security. If the keys are already configured to be disabled, it outputs a message indicating no changes are needed. If the keys don't exist, it displays a message that the registry is not configured.
The document provides an overview of troubleshooting techniques for application servers and websites. It discusses common problems like unresponsive servers, crashing applications, hanging applications, and slow performance. It then describes how to troubleshoot issues at different layers of the application stack, including hardware, operating systems, web servers, databases, and mail servers. Specific tools are recommended for analyzing each layer like ping, netstat, and SQL Profiler.
This document describes a project to design a fault-tolerant distributed file system. It implements a mediator that communicates with multiple data servers to store file data redundantly. If a data server fails, the mediator can still retrieve the correct data from the remaining servers. It includes implementations of key functions like data storage, retrieval, and server failure handling. The system was tested by writing and reading files, listing file contents, corrupting data, and terminating servers to validate fault tolerance functionality and performance.
Monitors the external connection through Outlook Anywhere (RPC over HTTP Proxy) to Exchange mailing system. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=es&action=view_PUI&id_PUI=571
Celery is an asynchronous task queue/job queue based on distributed message passing. It allows tasks to be executed concurrently on one or more worker servers to minimize request times and offload intensive processes. Some key benefits are improved user experience through faster responses, scalability by adding more workers as needed, and flexibility through many customization points. Celery uses message brokers like RabbitMQ to handle task routing and can integrate with databases, caching, and other services.
Sherlock Homepage - A detective story about running large web services - WebN...Maarten Balliauw
The site was slow. CPU and memory usage everywhere! Some dead objects in the corner. Something terrible must have happened! We have some IIS logs. Some traces from a witness. But not enough to find out what was wrong. In this session, we’ll see how effective telemetry, a profiler or two as well as a refresher of how IIS runs our ASP.NET web applications can help solve this server murder mystery.
This document provides steps to configure an Amazon EC2 load balancer with two nodes. It includes launching two EC2 instances, updating packages, configuring NTP and time synchronization, installing an Apache web server, adding content to identify each node, creating a load balancer and defining security settings, health checks, and associating the instances. The load balancer is then tested by making requests which are routed to each node, demonstrating the load balancing functionality.
This document provides instructions for configuring security groups on an Amazon EC2 Linux instance. It describes adding inbound rules to allow specific traffic types like SSH, HTTP, and custom TCP ports from selected IP addresses or security groups. Outbound traffic rules are by default open for all traffic to all destinations. The document also provides an example of accessing the Linux instance via SSH using its public IP address.
How To Install and Configure Open SSH Server on UbuntuVCP Muthukrishna
This document provides instructions on how to install and configure OpenSSH server on Ubuntu. It includes steps to update the system, check if OpenSSH is already installed, install the openssh-server package if needed, verify the installation, configure the listen port to 22, start the SSH daemon, test the SSH service from localhost, and open the firewall to allow SSH connections.
How To Connect Amazon AWS EC2 with Key Pair – LinuxVCP Muthukrishna
This document provides instructions for connecting to an Amazon AWS EC2 Linux instance using a key pair. It outlines downloading the key pair file, modifying its permissions, and then using it to connect via SSH either by public IP or private IP. The key steps are: 1) Identify the key pair associated with the instance; 2) Copy the private key file to the local machine; 3) Change permissions on the key file; 4) Connect using SSH and specifying the key file and either public or private IP address. Following these steps allows logging into the EC2 instance securely using the key pair.
This is an enterprise plugin to get information status on Apache by using the status module. It uses perl and wget to grab the information. For more information visit the following web page: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=270
How To Configure FirewallD on RHEL 7 or CentOS 7VCP Muthukrishna
This document provides instructions on how to configure the FirewallD firewall on RHEL 7 or CentOS 7 systems. It describes how to manage the firewall service, add and remove firewall rules, configure zones, and lists the predefined firewall configurations.
Windows PowerShell Basics - How To List PSDrive InfoVCP Muthukrishna
This document provides information on PowerShell drives (PSDrives) and includes a script to retrieve PSDrive information. PSDrives allow access to data stores like the file system, registry, and certificates from within PowerShell. The script outputs a HTML file listing the name, used space, provider, root, and current location for all available PSDrives.
How To Check IE Enhanced Security Is Enabled Windows PowerShellVCP Muthukrishna
This PowerShell script checks the status of Internet Explorer Enhanced Security settings on a system. It reads the registry keys that control IE Enhanced Security for the local machine profile and current user. The script outputs whether each key is supported, the current value set for each key, and notifies if a key is not defined.
How To Install and Configure Apache SSL on CentOS 7VCP Muthukrishna
This document provides instructions on how to install and configure Apache SSL on CentOS 7. It includes steps to install the httpd package and enable the service, create a self-signed SSL certificate, configure the SSL settings in the Apache configuration file including the certificate and key files, open firewall ports, and validate the SSL configuration. The goal is to securely serve HTTPS traffic from the Apache web server using the newly created SSL certificate.
Install and Configure WordPress in AWS on RHEL 7 or CentOS 7VCP Muthukrishna
The document provides instructions to install and configure WordPress on AWS with a local MariaDB database on RHEL 7 or CentOS 7. It describes how to install and configure Apache HTTPD, PHP, MariaDB, and WordPress. Key steps include installing packages for Apache, PHP, and MariaDB; configuring services; creating a database for WordPress; downloading and extracting the WordPress package; and configuring WordPress.
Shell Script Disk Usage Report and E-Mail Current Threshold StatusVCP Muthukrishna
This shell script generates a disk usage report for each disk partition on a server and emails the report. It checks disk usage percentages against thresholds of 90%, 80%, and 70% and colors partitions red, orange, or green accordingly in the report. It also calculates the difference in disk usage from the previous report 12 hours ago and includes this in the emailed report. Running the script generates an HTML report file and uses sendmail to email the file to specified recipients.
This document introduces the Flask micro web framework. It discusses that Flask provides URL routing, request and response objects, template engines and other features for web development. Flask is simple and extensible, using Werkzeug and Jinja2. It does not include an ORM or form validation, but supports extensions. The document provides examples of basic routing, using request objects, templates and the development server. It also discusses using SQLAlchemy, WTForms and common patterns like MVC with Flask projects.
This document provides instructions for installing and configuring Apache2 on Ubuntu. It discusses updating system packages, installing Apache2 packages, starting/stopping the Apache2 service, reloading configurations, important configuration files and directories, global configuration attributes like ServerName and Listen directives, the default virtual host configuration in sites-available, virtual host directives and their purposes, defining a virtual host with directives like ServerAdmin and DocumentRoot, enabling and disabling modules and sites, and managing Apache2 modules and sites.
This document provides instructions for installing and configuring RSyslog on CentOS 7. It describes how to install RSyslog, configure modules and protocols, manage the daemon, verify the log file, test the service, configure an RSyslog client for UDP and TCP forwarding, restart the client service, and lists the log severity and facility tables.
This document provides an overview and introduction to AJAX concepts including synchronous and asynchronous requests, HTTP methods (GET, POST, PUT), response formats (text, XML, JSON), the XMLHttpRequest object, parsing responses, same-origin policy limitations, JSONP, and jQuery methods for AJAX including $.get(), $.post(), $.ajax(). It includes code examples and discusses steps for making AJAX requests with JavaScript.
How To Configure Nginx Load Balancer on CentOS 7VCP Muthukrishna
This document provides instructions on how to configure Nginx as a load balancer on CentOS 7. It describes installing Nginx, configuring two web servers and a load balancer node, setting up the load balancing configuration in the Nginx configuration file, and testing the load balancer functionality using curl commands and a web browser.
How To Configure Apache VirtualHost on RHEL 7 on AWSVCP Muthukrishna
This document provides instructions on how to configure Apache virtual hosts on RHEL 7 to host multiple websites on different ports with different content folders. It includes steps to configure the Apache listen directive, create virtual host directives, set document roots and ports, create log directories, validate the configuration, and modify security settings. Sample index files are provided to demonstrate the three configured websites.
This presentation was prepared for a Webcast where John Yerhot, Engine Yard US Support Lead, and Chris Kelly, Technical Evangelist at New Relic discussed how you can scale and improve the performance of your Ruby web apps. They shared detailed guidance on issues like:
Caching strategies
Slow database queries
Background processing
Profiling Ruby applications
Picking the right Ruby web server
Sharding data
Attendees will learn how to:
Gain visibility on site performance
Improve scalability and uptime
Find and fix key bottlenecks
See the on-demand replay:
http://pages.engineyard.com/6TipsforImprovingRubyApplicationPerformance.html
Apache has several directives that control the number of server processes and maximum clients. The StartServers, MinimumSpareServers, and MaximumSpareServers directives determine the number of idle server processes available. The MaxClients directive sets the maximum number of simultaneous client requests. The ServerLimit directive sets the maximum value for MaxClients while MaxRequestsPerChild sets the limit per child process. The KeepAliveTimeout and MaxKeepAliveRequests control settings for HTTP persistent connections.
Scaling asp.net websites to millions of usersoazabir
This document discusses various techniques for optimizing ASP.NET applications to scale from thousands to millions of users. It covers topics such as preventing denial of service attacks, optimizing the ASP.NET process model and pipeline, reducing the size of ASP.NET cookies on static content, improving System.net settings, optimizing queries to ASP.NET membership providers, issues with LINQ to SQL, using transaction isolation levels to prevent deadlocks, and employing a content delivery network. The overall message is that ASP.NET requires various "hacks" at the code, database, and configuration levels to scale to support millions of hits.
Sherlock Homepage - A detective story about running large web services - WebN...Maarten Balliauw
The site was slow. CPU and memory usage everywhere! Some dead objects in the corner. Something terrible must have happened! We have some IIS logs. Some traces from a witness. But not enough to find out what was wrong. In this session, we’ll see how effective telemetry, a profiler or two as well as a refresher of how IIS runs our ASP.NET web applications can help solve this server murder mystery.
This document provides steps to configure an Amazon EC2 load balancer with two nodes. It includes launching two EC2 instances, updating packages, configuring NTP and time synchronization, installing an Apache web server, adding content to identify each node, creating a load balancer and defining security settings, health checks, and associating the instances. The load balancer is then tested by making requests which are routed to each node, demonstrating the load balancing functionality.
This document provides instructions for configuring security groups on an Amazon EC2 Linux instance. It describes adding inbound rules to allow specific traffic types like SSH, HTTP, and custom TCP ports from selected IP addresses or security groups. Outbound traffic rules are by default open for all traffic to all destinations. The document also provides an example of accessing the Linux instance via SSH using its public IP address.
How To Install and Configure Open SSH Server on UbuntuVCP Muthukrishna
This document provides instructions on how to install and configure OpenSSH server on Ubuntu. It includes steps to update the system, check if OpenSSH is already installed, install the openssh-server package if needed, verify the installation, configure the listen port to 22, start the SSH daemon, test the SSH service from localhost, and open the firewall to allow SSH connections.
How To Connect Amazon AWS EC2 with Key Pair – LinuxVCP Muthukrishna
This document provides instructions for connecting to an Amazon AWS EC2 Linux instance using a key pair. It outlines downloading the key pair file, modifying its permissions, and then using it to connect via SSH either by public IP or private IP. The key steps are: 1) Identify the key pair associated with the instance; 2) Copy the private key file to the local machine; 3) Change permissions on the key file; 4) Connect using SSH and specifying the key file and either public or private IP address. Following these steps allows logging into the EC2 instance securely using the key pair.
This is an enterprise plugin to get information status on Apache by using the status module. It uses perl and wget to grab the information. For more information visit the following web page: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=270
How To Configure FirewallD on RHEL 7 or CentOS 7VCP Muthukrishna
This document provides instructions on how to configure the FirewallD firewall on RHEL 7 or CentOS 7 systems. It describes how to manage the firewall service, add and remove firewall rules, configure zones, and lists the predefined firewall configurations.
Windows PowerShell Basics - How To List PSDrive InfoVCP Muthukrishna
This document provides information on PowerShell drives (PSDrives) and includes a script to retrieve PSDrive information. PSDrives allow access to data stores like the file system, registry, and certificates from within PowerShell. The script outputs a HTML file listing the name, used space, provider, root, and current location for all available PSDrives.
How To Check IE Enhanced Security Is Enabled Windows PowerShellVCP Muthukrishna
This PowerShell script checks the status of Internet Explorer Enhanced Security settings on a system. It reads the registry keys that control IE Enhanced Security for the local machine profile and current user. The script outputs whether each key is supported, the current value set for each key, and notifies if a key is not defined.
How To Install and Configure Apache SSL on CentOS 7VCP Muthukrishna
This document provides instructions on how to install and configure Apache SSL on CentOS 7. It includes steps to install the httpd package and enable the service, create a self-signed SSL certificate, configure the SSL settings in the Apache configuration file including the certificate and key files, open firewall ports, and validate the SSL configuration. The goal is to securely serve HTTPS traffic from the Apache web server using the newly created SSL certificate.
Install and Configure WordPress in AWS on RHEL 7 or CentOS 7VCP Muthukrishna
The document provides instructions to install and configure WordPress on AWS with a local MariaDB database on RHEL 7 or CentOS 7. It describes how to install and configure Apache HTTPD, PHP, MariaDB, and WordPress. Key steps include installing packages for Apache, PHP, and MariaDB; configuring services; creating a database for WordPress; downloading and extracting the WordPress package; and configuring WordPress.
Shell Script Disk Usage Report and E-Mail Current Threshold StatusVCP Muthukrishna
This shell script generates a disk usage report for each disk partition on a server and emails the report. It checks disk usage percentages against thresholds of 90%, 80%, and 70% and colors partitions red, orange, or green accordingly in the report. It also calculates the difference in disk usage from the previous report 12 hours ago and includes this in the emailed report. Running the script generates an HTML report file and uses sendmail to email the file to specified recipients.
This document introduces the Flask micro web framework. It discusses that Flask provides URL routing, request and response objects, template engines and other features for web development. Flask is simple and extensible, using Werkzeug and Jinja2. It does not include an ORM or form validation, but supports extensions. The document provides examples of basic routing, using request objects, templates and the development server. It also discusses using SQLAlchemy, WTForms and common patterns like MVC with Flask projects.
This document provides instructions for installing and configuring Apache2 on Ubuntu. It discusses updating system packages, installing Apache2 packages, starting/stopping the Apache2 service, reloading configurations, important configuration files and directories, global configuration attributes like ServerName and Listen directives, the default virtual host configuration in sites-available, virtual host directives and their purposes, defining a virtual host with directives like ServerAdmin and DocumentRoot, enabling and disabling modules and sites, and managing Apache2 modules and sites.
This document provides instructions for installing and configuring RSyslog on CentOS 7. It describes how to install RSyslog, configure modules and protocols, manage the daemon, verify the log file, test the service, configure an RSyslog client for UDP and TCP forwarding, restart the client service, and lists the log severity and facility tables.
This document provides an overview and introduction to AJAX concepts including synchronous and asynchronous requests, HTTP methods (GET, POST, PUT), response formats (text, XML, JSON), the XMLHttpRequest object, parsing responses, same-origin policy limitations, JSONP, and jQuery methods for AJAX including $.get(), $.post(), $.ajax(). It includes code examples and discusses steps for making AJAX requests with JavaScript.
How To Configure Nginx Load Balancer on CentOS 7VCP Muthukrishna
This document provides instructions on how to configure Nginx as a load balancer on CentOS 7. It describes installing Nginx, configuring two web servers and a load balancer node, setting up the load balancing configuration in the Nginx configuration file, and testing the load balancer functionality using curl commands and a web browser.
How To Configure Apache VirtualHost on RHEL 7 on AWSVCP Muthukrishna
This document provides instructions on how to configure Apache virtual hosts on RHEL 7 to host multiple websites on different ports with different content folders. It includes steps to configure the Apache listen directive, create virtual host directives, set document roots and ports, create log directories, validate the configuration, and modify security settings. Sample index files are provided to demonstrate the three configured websites.
This presentation was prepared for a Webcast where John Yerhot, Engine Yard US Support Lead, and Chris Kelly, Technical Evangelist at New Relic discussed how you can scale and improve the performance of your Ruby web apps. They shared detailed guidance on issues like:
Caching strategies
Slow database queries
Background processing
Profiling Ruby applications
Picking the right Ruby web server
Sharding data
Attendees will learn how to:
Gain visibility on site performance
Improve scalability and uptime
Find and fix key bottlenecks
See the on-demand replay:
http://pages.engineyard.com/6TipsforImprovingRubyApplicationPerformance.html
Apache has several directives that control the number of server processes and maximum clients. The StartServers, MinimumSpareServers, and MaximumSpareServers directives determine the number of idle server processes available. The MaxClients directive sets the maximum number of simultaneous client requests. The ServerLimit directive sets the maximum value for MaxClients while MaxRequestsPerChild sets the limit per child process. The KeepAliveTimeout and MaxKeepAliveRequests control settings for HTTP persistent connections.
Scaling asp.net websites to millions of usersoazabir
This document discusses various techniques for optimizing ASP.NET applications to scale from thousands to millions of users. It covers topics such as preventing denial of service attacks, optimizing the ASP.NET process model and pipeline, reducing the size of ASP.NET cookies on static content, improving System.net settings, optimizing queries to ASP.NET membership providers, issues with LINQ to SQL, using transaction isolation levels to prevent deadlocks, and employing a content delivery network. The overall message is that ASP.NET requires various "hacks" at the code, database, and configuration levels to scale to support millions of hits.
MCIS 6163 Assignment 1/MCIS 6163 Assignment 1.pdf
Assignment 1 – MCIS 6163
Building a Simple Web Client and a Multithreaded Web Server
Objectives
To understand client-server communication via sockets.
To gain exposure to the basic operations of a Web server and client.
To explore basic structures of HTTP messages.
Due: April 14, 2020 11:59pm
Project Description
In this project, you will be developing a multithreaded Web server and a simple web client. The Web
server and Web client communicate using a text-based protocol called HTTP (Hypertext Transfer
Protocol).
Requirements for the Web server
The server is able to handle multiple requests concurrently. This means the implementation is
multithreaded. In the main thread, the server listens to a specified port, e.g., 8080. Upon receiving an
HTTP request, the server sets up a TCP connection to the requesting client and serves the request in a
separate thread. After sending the response back to the client, it closes the connection.
The server is assumed to work with HTTP GET messages. If the requested file exists, the server
responds with “HTTP/1.1 200 OK” together with the requested page to the client, otherwise it sends a
corresponding error message, e.g., “HTTP/1.1 404 Not Found” or “HTTP/1.1 400 Bad Request”.
If running the server program using command line, the syntax should be:
server_code_name [<port_number>]
where the optional <port_number> is the port on which the server is listening to connections from
clients. If the port number is not entered, the default port 8080 is used.
You can test your Web server implementation on your local machine using a Web browser, e.g.,
Internet Explorer, Firefox, or Chrome. You need to specify the used port number within the URL, for
example,
http://localhost:8080/index.htm
If omitting the port number portion, i.e., 8080, the browser will use the default port 80.
The server should response with a default page when users do not enter a specific page in the URL,
for example,
http://localhost:8080/
It should also work when the request includes a path to the requested file, for example,
http://localhost:8080/path/to/file/example.htm
You should display/log the request and header lines of request messages on the server for the purpose
of debugging.
Requirements for the simple Web client
The client is able to connect to the server via a socket and to request a page on the server.
Upon receipt of the response message from the server, the client extracts and displays/logs the
message status, and then retrieves the page content from the message body.
If running the client program using command line, the syntax should be:
client_code_name <server_IPaddress/name> [<port_number>] [<requested_file_name>]
where the <server_IPaddress/name> is the IP address or name of the Web server, e.g., 127.0.0.1 or
localhost for the server running on the local machine. The optional < ...
MCIS 6163 Assignment 1/MCIS 6163 Assignment 1.pdf
Assignment 1 – MCIS 6163
Building a Simple Web Client and a Multithreaded Web Server
Objectives
To understand client-server communication via sockets.
To gain exposure to the basic operations of a Web server and client.
To explore basic structures of HTTP messages.
Due: April 14, 2020 11:59pm
Project Description
In this project, you will be developing a multithreaded Web server and a simple web client. The Web
server and Web client communicate using a text-based protocol called HTTP (Hypertext Transfer
Protocol).
Requirements for the Web server
The server is able to handle multiple requests concurrently. This means the implementation is
multithreaded. In the main thread, the server listens to a specified port, e.g., 8080. Upon receiving an
HTTP request, the server sets up a TCP connection to the requesting client and serves the request in a
separate thread. After sending the response back to the client, it closes the connection.
The server is assumed to work with HTTP GET messages. If the requested file exists, the server
responds with “HTTP/1.1 200 OK” together with the requested page to the client, otherwise it sends a
corresponding error message, e.g., “HTTP/1.1 404 Not Found” or “HTTP/1.1 400 Bad Request”.
If running the server program using command line, the syntax should be:
server_code_name [<port_number>]
where the optional <port_number> is the port on which the server is listening to connections from
clients. If the port number is not entered, the default port 8080 is used.
You can test your Web server implementation on your local machine using a Web browser, e.g.,
Internet Explorer, Firefox, or Chrome. You need to specify the used port number within the URL, for
example,
http://localhost:8080/index.htm
If omitting the port number portion, i.e., 8080, the browser will use the default port 80.
The server should response with a default page when users do not enter a specific page in the URL,
for example,
http://localhost:8080/
It should also work when the request includes a path to the requested file, for example,
http://localhost:8080/path/to/file/example.htm
You should display/log the request and header lines of request messages on the server for the purpose
of debugging.
Requirements for the simple Web client
The client is able to connect to the server via a socket and to request a page on the server.
Upon receipt of the response message from the server, the client extracts and displays/logs the
message status, and then retrieves the page content from the message body.
If running the client program using command line, the syntax should be:
client_code_name <server_IPaddress/name> [<port_number>] [<requested_file_name>]
where the <server_IPaddress/name> is the IP address or name of the Web server, e.g., 127.0.0.1 or
localhost for the server running on the local machine. The optional <.
The document provides information about performance testing with JMeter including example steps to write a JMeter script for a sample performance test scenario. The summary is:
The document discusses writing a JMeter script to simulate 30 concurrent users each sending 600 orders over 3 minutes to test the performance of an order processing system. It provides details on setting up thread groups, variables, CSV data configuration, HTTP requests, assertions and includes example XML payloads and JMeter script structure. Flexibility in JMeter is discussed including using BeanShell scripting and plugins to add custom functionality.
This document provides an overview of PeopleSoft integration broker architecture and performance tuning tips for asynchronous and synchronous messaging. It discusses key aspects of integration broker configuration like thread pool size, load balancing, message segmentation, and using dedicated messaging servers. Tools for monitoring and troubleshooting bottlenecks are also covered. The goal is to help optimize integration broker performance and address issues like increased CPU usage, messages getting stuck, or improving synchronous message response times.
The document provides an overview of troubleshooting techniques for application servers and websites. It discusses common problems at different levels of the application stack from hardware to code. Specific tools are recommended for analyzing issues with servers, networks, operating systems, web servers, databases, and mail servers. Detailed steps are outlined for using tools like Netstat, Telnet, SQL Profiler and SeeFusion to diagnose performance and crashing issues.
The document discusses session state configuration in ASP.NET, including the different session state modes (InProc, StateServer, SQLServer, Custom), how to configure session state through the web.config file, and an overview of choices for state management.
Sherlock Homepage - A detective story about running large web services - NDC ...Maarten Balliauw
The site was slow. CPU and memory usage everywhere! Some dead objects in the corner. Something terrible must have happened! We have some IIS logs. Some traces from a witness. But not enough to find out what was wrong. In this session, we’ll see how effective telemetry, a profiler or two as well as a refresher of how IIS runs our ASP.NET web applications can help solve this server murder mystery.
The site was slow. CPU and memory usage everywhere! Some dead objects in the corner. Something terrible must have happened! We have some IIS logs. Some traces from a witness. But not enough to find out what was wrong. In this session, we’ll see how effective telemetry, a profiler or two as well as a refresher of how IIS runs our ASP.NET web applications can help solve this server murder mystery.
Sherlock Homepage - A detective story about running large web services (VISUG...Maarten Balliauw
The site was slow. CPU and memory usage everywhere! Some dead objects in the corner. Something terrible must have happened! We have some IIS logs. Some traces from a witness. But not enough to find out what was wrong. In this session, we’ll see how effective telemetry, a profiler or two as well as a refresher of how IIS runs our ASP.NET web applications can help solve this server murder mystery.
Using Apache as an Application Server allows building web applications with less effort by leveraging Apache's support for request processing, security, logging, and other services. The document discusses how Apache modules can integrate application services by running inside the Apache process and having access to the full HTTP request lifecycle. It provides an example Apache configuration and architecture for implementing a rule interpretation engine as an Apache module to deliver dynamic JavaScript for context-aware web pages.
The document discusses server-side programming and Java 2 Enterprise Edition (J2EE). It explains what J2EE is, its architecture and components. It describes the lifecycle of a servlet, including initialization, request handling, and destruction. It also discusses session management techniques in servlets like using cookies, URL rewriting, and hidden form fields to track user requests across multiple pages. Exception handling using request dispatchers is also covered.
C sharp and asp.net interview questionsAkhil Mittal
The document provides summaries of common questions and answers related to ASP.NET, C#, and the .NET framework. It defines view state as storing the current property settings of an ASP.NET page and controls to detect form submissions. It explains that user controls allow reusing ASP.NET pages as controls, and validation controls perform input checking on server controls. The document also distinguishes between Response.Write and Response.Output.Write, and lists page life cycle methods like Init, Load, and Unload.
Salt conf 2014 - Using SaltStack in high availability environmentsBenjamin Cane
This document discusses best practices for using SaltStack in high availability environments. It recommends automating processes like system builds, configurations, application installations and updates to replace manual human processes that often cause downtime. Specific techniques covered include using pillars to define server configurations, templates to deploy consistent configuration files, scripts to install third-party applications, and automatically running states on a schedule while staggering restarts across servers. It cautions that automatic state runs may not always be appropriate and recommends using test runs to validate changes.
Here's a brief hands-on to get started with MySQL Server performance tuning. I'll show basic options to get started and have the right basics settings. Hope you'll enjoy!
SaltConf14 - Ben Cane - Using SaltStack in High Availability EnvironmentsSaltStack
An overview on the benefits and best practices of using SaltStack for consistency and automation in highly available enterprise environments such as financial services.
OSCP Exam Preparation Documents.
In This document, we download one vulnerable machine VM image and start analysis on the machine and get root privileged.
This document discusses profiling PHP applications to improve performance. It recommends profiling during development to identify inefficiencies. The document introduces Xdebug for profiling PHP code and Webgrind, a PHP frontend for visualizing Xdebug profiles. It provides an example of profiling a sample PHP application, identifying issues, making code changes, and verifying performance improvements through re-profiling.
Service Discovery using etcd, Consul and KubernetesSreenivas Makam
Overview of Service Discovery and Service Discovery using etcd, Consul, Kubernetes and Docker. Presented at Open source meetup, Bangalore(http://www.meetup.com/Bangalore-Open-Source-Meetup/events/229763724/)
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
2. For any website performance depends on the
following factors:
1. Server configuration.
2. Server side implementation.
3. Client side implementation.
4. Database implementation.
5. Hardware configuration.
6. Network configuration.
3. In this session we will discuss on blue highlighted
items below:
1. Server configuration.
2. Server side implementation.
3. Client side implementation.
4. Database implementation.
5. Hardware configuration.
6. Network configuration.
4. We know:
For asp.net websites we use IIS as webserver.
We hold all of our website specific configurations in
web.config file.
But do we know about 2 more config files that hold
different configurations of our application? Those
are machine.config and web.config inside
“C:WindowsMicrosoft.NETFrameworkv2.0.5072
7CONFIG” folder.
5. Web.config in your website’s root directory
holds configuration of your website. On the
other hand web.config and machine.config in
“C:WindowsMicrosoft.NETFrameworkv2.0.
50727CONFIG” folder holds global
configuration of your webserver and it is
global for all the websites of your server.
6. Now a days most of the sites have dependencies on
external services and resources. You can adjust the
settings of few server variables to scale your site
for better accessibility and performance.
7. Process Model
In machine.config file you will find the following
block under system.web:
<processModel autoConfig="true"/>
This will set all the process model parameters
value to its default. Though the default process
model configuration is not defined in
machine.config or root web.config, you can see
the default values set by an application here:
9. We will see how we can improve asp.net application’s
performance by modifying few of the processModel
parameters.
Before that, another very important configuration element
that has contribution is httpRuntime under system.web.
Again, you will not see the default value of this element in
either machine.config or root web.config. Here is the default
settings:
11. Now let’s see how some of the server level
parameter values can help us to gain
performance boost for our applications.
12. This parameter defines the number of threads asp.net can process at a time. The
default value of this parameter is 20. It means, if your web server is a single CPU
machine, 20 worker threads will be usable by asp.net in parallel. For a dual core
machine it will be 40.
The formula is : maxWorkerThreads * # of CPU.
Don’t confuse one important factor here. Say, you have a dual core machine. That
does not mean, your webserver can serve 40 simultaneous request based on the
default settings. It actually depends on another parameter of httpRuntime. that is
minFreeThreads. I will talk on this soon.
If your application is less CPU intensive, rather more dependant on database
server and external services for data and processing, you may increase the value
of maxWorkerThreads significantly. The allowed range of this parameter is 5 to
100. Try to assess which value should be optimum for you. I would set it to 100
for my application. Note that, I knew my application was hosted to a dedicated
server and no other applications were served from that server.
13. This is a parameter of processModel element. It defines the
maximum number of I/O threads to use for the process. Like
maxWorkerThreads, the value of this parameter is also
multiplied by the number of CPU. So,
the folrmula is: maxIoThreads * # of CPU.
Default value of this parameter is 20. The range of value it
allows is 5 to 100. It is better to have this aligned with
maxWorkerThreads. I would set it to 100 for my application.
14. minFreeThreads is a parameter of httpRuntime. It determines how many
worker threads must be available to start a remote or local request. The
default value of this parameter is 8. That means if the value of
maxWorkerThreads is set to 100 in a dual core machine, and if
minFreeThreads is set to default 8, asp.net will be able to serve total 192
requests simultaneously.
The formula is: (maxWorkerThreads*number of CPUs)-minFreeThreads
You should be careful in setting the value of this parameter. Because, if
you increase the value of maxWorkerThreads to 100 and sets a very low
value for minFreeThreads, it will hamper your application. Because for
every request you application may need some free threads for
processing background or parallel tasks. That is why, you always should
ensure a good number of free threads in your application. MSDN
suggests to set it to 88 * # of CPU. But as my application was hosted to a
dedicated server, I would set to 50 * # of CPU. You can think of setting
it to an even lower value if your application runs in a dedicated server
and does not handle too many asynchronous processing.
15. This is a parameter of httpRuntime. It specifies the minimum
number of free threads that ASP.NET keeps available to allow
execution of new local requests. The specified number of
threads is reserved for requests that are coming from the
local host, in case some requests issue child requests to the
local host during processing. This helps to prevent a possible
deadlock with recursive reentry into the Web server. The
default value of this parameter is 4.
MSDN suggests to set this value to 76 * # of CPU. But
according to the ratio of default minLocalRequestFreeThreads
and maxWorkerThreads, I would set it to 10 * # of CPU.
16. minWorkerThreads indicates the minimum number of threads
that should be kept warm. This is a parameter of
processModel. The default value of this parameter is 1.
Threads that are controlled by this setting can be created at a
much faster rate than worker threads that are created from
the CLR's default "thread-tuning" capabilities. The suggested
value for this parameter is : maxWorkerThreads/2. So, if you
set maxWorkerThreads to 100 should set minWorkerThreads
to 50. Note that, you should not confuse minWorkerThreads
with minFreeThreads.
17. This is a configuration parameter of
httpRuntime. The default value is 110
seconds. Based on your preference, you may
like to alter the value of this parameter.
18. MaxConnection is a parameter defined under
System.Net.ConnectionManagement. It defines, how
many external http connections can be made from a
client. Here the client is asp.net. The suggested value of
this parameter according to msdn is 12 * # of CPU. But
you can make it even bigger number based on your
scenario. If your application has dependencies on many
external services for data and it is less CPU intensive
you may set it to as maximum as 100.
<system.net>
<connectionManagement>
<add address="*" maxconnection="100" />
</connectionManagement>
</system.net>
19. So we have talked about different configurations you may set
to tune your application for processModel, httpRuntime and
system.net. These values have dependency on each other. So,
you must do it very carefully to get the best output.
20. An HttpModule is an assembly that implements IHttpModule
interface and intercepts all Http requests. By default asp.net loads
quite a few HttpModules. Whenever a http request is sent to the
server all of the HttpModules take place in in the request pipeline
and intercepts each and every request.
The default HttpModules are configured at web.config file inside
C:WindowsMicrosoft.NETFrameworkv2.0.50727CONFIG directory.
22. It is obvious that you do not need all of the HttpModules in your application.
So, there is no point to keep the un-used HttpModules in your request
pipeline and allow them to execute some unnecessary code. For example if
you do not use WindowsAuthentication, you can safely remove this module
from your configuration. But removing default HttpModules from the global
web.config file inside frameworkconfig directory is never wise as it will
impace all the websites installed in the server. So you should do this in the
web.config of your own application. You can do this in the following way:
<httpModules>
<remove name="UrlAuthorization" />
<remove name="WindowsAuthentication" />
<remove name="PassportAuthentication" />
<remove name="AnonymousIdentification" />
<remove name="FileAuthorization" />
</httpModules>
Be confirm that your application does not need a module before you
remove it.
23. Since asp.net webform based application came first, perhaps viewstate is one
of the most liked features in the community. You have a server control in
your page and after post back you have its value preserved without doing
anything. Really for web form developers it is an awesome feature. But while
it is a nice feature, it can hamper your site performance too unless you use
this efficiently.
By default in all asp.net pages the viewstate is enabled. So, all the server
controls you use in your webform will persist its viewstate. ViewSate always
loads in your browser in encoded format. So, the bigger your ViewState is,
the bigger your page size becomes. For a small and simple page this may be
minor. But when you use a complex and large page where quite a few server
controls are used, ViewState can increase your page size significantly. Look
at image 1 to see the look of ViewState of a simple asp.net page where I had
used just a GridView control and populated it with 60 rows and 3 columns.
24.
25. You can disable ViewState in your asp.net application in 3 levels. 1. application level 2.
page level 3. control level. You should always remember the precedence of this settings.
Your common sense may tempt you to think you can disable ViewState in application
level and even in page level then, you will enable it in control level. But it will not work in
this way. In asp.net ViewState settings work the other way. Application level setting gets
the highest priority, then the page level setting and finally the control level setting.
So the suggested way is:
1. If you need ViewState even in a single location of your application, keep it enabled at application level.
2. The pages where you do not need ViewState at all, disable it in page level.
3. The pages where you need ViewState, enable it in page level and then disable it in all the server
controls where you actually do not need it. The controls that loads on every get or post request and
you do not need its value to be persisted between http requests are most likely the controls where you
do not need view state. For example: A GridView control may not need a view state.
Application Level Setting > Page Level Setting > Control Level Setting
26. Disable ViewState in Application Level inside web.config
<system.web>
<pages enableViewState="false"></pages>
</system.web>
Disable ViewState in Page Level in Page directive
<%@ Page .... EnableViewState="false" %>
Disable ViewState at control level
<asp:Label runat="server" ID="lblMsg" EnableViewState="false">H
ere is your message!</asp:Label>
27. This is really a 100 level message to most asp.net developers.
Sometimes, we tend to store information in ViewState when the
information just needs to be persisted during a post back. But as I
have already described, we should always try to keep the ViewState
size as minimum as possible. So, storing large data in ViewState is
always prohibited.
28. When you develop your asp.net based web application, you may like to
turn on the trace to profile different matrixes of your application. This is
fine. But when you deploy the site to production, you must turn off the
Asp.Net Trace.
You can turn on the trace through web.config:
<trace enabled="true" pageOutput="true"/>
This will load the trace data at the bottom of your browser window.
When you go to production make sure that you make both “enabled”
and “pageOutput” to false. If you just make pageOutput to false still
tracing runs in the background and performance will be affected.
29. Turn Debug off.
Deploy with release build.
32. Minimize HTTP Requests
◦ Use Sprite Images
◦ Use Image Maps
Use CDN
Cache your static contents
Cache your dynamic contents where appropriate.
34. Put Stylesheets at the Top
Put Scripts at the Bottom
Make JavaScript and CSS External
Minify JavaScript and CSS
Flush the Buffer Early
Split Components Across Domains
Reduce Cookie Size
Use Cookie-free Domains for static
Components
35. Use PNG over GIF
Don't re-size Images in HTML
Make favicon.ico Small and Cacheable
36. Create proper indexing
De-fragment your indexes
37. Write better query
◦ Avoid using cursor
◦ Temporary Table/ Table variable
◦ Avoid Using Dynamic SQL
◦ Avoid “like” when you perform any complex query
on large data
◦ Never do “select * from table”
◦ Comment out your print statements
◦ Use Indexed view
◦ Prefer subquery over function if re-usability is not
vital.
◦ Use “UNION” over “OR”