SafePeak offers a Plug & Play application acceleration solution for cloud, hosted and business SQL server applications.
SafePeak unique Dynamic Database Caching to resolve information access bottlenecks and latency without any change to existing applications or databases.
SafePeak - How to manually configure SafePeak ClusterVladi Vexler
This SafePeak guide describes how to configure a SafePeak cluster, by deploying two servers with SafePeak Standard / Stand-alone edition and then manually configure the NLB Cluster.
SafePeak - How to manually configure SafePeak ClusterVladi Vexler
This SafePeak guide describes how to configure a SafePeak cluster, by deploying two servers with SafePeak Standard / Stand-alone edition and then manually configure the NLB Cluster.
About the course:
This Oracle performance tuning online course is designed for the audience who want to learn basics and core concepts of Oracle PT. You will be learning about Introduction, basic tuning diagnostics, how to use automatic workload repository, defining of problems, how to create AWR baselines, monitoring of applications Etc. All Oracle performance tuning classes will be live and interactive.
Course Target:
Oracle performance tuning online training is designed to teach you fundamentals of PT.
Understand basic tuning diagnostics.
Learn how to use Automatic workload repository.
Obtain knowledge of using metrics and alerts.
Clear understanding of how to monitor applications.
Need to identify problem SQL statements
Learn how to influence the optimizer.
Understand SQL performance management.
Tuning the shared pool, I/0, Buffer cache, PGA and temporary space.
Course Targeted Audience:
Any candidate can join our Oracle performance tuning online course.
People who are from professional background can join.
Researches can also participate in this course.
Prerequisites:
Candidates with basic knowledge of computer.
Basics of database are recommended.
Training Format:
Kernel Training provides Oracle performance tuning online course led by real time expert.
Registered Candidates can interact with instructor in live interactive sessions.
Candidates will have life time access to learning material.
Companies Using Oracle PT:
Major international IT companies perform Oracle performance tuning for their operations.
Oracle Autonomous Health Framework (AHF) White PaperAnkita Khandelwal
Oracle 12c Release 2 introduces new Oracle Autonomous Health Framework, a collaborative framework whose components work 24x7 to autonomously to ensure continuous availability and consistent performance of database systems while minimizing human effort!
Getting to Know MySQL Enterprise MonitorMark Leith
MySQL Enterprise Monitor is the monitoring and management solution for DBAs and developers delivered as part of MySQL Enterprise Edition. It provides background monitoring, alerting, trending, and analysis of the MySQL database and the statement traffic that is running within it.
View this session to learn how to install/configure, customize, and use MySQL Enterprise Monitor to suit your environment. Whether you use a single server or have hundreds of instances, MySQL Enterprise Monitor can provide great insights into how your environment is performing.
This is a comprehensive presentation for the Oracle Exachk tool which covers automation and how to cover best practices and what options are features are available with the same
Oracle Enterprise Manager is a set of system management tools from Oracle for managing the business Oracle stack and even some non-oracle products.
The tools work to monitor the Oracle environment, automating tasks to make database application and cloud management easier for the business
Here at http://www.pebbleit.com.au, we have all the Oracle expertise you may need. We can advise specifically on the implementation and management of Oracle Enterprise Manager and how best this can be configured for your database setup
About the course:
This Oracle performance tuning online course is designed for the audience who want to learn basics and core concepts of Oracle PT. You will be learning about Introduction, basic tuning diagnostics, how to use automatic workload repository, defining of problems, how to create AWR baselines, monitoring of applications Etc. All Oracle performance tuning classes will be live and interactive.
Course Target:
Oracle performance tuning online training is designed to teach you fundamentals of PT.
Understand basic tuning diagnostics.
Learn how to use Automatic workload repository.
Obtain knowledge of using metrics and alerts.
Clear understanding of how to monitor applications.
Need to identify problem SQL statements
Learn how to influence the optimizer.
Understand SQL performance management.
Tuning the shared pool, I/0, Buffer cache, PGA and temporary space.
Course Targeted Audience:
Any candidate can join our Oracle performance tuning online course.
People who are from professional background can join.
Researches can also participate in this course.
Prerequisites:
Candidates with basic knowledge of computer.
Basics of database are recommended.
Training Format:
Kernel Training provides Oracle performance tuning online course led by real time expert.
Registered Candidates can interact with instructor in live interactive sessions.
Candidates will have life time access to learning material.
Companies Using Oracle PT:
Major international IT companies perform Oracle performance tuning for their operations.
Oracle Autonomous Health Framework (AHF) White PaperAnkita Khandelwal
Oracle 12c Release 2 introduces new Oracle Autonomous Health Framework, a collaborative framework whose components work 24x7 to autonomously to ensure continuous availability and consistent performance of database systems while minimizing human effort!
Getting to Know MySQL Enterprise MonitorMark Leith
MySQL Enterprise Monitor is the monitoring and management solution for DBAs and developers delivered as part of MySQL Enterprise Edition. It provides background monitoring, alerting, trending, and analysis of the MySQL database and the statement traffic that is running within it.
View this session to learn how to install/configure, customize, and use MySQL Enterprise Monitor to suit your environment. Whether you use a single server or have hundreds of instances, MySQL Enterprise Monitor can provide great insights into how your environment is performing.
This is a comprehensive presentation for the Oracle Exachk tool which covers automation and how to cover best practices and what options are features are available with the same
Oracle Enterprise Manager is a set of system management tools from Oracle for managing the business Oracle stack and even some non-oracle products.
The tools work to monitor the Oracle environment, automating tasks to make database application and cloud management easier for the business
Here at http://www.pebbleit.com.au, we have all the Oracle expertise you may need. We can advise specifically on the implementation and management of Oracle Enterprise Manager and how best this can be configured for your database setup
SafePeak offers a Plug & Play application acceleration solution for cloud, hosted and business SQL server applications.
SafePeak unique Dynamic Database Caching to resolve information access bottlenecks and latency without any change to existing applications or databases.
These are the slides I used to present "MySQL Performance Schema" at FOSSASIA, 2015 Singapore. It gives an overview of Performance Schema and also explains how it could be used to diagnose issues using few use cases.
Open Source 101 2022 - MySQL Indexes and HistogramsFrederic Descamps
Nobody complains that the database is too fast. But when things slow down, the complaints come quickly. The two most popular approaches to speeding up queries are indexes and histograms. But there are so many options and types on indexes that it can get confusing. Histograms are fairly new to MySQL but they do not work for all types of data. This talk covers how indexes and histograms work and show you how to test just how effective they are so you can measure the performance of your queries.
Backup exec 2014 deduplication option white paperSymantec
This white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Deduplication Option and make related decisions.
The attached white paper includes the following topics:
● Business Value
● Exchange Protection Methods and Technology
● Backup Exec & Exchange High Availability Configurations
● Exchange Recovery Methods & Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting ● Exchange
● Exchange Protection Notes and Best Practices
● Additional Resources
Modern Data Management and Protection Challenges
Customers of all types and sizes are seeking new and innovative ways to overcome challenges associated with data growth and storage management. While these challenges are not necessarily new, they continue to become more complex and more difficult to overcome due to the following:
Pace of data growth has accelerated
Location of data has become more disperse
Linkages between data sets have become more complex
Data and storage management challenges are compounded by the need for companies to protect critical data assets against disaster through backup and recovery solutions. In order to maintain backups of critical data assets, additional secondary storage resources are required. This additional layer of backup storage must be implemented wherever backups occur, including central data centers and remote offices.
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Prolifics
Abstract: Recent projects have stressed the "need for speed" while handling large amounts of data, with near zero downtime. An analysis of multiple environments has identified optimizations and architectures that improve both performance and reliability. The session covers data gathering and analysis, discussing everything from the network (multiple NICs, nearby catalogs, high speed Ethernet), to the latest features of extreme scale. Performance analysis helps pinpoint where time is spent (bottlenecks) and we discuss optimization techniques (MQ tuning, IIB performance best practices) as well as helpful IBM support pacs. Log Analysis pinpoints system stress points (e.g. CPU starvation) and steps on the path to near zero downtime.
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015 Vladi Vexler
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
Data Modeling and Scale Out
451 Research:
- Key challenges in the data landscape
- Evolution of distributed database environments
ScaleBase
- Pros and cons of abstracting complex databases topology
- Top strategies of distributed data modeling
- Advanced data modeling and “what-if” simulations with
- ScaleBase Analysis Genie
- Scaling real apps – From need to deployment
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...Vladi Vexler
Continuous Availability and Scalability with ScaleBase Lite and ScaleBase
Abstract:
Business are driven by data and processes. Ensuring databases availability during unexpected outages, continuous operations during maintenance and webscale scalability – are keys for major positive impact on businesses.
ScaleBase and ScaleBase Lite distributed database management systems ensure business continuity during unexpected and expected outages with automated failover and failback capabilities, enabling five-nines of availability (99.999%). Additional functionalities, such as load balancing and data distribution further increase performance and throughput capacity for more users and more data management.
This webinar will review and discuss:
1. The lifecycle and the challenges of webscale databases
2. Availability challenges in public, private and hybrid clouds
3. Introduction to ScaleBase Lite – instant and transparent MySQL Scale-out by intelligent load balancing (read/write splitting) and continuous availability
4. Scale further with ScaleBase – Massive scale out to distributed database containing 10s and 100s of servers
(Webinar Dec 17 2014)
SafePeak - IT particle accelerator (2012)Vladi Vexler
An Economic Review of performance, scale and budget effects on the IT and organizational performance.
Provided by SafePeak, an automated in-memory dynamic caching for SQL Server applications
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Designing Great Products: The Power of Design and Leadership by Chief Designe...
SafePeak whitepaper
1. SAFEPEAK TECHNOLOGIES LTD
Accelerating Performance
of Custom and 3rd-Party
SQL Server Applications
with
SafePeak Automated Dynamic Caching
A SafePeak Whitepaper
February 2014
Copyright. SafePeak Technologies 2014
2. Contents
Objective ................................................................................................................................................. 3
Introduction ............................................................................................................................................. 3
SafePeak® - Immediate Acceleration of SQL Server Operational Apps ................................................ 4
Automated Dynamic Caching for SQL Server OLTP Apps ............................................................... 4
How SafePeak Works - Query Process Flow.......................................................................................... 5
Scenario I – Query Result Returned By SafePeak ............................................................................... 5
Scenario II – Query Sent to the Database; Result Stored In SafePeak Memory ................................. 6
Scenario III – Eviction of Results Set In Cache; Update to Database ................................................ 7
SafePeak High Availability................................................................................................................. 8
SafePeak Dashboard – Deep Real-Time Performance Analysis............................................................. 9
Telco Case Study: Upgrading Infrastructure Scalability and Utilization .............................................. 10
Summary ............................................................................................................................................... 11
Page 2
Copyright. SafePeak Technologies 2014
3. Objective
This paper describes the SafePeak solution, which delivers plug-and-play performance
acceleration and scalability for SQL Server OLTP / Operational applications. This paper will
explain how SafePeak can instantly enable any type of organization to resolve information
access bottlenecks and latency, without any change to the existing applications or
databases. In addition, the paper will clarify how the SafePeak solution enables
organizations to resolve application and database performance and scalability challenges
within hours, while preserving all data integrity and consistency.
View an online demo: http://www.safepeak.com/Product/Safepeak-Demo
Introduction
The requirement for faster data access and application response times, along with the need
for high availability of critical business information, has grown exponentially. In many
industries, fast response time and continuous availability are an important competitive
differentiator and a prerequisite for doing business. These industries include but are not
limited to ecommerce, publishing, broadcasting, rich media, finance, medical, travel, online
games and more.
Reduced costs of data storage and the advancement of technology for capturing and storing
information are leading to the accumulation of massive amounts of data in organizational
databases. The demand for increased database performance, increasing volumes of
corporate information and requirements for operational efficiency provide a growing
challenge for IT professionals, DBAs, architects and development managers. The database
and application infrastructure needs to meet or exceed performance expectations while
scaling to meet growing business needs.
While the requirement for faster data access is ever present, so are the causes of
slowdowns and downtime for applications and databases, and these significantly affect
businesses. Outages reduce revenues, reduce employees’ productivity, and lower the
quality of customer service, all of which can damage the corporate brand.
This paper reviews SafePeak’s unique software capabilities to dramatically accelerate SQL
Server-based applications by using innovative dynamic caching, sophisticated auto learning
and automatic adaptation algorithms.
Page 3
Copyright. SafePeak Technologies 2014
4. SafePeak® - Immediate Acceleration of SQL Server Operational Apps
SafePeak provides immediate resolution of several SQL Server issues:
Performance
Query access speed
Data bottlenecks
CPU/IO load and latency
SafePeak dramatically accelerates data access to microsecond speeds, providing immediate
benefits without any changes to application code or the database. SafePeak enables
companies to maximize operational efficiency of existing infrastructure and scale 5x to10x
more data and work load, avoiding costly and complicated hardware and software
upgrades. SafePeak ensures high availability for mission-critical custom and 3rd-party
applications (like SharePoint, or CRM Dynamics), and safeguards against traffic spikes.
Automated Dynamic Caching for SQL Server OLTP Apps
SafePeak delivers value through the implementation of an innovative solution for dynamic
database caching, using sophisticated auto learning and automatic adaptation algorithms.
SafePeak’s solution is deployed on Windows 2008 64bit virtual machine, a server (or two
servers for an HA cluster), and acts as a seamless proxy between the applications and SQL
Servers. Patent-pending auto-learning algorithms analyze connected SQL Server instances
and study the application traffic, create patterns of SQL queries and stored procedure calls,
to understand their nature and dependencies and to build caching rules for the SafePeak
Core engine.
SafePeak offloads repetitive "Read" queries and stored procedures calls (queries and
procedures that “select” data), while storing the result-sets in SafePeak’s cache memory.
Page 4
Copyright. SafePeak Technologies 2014
5. Requests for the same queries are not sent to the database servers and the result is
retrieved from the RAM based cache at instant speed (microseconds). SafePeak's
sophisticated algorithms manage the changes of data completely automatically, evicting in
real-time the relevant items from cache with arrival of “write” commands (DML, DCL, DDL)
ensuring 100% data integrity and 100% ACID compliance.
Database CPU and IO load is reduced dramatically, freeing important resources, leading to
additional performance acceleration for both reads and writes.
The benefit from SafePeak’s solution is immediate: Within few hours of installation, autolearning and configuration fine-tuning your application gains significant performance
acceleration and your database sees a scalability boost. Since SafePeak is transparent to the
application or web server and database, the installation process requires minimal effort. No
code changes in the application or database are required.
How SafePeak Works - Query Process Flow
When a SQL query is issued from an application, SafePeak intercepts the query and
determines whether to direct it to the SQL Server database for processing or to return a
response from the SafePeak Cache Manager.
SafePeak examines whether the query is a repetitive read query whose results have been
stored in SafePeak’s RAM memory or if it is new and needs to be sent to the SQL Server
database for retrieval. SafePeak also checks to see if it is a write request (update, insert,
delete or other DDL/DCL types) that will cause a change in the target database (and possibly
the cached results) and needs to be forward to the SQL Server database for execution. The
major scenarios and flows are described in detail below:
Scenario I – Query Result Returned By SafePeak
The first action that SafePeak takes is determining if the transaction contains a repetitive
query whose result set is stored in the SafePeak Cache Manager in RAM memory. If the
query is found to exist, the result set is retrieved from the Cache Manager (C1) and returned
to the querying application (C2). SafePeak takes no further action and the query never
needs to reach the target database. In this scenario, the query cache holds the exact results
that are sent to the querying application in a low level binary result set.
Figure 1 - Query Result Returned By SafePeak
Page 5
Copyright. SafePeak Technologies 2014
6. The ability to rapidly retrieve identical result sets significantly improves response time,
reduces overall network and database traffic and boosts system scalability, especially at
times of peak usage and demand spikes.
Scenario II – Query Sent to the Database; Result Stored In SafePeak Memory
In scenario two, SafePeak checks and determines that the query and result set are not
stored in the Cache Manager. SafePeak continues to process the query and determines
whether the request is a read query or a write request. In the scenario illustrated in figure 2,
we have determined that the request is a read query (Q1).
SafePeak takes several steps at this point. The first step is to process the query on the target
database and return the result set to the querying application to ensure the most rapid
response possible (Q2).
Once the information has been sent to the querying application, SafePeak determines if the
query is a repetitive cacheable query. If it is, then SafePeak saves its result set in binary code
inside the RAM memory of the Cache Manager (Q3) to be accessed upon the next instance
of the identical query.
Figure 2 - Query Result Returned by Database; Result Stored In Cache Manager RAM
Page 6
Copyright. SafePeak Technologies 2014
7. Scenario III – Eviction of Results Set In Cache; Update to Database
In scenario three, SafePeak determines that the incoming query is an update, insert, alter or
any other request that may cause a change in the database. In this case, SafePeak dissects
the request and decides which tables in the database may be impacted by its execution. It
then looks at the query results stored in the Cache Manager and evicts all results that have
any connection to the impacted database tables (U1).
Once the Cache Manager has been cleaned to ensure data credibility and accuracy, the
request is sent to the SQL Server database and executed (U2). The result set of the executed
response is then sent back to the querying application (U3). By handling the update requests
and eviction of cached result sets in this fashion, SafePeak is able to ensure the highest
levels of data integrity and consistency. While the transaction is in progress SafePeak’s
Cache Manager is locked, preventing new queries to be inserted to the cache with relation
to the objects affected by this update request.
Figure Three – Eviction of Results Set In Cache; Update to Database
Page 7
Copyright. SafePeak Technologies 2014
8. SafePeak High Availability
SafePeak runs in mission critical, enterprise production environments providing continuous
information flow. It is crucial to ensure the highest level of reliability and data availability
with protection against both hardware and software failures and malfunctions.
SafePeak provides a high availability solution, by utilizing a clustered deployment.
Protection against hardware malfunctions requires a SafePeak Cluster installation, easily
deployed and managed on two dedicated commodity stand-alone servers (no need for
special servers, load balancers or shared storage). Protection against software failures is
automatically embedded in both single and cluster installations.
SafePeak solution monitors and adjusts to system failures or malfunctions and provides
automatic failover protection without needing IT intervention. It ensures the rapid recovery
of critical functions for continuous database processing.
SafePeak's high availability solution supports various clustering or load balancing options, by
configuring an active/passive cluster between the front-end client application and the backend SQL Server database as shown in Figure 4 below.
In normal operation, the incoming
query is routed via the Network
Proxy (A1) where the request is
forwarded to the SafePeak Core
for processing (A2). In the rare
event of a SafePeak software
failure,
processing
will
be
redirected to the database (A4).
If a hardware error or operating
system error occurs due to a
malfunction,
processing
is
automatically shifted into failover
mode (P1) ensuring that the loss of
the server will not impact
continuous processing. The queries
are routed to the backup SafePeak
instance. Processing at this point is
handled by the SafePeak Core (P2) as long as SafePeak is fine. Otherwise, processing will
continue directly from the Network Proxy to the SQL Server database (P3).
Page 8
Copyright. SafePeak Technologies 2014
9. SafePeak Dashboard – Deep Real-Time Performance Analysis
SafePeak comes with an intuitive browser-based user interface dashboard for configuration,
management, tuning, reporting, real-time and historical analysis allowing both database and
SafePeak performance analysis with a focus on finding bottlenecks. The auditing and
analysis mechanisms are built into SafePeak and do not add additional performance
overhead.
SafePeak Management Dashboard
The dashboard is used for many aspects of the SafePeak operation, including the following:
SafePeak Management:
o Configuration of multiple SQL Server instances managed by one SafePeak server
o Enabling and disable caching for specific databases, tables (queries that access
the tables), queries. Changing cache policy rules, such as default timeout, special
eviction scheduling, etc.
o Fine-tuning of dynamic stored procedures: objects dependencies, behavior etc.
o Global cache start/stop, reload configurations
Performance monitoring and analysis tools
o Real time load information, performance and throughput statistics and reports
o Analysis on different levels: instance, databases, tables and views, up to single
query level: response time, percent of usage, dependent objects etc.
Page 9
Copyright. SafePeak Technologies 2014
10. SafePeak’s management dashboard provides DBAs, IT Managers, Architects and Developers
with critical and valuable information. This information includes a drill down on database
instances regarding usage, accessed tables and length of execution of queries. It also helps
to uncover queries that are incorrect or those which can be fine tuned for better processing
efficiency.
Telco Case Study: Upgrading Infrastructure Scalability and Utilization
A trial conducted in a large Telco company (20,000 employees; over $5B market cap)
provides a clear benchmark regarding SafePeak’s solution value and benefits:
Graph A: SQL Server: % Processor Time. SafePeak ON (green) and SafePeak OFF (red)
Red represents the CPU load before SafePeak was integrated. Green represents the results
after SafePeak was integrated and activated.
CPU consumption was reduced on average by 75%, enhancing the capability of the existing
infrastructure to handle much higher workloads while also delivering superior performance
results.
Graph B: SQL Server: IO Data Bytes/sec. SafePeak ON (green) and SafePeak OFF (red)
Red represents the CPU load before SafePeak was integrated. Green represents the
recording after SafePeak was integrated and activated.
IO consumption was reduced on average by 85%, enhancing the overall infrastructure
capability to handle much higher workloads while delivering superior performance results.
Page 10
Copyright. SafePeak Technologies 2014
11. Summary
SafePeak provides a modern answer to well-known and growing SQL Server performance
and scalability challenges. It enables organizations of any type to achieve, exceed and
maintain their business goals by providing plug-and-play software to immediately fix
existing information access bottlenecks and ensure stable performance over usage peaks
and growth, without any changes to existing databases or applications.
By offloading repetitive queries from the database, SafePeak significantly improves data
retrieval performance while decreasing database resource consumption. This also serves to
improve the response time of other database operations, increasing overall data and
application throughput and scalability.
To ensure continuous information availability and to prevent data loss or outages, SafePeak
provides a high availability cluster solution based on a proven and reliable high performance
load balancing proxy server. SafePeak’s solution monitors and adjusts to system failures or
malfunctions and provides automatic failover protection without the need for IT
intervention. It ensures the rapid recovery of critical functions for continuous database
processing.
Would you like to know more?
Find out more about SafePeak; please visit www.safepeak.com or email:
info@safepeak.com.
A free trial is available: www.safepeak.com/download
View an online demo: www.safepeak.com/Product/Safepeak-Demo
Page 11
Copyright. SafePeak Technologies 2014