The document discusses the key activities in system implementation which include coding, testing, installation, documentation, training, and support. It provides details on each of these implementation steps such as coding the physical design specifications into working software code, performing various types of testing, replacing the current system with the new system during installation, and documenting the system and training users on how to use it for support after installation. The goal of implementation is to convert specifications into working, reliable software and prepare documentation and training to support user adoption of the new system.
DCD INTELLIGENCE PRESENTATION ISTANBUL - DECEMBER 2014_NPDarran Blatch
DCD Intelligence provides research on the global data center industry. This document summarizes DCD Intelligence's research on the Turkish data center sector. It finds that from 2011-2014:
- Total data center space in Turkey grew at an average annual rate of 3.5% to 610,000 square meters.
- Power consumption increased around 4% annually to 880 MW in 2014.
- Data center investment grew at an annual rate of 12.7-14.5% to $3.55 billion in 2014.
- Outsourcing saw the highest investment growth at 16.7% annually on average.
The document discusses data center infrastructure management (DCIM) solutions. It defines DCIM as systems that collect and manage data about a data center's assets, resource use, and operational status throughout the lifecycle to help optimize performance and meet business goals. The document outlines challenges in data center management like availability, efficiency, costs, and changing needs. It then describes Schneider Electric's DCIM solutions and tools that provide integrated management of physical infrastructure, IT systems, and business processes to address these challenges.
The document discusses various topics related to software development including challenges, opportunities, and best practices. Some key points:
1. Software development involves many phases from requirements analysis to testing to maintenance. It is important to involve users, establish clear standards, and divide projects into well-defined phases and activities.
2. Developing software presents inherent challenges like changing requirements, managing frequent changes, and ensuring compatibility with existing systems. Adopting a problem-solving approach and justifying systems as investments can help address some challenges.
3. Opportunities in software development include making the process more cost-effective, improving quality, and capturing important domain knowledge. New approaches like model-driven development also offer benefits if properly
Experts Live 2022 - Setup and implement a successful Microsoft Teams governan...Jasper Oosterveld
EVENTS OFFICE 365 SPEAKER
I AM SPEAKING AT EXPERTS LIVE NETHERLANDS 2022
Posted on July 20, 2022
After two years it is time for Experts Live Netherlands again! I am super happy to be selected as speaker. Below you can find the details of my session:
Setup and implement a successful Microsoft Teams governance strategy
Microsoft Teams enables organizations to stay connected and access shared content any time to learn, plan, and innovate—together. To guarantee a succesfull rollout and adoption of your Microsoft Teams implementation, it is crucial to setup and implement a Governance strategy. Jasper Oosterveld, Microsoft MVP & Modern Workplace Consultant, has vast experience with the implementation of Microsoft Teams governance strategies. During this session, he is going to share his hands-on approach, so after this session you are ready to setup and implement your own successful governance strategy for Microsoft Teams.
Maturity Models - Open Compliance Summit 2023Shane Coughlan
The document discusses a capability maturity model (CMM) for assessing the maturity of an organization's open source software development practices. It presents a five-level maturity framework from initial to optimizing and maps out how capabilities could be assessed across four categories: people and organization, processes, information, and systems. The CMM is aligned with requirements in the OpenChain specification and ISO 5230 standard to provide a potential framework for determining an organization's open source compliance maturity.
Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. I hope this ppt will help u to learn about software testing.
Active brand management is critical to driving trust in the marketplace. The brand management maturity model will help you optimize the essential assets of your brand.
The brand management maturity model helps Widen CollectiveⓇ customers optimize investments in their brand management practice by examining the five dimensions of strategy, people, process, technology, and impact.
Use this tool as a guide to developing your brand strategy to get more out of your marketing investments. Learn more at https://www.widen.com/blog/the-widen-brand-management-maturity-model-your-path-to-greater-roi.
The document discusses the key activities in system implementation which include coding, testing, installation, documentation, training, and support. It provides details on each of these implementation steps such as coding the physical design specifications into working software code, performing various types of testing, replacing the current system with the new system during installation, and documenting the system and training users on how to use it for support after installation. The goal of implementation is to convert specifications into working, reliable software and prepare documentation and training to support user adoption of the new system.
DCD INTELLIGENCE PRESENTATION ISTANBUL - DECEMBER 2014_NPDarran Blatch
DCD Intelligence provides research on the global data center industry. This document summarizes DCD Intelligence's research on the Turkish data center sector. It finds that from 2011-2014:
- Total data center space in Turkey grew at an average annual rate of 3.5% to 610,000 square meters.
- Power consumption increased around 4% annually to 880 MW in 2014.
- Data center investment grew at an annual rate of 12.7-14.5% to $3.55 billion in 2014.
- Outsourcing saw the highest investment growth at 16.7% annually on average.
The document discusses data center infrastructure management (DCIM) solutions. It defines DCIM as systems that collect and manage data about a data center's assets, resource use, and operational status throughout the lifecycle to help optimize performance and meet business goals. The document outlines challenges in data center management like availability, efficiency, costs, and changing needs. It then describes Schneider Electric's DCIM solutions and tools that provide integrated management of physical infrastructure, IT systems, and business processes to address these challenges.
The document discusses various topics related to software development including challenges, opportunities, and best practices. Some key points:
1. Software development involves many phases from requirements analysis to testing to maintenance. It is important to involve users, establish clear standards, and divide projects into well-defined phases and activities.
2. Developing software presents inherent challenges like changing requirements, managing frequent changes, and ensuring compatibility with existing systems. Adopting a problem-solving approach and justifying systems as investments can help address some challenges.
3. Opportunities in software development include making the process more cost-effective, improving quality, and capturing important domain knowledge. New approaches like model-driven development also offer benefits if properly
Experts Live 2022 - Setup and implement a successful Microsoft Teams governan...Jasper Oosterveld
EVENTS OFFICE 365 SPEAKER
I AM SPEAKING AT EXPERTS LIVE NETHERLANDS 2022
Posted on July 20, 2022
After two years it is time for Experts Live Netherlands again! I am super happy to be selected as speaker. Below you can find the details of my session:
Setup and implement a successful Microsoft Teams governance strategy
Microsoft Teams enables organizations to stay connected and access shared content any time to learn, plan, and innovate—together. To guarantee a succesfull rollout and adoption of your Microsoft Teams implementation, it is crucial to setup and implement a Governance strategy. Jasper Oosterveld, Microsoft MVP & Modern Workplace Consultant, has vast experience with the implementation of Microsoft Teams governance strategies. During this session, he is going to share his hands-on approach, so after this session you are ready to setup and implement your own successful governance strategy for Microsoft Teams.
Maturity Models - Open Compliance Summit 2023Shane Coughlan
The document discusses a capability maturity model (CMM) for assessing the maturity of an organization's open source software development practices. It presents a five-level maturity framework from initial to optimizing and maps out how capabilities could be assessed across four categories: people and organization, processes, information, and systems. The CMM is aligned with requirements in the OpenChain specification and ISO 5230 standard to provide a potential framework for determining an organization's open source compliance maturity.
Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. I hope this ppt will help u to learn about software testing.
Active brand management is critical to driving trust in the marketplace. The brand management maturity model will help you optimize the essential assets of your brand.
The brand management maturity model helps Widen CollectiveⓇ customers optimize investments in their brand management practice by examining the five dimensions of strategy, people, process, technology, and impact.
Use this tool as a guide to developing your brand strategy to get more out of your marketing investments. Learn more at https://www.widen.com/blog/the-widen-brand-management-maturity-model-your-path-to-greater-roi.
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptxJasper Oosterveld
Thinking about Governance doesn't get many people excited. That said, defining and implementing Governance is the key to a successful rollout and adoption of Microsoft Teams. Jasper Oosterveld, Microsoft MVP & Modern Workplace Consultant, is taking a hands-on approach around Governance for Microsoft Teams. You can expect real world advise around a variety of topics: naming convention, external access, expiration policy, information protection and the creation process. After this session you are ready to go back and build your own successful Governance for Microsoft Teams.
Managing security settings in windows server with group policyMiguel de la Cruz
This document discusses how to use Group Policy in Windows Server to define security configurations and manage security settings. It provides guidance on setting up security auditing through Group Policy to log events and monitor access. It describes how to configure audit settings for specific event categories, apply auditing to local files/folders, and view the security log to check audited events. The aim is to help IT professionals and users understand how to enhance security and network administration using Windows auditing technologies.
This document provides an overview of how to master the Oracle Enterprise Manager 12c (EM12c) environment. It discusses how to configure various EM12c features such as auto-discovery of targets, monitoring templates, incident rule sets, administration groups, and reporting. The document emphasizes automating management tasks, removing unnecessary notifications, updating metric thresholds, and consolidating job management to improve efficiency. It also previews new features coming in future EM12c releases and encourages attendees to apply patches, upgrades, and connect on social media.
March 2023 CIAOPS Need to Know WebinarRobert Crane
The document provides information about an upcoming webinar on Microsoft 365 hosted by @directorcia on March 2023. The webinar will cover Microsoft 365 updates, information protection in Microsoft 365, and include a Q&A session. The agenda includes discussing the Microsoft 365 update, information protection in Microsoft 365, and a Q&A. Recordings of past webinars are available on ciaopsacademy.com. Attendees are asked to turn off their mobile devices and email and take notes during the webinar.
The document outlines an effective software release management strategy with multiple layers and branching models. It discusses establishing rigorous development, build, test, and deployment cycles with common environments. It also recommends moving to continuous integration and deployment with tools and processes to support rapid defect detection. Higher level branches have stricter quality criteria than lower ones, with mainline and release branches intended for stable, tested code. The strategy aims to speed delivery, increase quality, reduce costs, and support scalable, efficient development.
The document describes the six phases of the systems development life cycle: 1) preliminary investigation, 2) systems analysis, 3) systems design, 4) systems development, 5) systems implementation, and 6) systems maintenance. Each phase involves specific activities like gathering requirements, designing system components, developing and acquiring software/hardware, testing, training users, and ongoing maintenance. Traceability matrices are used to map requirements to designs and validate that the life cycle process is followed.
This document discusses establishing governance for Microsoft Power Platform environments and assets. It recommends establishing an environment strategy, setting up data loss prevention policies, leveraging built-in activity logs and analytics, installing a Center of Excellence starter kit, welcoming new users and identifying champions, and establishing automated audit processes. The presentation also demonstrates restricting connector usage and provides information on Dynamics 365 and Power Platform communities for support.
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxsleeperfindley
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose:
Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1.
Develop a Windows
system restore point
systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2.
Develop a Windows system administration procedure to manage
programs and features
.
3.
Develop a
systems administration
procedure to implement configuration rules from
systems security technical
guidance
issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes). You will write three separate procedures for this lab:
(a)
Creating, Using, Removing System Restore Points for Windows 8.1
(b)
Managing Windows 8.1 Programs and Features
(c)
Implementing Security Configuration Rules for Windows 8.1
Each procedure will have the following major sections (see Figure 1):
·
Title:
·
Operating Environment:
·
Description:
·
Notes, Warnings, & Restrictions:
·
Resources (Further Reading):
·
Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g.
Create System Restore Points
) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for creating System Restore Points using the “System Restore ” tool….)
Title:
Operating Environment:
1.
Hardware
2.
Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
Figure 1. Required Outline for System Administration Procedures
Instructions
Part (a): Implementing System Restore Points
1.
Investigate the
System Restore
tool (used to manage system restore points). To access the tool, open the
System
tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2.
Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a.
Create a system restore point for a Windows 8.1 system
b.
Use a system r.
The role of the quality group in software development lecture 4Abdul Basit
The quality group plays several roles in software development including testing products, providing expertise on the product and development process, and offering knowledge and training. The primary activities of the quality assurance group are to develop and run tests with an emphasis on reporting defects. They also measure product quality, assess risks, ensure processes are defined and controlled, and provide guidance throughout the organization. The quality system models like ISO 9000 and CMM provide a framework for quality but do not prescribe specific techniques. The quality group aims to promote quality assurance, make developers aware of quality, and monitor procedures, testing, deliveries, and continuous improvement.
Managing and supporting PowerApps & Flow at scale by Daniel LaskewitzDaniel Laskewitz
The document discusses how to establish governance over a Power Platform environment. It recommends establishing an environment strategy, setting up data loss prevention policies, leveraging built-in activity logs and analytics, installing a Center of Excellence starter kit, welcoming new users and identifying champions, and establishing automated audit processes. The agenda covers product discovery, security layers, demoing DLP policies, monitoring activity, leveraging management tools, and nurturing an app catalog.
This document outlines a comprehensive three-day training course that covers all aspects of using the Questionmark Perception assessment system. The course will teach participants how to author assessments, create and schedule participants, deliver assessments, analyze results, and generate reports. Over the three days, trainees will learn how to use the Authoring Manager to create questions and assessments, the Enterprise Manager for administration and results, and the Reporter for generating reports. By the end of the course, participants will be able to independently use all the major components of Perception.
This document outlines a comprehensive 3-day training course that covers all aspects of using the Questionmark Perception assessment system. The course will teach participants how to author assessments, create and schedule participants, deliver assessments, analyze results, and generate reports. Over the three days, trainees will learn how to use the Authoring Manager to create questions and assessments, the Enterprise Manager for administration and results, and the Reporter for generating reports. By the end of the course, participants will be able to independently use all the major components of Perception.
This document discusses an approach to DevOps. It outlines some of the challenges faced in a pre-DevOps environment like SLA violations and burnout. It then discusses how adopting a DevOps mindset can enable faster delivery while maintaining quality. Key aspects of DevOps include treating other teams as customers, establishing feedback loops, and including time for improvement. Metrics like lead time, deployments, and customer satisfaction are important. The document provides examples of DevOps practices from Spotify and references for further information.
We are FixNix, born on a vision to democratize the Governance, Risk and Compliance(GRC) vertical. GRC is a very niche area and there are very few companies doing this in market. Within one year of inception, we have cracked Microsoft Bizspark Challenge and IEEE Best Cloud Startup awards.
We master in developing mature and tailored GRC solutions and offer them as a SaaS model. We have launched our product before 6 months and we are successful by achieving enterprise clients like Cipla, Mphasis, GMR, E&Y with on-premise deployments and a couple of SMBs with SaaS sign ups.
The document discusses various topics related to business strategy formulation and implementation including:
1. Elements of a business plan such as the executive summary, market research, marketing plan, management team, and financial plan.
2. Types of strategies such as corporate, directional, growth, concentration, and stability strategies.
3. Implementation of strategies through programs, budgets, and procedures.
4. Evaluation and control of strategies by monitoring performance, comparing to standards, and taking corrective actions. Measures like ROI are discussed.
This document describes a Deployment Excellence Framework (DEF) to effectively adopt high maturity processes. The framework includes 3 interlinked cycles: 1) Identification Cycle to target initial units and stakeholders, 2) Initial Deployment Cycle focusing on awareness and success indicators, and 3) Sustenance Cycle increasing adoption scope and self-reliance. It also includes a feedback adapter for course correction. The case study illustrates using DEF to standardize an organization's project estimation processes and templates by deploying new estimation models and tools over 6 quarters.
System testing is performed to verify that an implemented system meets its specified requirements. There are several types of system testing that should be performed including: 1) System acceptance testing to determine if the system satisfies acceptance criteria, 2) Installation testing to ensure the system can be installed and configured properly, 3) Performance testing to measure the system's performance under different conditions such as load and stress. Proper system testing is important to ensure the system is error-free, works as intended, and is acceptable to stakeholders.
The Most Underutilized Configuration Management Features Cireson
In my most recent webinar we looked at my favorite features of Configuration Manager 2012. This week we will look at the features that I think are either underutilized or features that I don't see used well enough in the product. The goal of this webinar is to help identify additional features that could be used in Configuration Manager or possibly change how some of those features are utilized.
AGENDA:
-How to more effectively use role based administration
-Look at the application model
-Explore Asset Intelligence and why you want to use it
-Discuss benefits of using automatic deployment rules
-Review compliance settings and why they are useful
-Reveal additional features that may be of interest
What is DevOps? It’s a fairly hot term in today’s application development and operations space,but there are many different definitions as to what DevOps really is. Ultimately, DevOps is abouthow teams build software, deploy software and maintain it throughout its lifecycle. There is nosingle, right answer to the question, but there are a number of tools and strategies that can helpcustomers adopt a winning DevOps process that allows dev and operations teams to moreproductive together.In this session, the audience will learn what DevOps is at a high level, provide strategies for howto implement a DevOps process that fits their organization’s needs and how the MicrosoftApplication Lifecycle Management (ALM) tooling can help with this. As part of the session,attendees can expect to learn how to set up the Microsoft ALM stack for their teams and how touse it effectively in their software development lifecycle, regardless of the role each individual plays on the team.
Engage for success ibm spectrum accelerate 2xKinAnx
IBM Spectrum Accelerate is software that extends the capabilities of IBM's XIV storage system, such as consistent performance tuning-free, to new delivery models. It provides enterprise storage capabilities deployed in minutes instead of months. Spectrum Accelerate runs the proven XIV software on commodity x86 servers and storage, providing similar features and functions to an XIV system. It offers benefits like business agility, flexibility, simplified acquisition and deployment, and lower administration and training costs.
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep divexKinAnx
The document provides an overview of IBM Spectrum Virtualize HyperSwap functionality. HyperSwap allows host I/O to continue accessing volumes across two sites without interruption if one site fails. It uses synchronous remote copy between two I/O groups to make volumes accessible across both groups. The document outlines the steps to configure a HyperSwap configuration, including naming sites, assigning nodes and hosts to sites, and defining the topology.
More Related Content
Similar to Presentation strategies for monitoring large data centers with oracle enterprise manager
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptxJasper Oosterveld
Thinking about Governance doesn't get many people excited. That said, defining and implementing Governance is the key to a successful rollout and adoption of Microsoft Teams. Jasper Oosterveld, Microsoft MVP & Modern Workplace Consultant, is taking a hands-on approach around Governance for Microsoft Teams. You can expect real world advise around a variety of topics: naming convention, external access, expiration policy, information protection and the creation process. After this session you are ready to go back and build your own successful Governance for Microsoft Teams.
Managing security settings in windows server with group policyMiguel de la Cruz
This document discusses how to use Group Policy in Windows Server to define security configurations and manage security settings. It provides guidance on setting up security auditing through Group Policy to log events and monitor access. It describes how to configure audit settings for specific event categories, apply auditing to local files/folders, and view the security log to check audited events. The aim is to help IT professionals and users understand how to enhance security and network administration using Windows auditing technologies.
This document provides an overview of how to master the Oracle Enterprise Manager 12c (EM12c) environment. It discusses how to configure various EM12c features such as auto-discovery of targets, monitoring templates, incident rule sets, administration groups, and reporting. The document emphasizes automating management tasks, removing unnecessary notifications, updating metric thresholds, and consolidating job management to improve efficiency. It also previews new features coming in future EM12c releases and encourages attendees to apply patches, upgrades, and connect on social media.
March 2023 CIAOPS Need to Know WebinarRobert Crane
The document provides information about an upcoming webinar on Microsoft 365 hosted by @directorcia on March 2023. The webinar will cover Microsoft 365 updates, information protection in Microsoft 365, and include a Q&A session. The agenda includes discussing the Microsoft 365 update, information protection in Microsoft 365, and a Q&A. Recordings of past webinars are available on ciaopsacademy.com. Attendees are asked to turn off their mobile devices and email and take notes during the webinar.
The document outlines an effective software release management strategy with multiple layers and branching models. It discusses establishing rigorous development, build, test, and deployment cycles with common environments. It also recommends moving to continuous integration and deployment with tools and processes to support rapid defect detection. Higher level branches have stricter quality criteria than lower ones, with mainline and release branches intended for stable, tested code. The strategy aims to speed delivery, increase quality, reduce costs, and support scalable, efficient development.
The document describes the six phases of the systems development life cycle: 1) preliminary investigation, 2) systems analysis, 3) systems design, 4) systems development, 5) systems implementation, and 6) systems maintenance. Each phase involves specific activities like gathering requirements, designing system components, developing and acquiring software/hardware, testing, training users, and ongoing maintenance. Traceability matrices are used to map requirements to designs and validate that the life cycle process is followed.
This document discusses establishing governance for Microsoft Power Platform environments and assets. It recommends establishing an environment strategy, setting up data loss prevention policies, leveraging built-in activity logs and analytics, installing a Center of Excellence starter kit, welcoming new users and identifying champions, and establishing automated audit processes. The presentation also demonstrates restricting connector usage and provides information on Dynamics 365 and Power Platform communities for support.
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxsleeperfindley
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose:
Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1.
Develop a Windows
system restore point
systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2.
Develop a Windows system administration procedure to manage
programs and features
.
3.
Develop a
systems administration
procedure to implement configuration rules from
systems security technical
guidance
issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes). You will write three separate procedures for this lab:
(a)
Creating, Using, Removing System Restore Points for Windows 8.1
(b)
Managing Windows 8.1 Programs and Features
(c)
Implementing Security Configuration Rules for Windows 8.1
Each procedure will have the following major sections (see Figure 1):
·
Title:
·
Operating Environment:
·
Description:
·
Notes, Warnings, & Restrictions:
·
Resources (Further Reading):
·
Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g.
Create System Restore Points
) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for creating System Restore Points using the “System Restore ” tool….)
Title:
Operating Environment:
1.
Hardware
2.
Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
Figure 1. Required Outline for System Administration Procedures
Instructions
Part (a): Implementing System Restore Points
1.
Investigate the
System Restore
tool (used to manage system restore points). To access the tool, open the
System
tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2.
Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a.
Create a system restore point for a Windows 8.1 system
b.
Use a system r.
The role of the quality group in software development lecture 4Abdul Basit
The quality group plays several roles in software development including testing products, providing expertise on the product and development process, and offering knowledge and training. The primary activities of the quality assurance group are to develop and run tests with an emphasis on reporting defects. They also measure product quality, assess risks, ensure processes are defined and controlled, and provide guidance throughout the organization. The quality system models like ISO 9000 and CMM provide a framework for quality but do not prescribe specific techniques. The quality group aims to promote quality assurance, make developers aware of quality, and monitor procedures, testing, deliveries, and continuous improvement.
Managing and supporting PowerApps & Flow at scale by Daniel LaskewitzDaniel Laskewitz
The document discusses how to establish governance over a Power Platform environment. It recommends establishing an environment strategy, setting up data loss prevention policies, leveraging built-in activity logs and analytics, installing a Center of Excellence starter kit, welcoming new users and identifying champions, and establishing automated audit processes. The agenda covers product discovery, security layers, demoing DLP policies, monitoring activity, leveraging management tools, and nurturing an app catalog.
This document outlines a comprehensive three-day training course that covers all aspects of using the Questionmark Perception assessment system. The course will teach participants how to author assessments, create and schedule participants, deliver assessments, analyze results, and generate reports. Over the three days, trainees will learn how to use the Authoring Manager to create questions and assessments, the Enterprise Manager for administration and results, and the Reporter for generating reports. By the end of the course, participants will be able to independently use all the major components of Perception.
This document outlines a comprehensive 3-day training course that covers all aspects of using the Questionmark Perception assessment system. The course will teach participants how to author assessments, create and schedule participants, deliver assessments, analyze results, and generate reports. Over the three days, trainees will learn how to use the Authoring Manager to create questions and assessments, the Enterprise Manager for administration and results, and the Reporter for generating reports. By the end of the course, participants will be able to independently use all the major components of Perception.
This document discusses an approach to DevOps. It outlines some of the challenges faced in a pre-DevOps environment like SLA violations and burnout. It then discusses how adopting a DevOps mindset can enable faster delivery while maintaining quality. Key aspects of DevOps include treating other teams as customers, establishing feedback loops, and including time for improvement. Metrics like lead time, deployments, and customer satisfaction are important. The document provides examples of DevOps practices from Spotify and references for further information.
We are FixNix, born on a vision to democratize the Governance, Risk and Compliance(GRC) vertical. GRC is a very niche area and there are very few companies doing this in market. Within one year of inception, we have cracked Microsoft Bizspark Challenge and IEEE Best Cloud Startup awards.
We master in developing mature and tailored GRC solutions and offer them as a SaaS model. We have launched our product before 6 months and we are successful by achieving enterprise clients like Cipla, Mphasis, GMR, E&Y with on-premise deployments and a couple of SMBs with SaaS sign ups.
The document discusses various topics related to business strategy formulation and implementation including:
1. Elements of a business plan such as the executive summary, market research, marketing plan, management team, and financial plan.
2. Types of strategies such as corporate, directional, growth, concentration, and stability strategies.
3. Implementation of strategies through programs, budgets, and procedures.
4. Evaluation and control of strategies by monitoring performance, comparing to standards, and taking corrective actions. Measures like ROI are discussed.
This document describes a Deployment Excellence Framework (DEF) to effectively adopt high maturity processes. The framework includes 3 interlinked cycles: 1) Identification Cycle to target initial units and stakeholders, 2) Initial Deployment Cycle focusing on awareness and success indicators, and 3) Sustenance Cycle increasing adoption scope and self-reliance. It also includes a feedback adapter for course correction. The case study illustrates using DEF to standardize an organization's project estimation processes and templates by deploying new estimation models and tools over 6 quarters.
System testing is performed to verify that an implemented system meets its specified requirements. There are several types of system testing that should be performed including: 1) System acceptance testing to determine if the system satisfies acceptance criteria, 2) Installation testing to ensure the system can be installed and configured properly, 3) Performance testing to measure the system's performance under different conditions such as load and stress. Proper system testing is important to ensure the system is error-free, works as intended, and is acceptable to stakeholders.
The Most Underutilized Configuration Management Features Cireson
In my most recent webinar we looked at my favorite features of Configuration Manager 2012. This week we will look at the features that I think are either underutilized or features that I don't see used well enough in the product. The goal of this webinar is to help identify additional features that could be used in Configuration Manager or possibly change how some of those features are utilized.
AGENDA:
-How to more effectively use role based administration
-Look at the application model
-Explore Asset Intelligence and why you want to use it
-Discuss benefits of using automatic deployment rules
-Review compliance settings and why they are useful
-Reveal additional features that may be of interest
What is DevOps? It’s a fairly hot term in today’s application development and operations space,but there are many different definitions as to what DevOps really is. Ultimately, DevOps is abouthow teams build software, deploy software and maintain it throughout its lifecycle. There is nosingle, right answer to the question, but there are a number of tools and strategies that can helpcustomers adopt a winning DevOps process that allows dev and operations teams to moreproductive together.In this session, the audience will learn what DevOps is at a high level, provide strategies for howto implement a DevOps process that fits their organization’s needs and how the MicrosoftApplication Lifecycle Management (ALM) tooling can help with this. As part of the session,attendees can expect to learn how to set up the Microsoft ALM stack for their teams and how touse it effectively in their software development lifecycle, regardless of the role each individual plays on the team.
Engage for success ibm spectrum accelerate 2xKinAnx
IBM Spectrum Accelerate is software that extends the capabilities of IBM's XIV storage system, such as consistent performance tuning-free, to new delivery models. It provides enterprise storage capabilities deployed in minutes instead of months. Spectrum Accelerate runs the proven XIV software on commodity x86 servers and storage, providing similar features and functions to an XIV system. It offers benefits like business agility, flexibility, simplified acquisition and deployment, and lower administration and training costs.
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep divexKinAnx
The document provides an overview of IBM Spectrum Virtualize HyperSwap functionality. HyperSwap allows host I/O to continue accessing volumes across two sites without interruption if one site fails. It uses synchronous remote copy between two I/O groups to make volumes accessible across both groups. The document outlines the steps to configure a HyperSwap configuration, including naming sites, assigning nodes and hosts to sites, and defining the topology.
Software defined storage provisioning using ibm smart cloudxKinAnx
This document provides an overview of software-defined storage provisioning using IBM SmartCloud Virtual Storage Center (VSC). It discusses the typical challenges with manual storage provisioning, and how VSC addresses those challenges through automation. VSC's storage provisioning involves three phases - setup, planning, and execution. The setup phase involves adding storage devices, servers, and defining service classes. In the planning phase, VSC creates a provisioning plan based on the request. In the execution phase, the plan is run to automatically complete all configuration steps. The document highlights how VSC optimizes placement and streamlines the provisioning process.
This document discusses IBM Spectrum Virtualize 101 and IBM Spectrum Storage solutions. It provides an overview of software defined storage and IBM Spectrum Virtualize, describing how it achieves storage virtualization and mobility. It also provides details on the new IBM Spectrum Virtualize DH8 hardware platform, including its performance improvements over previous platforms and support for compression acceleration.
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...xKinAnx
HyperSwap provides high availability by allowing volumes to be accessible across two IBM Spectrum Virtualize systems in a clustered configuration. It uses synchronous remote copy to replicate primary and secondary volumes between the two systems, making the volumes appear as a single object to hosts. This allows host I/O to continue if an entire system fails without any data loss. The configuration requires a quorum disk in a third site for the cluster to maintain coordination and survive failures across the two main sites.
IBM Spectrum Protect (formerly IBM Tivoli Storage Manager) provides data protection and recovery for hybrid cloud environments. This document summarizes a presentation on IBM's strategic direction for Spectrum Protect, including plans to enhance the product to better support hybrid cloud, virtual environments, large-scale deduplication, simplified management, and protection for key workloads. The presentation outlines roadmap features for 2015 and potential future enhancements.
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...xKinAnx
The document provides instructions for installing and configuring Spectrum Scale 4.1. Key steps include: installing Spectrum Scale software on nodes; creating a cluster using mmcrcluster and designating primary/secondary servers; verifying the cluster status with mmlscluster; creating Network Shared Disks (NSDs); and creating a file system. The document also covers licensing, system requirements, and IBM and client responsibilities for installation and maintenance.
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...xKinAnx
This document discusses quorum nodes in Spectrum Scale clusters and recovery from failures. It describes how quorum nodes determine the active cluster and prevent partitioning. The document outlines best practices for quorum nodes and provides steps to recover from loss of a quorum node majority or failure of the primary and secondary configuration servers.
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...xKinAnx
IBM Spectrum Scale can help achieve ILM efficiencies through policy-driven, automated tiered storage management. The ILM toolkit manages file sets and storage pools and automates data management. Storage pools group similar disks and classify storage within a file system. File placement and management policies determine file placement and movement based on rules.
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...xKinAnx
The document provides an overview of IBM Spectrum Scale Active File Management (AFM). AFM allows data to be accessed globally across multiple clusters as if it were local by automatically managing asynchronous replication. It describes the various AFM modes including read-only caching, single-writer, and independent writer. It also covers topics like pre-fetching data, cache eviction, cache states, expiration of stale data, and the types of data transferred between home and cache sites.
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...xKinAnx
This document provides information about replication and stretch clusters in IBM Spectrum Scale. It defines replication as synchronously copying file system data across failure groups for redundancy. While replication improves availability, it reduces performance and increases storage usage. Stretch clusters combine two or more clusters to create a single large cluster, typically using replication between sites. Replication policies and failure group configuration are important to ensure effective data duplication.
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...xKinAnx
This document provides information about clustered NFS (cNFS) in IBM Spectrum Scale. cNFS allows multiple Spectrum Scale servers to share a common namespace via NFS, providing high availability, performance, scalability and a single namespace as storage capacity increases. The document discusses components of cNFS including load balancing, monitoring, and failover. It also provides instructions for prerequisites, setup, administration and tuning of a cNFS configuration.
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...xKinAnx
This document provides an overview of managing Spectrum Scale opportunity discovery and working with external resources to be successful. It discusses how to build presentations and configurations to address technical and philosophical solution requirements. The document introduces IBM Spectrum Scale as providing low latency global data access, linear scalability, and enterprise storage services on standard hardware for on-premise or cloud deployments. It also discusses Spectrum Scale and Elastic Storage Server, noting the latter is a hardware building block with GPFS 4.1 installed. The document provides tips for discovering opportunities through RFPs, RFIs, events, workshops, and engaging clients to understand their needs in order to build compelling proposal information.
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...xKinAnx
This document provides guidance on sizing and configuring Spectrum Scale and Elastic Storage Server solutions. It discusses collecting information from clients such as use cases, workload characteristics, capacity and performance goals, and infrastructure requirements. It then describes using tools to help architect solutions that meet the client's needs, such as breaking the problem down, addressing redundancy and high availability, and accounting for different sites, tiers, clients and protocols. The document also provides tips for working with the configuration tool and pricing the solution appropriately.
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...xKinAnx
The document provides an overview of key concepts covered in a GPFS 4.1 system administration course, including backups using mmbackup, SOBAR integration, snapshots, quotas, clones, and extended attributes. The document includes examples of commands and procedures for administering these GPFS functions.
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...xKinAnx
This document provides an overview of Spectrum Scale 4.1 system administration. It describes the Elastic Storage Server options and components, Spectrum Scale native RAID (GNR), and tips for best practices. GNR implements sophisticated data placement and error correction algorithms using software RAID to provide high reliability and performance without additional hardware. It features auto-rebalancing, low rebuild overhead through declustering, and end-to-end data checksumming.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Presentation strategies for monitoring large data centers with oracle enterprise manager
1.
2. Strategies for Monitoring Large Data Centers with Oracle Enterprise
Manager
Ana McCollum
Consulting Product Manager
3. The following is intended to outline our general
product direction. It is intended for information
purposes only, and may not be incorporated into any
contract. It is not a commitment to deliver any
material, code, or functionality, and should not be
relied upon in making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle‟s
products remains at the sole discretion of Oracle.
7. Enterprise Manager Monitoring
Fundamental part of Integrated Application-to-Disk solution
Lights-out data center monitoring
Manage by Exception: continuous monitoring of
targets, generation of alerts when exceptions are
detected
Metric: mechanism used to monitor target
conditions (availability, performance, etc.)
Alert: generated when metric crosses its
thresholds (warning, critical)
Notifications: sending of alert information (email,
etc.)
Complete and integrated across stack
Entire Oracle stack
Heterogeneous infrastructure monitoring by plug-ins
Extensible for custom needs
Manage Many as One
Features to setup and monitor many targets as one
Integrates with third party systems
Helpdesks and other management systems
ExtendedInfrastructure
…
Monitoring scope
8. Common Monitoring Questions
What‟s the best way to...
Set Up Monitoring
Deploy monitoring settings on
targets
Set up notifications for administrators
Assign right level of target privileges
to administrators
Manage Alerts
Controlling volume of alerts
Removing unwanted alerts
Automating fix for common alerts
Administrator
Data center
9. Best Practices for Monitoring the Data Center
Goals:
Meet monitoring requirements
Deploy your monitoring standards
Alert notifications sent to the appropriate
persons
Comply with security practices
Follow Principle of least privilege when
granting target privileges
Easy to manage
Infrastructure does not become
administrative task
„Manage many as one‟ for managed
targets
Scalable as enterprise grows
Strategy:
Set up monitoring for
„economies of scale‟ by laying
the groundwork for monitoring
As enterprise grows, minimal
effort to monitor new targets or
add new Enterprise Manager
administrators
• Leverage “Manage Many as
One” features
10. Best Practices: Setting Up Monitoring
4 Step Methodology
Step 1: Organize targets into groups
Step 2: Use Roles to segregate responsibilities
Step 3: Define and enforce monitoring standards
Step 4: Set up notifications using groups
11. Setting Up Monitoring
STEP 1: Organize targets into Groups
Plan your group structure
Considerations:
Group together targets monitored in
the same way
Same monitoring settings due to:
Supporting same application
Same Deployment type
(Production, Development,
Test)
Visually monitor them together in
a dashboard
Can have group hierarchies
Sample group hierarchy:
By Line of Business
By Deployment (Prod vs Devt)
By Ownership
By Line of Business
FINANCE
…… ……
By Deployment
(Prod vs Devt)
PRODUCTION DEVT
By Owner A B C D E
12. Create the group in
Enterprise Manager
You can search targets by
operational criteria (aka
target properties)
Deployment Type, Line of
Business, Location…
Additional tips:
Can add new target
properties via EMCLI
add_target_property
Can bulk update target
properties via EMCLI
set_target_property_value
Setting Up Monitoring
STEP 1: Organize targets into Groups
“Create group based on
Production database and host
targets in the Finance department”
13. Setting Up Monitoring
STEP 1: Organize targets into Groups
Make the group “privilege-
propagating”
A privilege on the group that is
granted to a user automatically
extends to all members of the
group
Includes subgroups
Requires:
Create Privilege-Propagating
Group privilege
Full privilege on all targets to be
added to the group
EMCLI modify_group verb to
convert group to privilege
propagating group
If a group is privilege propagating,
all its parent groups must be
privilege propagating.
Administrator
Production
Finance Group
Production
Group
Production
Sales Group
Operator
Privilege
14. Setting Up Monitoring
4 Step Methodology
Step 1: Organize targets into groups
Step 2: Use Roles to segregate responsibilities
Step 3: Define and enforce monitoring standards
Step 4: Set up notifications using groups
15. Setting Up Monitoring
STEP 2: Use Roles to segregate responsibilities
Who should do what on the targets in the group?
Map operations on the groups to job responsibilities (Senior
Lead, DBA owner, First Line Support, etc.)
Planning Considerations:
For the groups created, who can do these operations on them?
Change group membership
Grant privileges on the group to other users
Who can do these operations on the targets in the group?
Add / delete the target from Enterprise Manager
Define monitoring settings
Define notification settings
View / receive notifications for alerts
Acknowledge an alert
Act on target to resolve alert
Blackout target for planned or unplanned downtime
16. Setting Up Monitoring
STEP 2: Use Roles to segregate responsibilities
Operations Enterprise Manager Privilege
...On the Group:
•Change group membership
•Grant privileges on group to users
Group Administration
…On the member targets:
•Delete target from Enterprise Manager •Full on group
•Set blackout for planned downtime
•Change monitoring settings
•Change monitoring configuration
•View and acknowledge alerts, Clear alerts
•Operator on group
•Blackout Target
•Manage Target Metrics
•Configure Target
•Manage Target Alerts
•View target, receive alerts on target View on group
Mapping of operations to Enterprise Manager privileges
17. Setting Up Monitoring
STEP 2: Use Roles to segregate responsibilities
Group Administrator
• Adds / Deletes target from Enterprise Manager
• Manages group membership
• Grants privilege on group to other users
Senior Administrator
• Adds / Deletes target from Enterprise Manager
• Sets up monitoring for targets
• Sets up notification rules for targets
First Line Support
• Receives notifications for alerts
• Responds to alerts
Target Owner
• Receives alerts and responds to alerts
• Changes monitoring settings for targets
• Perform target maintenance
Examples of common job responsibilities:
18. Setting Up Monitoring
STEP 2: Use Roles to segregate responsibilities
Group Administrator ROLE
• “Add Any Target” system privilege
• “Group Administrator” on the group
Senior Administrator ROLE
• “Add Any Target” system privilege
• “Full” on the (privilege propagating) group
First Line Support ROLE
• “Manage Target Alerts” on the (privilege propagating) group
Target Owner ROLE
• “Operator” on the (privilege propagating) group
Create roles for each job responsibility
19. Setting Up Monitoring
STEP 2: Use roles to segregate responsibilities
Create roles containing the
appropriate privileges on the
privilege propagating group
Examples:
SeniorAdmin Role =
Full on „Production Sales
Group‟
FirstLineSupport Role=
Manage Target Alerts on
„Production Sales Group‟
Grant roles to administrators
who manage the group
Don’t grant privileges on
individual member targets
Harder to maintain as group grows
Production Sales Group
(Privilege-Propagating)
SeniorAdmin
Role
Full
FirstLine
Support Role
Manage
Target
Alerts
Senior Administrator
Junior Administrator
20. Setting Up Monitoring
4 Step Methodology
Step 1: Organize targets into groups
Step 2: Use Roles to segregate responsibilities
Step 3: Define and enforce monitoring standards
Step 4: Set up notifications using groups
21. Setting Up Monitoring
STEP 3: Define and enforce monitoring standards
Simplify management of many targets by defining standards for
monitoring (set of metrics and thresholds)
Monitoring standard for production databases
Monitoring standard for test databases
etc.
Create Monitoring Templates to encapsulate monitoring
standards
Monitoring standard for “Production‟ systems put this in one
template
Monitoring standard for “Test” systems put in a separate template
Monitoring Template typically contains complete set of metric
settings
Specific to a target type
Examples:
Monitoring Template for production databases
Monitoring Template for test databases
22. Setting Up Monitoring
STEP 3: Define and enforce monitoring standards
Create monitoring template
Senior Administrator creates the
template on behalf of the LOB / Team
Grant „View 'on template to other
consumers of the template
Grant „Full‟ on template only to other
senior administrators (or role) who are
entitled to edit the template
Apply monitoring templates to groups
Apply to highest level in group
hierarchy
Will apply to the applicable targets in the
group / subgroups
Example: Database template will only be
applied to database targets in group
Usage Notes:
Apply requires at least “Manage Target
Metrics”
Multiple templates can be applied on a
target, potentially overriding metric
settings
Target can have specific metric settings
by setting „prevent template override‟ flag
Metric Warn Crit
Corr
Action
Table-
space
75 90 xxx
Archive
Area %
70 80 yyy
Monitoring
Templates
Apply
Templates
Production
Group
23. Setting Up Monitoring
STEP 3: Define and enforce monitoring standards
What if I have one monitoring
standard for all my targets?
Define Monitoring Template
Specify it as the „Default” for
the target type
For targets added in the future,
will be used instead of Oracle‟s
out-of-box monitoring settings
Enterprise Manager will
automatically apply
template upon target
discovery
Usage notes:
Manually apply template for
existing targets
Requires Super Administrator
privilege to specify template as
„Default‟
Enterprise Manager
Default Template for
database
24. Setting Up Monitoring
STEP 3: Define and enforce monitoring standards
What if I have enterprise-
wide settings and
application-specific
settings for my targets?
Use Default Template to
specify enterprise-wide
settings common to all
targets
Use another template
containing settings specific
to application
Apply to target after
discovery
Default Template for
database (all)
Enterprise Manager
Database Template for
Finance Production DBs
Target applied
with Default
Template
then with
Finance
Template
25. Setting Up Monitoring
4 Step Methodology
Step 1: Organize targets into groups
Step 2: Use Roles to segregate responsibilities
Step 3: Define and enforce monitoring standards
Step 4: Set up notifications using groups
26. Setting Up Monitoring
STEP 4: Set up notifications using groups
Notification Method: means of
sending notifications (e.g. email)
You can extend Notification
Methods to accommodate custom
alert handling: OS Script,
PL/SQL, SNMP traps
Notification Rule: when alert
occurs, who gets notified and how
Use groups as the target for the
notification rule
If a target is added to the group,
the notification rule will
automatically apply to the target
Production Sales Group
(Privilege-Propagating)
Notification Rule:
Target: Production Sales Group
Critical alerts
Action: Send email to DBA team
27. Leveraging your monitoring setup
As your enterprise grows, minimal effort required for target setup
When new targets are added
to Enterprise Manager:
Production Sales Group
(Privilege-Propagating)
Apply template
Do nothing (if using Default
Templates) or apply Template
Add to appropriate group
… That‟s it!
Results:
Targets are monitored according
to your standards
Notifications for alerts on the
targets go to the right
administrators
Administrators have the right
privileges to manage the targets
Enterprise Manager
28. Common Monitoring Questions
What‟s the best way to...
Set Up Monitoring
Deploy monitoring settings on
targets
Set up notifications for administrators
Assign right level of target privileges
to administrators
Manage Alerts
Controlling volume of alerts
Removing unwanted alerts
Automating fix for common alerts
Administrator
Data center
29. Managing Alerts
1. Control alerts at the source
Was the alert raised prematurely?
Are the thresholds too high/low?
Review metric trend
Adjust thresholds, set number of occurrences
Do I care about this condition? If NOT, then:
Disable metric collection schedule
Note: Other metrics may be impacted
For database alert log metric, use alert log filters
To disable alerting for database TEMP, UNDO
tablespaces, see Support Note 816920.1
To deploy changed metric settings across targets, use
Monitoring Templates
30. Managing Alerts
2. Use Corrective Actions to
auto-resolve alerts
Tasks that automatically run in
response to an alert
Is the resolution of the alert a
repeatable process that can be
scripted?
Usage Notes:
Defined for a metric
Can be same or different for
Warning vs Critical severity
Can have different tasks based
on monitored object
Ex: Filesystem Space
Available(%) can have
different corrective actions
for /u1 and /u2
Set up notifications for
corrective action failure
Critical
Alert
Corrective
Action
Automated
Alert
Resolution
31. Managing Alerts
3. Clear old log-based alerts
regularly
Think about operational
practice for regularly clearing
old, resolved alerts
Automate using duration-
based notification rules
Tip: Create a separate
notification rule for this
Do not combine with rules
for sending notifications
Manually via EMCLI
clear_stateless_alerts
Bulk clears stateless
alerts for a target
Alert
Log
Auto-Cleared
Alerts After N Days
DBA Fixes
Issues
Alert
raised
Automated
Manual / On Demand
32. Managing Alerts
Auto-clearing log-based alerts using notification rules
First specify the
duration-based
condition…
(“Alert Log”
alerts opened
for at least 30
days)
34. Managing Alerts
4. Perform proactive
monitoring using the
System Dashboard
Shows overall health of
your group using universal
colors of alarm
Use System Dashboard at
any level in group
hierarchy:
Highest level – visibility
into status/performance
of ALL targets
Lower level – details of
alerts for specific group
FINANCE
…… ……
PRODUCTION DEVT
A B C D E
System
Dashboard
(overview)
System
Dashboard
(details)
35. Managing Alerts
System Dashboard
Include metrics showing
overall health
To help triage/assign the
alert, add operational data
using target properties (e.g.
Contact, Application
Supported, etc.)
Latest comment for alert is
shown. Use this to:
Display ticket ID
Show alert ownership
System Dashboard
Alert Details
Target
Status
Add operations
data e.g.
Owner
36. More Monitoring Tips in the Appendix
Refer to Appendix for information on additional topics:
Choosing metrics and thresholds for alerting
Customizing email to add more operational context
Practices for setting up notification rules
Sending alert reminders using repeat notifications
Escalations through email
Did my fix resolve the alert?
Is this old alert still valid?
Are my targets following my monitoring standards?
Do I have correct notification coverage for my target's alerts?
Changing dbsnmp credentials across many databases
37. Benefits: Enterprise Manager Monitoring
Enabling value through best practices
Minimal effort to scale as
enterprise grows
Reduce manual tasks
Improve administrator
productivity
Flexible to meet monitoring
and security requirements
Enables IT to meet service
goals
Standardized approach to
monitoring
Manage More with Less
38. Oracle Enterprise Manager 11g
Resource Center
Access Videos, Webcasts, White Papers, and More
Oracle.com/enterprisemanager11g
39. Additional Oracle Enterprise Manager Sessions
Thursday, Sept. 23 Location
9:00 a.m. - Oracle WebLogic Server Management for Oracle
DBAs
Marriott Marquis,
Salon 9
9:00 a.m. - Enabling Database as a Service Through Agile Self-
Service Provisioning
• Moscone S. Room
102
9:00 a.m. - Reduce TCO with Oracle Application Management
Pack for Oracle E-Business Suite
• Moscone W L2, Rm
2024
10:30 a.m. - Best Practices for Managing Your PeopleSoft
Applications
Marriott Hotel, Golden
Gate A
10:30 a.m. - Oracle Enterprise Manager Grid Control
Deployment Best Practices
Moscone S. Room
102
10:30 a.m. - Managing Sun SPARC Servers with Oracle
Enterprise Manager Ops Center
Moscone S. Room
252
10:30 a.m. - Heterogeneous Data Masking: Oracle, SQL Server,
and DB2 Database Best Practices
Moscone S. Room
306
12:00 p.m. - Scalable Enterprise Data Processing for the Cloud
with Oracle Grid Engine
Moscone S. Room
310
12:00 p.m. - Spot Problems Before Your Users Call: User
Experience Monitoring for Oracle Apps
Marriott Hotel, Golden
Gate A
12:00 p.m. - Reduce Problem Resolution Time with Oracle
Database 11g Diagnostic Framework
Moscone S. Room
102
40. Additional Oracle Enterprise Manager Sessions
Thursday, Sept. 23 Location
1:30 p.m. - Patching Enterprisewide Databases: Automation
Techniques and Real-World Insights
Moscone S. Room
310
• 1:30 p.m. - Managing User Experience: Lessons from eBay
Marriott Hotel, Golden
Gate A
1:30 p.m. - Deep Java Diagnostics and Performance Tuning:
Expert Tips and Techniques
Marriott Marquis,
Salon 9
1:30 p.m. - Oracle Enterprise Manager Configuration
Management Unleashed: Top 10 Expert Tips
Marriott Marquis,
Salon 6
1:30 p.m. - Oracle Enterprise Manager Security Best Practices
Moscone S. Room
102
3:00 p.m - The X-Files: Managing the Oracle Exadata and
Highly Available Oracle Databases
Moscone S. Room
102
3:00 p.m. - Monitoring and Diagnosing Oracle RAC
Performance with Oracle Enterprise Manager
Moscone S. Room
310
41. Oracle Enterprise Manager Hands On Labs
Thursday September 23, 2010
9:00 - 10:00 a.m. Database Performance Diagnostics and Tuning Marriott Hotel,
Salon 12/13, YB
Level
10:30 - 11:30 a.m. Oracle Fusion Middleware Management Marriott Hotel,
Salon 12/13, YB
Level
42. Oracle Enterprise Manager Demogrounds
D E M O T I T L E L O C AT I O N
Oracle Real Application Testing: Database Replay Moscone West
Oracle Real Application Testing: SQL Performance Analyzer Moscone West
Self-Managing Database: Automatic Performance Diagnostics Moscone West
Self-Managing Database: Automatic Fault Diagnostics Moscone West
Self-Managing Database: Automatic Application and SQL Tuning Moscone West
Application Quality Management: Application Testing Suite Moscone South - S022
Real User Monitoring with Oracle Enterprise Manager Moscone South - S021
Siebel CRM Application Management Moscone South - S024
Real User Monitoring with Oracle Enterprise Manager Moscone West
Oracle WebLogic Server Management and Java Diagnostics Moscone West
SOA Management with Oracle Enterprise Manager Moscone West
Oracle Business Transaction Management Moscone West
Push Button Provisioning and Patch Automation Moscone West
Smart Configuration Management Moscone West
Oracle Enterprise Manager Ops Center Moscone West
Managing the Enterprise Private Cloud Moscone West
System Management, My Oracle Support, and Oracle Enterprise Manager Moscone West
Self Managing Database: Change Management for DBAs Moscone West
Oracle Enterprise Manager: Complete Datacenter Management Moscone West
Self-Managing Database: Data Masking for DBAs Moscone West
44. Setting up Monitoring: Tips and Traps
Choosing metrics and thresholds for alerting
Default thresholds may over-alert
Some defaults designed for PRODUCTION use cases
Use template with adjusted thresholds to apply to DEV and TEST
Choose metrics for alerting carefully:
Time-based metrics superior for performance
Base resource consumption (CPU, I/O, Memory)
Workload or application-specific metrics or health checks
Threshold values
Use metric history to analyze value ranges
Be conservative with critical thresholds:
Reserve CRITICAL for high signal of serious problem
45. Database Performance Metrics
#1 Metric: Average Active Sessions
Measures active load on database instance
Sudden high spikes usually mean severe performance issue
Use Adaptive Thresholds:
Sets thresholds automatically and adjusts for workload cycles
Warn at 0.99 significance (measured sample statistic)
Critical at 0.9999 significance (estimated high significance value)
11g: New Adaptive Thresholds user interface
Supports threshold “what-if” analysis over recent history
Organizes metrics into Classes
Located under “Baseline Metric Thresholds” in Grid/Database Control
46. Setting Up Monitoring: Beyond the Basics
Additional tips for setting up notifications
Customize email format to add more operational
context
Add target properties (Line of Business, Owner,
Contact..) in the email to provide additional
operational information
Practices for setting up Notification Rules
Designate users (Senior Administrators) to create
rules on behalf of the team
Common use cases
Rules for production targets different than rules for
non-production targets
Separate rules by Line-of-Business / team
Use naming convention ( e.g. include team name
in rule)
Facilitates searching for rules
47. Setting Up Monitoring: Beyond the Basics
Additional tips for setting up notifications
Send alert reminders using Repeat Notifications
Set the global defaults to the least frequent interval used and
use this in most rules
Example: Global setting: Repeat every 30 minutes up to
a max of 3 repeats
For rules that include important targets or critical alerts, set to
higher repeat frequency
Example: For target down rule(s): repeat every 5 minutes
up to a max of 10 repeats
Usage Note: Users need to „acknowledge‟ the alert in the
Enterprise Manager console to stop repeat notifications
Remember to provide “Manage Target Alerts” privilege to
your operators
48. Setting Up Monitoring: Beyond the Basics
Additional tips for setting up notifications
Escalate unattended, important alerts via email
Send email to different person (e.g. manager level) if alert is
open too long
To set up this rule:
Create new notification rule and put a „duration condition‟
associated with the alert
Rule action: Send email to the manager
49. Notification Rule for Alert Escalation via E-mail
In Metrics tab, define
duration condition for
the alert…
(Apply rule if alert
opened > 12 hours
and not
acknowledged)
.. then in Actions tab,
send email to the
manager
50. Managing Alerts: Other Tips
How do I know if my fix
resolved the alert?
Use „Reevaluate Alert‟
feature
Alternative to waiting for
next metric evaluation
Causes the agent to
reevaluate the metric alert
Current severity will be
provided
Usage: requires 10.2.0.5
agent or higher
51. Managing Alerts: Other Tips
Is this alert still valid?
Enterprise Manager does
not change the alert
triggered date
Validation shown in the
Console
Last Collected Value
Last Collected
Timestamp
Alert triggered: June 18, 2010
Last Collected
Value
Last Collected
June 29, 2010
52. Monitoring: Ongoing Maintenance
Are my targets still following my monitoring
standards?
Generate report using Monitoring Template Comparison
reporting element and/or
Use “Compare Settings” feature in Monitoring Templates
page
Shows differences between monitoring template and target‟s
settings
54. Monitoring: Ongoing Maintenance
Do I still have correct
notification coverage for my
target?
Notification Rule Coverage
report (per target)
For each metric contained in
a rule:
Alert severities covered
Rule(s), if any
Type of notification
Shows alert-able metrics not
covered in any rule
Potential missed
notification
55. Monitoring: Ongoing Maintenance
What‟s the easiest way to change monitoring
credentials (e.g. dbsnmp) across many databases?
EMCLI update_db_password
Changes password associated with the user in Enterprise
Manager and database target
Changes the password across all features that use it:
Preferred credentials, Corrective Actions, Jobs, User-
defined metrics, target monitoring credentials
Usage tip: Blackout the target during this operation to avoid
metric collection errors due to invalid password