This document provides instructions for integrating SAP Business Process Automation (BPA) with SAP Landscape Virtualization Management (LVM). It involves creating a custom operation in LVM that allows controlling BPA queues. This is done by creating a provider implementation and custom operation in LVM along with a process definition and web service in BPA. It also requires registering a script with the host agent to connect the LVM and BPA configurations. The custom operation then allows holding or releasing BPA queues from the LVM interface.
Mastering SAP Monitoring - SAP SLT & RFC Connection MonitoringLinh Nguyen
This document discusses monitoring SAP SLT (system replication) and RFC (remote function call) connections. It describes the limited monitoring capabilities available within SAP, including LTR, LTRC, LTRO and Solution Manager. It then introduces two alternative monitoring solutions - the OZSoft SAP Management Pack for Microsoft SCOM, and IT-Conductor's cloud-based application performance management. Both solutions allow for centralized, automated monitoring of SLT replication tables and RFC destinations without requiring SAP-specific software.
Mastering SAP Monitoring - Workload MonitoringLinh Nguyen
This document discusses workload monitoring for on-premises SAP systems without SAP CCMS or Solution Manager. It defines workload as units of work like transactions, jobs, and processes. It explains why monitoring workloads is important for performance, capacity planning, and trend analysis. The document reviews limited workload monitoring options in SAP and advocates an approach that monitors transactions, users, locations, and timestamps across systems. It also discusses service-oriented workload monitoring and announces upcoming webinars on topics like batch jobs and BusinessObjects monitoring.
This document provides guidance on customizing SAP Landscape Virtualization Management (LVM) to manage custom instance types. It describes how to configure generic operations like detect, monitor, start, and stop by creating scripts referenced in configuration files. An example is provided for managing SAP Replication Server (SRS) instances, with configuration files and sample scripting code shown.
SAP Solution Manager - Netweaver on HANA Monitoring Setup Part 1 of 3 (Prepar...Linh Nguyen
This document provides instructions for setting up technical monitoring of SAP Netweaver on HANA in Solution Manager. The steps include:
1. Creating a monitoring user in the HANA database and assigning it the necessary roles.
2. Configuring the HANA client, registering the HANA system in the SLD, and testing the web services.
3. Installing the HANA Lifecycle Manager and registering the HANA database in the SLD and verifying it is visible.
This document provides instructions for setting up SSL connectivity between SAP LVM and the SAP Host Agent using x509 certificate authentication. It involves generating a certificate signing request for the LVM server, having it signed by a certificate authority, importing the signed certificate and CA/intermediate certificates into the LVM keystore. It also describes adding the CA/intermediate certificates to the Host Agent's PSE, configuring the host profile, and testing the SSL connection. The aim is to connect LVM and the Host Agent without username/password authentication.
This document provides instructions for integrating SAP Business Process Automation (BPA) with SAP Landscape Virtualization Management (LVM). It involves creating a custom operation in LVM that allows controlling BPA queues. This is done by creating a provider implementation and custom operation in LVM along with a process definition and web service in BPA. It also requires registering a script with the host agent to connect the LVM and BPA configurations. The custom operation then allows holding or releasing BPA queues from the LVM interface.
Mastering SAP Monitoring - SAP SLT & RFC Connection MonitoringLinh Nguyen
This document discusses monitoring SAP SLT (system replication) and RFC (remote function call) connections. It describes the limited monitoring capabilities available within SAP, including LTR, LTRC, LTRO and Solution Manager. It then introduces two alternative monitoring solutions - the OZSoft SAP Management Pack for Microsoft SCOM, and IT-Conductor's cloud-based application performance management. Both solutions allow for centralized, automated monitoring of SLT replication tables and RFC destinations without requiring SAP-specific software.
Mastering SAP Monitoring - Workload MonitoringLinh Nguyen
This document discusses workload monitoring for on-premises SAP systems without SAP CCMS or Solution Manager. It defines workload as units of work like transactions, jobs, and processes. It explains why monitoring workloads is important for performance, capacity planning, and trend analysis. The document reviews limited workload monitoring options in SAP and advocates an approach that monitors transactions, users, locations, and timestamps across systems. It also discusses service-oriented workload monitoring and announces upcoming webinars on topics like batch jobs and BusinessObjects monitoring.
This document provides guidance on customizing SAP Landscape Virtualization Management (LVM) to manage custom instance types. It describes how to configure generic operations like detect, monitor, start, and stop by creating scripts referenced in configuration files. An example is provided for managing SAP Replication Server (SRS) instances, with configuration files and sample scripting code shown.
SAP Solution Manager - Netweaver on HANA Monitoring Setup Part 1 of 3 (Prepar...Linh Nguyen
This document provides instructions for setting up technical monitoring of SAP Netweaver on HANA in Solution Manager. The steps include:
1. Creating a monitoring user in the HANA database and assigning it the necessary roles.
2. Configuring the HANA client, registering the HANA system in the SLD, and testing the web services.
3. Installing the HANA Lifecycle Manager and registering the HANA database in the SLD and verifying it is visible.
This document provides instructions for setting up SSL connectivity between SAP LVM and the SAP Host Agent using x509 certificate authentication. It involves generating a certificate signing request for the LVM server, having it signed by a certificate authority, importing the signed certificate and CA/intermediate certificates into the LVM keystore. It also describes adding the CA/intermediate certificates to the Host Agent's PSE, configuring the host profile, and testing the SSL connection. The aim is to connect LVM and the Host Agent without username/password authentication.
BW Migration to HANA Part 3 - Post-processing on the Migrated SystemLinh Nguyen
This series of publication intends to provide an overview and explanation of major steps and considerations for BW on HANA migrations from anyDB (any database). The complex procedure involves:
1) Preparatory work in the BW system
2) SUM DMO Upgrade and Actual migration
3) Post processing on the migrated systems
This part focuses on post-processing, which includes standard tasks after upgrade and HANA-specific post-tasks.
BW Migration to HANA Part1 - Preparation in BW SystemLinh Nguyen
This series of publication intends to provide an overview and explanation of major steps and considerations for BW on HANA migrations from anyDB (any database). The complex procedure involves:
1) Preparatory work in the BW system
2) SUM DMO Upgrade and Actual migration
3) Post processing on the migrated systems
This first part focuses on the preparation tasks on the BW system.
By OZSoft Consulting for ITConductor.com
Author: Terry Kempis
Editor: Linh Nguyen
SolMan 7.2 is based on NetWeaver 7.4 but no longer uses a double-stack architecture. Instead, the ABAP and Java stacks run independently on separate systems. It also supports SAP HANA as the database. Java hubs like the Enterprise Portal are supported. When splitting a dual-stack system, the Dual Stack Split tool is used. SAP recommends downloading the latest tool support package and patch level from their website when starting a new provisioning project.
Mastering SAP Monitoring - SAP HANA Monitoring, Management & AutomationLinh Nguyen
Part 7 of Mastering SAP Monitoring series http://www.itconductor.com/blog/mastering-sap-monitoring-without-sap-ccms-or-solman explains SAP HANA monitoring and management challenges and solutions.
HANA use cases have grown rapidly from BW to Suite on HANA to S/4HANA, along with myriads of choices for platforms such as on-premise, HANA Cloud Platform, HANA Enterprise Cloud, Public Cloud like AWS, and Private clouds such as VirtualStream, etc. No matter what scenario or platform, one thing is certain - it has to be monitored and managed to ensure the best possible performance, availability and ROI. Run Simple with SAP may mean simple for users, however for Basis and IT Operations we also need tools to help simplify the life cycle management aspects.
We will explain these topics in detail with regards to SAP and the 10 principles of Application-Centric Service Management & Automation
Benefits:
1) Look at an updated list of tools available from SAP and other solutions
2) Focus on availability, performance, alerts management
Proactive health checks
3) Automation of common housekeeping tasks
Trend analysis
Audience: SAP Basis Administrator, SAP DBA, HANA Admin, IT operations and managers of environments.
The document discusses SAP memory management. It describes the different types of memory that can be assigned to SAP work processes, including roll area, extended memory, and private memory. It explains that the order work processes are assigned memory depends on factors like the work process type and operating system. Roll area is used for initial memory and additional memory if expanded memory is full. Extended memory is the core of SAP memory management and allows memory to be mapped between work processes. Private memory is used if dialog work processes use up other memory areas.
A logical component in the SAP Solution Manager project contains at least one system with the role Retrofit System.
If a change is done in DEV1, this change must also be done in DEV2 to maintain the synchronization this is the reason for retrofit, to bring the changes made in DEV1 to DEV2
This document provides guidance on planning and executing an SAP system landscape copy. It discusses reasons for copying landscapes, challenges involved, and important considerations like scope and consistency requirements. Different copy scenarios are described for situations like copying a production landscape to a non-production one, refreshing an existing non-production landscape, or migrating a production landscape. Key phases of the copy process and various technologies that can be used are also outlined.
A three-tier client/server configuration has advantages over single-tier or two-tier configurations including simpler scalability and the ability to perform load balancing between application servers. The dispatcher process receives user requests on the AS ABAP and passes them to available work processes. Work process types on an AS ABAP system include dialog, update, background, enqueue, and spool processes. The server process, software deployment manager, and dispatcher belong to the AS Java architecture. ABAP and Java are programming languages that are platform independent, while the JVM executes Java bytecode across hardware architectures.
This document discusses preventative mechanisms for crashes of the OTM application server and provides a systematic data recovery process. It recommends developing alerts to monitor inbound/outbound transaction loads and active monitoring during periods of high data processing. If a crash occurs, the recovery process involves stabilizing the system by stopping inbound traffic and bouncing servers, then recovering lost data by identifying impacted processes and objects and running validation scripts.
Kaseya Connect 2013: Understanding & Configuring Kaseya Service DeskKaseya
John Nuttall will present on the Service Desk product. The Service Desk allows for fully integrated ticketing within the Kaseya framework. It provides a single point for all alerts, requests, and change requests. The Service Desk uses desks, stages, roles, and procedures to customize workflows to match business needs. Troubleshooting focuses on ensuring procedures are properly configured and using logging and notes to test variables.
The document discusses problems with Thrift drivers for Cassandra and introduces a new native protocol driver from DataStax. The new driver aims to address issues like backwards compatibility, too many connections, lack of standard interfaces, and Thrift overhead. It utilizes features like operation pipelining, prepared statements, policies for load balancing and retries, and a control connection to monitor the cluster. Benchmarks show the new driver provides much higher performance than existing options like Pycassa. Support currently exists for Java, C#, and Python drivers with more languages planned.
Enhancing the Security of Data at Rest with SAP ASE 16SAP Technology
This session will discuss the new features and benefits offered by SAP ASE for security and how these new features can be leveraged in your environment.
Leveraging SAP ASE Workload Analyzer to optimize your database environmentSAP Technology
New functionality in SAP ASE allows you to capture, analyze and replay a production workload in a non-disruptive manner. Learn how to capture a workload on your production system, analyze the characteristics of the workload, and then replay it on a testing environment. See how quickly you can analyze the impact of changes in configuration parameters on application performance. Use real-life scenarios to determine the optimal configuration for your database.
A small group of DBAs with over 100 combined years of DBA experience discuss the characteristics of being a DBA, as well as the SAP-ASE specific tasks required.
ASE 15.5 introduced semantic partitions as a premium feature. Follow two real-world case studies and learn what the gotchas are, and implications for your data model and application SQL.
Learn how to combine parallel processing, disk usage, memory adjustment and index rebuild.
This session will show how Caixa Economica Federal achieved a real reduction from 100 hours to 6 hours in a index for a table with 1 TB of size
Configuring and using SIDB for ASE CE SP130SAP Technology
This session will discuss and demonstrate how to configure ASE CE for HA operations with SP130. An ASE Cluster Edition overview will be provided and basic ASE CE features will also be discussed.
This document discusses the migration of the Eclipse project from CVS to Git. It describes some of the lessons learned during the process, including setting policies to prevent non-fast-forward merges and reflog retention to prevent history rewrites. Best practices for Git usage are also outlined, such as automatic rebase setup and integration branches. Legal notices for trademarks are also provided.
BW Migration to HANA Part 3 - Post-processing on the Migrated SystemLinh Nguyen
This series of publication intends to provide an overview and explanation of major steps and considerations for BW on HANA migrations from anyDB (any database). The complex procedure involves:
1) Preparatory work in the BW system
2) SUM DMO Upgrade and Actual migration
3) Post processing on the migrated systems
This part focuses on post-processing, which includes standard tasks after upgrade and HANA-specific post-tasks.
BW Migration to HANA Part1 - Preparation in BW SystemLinh Nguyen
This series of publication intends to provide an overview and explanation of major steps and considerations for BW on HANA migrations from anyDB (any database). The complex procedure involves:
1) Preparatory work in the BW system
2) SUM DMO Upgrade and Actual migration
3) Post processing on the migrated systems
This first part focuses on the preparation tasks on the BW system.
By OZSoft Consulting for ITConductor.com
Author: Terry Kempis
Editor: Linh Nguyen
SolMan 7.2 is based on NetWeaver 7.4 but no longer uses a double-stack architecture. Instead, the ABAP and Java stacks run independently on separate systems. It also supports SAP HANA as the database. Java hubs like the Enterprise Portal are supported. When splitting a dual-stack system, the Dual Stack Split tool is used. SAP recommends downloading the latest tool support package and patch level from their website when starting a new provisioning project.
Mastering SAP Monitoring - SAP HANA Monitoring, Management & AutomationLinh Nguyen
Part 7 of Mastering SAP Monitoring series http://www.itconductor.com/blog/mastering-sap-monitoring-without-sap-ccms-or-solman explains SAP HANA monitoring and management challenges and solutions.
HANA use cases have grown rapidly from BW to Suite on HANA to S/4HANA, along with myriads of choices for platforms such as on-premise, HANA Cloud Platform, HANA Enterprise Cloud, Public Cloud like AWS, and Private clouds such as VirtualStream, etc. No matter what scenario or platform, one thing is certain - it has to be monitored and managed to ensure the best possible performance, availability and ROI. Run Simple with SAP may mean simple for users, however for Basis and IT Operations we also need tools to help simplify the life cycle management aspects.
We will explain these topics in detail with regards to SAP and the 10 principles of Application-Centric Service Management & Automation
Benefits:
1) Look at an updated list of tools available from SAP and other solutions
2) Focus on availability, performance, alerts management
Proactive health checks
3) Automation of common housekeeping tasks
Trend analysis
Audience: SAP Basis Administrator, SAP DBA, HANA Admin, IT operations and managers of environments.
The document discusses SAP memory management. It describes the different types of memory that can be assigned to SAP work processes, including roll area, extended memory, and private memory. It explains that the order work processes are assigned memory depends on factors like the work process type and operating system. Roll area is used for initial memory and additional memory if expanded memory is full. Extended memory is the core of SAP memory management and allows memory to be mapped between work processes. Private memory is used if dialog work processes use up other memory areas.
A logical component in the SAP Solution Manager project contains at least one system with the role Retrofit System.
If a change is done in DEV1, this change must also be done in DEV2 to maintain the synchronization this is the reason for retrofit, to bring the changes made in DEV1 to DEV2
This document provides guidance on planning and executing an SAP system landscape copy. It discusses reasons for copying landscapes, challenges involved, and important considerations like scope and consistency requirements. Different copy scenarios are described for situations like copying a production landscape to a non-production one, refreshing an existing non-production landscape, or migrating a production landscape. Key phases of the copy process and various technologies that can be used are also outlined.
A three-tier client/server configuration has advantages over single-tier or two-tier configurations including simpler scalability and the ability to perform load balancing between application servers. The dispatcher process receives user requests on the AS ABAP and passes them to available work processes. Work process types on an AS ABAP system include dialog, update, background, enqueue, and spool processes. The server process, software deployment manager, and dispatcher belong to the AS Java architecture. ABAP and Java are programming languages that are platform independent, while the JVM executes Java bytecode across hardware architectures.
This document discusses preventative mechanisms for crashes of the OTM application server and provides a systematic data recovery process. It recommends developing alerts to monitor inbound/outbound transaction loads and active monitoring during periods of high data processing. If a crash occurs, the recovery process involves stabilizing the system by stopping inbound traffic and bouncing servers, then recovering lost data by identifying impacted processes and objects and running validation scripts.
Kaseya Connect 2013: Understanding & Configuring Kaseya Service DeskKaseya
John Nuttall will present on the Service Desk product. The Service Desk allows for fully integrated ticketing within the Kaseya framework. It provides a single point for all alerts, requests, and change requests. The Service Desk uses desks, stages, roles, and procedures to customize workflows to match business needs. Troubleshooting focuses on ensuring procedures are properly configured and using logging and notes to test variables.
The document discusses problems with Thrift drivers for Cassandra and introduces a new native protocol driver from DataStax. The new driver aims to address issues like backwards compatibility, too many connections, lack of standard interfaces, and Thrift overhead. It utilizes features like operation pipelining, prepared statements, policies for load balancing and retries, and a control connection to monitor the cluster. Benchmarks show the new driver provides much higher performance than existing options like Pycassa. Support currently exists for Java, C#, and Python drivers with more languages planned.
Enhancing the Security of Data at Rest with SAP ASE 16SAP Technology
This session will discuss the new features and benefits offered by SAP ASE for security and how these new features can be leveraged in your environment.
Leveraging SAP ASE Workload Analyzer to optimize your database environmentSAP Technology
New functionality in SAP ASE allows you to capture, analyze and replay a production workload in a non-disruptive manner. Learn how to capture a workload on your production system, analyze the characteristics of the workload, and then replay it on a testing environment. See how quickly you can analyze the impact of changes in configuration parameters on application performance. Use real-life scenarios to determine the optimal configuration for your database.
A small group of DBAs with over 100 combined years of DBA experience discuss the characteristics of being a DBA, as well as the SAP-ASE specific tasks required.
ASE 15.5 introduced semantic partitions as a premium feature. Follow two real-world case studies and learn what the gotchas are, and implications for your data model and application SQL.
Learn how to combine parallel processing, disk usage, memory adjustment and index rebuild.
This session will show how Caixa Economica Federal achieved a real reduction from 100 hours to 6 hours in a index for a table with 1 TB of size
Configuring and using SIDB for ASE CE SP130SAP Technology
This session will discuss and demonstrate how to configure ASE CE for HA operations with SP130. An ASE Cluster Edition overview will be provided and basic ASE CE features will also be discussed.
This document discusses the migration of the Eclipse project from CVS to Git. It describes some of the lessons learned during the process, including setting policies to prevent non-fast-forward merges and reflog retention to prevent history rewrites. Best practices for Git usage are also outlined, such as automatic rebase setup and integration branches. Legal notices for trademarks are also provided.
This session will take a look at when/how query optimization takes place, the resources used for query optimization, the role of index statistics and common application query problems (other than simplistic missing indexes) that lead to DBA’s assuming there is a query optimization issue.
The Science of DBMS: Data Storage & Organization SAP Technology
This session will take a look at data storage and compression/encryption and discuss the different techniques for organizing data on disk along with the tradeoffs of the different types of common compression considerations and the impacts of encryption. Familiarity with space allocation in ASE is assumed.
Tabular Data Stream: The Binding Between Client and SAP ASESAP Technology
This lecture will cover the TDS (Tabular Data Stream) protocol in different aspects. We'll cover in brief form its history and then go over the specfication via a walk through method so the learner can understand how to navigate the documentation. Critical aspects of the protocol such as login, execution and result set processing will be covered. The majority of the lecture will cover how to collect the TDS logs from different ASE clients (OpenClient, ODBC, ADO.NET and jConnect) and how to format the traces in readable form. From there we'll look at problem scenarios and learn how toread the trace and utilize it for diagnostic purposes.
Index selection by the optimizer drives performance. There are a variety of factors driving what the optimizer can and can't use, from statistics to column sequence. This presentation teaches index design and selection.
This presentation is the definitive list of literally every possible technique for making tempdb faster. It's been run at multiple events around the world and it keeps getting bigger and better.
This presentatio highlights the enhancements planned for SAP ASE to support multi-tenancy and other requirements for cloud deployments. It will also highlight capabilities to support database-as-a-service, along with how SAP ASE can be used with popular solutions provided by infrastructure-as-a-service providers.
Get an overview of the activities around the SAP HANA Innovation Award, how sharing your story can help charities, and how the judging criteria works.
For more information, or to submit an entry, please visit: https://ideas.sap.com/SAPHANAInnovationAward2015/
Storage Optimization and Operational Simplicity in SAP Adaptive Server Enter...SAP Technology
This presentation will discuss the key storage optimization and operational simplicity features available in SAP ASE and introduce enhancements such as heat map providing the capability to move data to high/low performing storage devices based on access patterns.
ASE Performance and Tuning Parameters Beyond the cfg FileSAP Technology
The ASE configuration file contains a long list of changeable parameters, but many parameter still exists outside of the main configuration file. This session will be a discussion of hidden gems in other places that can make performance better for queries, networking, and system administration.
In this presentation, attendees will learn how to determine the best approach for tuning SQL statements and other issues by identifying specific causes of slow performance. Real-life case studies will be used to demonstrate:
1.How to use Response Time Analysis (RTA) to quickly identify the biggest problems in a database
2.How to utilize the MDA tables to understand what resources are being used or waited on
3.Tips and techniques on examining and further fine-tuning the execution plan
Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...Denny Lee
This document discusses lessons learned from deploying large scale SQL Server Reporting Services (SSRS) environments based on customer scenarios. It covers the key aspects of success, scaling out the architecture, performance optimization, and troubleshooting. Scaling out involves moving report catalogs to dedicated servers and using a scale out deployment architecture. Performance is optimized through configurations like disabling report history and tuning memory settings. Troubleshooting utilizes logs, monitoring, and diagnosing issues like out of memory errors.
Antonios Chatzipavlis is a database architect and SQL Server expert with over 30 years of experience working with SQL Server. The document provides tips for installing and configuring SQL Server correctly, including selecting the appropriate server hardware, installing Windows, configuring disks and storage, installing and configuring SQL Server, and creating user databases. The goal is to optimize performance and reliability based on best practices.
VMworld 2013: Strategic Reasons for Classifying Workloads for Tier 1 Virtuali...VMworld
This document discusses the importance of classifying workloads before virtualizing tier 1 applications. Workload classification involves measuring existing application and database workloads to properly size and place them in a new virtualized environment. This reduces risks and speeds up implementation by providing the proper analysis. The document outlines challenges, opportunities, models, metrics, tools and an example MolsonCoors used workload classification to virtualize their SAP landscape.
This document provides guidelines for using Oracle Database In-Memory (IM) with SAP applications. It describes two approaches: 1) Using the Oracle Database IM Advisor to identify SAP tables to place in the IM column store, and 2) Manually identifying SAP tables to place in the IM column store based on memory requirements. The IM Advisor requires collecting Automatic Workload Repository (AWR) statistics over multiple days to provide accurate recommendations for SAP workloads. Additional steps are needed to filter the IM Advisor results to identify SAP tables suitable for IM.
Learn how to execute a SAP S/4HANA Migration - what are the things you need to know? Also check out the repeat of the webinar here! https://sap.na.pgiconnect.com/p2480o9iw1f/
Webinar slides: Our Guide to MySQL & MariaDB Performance TuningSeveralnines
If you’re asking yourself the following questions when it comes to optimally running your MySQL or MariaDB databases:
- How do I tune them to make best use of the hardware?
- How do I optimize the Operating System?
- How do I best configure MySQL or MariaDB for a specific database workload?
Then this replay is for you!
We discuss some of the settings that are most often tweaked and which can bring you significant improvement in the performance of your MySQL or MariaDB database. We also cover some of the variables which are frequently modified even though they should not.
Performance tuning is not easy, especially if you’re not an experienced DBA, but you can go a surprisingly long way with a few basic guidelines.
This webinar builds upon blog posts by Krzysztof from the ‘Become a MySQL DBA’ series.
AGENDA
- What to tune and why?
- Tuning process
- Operating system tuning
- Memory
- I/O performance
- MySQL configuration tuning
- Memory
- I/O performance
- Useful tools
- Do’s and do not’s of MySQL tuning
- Changes in MySQL 8.0
SPEAKER
Krzysztof Książek, Senior Support Engineer at Severalnines, is a MySQL DBA with experience managing complex database environments for companies like Zendesk, Chegg, Pinterest and Flipboard.
SAP #BOBJ #BI 4.1 Upgrade Webcast Series 3: BI 4.1 Sizing and VirtualizationSAP Analytics
http://spr.ly/BI41_Migration_Webinars - Learn how to develop a good strategy for sizing your SAP BusinessObjects BI 4.1 deployment. Understand why core architectural differences between former BOE XI releases and BI 4.1 mandate new sizing considerations. Find out how to test and tune your BI system before releasing it to your user base. Also, learn about virtualization support and guidelines when deploying to virtual and cloud environments.
• Understand how and where virtualization works well
• Learn how to avoid difficult situations when managing virtualized resources
• Develop a strategy that allows for growth, and talk the same language as your administrators
For more on upgrading to SAP BusinessObjects BI 4.1, visit http://www.sapbusinessobjectsbi.com
SA114 - Virtual Notesiality! - How the Notes client and Browser Plugin can ex...Daniel Reimann
The document provides best practices for installing and configuring IBM Notes and ICAA in virtual environments. It discusses using local multi-user installations of Notes to avoid network latency issues. It recommends configuring Notes to use roaming so that user data is available regardless of which virtual server a user logs into. The document also provides tips for optimizing the Notes installation, such as setting default ODS versions, configuring notes.ini, using a configuration file, and sharing the jvm.shareclasses file across users.
Come along to this session to learn how large scale systems like SAP, Oracle, Microsoft and others are being used by enterprise customers of all shapes and sizes. In this session you will discover some of the challenges and approaches that will make you successful in deploying and operating these systems on AWS. This is a must session for enterprise customers that are looking at moving material workloads into the cloud.
This document discusses using a traditional migration design for high-volume data integration projects. It notes that transactional integration designs may not be fast enough when large amounts of data need to be integrated initially. The session agenda covers best practices for performance, an overview of integration and migration design patterns, and five migration design practices: using bulk processing when possible, upsert operations, using local resources for lookups, staging data, and multi-processing.
SAP/HANA Financial Closing can help you ACCELERATE your financial closing cycle. Benefit from increased governance, higher user efficiency and automation, strong collaboration, and real-time insight.
Sap basis training demo basis online training in usa,uk and indiamagnificsmile
www.Magnifictraining.com-sap basis ONLINE TRAINING. contact us: info@magnifictraining.com
or call us: +919052666559,919052666558 sap technologies like sap basis,sap ewm,sap basis,sap basis ,sap basis,
sap hcm ,sap bi/bw, sap is banking,sap srm,
sap gts online training by industrail hands on training on sap basis online TRAINING.
SAP BASIS Online Training Course Contents :
What is SAP?
An introduction to ERP
An introduction to SAP
SAP AG: Evolution & Strategy
SAP Product Evolution
SAP Services Overview ( OSS )
An introduction to BASIS
Basics to startup with BASIS Administration
An introduction to Operating Systems
An introduction to Database Systems
Overview of computer Networks
Network types & devices
Protocol & IP Address concepts
An introduction to Kernel Software
Description of R/3
Client / Server Solution
Overview of 3 layer interface
Sap basis training demo basis online training in usa,uk and indiamagnifics
This document provides an overview of SAP Basis training. It discusses the SAP architecture including how transactions are processed, the different work processes, and basic Basis functions. The key points are:
1) When a user submits a transaction request, it is assigned to a work process by the dispatcher which fulfills the request by accessing the database and communicating with other servers.
2) Work processes include dialog, update, enqueue, batch, and spool processes that handle different transaction types and tasks like database changes.
3) Basis functions involve user administration, client maintenance, transporting changes, performance monitoring, and more administrative and support roles for the SAP system.
Las nuevas arquitecturas, servicios y micro-servicios web, aplicaciones y apps, Bots, IoT, AI, etc., que demandan las organizaciones, necesitan cada vez más del talento y experiencia de los Administradores de Bases de Datos para dar consejos, sugerencias y respuestas que aporten un valor diferencial a los grupos de desarrollo y usuarios de negocio.
Te mostramos las claves del nuevo rol del DBA, que complementa la “A” de Administrar con: Analizar, Aconsejar, Automatizar y crear Arquitecturas eficientes y Autónomas para la gestión Avanzada de datos, colaborando con los desarrolladores y usuarios desde un conocimiento profundo de las base de datos.
The document discusses sizing storage for SAP implementations. It describes different types of sizing including greenfield, brownfield, and hybrid. It also covers sizing tools from SAP like QuickSizer that estimate hardware requirements based on metrics like CPU time, memory usage, and disk space. The document emphasizes that sizing is an iterative process that requires validating assumptions with usage data and testing.
This document provides answers to frequently asked questions about migrating from an existing SAP ECC environment to SAP S/4HANA. Key challenges addressed include integrating various existing SAP and non-SAP systems, recommendations for application hosting, handling custom code and configurations, and impacts to specific functional areas like CRM and logistics. The responses provide guidance on testing interfaces, analyzing custom code for required changes, and taking a phased approach to the migration.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. • This document provides a brief summary of experiences and
lessons learned following a recent customer migra9on from
Oracle to ASE
• The document is aimed at technical consultants involved with
migra9on to ASE
Introduc3on
3. • 2087322 -‐ SYB: Where to find informa9on about SAP
applica9ons on SAP ASE
• SAP ASE is cer9fied for use with SAP Business Suite or as a
standalone database plaKorm
• There are always two delivery channels for the SAP ASE
soLware binaries
• Check if your use case is supported and that you download the
relevant soLware version
• Ensure that you validate the informa9on within the SAP notes
to ensure it’s relevant to your use case
#1
–
Business
Suite
Compa3bility
4. • Download the latest SP from the SAP Support Portal
• The version of SAP ASE will make a big difference when
considering the implementa9on project
• Consult with your SAP TQM to ensure you plan to be on the
op9mum version and patch level of SAP ASE for your project
9melines
• SAP ASE patches are released as frequently as every 3 months
which can poten9ally contain fixes for a possible data loss or
data corrup9on scenario
#2
–
Download
the
Latest
5. • hVp://wiki.scn.sap.com/wiki/display/SYBASE/Targeted+ASE+15.x
+Release+Schedule+and+CR+list+Informa9on
• Revisions to SAP ASE soLware are performed rapidly so plan to
patch at least every 3 to 6 months at minimum
• Failing to remain current may create issues with other 9ghtly
associated soLware areas (such as SAP Replica9on Server)
• Revisions can be delayed drama9cally (by months) only to be
superseded almost immediately by a later revision
• “Hot fixes” exist, whereby a current revision receives an
addi9onal increment in between the previous and the latest
#3
–
Stay
Current
6. • 1539124 -‐ SYB: Database Configura9on for SAP applica9ons on
SAP ASE
• 1619967 -‐ SYB: DBA Cockpit Correc9on Collec9on SAP Basis
7.31
• Configura9on of parameters of SAP ASE database is performed
against one core SAP note.
• It has a messy layout and can be complex to digest manually.
• Changing the parameters to those recommended by SAP is a
must as out-‐of-‐the-‐box configura9on is never op9mal or
poten9ally even unstable
• DBA Cockpit is your friend and allows easy valida9on of the
parameters depending on your NetWeaver release
#4
–
Ensure
Correct
Parameteriza3on
7. • Erroneous or conflic9ng support statements within SAP notes
can cause confusion
• Some9mes the SAP ASE standalone community forget SAP ASE
can run underneath SAP Business Suite
• If you see a SAP note sta9ng you’re not supported if you do “X”
or have “Y” installed, query it with your TQM as it may not be
relevant to your use case
• Get the account manager involved with your project
#5
–
Confirm
Statements
with
TQM
8. • 1749935 -‐ SYB: Configura9on Guide for SAP ASE 15.7
• 1581695 -‐ SYB: Configura9on Guide for SAP ASE 16.0
• Some parameters listed in SAP notes will be specific to SAP BW
or SAP ERP
• The old OLAP versus OLTP tuning issue is s9ll relevant
• Double check the SAP note containing the SAP ASE
recommended parameters and don’t just blindly apply it
#6
–
Set
Relevant
DB
Parameters
9. • Patching SAP ASE is simple so expend the 9me saved by tes9ng
• Include both func9onal, technical and opera9onal tes9ng
including your system copy process
• Performance tes9ng is a must with the change in database
• Issues detected may take 9me to resolve with workarounds
possible
• But issue may be fixed in a later SAP ASE revision – keep an eye
on the important notes
#7
–
Perform
Rigorous
Tes3ng
10. • 2077419 -‐ Targeted ASE 15.x Release Schedule and CR list
Informa9on
• Check the bug lis9ng of the next revision carefully
• It could save you from poten9al corrup9on or an unfixable
situa9on
• SAP ASE bugs are not listed in individual SAP notes but in the
Release Informa9on Note for the next revision
#8
–
Always
Check
Bug
List
11. • 1618817 -‐ SYB: How to restore an SAP ASE database server
(UNIX)
• 1585981 -‐ SYB: Ensuring Recoverability for SAP ASE
• The log files for the database, jobserver and backupserver do
not rotate un9l the SAP ASE instance is restarted
• Keep these files 9dy and compressed with your own
housekeeping scripts
• Recommenda9ons exist for retaining certain files such as the
last config file, the dumphist file and export of sysdevices table,
on a separate file system
#9
–
Configure
Housekeeping
12. • Out-‐of-‐the-‐box the performance of backups and restores is
adequate.
• A 1.3TB database within 1 stripe can take in excess of 4 hours
(to a DataDomain appliance such as EMC Avamar)
• Spend 9me to performance tune by adjus9ng one SAP ASE
parameter and you could reduce run9me by as much as 30%
• Make sure that you test the restore capability
• Allocate adequate disk space for emergency backups (dumps)
to disk if you’re planning to backup to a third-‐party tool
• Allocate adequate disk space for transac9on log in case of
emergency situa9ons
#10
–
Tune
Backup
for
Performance
13. • 1996340 -‐ SYB: Default RSDB profile parameters for SAP ASE
– Failure to set these parameters correctly will lead to performance
problems during SELECT with IN lists
• During a database plaKorm migra9on ensure that you re-‐visit
the relevance of any database specific parameters especially
those concerned with DBSL level interac9ons.
• Search for notes in component BC-‐DB-‐SYB and order in date
descending then filter for relevancy against your NW release
and SP level
#11
–
Re-‐Visit
NetWeaver
Parameters
14. • 1702338 -‐ SYB: Database hints in Open SQL for Sybase ASE
– Failure to re-‐visit any hints you had previously specified for your source
database may lead to unexpected performance problems
• Your old database plaKorm hints will be ineffec9ve on the new
database
• Consider valida9ng whether new hints for ASE are required, or
whether the new op9mizer will automa9cally cope
• Ensure that you know how to “EXPLAIN PLAN” as you’ll need it!
• Budget project 9me for performance tuning of SQL especially in
custom code
#12
–
Re-‐Visit
Any
SQL
Hints
15. • 2162183 -‐ SYB: Frequently Asked Ques9ons for SAP ASE
– good star9ng point for other notes
• 1946048 -‐ Too many UPDATES to Table SWNCMONI
– without this note, high transac9on log volumes may be experienced
• 2276031 -‐ Deac9va9on of BAdi ICF_STAT_COLLECTOR
– without this note, high transac9on log volumes may be experienced
Other
Useful
Notes