SQL SEREVR MASTERS are pioners in offering real time industrail experts hands on training on SQL SERVER 2012 DBA TRAINING.
SQL Server technologies like SQL DBA, MS BI, High availability solutions, Performance Tuning, T- SQL programming, Windows & SQL Clustering through webex ,team viewer & skype to serve the requests coming from all over the world.
Module1:
Starting with SQL Server
Responsibilities of Database Administrator
Types of DBAs
History of SQL Server
Editions of SQL Server
Tools of SQL Server
Differences between Standard and Enterprise editions
Instances types in SQL Server
Default Instance
Named Instance
SQL Server Services
Instance aware services
Instance unaware services
Module2:
Installing SQL Server
Pre-requisites
Installation
Post Installation verification Session
Module3:
Functioning of Databases
Database
Types of Database and Brief explanation
System Databases
User Database
Database Architecture
Pages
Extents
File groups
Database
Transaction Architecture
Creating Database
Modifying Database
Adding Files
Moving and renaming of Database files
Database modes
Real time Scenario.
Module4:
Security
Authentication Types in SQL Server
Types of Login
Windows Login
SQL Login
Creating Users and Logins
Server roles
Password policy
Understanding Database and Server Roles
Permissions
Working on access level issues
Orphan users Finding and Fixing
Important Queries.
Module5:
Database Backups and Restoration
Database Backups
Why we need backups
Types of Backup
Full Backup
Differential Backup
Transaction Log Backup
Copy-only, Mirrored, Split and Tail log Backups
Differences between backups
Backup Strategy
Understanding how the data moving from Log to Data File, CHECKPOINT
Monitoring the space usage of Log File and fixing
Checking the backup files VALID or CORRUPTED
Backup storage tables
Important Queries
Performing Restorations
Types of Restoration
Attach and Detach
Shrinking files.
or full course details please visit our website www.sqlservermasters.com
Duration for course is 30 days or 45 hours and special care will be taken. It is a one to one training with hands on experience.
* Resume preparation and Interview assistance will be provided.
For any further details please contact +91-9052666559 or
visit www.sqlservermasters.com
please mail us all queries to training@sqlservermasters.com
RE-DELAYS: Documenting and analising the cost of regulatory delaysIEA_RETD
IEA-RETD investigated the costs of regulatory delays for the growth and economic potential of the renewable energy industry. Key recommendations from the RE-DELAYS project are:
• Streamline the regulatory processes by creating a one stop shop with simplified rules for applications.
• Increase accountability for decision making processes at the regulatory/governmental level, for example in the form of pre-determined fines associated with not achieving set milestones.
• Link the level of incentive such as FIT to delay.
• Define clear procedures and cost impact assessment of appeal processes.
• Inform the public about benefits and risks of RE and encourage consultative mechanisms to share concerns.
The project was carried out by 3E together with London Economics International LLC (LEI).
This document discusses an arbitration case between AT&T and Saudi Cable Company regarding a $4.5 billion telecommunications project in Saudi Arabia. AT&T and Saudi Cable had partnered to bid for the project but later disagreed on the terms of their final commercial contract. AT&T filed for arbitration claiming the pre-bid agreement was terminated, while Saudi Cable counterclaimed that AT&T failed to negotiate in good faith. Both parties agreed to an arbitrator, but Saudi Cable later challenged his impartiality. Both the ICC and English courts reviewed the challenge and found no evidence of apparent bias by the arbitrator.
VV Mineral Mining Dismisses Allegations Against Companyshiva rajan
VV Mineral Mining has dismissed allegations against the company for illegal beach mining in Tamil Nadu's Tuticorin district that has caused heavy beach erosion and corrosion issues in neighboring villages. The former district collector, Ashish Kumar, had investigated these allegations but was later transferred, though there is no evidence the transfer was due to political connections. VV Mineral stated the allegations were baseless and motivated. However, the first District Collector, V Sundaram, had written a letter accusing VV Mineral of illegal mining worth over Rs. 96,000 crores and favoritism shown by state government departments to the company. The founder of VV Mineral dismissed the allegations as a conspiracy by business rivals.
RES-T-NEXT, IEA RETD workshop in London, 26th August 2015IEA_RETD
IEA-RETD Report: Next Generation Policy Instruments for Renewable Transport (RES-T-NEXT)
David de Jager, Operating Agent IEA-RETD
The RES-T-Next project aims at providing an analysis of next generation RES-T policy instruments and recommendations regarding private and urban transport in order to increase the level of energy used from renewable sources and to decrease GHG emissions.
Devanshu Raj is a highly skilled IT professional with over 4 years of experience working for IBM India. He has expertise in requirement analysis, design, development and delivery of optimized solutions. Some of his technical skills include Teradata, Informatica, Oracle, and he is currently pursuing certification in Cassandra. He is seeking new opportunities where he can apply his skills and experience in data warehousing and ETL development.
Funky Renewables is a renewable energy company that provides flexible solutions using various renewable technologies like solar PV, wind, heat pumps, and biomass. They pride themselves on using high quality, long lasting components from partners in Germany and elsewhere in Europe. Their mission is to install renewable systems to the highest standards using qualified technicians while offering strong warranties and customer service.
TINTIN is a tool for incremental integrity checking of SQL assertions. It currently runs on SQL server but it may easily be adapted to other relational DBMSs
RE-DELAYS: Documenting and analising the cost of regulatory delaysIEA_RETD
IEA-RETD investigated the costs of regulatory delays for the growth and economic potential of the renewable energy industry. Key recommendations from the RE-DELAYS project are:
• Streamline the regulatory processes by creating a one stop shop with simplified rules for applications.
• Increase accountability for decision making processes at the regulatory/governmental level, for example in the form of pre-determined fines associated with not achieving set milestones.
• Link the level of incentive such as FIT to delay.
• Define clear procedures and cost impact assessment of appeal processes.
• Inform the public about benefits and risks of RE and encourage consultative mechanisms to share concerns.
The project was carried out by 3E together with London Economics International LLC (LEI).
This document discusses an arbitration case between AT&T and Saudi Cable Company regarding a $4.5 billion telecommunications project in Saudi Arabia. AT&T and Saudi Cable had partnered to bid for the project but later disagreed on the terms of their final commercial contract. AT&T filed for arbitration claiming the pre-bid agreement was terminated, while Saudi Cable counterclaimed that AT&T failed to negotiate in good faith. Both parties agreed to an arbitrator, but Saudi Cable later challenged his impartiality. Both the ICC and English courts reviewed the challenge and found no evidence of apparent bias by the arbitrator.
VV Mineral Mining Dismisses Allegations Against Companyshiva rajan
VV Mineral Mining has dismissed allegations against the company for illegal beach mining in Tamil Nadu's Tuticorin district that has caused heavy beach erosion and corrosion issues in neighboring villages. The former district collector, Ashish Kumar, had investigated these allegations but was later transferred, though there is no evidence the transfer was due to political connections. VV Mineral stated the allegations were baseless and motivated. However, the first District Collector, V Sundaram, had written a letter accusing VV Mineral of illegal mining worth over Rs. 96,000 crores and favoritism shown by state government departments to the company. The founder of VV Mineral dismissed the allegations as a conspiracy by business rivals.
RES-T-NEXT, IEA RETD workshop in London, 26th August 2015IEA_RETD
IEA-RETD Report: Next Generation Policy Instruments for Renewable Transport (RES-T-NEXT)
David de Jager, Operating Agent IEA-RETD
The RES-T-Next project aims at providing an analysis of next generation RES-T policy instruments and recommendations regarding private and urban transport in order to increase the level of energy used from renewable sources and to decrease GHG emissions.
Devanshu Raj is a highly skilled IT professional with over 4 years of experience working for IBM India. He has expertise in requirement analysis, design, development and delivery of optimized solutions. Some of his technical skills include Teradata, Informatica, Oracle, and he is currently pursuing certification in Cassandra. He is seeking new opportunities where he can apply his skills and experience in data warehousing and ETL development.
Funky Renewables is a renewable energy company that provides flexible solutions using various renewable technologies like solar PV, wind, heat pumps, and biomass. They pride themselves on using high quality, long lasting components from partners in Germany and elsewhere in Europe. Their mission is to install renewable systems to the highest standards using qualified technicians while offering strong warranties and customer service.
TINTIN is a tool for incremental integrity checking of SQL assertions. It currently runs on SQL server but it may easily be adapted to other relational DBMSs
El documento describe las características y responsabilidades de los servidores públicos. Explica que los servidores públicos prestan servicios al Estado a través de instituciones estatales como hospitales, escuelas y fuerzas de seguridad. Administran recursos estatales por lo que deben comportarse de manera intachable e honesta para proteger los intereses de la sociedad. También se detallan las diferentes categorías de servidores públicos y su régimen laboral.
O documento discute a violência urbana à luz dos ensinamentos espíritas. Aponta que a indignação popular com a violência não resolve o problema e pode envenenar os pensamentos. Defende que os espíritas devem entender que todos, inclusive criminosos, são irmãos em progresso e que a reabilitação, e não apenas o encarceramento, é necessária. Conclui que cada um constrói seu futuro com suas ações, e que a compreensão espírita pode ajudar a lidar com as mazelas sociais de forma construtiva.
RE-STORAGE, IEA RETD workshop in London, 26th August 2015IEA_RETD
IEA-RETD Scoping Study: Policies for Storing Renewable Energy (RE-STORAGE)
Paul Robson, E4tech
The RE-STORAGE scoping study aims to answer the question “Everybody is talking about storage – what is important for policy makers?” by giving an overview of policy relevant aspects relating to renewable energy and storage. It will explain no-regret policies and provide a guiding framework that allows policy makers to set priorities in a large scale uptake of RE scenario.
This document outlines the scheme and structure of the Code of Criminal Procedure, 1898 in India. It contains 46 chapters organized across 9 parts, covering topics like the constitution of criminal courts, powers of investigation, procedures for prosecution, appeals and special proceedings. The code also includes 5 schedules providing additional details on offenses, powers of magistrates and forms.
The document summarizes key sections of the Punjab Rent Act 2009 regarding the creation and regulation of tenancies in Punjab. Some important points include:
1. The Act establishes Rent Tribunals to settle disputes between landlords and tenants and regulate their relationships.
2. Tenancy agreements must be registered with the Rent Registrar, who maintains records of agreements.
3. The Tribunals have powers like civil courts to enforce attendance, collect evidence, and issue orders. They must decide cases within 4 months but can extend with daily hearings.
4. Orders can be appealed to the District Judge within 30 days, but interlocutory orders cannot be appealed.
The document is about the book "Learning Selenium" which teaches readers how to create automated test scripts using Selenium. It provides tutorials to get started with Selenium IDE, including how to record a test script, modify an existing script, store information from a web page. It also discusses using extensions and plugins with Selenium IDE. The book aims to help readers structure their Selenium test automation projects and provides hands-on examples testing a demo e-commerce website.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
El documento describe las características y responsabilidades de los servidores públicos. Explica que los servidores públicos prestan servicios al Estado a través de instituciones estatales como hospitales, escuelas y fuerzas de seguridad. Administran recursos estatales por lo que deben comportarse de manera intachable e honesta para proteger los intereses de la sociedad. También se detallan las diferentes categorías de servidores públicos y su régimen laboral.
O documento discute a violência urbana à luz dos ensinamentos espíritas. Aponta que a indignação popular com a violência não resolve o problema e pode envenenar os pensamentos. Defende que os espíritas devem entender que todos, inclusive criminosos, são irmãos em progresso e que a reabilitação, e não apenas o encarceramento, é necessária. Conclui que cada um constrói seu futuro com suas ações, e que a compreensão espírita pode ajudar a lidar com as mazelas sociais de forma construtiva.
RE-STORAGE, IEA RETD workshop in London, 26th August 2015IEA_RETD
IEA-RETD Scoping Study: Policies for Storing Renewable Energy (RE-STORAGE)
Paul Robson, E4tech
The RE-STORAGE scoping study aims to answer the question “Everybody is talking about storage – what is important for policy makers?” by giving an overview of policy relevant aspects relating to renewable energy and storage. It will explain no-regret policies and provide a guiding framework that allows policy makers to set priorities in a large scale uptake of RE scenario.
This document outlines the scheme and structure of the Code of Criminal Procedure, 1898 in India. It contains 46 chapters organized across 9 parts, covering topics like the constitution of criminal courts, powers of investigation, procedures for prosecution, appeals and special proceedings. The code also includes 5 schedules providing additional details on offenses, powers of magistrates and forms.
The document summarizes key sections of the Punjab Rent Act 2009 regarding the creation and regulation of tenancies in Punjab. Some important points include:
1. The Act establishes Rent Tribunals to settle disputes between landlords and tenants and regulate their relationships.
2. Tenancy agreements must be registered with the Rent Registrar, who maintains records of agreements.
3. The Tribunals have powers like civil courts to enforce attendance, collect evidence, and issue orders. They must decide cases within 4 months but can extend with daily hearings.
4. Orders can be appealed to the District Judge within 30 days, but interlocutory orders cannot be appealed.
The document is about the book "Learning Selenium" which teaches readers how to create automated test scripts using Selenium. It provides tutorials to get started with Selenium IDE, including how to record a test script, modify an existing script, store information from a web page. It also discusses using extensions and plugins with Selenium IDE. The book aims to help readers structure their Selenium test automation projects and provides hands-on examples testing a demo e-commerce website.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
3. sql server 2008r2 dba course
contents
• Module: 1 Architecture &Internals of SQL Server Engine
• Module : 2 Installing, Upgrading, Configuration, Managing
Services and Migration
• Module: 3 Security, Automation & Monitoring
• Module: 4 Backup & Restore, High Availability & Replication
•
• Module: 5 SQL Server Clustering & AlwaysOn Availability Groups
•
• Module: 6 Performance Tuning, Indexing & Optimizing SQL
Server
4. Architecture &Internals of SQL Server
• Introduction to SQL Server 2012
• Overview on RDBMS and Beyond Relational
• Big picture of SQL Server 2012
• Components & Services of SQL Server 2012
• Roles of production DBA
• System Databases
• Master, Model, MSDB, Tempdb & Resource
•
• SQL Server 2012 Editions & Capacity Planning
• Principal Editions [Enterprise, BI, Standard]
• Specialized Editions [Web]
• Breadth Editions [Developer, Express]
• Hardware Requirements
• OS and Software requirements
•
5. Pages & Extents
• Pages
• Extents [Uniform & Mixed]
• Managing Extent Allocations
• Tracking Free Space
Files and File groups
• Database Files
• Primary data files
• Secondary data files
• Log files
• Database File groups [Primary & User-defined]
6. sql server 2008r2 dba course
Thread and Task Architecture
• Allocating threads to CPU
• Affinity Mask
• IO and Processor affinity mask
• Configuring Affinity masks
• Boost SQL Server priority
• Hot Add CPU
• Checkpoints
7. sql server 2008r2 dba course
Memory Architecture
• 32-bit Vs 64-bit Architecture
• Dynamic Memory Management
• Effects of min and max server memory
• Buffer Management
• The Relational Engine
• The Command Parser
• The Query Optimizer
• The Query Executor
• Using AWE
• Configuring Memory Settings
• The Buffer Pool and the Data Cache
• Checkpoints
8. sql server 2008r2 dba course
T-Log Architecture
• Transaction Log Logical Architecture
• Transaction Log Physical Architecture
• Recovery phases [Analysis, Redo & Undo]
• Checkpoint Operation
• Write-Ahead Transaction Log
• Managing T-log
• Truncating and shrinking the log file
• Managing T-Log issues by using DBCC commands
9. sql server 2008r2 dba course
Module: 2
Installing, Upgrading, Configuration, Managing services and
Migration
SQL server 2012 Installation
• Planning the System/Pre-Requisites
• Installing SQL server 2008 R2 /2012
• Installing Analysis Services
• Installing & Configuring Reporting Services
• Best Practices on Installation
• Uninstalling SQL server
• Common Installation Issues
10. sql server 2008r2 dba course
Upgrading to SQL server 2008 R2/2012
• Upgrading the server by applying service packs
• Upgrading the server by applying Hot fixes
• In-Place Vs. Side-by-Side upgradations
• Pre-Upgrade Checks/pre-requisites
• Upgrade advisor
• In-Place Upgradation from SQL server 2008 R2 to 2012
• Best Practices to follow while upgrading
11. sql server 2008r2 dba course
Managing services
• Server/Engine Connectivity issues
• Security/Firewall access issues
• Starting and Stopping Services through
– Configuration manager
– Net Command
– Management Studio
• Start Up parameters
• Starting SQL server in single user mode
12. sql server 2008r2 dba course
Configuring SQL Server 2012
• Configuring Network Protocols from SQL Server configuration manager
• Configuring Client Protocols from SQL Server configuration manager
• Dedicated Administrator Connection
• Enabling advanced features by using facets
• Connecting to DAC
• Configuring Database Mail
• Configuring Registered servers
• Configuring Central Management Servers [CMS]
• Querying data from different servers by using CMS
• Configuring other settings through SP_Configure
• Configuring Server memory settings
• Configuring Database Settings
• Tempdb configuration
• Best Practices on configuration tempdb & Database settings
13. sql server 2008r2 dba course
Migrating SQL server
• Side-By- Side Migration Techniques
• Difference between in-place & Side by Side Migration/Upgradation
• Advantages/Disadvantages of In-Place to Side-by-Side
• Migrating Databases
– Migration by using Attach and Detach Method
– Migration by using Back and restore method
– Migration by using Copy Database Wizard
• Migrating Logins [Fixing Orphaned Users]
• Creating and migrating linked servers
• Migrating Jobs
• Data movement by using Import & Export wizard
• Migrating jobs & logins by using SSIS
14. sql server 2008r2 dba course
Module: 3 Security, Automation & Monitoring
Automating Administrative Tasks
• About SQL server Agent
• Creating Jobs, Alerts and Operators
• Scheduling the Jobs
• Working with Job activity Monitor
• Resolving failure Jobs
• Configuring Alert system in SQL server agent
• Best practices on job maintenance
15. sql server 2008r2 dba course
Monitoring SQL Server
• The Goal of Monitoring
• Choosing the Appropriate Monitoring Tools
• Monitoring health status by using server Dashboard & DMV’s
• Monitoring Job activities by job activity monitor
• Monitoring SQL Server process by server activity monitor
• Monitoring SQL Server Error Logs/Windows by log file viewer
• Best Practices on Monitoring
16. sql server 2008r2 dba course
Security
• Security Principles & Authentications
• Server and Database Roles
• User-defined server roles
• Server and Database Principles
• Server & Database Securable
• Creating Logins and mapping Users to databases
• Creating Schemas & credentials
• Default Schema for Groups
• Enabling contained databases
• Creating users for contained databases
• Connecting to contained databases from SSMS
• Role permissions for CMS and SQL Server Agent
• Granting to Object level Permissions
• Best Practices on security
17. sql server 2008r2 dba course
Module: 4 Backup & Restore, High Availability & Replication
Backup & Restore:
• Recovery Models [Simple, Bulk-Logged & Full]
• How Backup Works
• Types of backups
– Full backup
– Diff backup
– T-log backup
– Copy Only
– Mirror
– Tail-Log
– Compressed backups
18. sql server 2008r2 dba course
• Restoring Modes [With Recovery, No Recovery, Read
only/Standby]
• Disaster Recovery Planning
• Performing Restore (point-in-time recovery)
• Partial availability of database.
• Database Recovery advisor
• Backup strategy: Developing and executing a Backup Plan
• Creating Maintenance Plans
• Resolving Backup failures in Real time scenarios
• Best Practices on Backup & Recovery
19. sql server 2008r2 dba course
Log Shipping
• Log-Shipping Architecture
• Building DRS for log-shipping
• Pre-requisites/Log-Shipping Process
• Deploying Log Shipping
• Working with Log Shipping Monitor
• Logs hipping Role changing [Fail-Over]
• Removing Log Shipping
• Frequently Raised Errors In Log-Shipping
• Case study: How to add files to a log-shipped database
• Best Practices on Log-Shipping
20. sql server 2008r2 dba course
Database Mirroring
• Overview of Database Mirroring
• Operating Modes in Database Mirroring
• Pre-Requisites for Database Mirroring
• Deploying Database Mirroring
• Fail-Over from Principle to Mirror
• Working with Database mirroring monitor
• Advantages & Disadvantages of database mirroring
• Database Snapshots
• Using Database Snapshots for reporting purposes.
• Case study on moving mirrored files
• Best practices on Mirroring
•
21. sql server 2008r2 dba course
Replication
• Replication Overview
• Replication Models (snapshot/Transactional/Merge/Peer to Peer)
• Replication agents
• Configuring Distributor
• Deploying Transactional Replication for High Availability
• Deploying Merge Replication for Bi-directional
• Creating Subscriptions [Homogeneous / heterogeneous]
• Monitoring Replication by using replication monitor
• Scripting & Removing Replication
• Best Practices on Replication
• Configuring peer to peer replication
• Frequently asked questions in replication
22. sql server 2008r2 dba course
Module: 5 SQL Server Clustering & AlwaysOn Availability
Groups
Windows Server 2012 Clustering
• What is a cluster and Overview of Windows cluster
• Server cluster technologies
– Server clusters
– NLB clusters [Network load balancing]
• Basic architecture of server clusters
• Networks in clustering [Public & Private]
• How cluster works
• Health Detection [Looks alive, Is alive]
23. sql server 2008r2 dba course
• Introduction to fail-over cluster manger
• Validating the cluster configuration
• Creating cluster through fail-over cluster manager
• Adding Nodes to the cluster [2/3 Node cluster]
• Configuring MSDTC as a cluster aware application
• Active - passive Vs Active - Active Clustering
• Adding/Evicting Nodes to/from the cluster
• Adding volumes to the roles/services in the cluster
• Simulating the failover for the resources
• Failing over the core cluster resources to the another node
24. sql server 2008r2 dba course
Installing SQL Server 2012 Fail-Over Clustering
• Pre-SQL Server Installation Tasks.
• Configure SQL Server–Related Service Accounts and Service Account
Security
• Stop Unnecessary Processes or Services
• Check for Pending Reboots
• Install SQL Server Setup Support Files
• SQL Server 2012 Setup
• Install the First Node
• Perform Post installation Tasks
• Verify the Configuration
• Set the Preferred Node Order for Failover
• Configure a Static TCP/IP Port for the SQL Server Instance
25. sql server 2008r2 dba course
Administering a SQL Server 2012 Failover Cluster
• Install SQL Server Service Packs, Patches, and Hot fixes
• Introducing Failover Cluster Management
• Monitoring the Cluster Nodes
• Adding volumes to cluster roles
• Clustered SQL Server Administration
• Fail over resources/roles between the nodes
• Automatic failover & Failback
• Destroying a Cluster- Using Failover Cluster Management
• Uninstalling a Failover Clustering Instance
• Best Practices on Clustering
26. sql server 2008r2 dba course
AlwaysOn Availability Groups
• AlwaysOn Overview
• Understanding Concepts and Terminology
• Availability Modes
• Types of fail-overs
• Pre-requisites for AlwaysOn configuration
• Configuring Availability Groups
• Monitoring Availability groups
• Add/remove database/replica
• Suspend/resume an availability database
• Backups on Secondary
• AlwaysOn Failover Cluster Instances
• Online Operations
27. sql server 2008r2 dba course
High Availability: Interoperability and Coexistence
• Database Mirroring and Log Shipping
• Database Mirroring and Database Snapshots
• Database Mirroring and Failover Clustering
• Replication and Log Shipping
• Replication and Database Mirroring
• Failover Clustering and AlwaysOn Availability groups
28. sql server 2008r2 dba course
Module: 6 Performance Tuning, Indexing & Optimizing
SQL Server
Optimizing SQL server
• Policy based management
• Policy based management implementation
• Creating Policy & Condition
• Evaluating polices
• Resource governor
• Resource pool & Workloads
• Using resource governor from SSMS
• Monitoring Resource governor
29. sql server 2008r2 dba course
• Change data capture [CDC]
• Enabling CDC at Database and table level
• Compression techniques
• Data & Backup compression
• Row compression & Page compression
• Monitoring data compression
• Partitioning – A big picture
• Table and index partitioning
• Creating a partition function/schema
30. sql server 2008r2 dba course
Indexing
• Index Architecture
• How to optimally take advantage of indexes
• Clustered & Non-Clustered indexes
• Covering Index or index with included column
• Creating covering indexes
• Filtered indexes
• Creating filtered indexes to minimize the CPU pressure
• Column store Index Overview
• Column store Index Fundamentals and Architecture
• Creating column store index to improve the performance
• Index Fragmentation
31. sql server 2008r2 dba course
Locking & Concurrency
• Isolation Levels in SQL Server
• Locking in SQL Server
• Resolving concurrency effects in SQL Server
• Lock modes – Shared, Update, Exclusive, Intent, Schema, bulk-update, key-
range
• Lock escalation in SQL server
• Blocking [SP_Who2]
• Resolving blocking issues in SQL Server
32. sql server 2008r2 dba course
• Working with Activity Monitor
• Live & Dead Locks
• Trace flags to capture dead locks
• Capturing dead lock information in error logs
• SQL Profiler [How to capture events data by using Profiler]
• Capturing deadlock events in profiler
• Deadlocks and deadlock chain detection.
33. sql server 2008r2 dba course
Performance Tuning
• Factors That Impact Performance
• Tools used SQL Profiler, Database Tuning Advisor, System Monitor
• Introduction to Database Tuning Advisor [DTA]
• Analyzing the profiler data by using DTA
• Performance Monitor [System Monitor]
• Correlate SQL Profiler Data with Performance Monitor Data
• New Dynamic Management Views (DMV’s)
• Best Practices on Performance Tuning
• Case Study A: Performance Counters Setup-Collect-Analyze
• Case Study B: Performance Counters- Thresholds
• Case study: Effects of MAXDOP query hint in SQL Server