AMicrosoft azure hyper v recovery manager overviewAbhishek Sur
This document discusses Windows Azure Hyper-V Recovery Manager, a service that protects virtual machines running in a private cloud by replicating them to a secondary site. It monitors the health of System Center Virtual Machine Manager clouds and orchestrates quick recovery of VMs if an outage occurs at the primary site. The service automates replication using in-box technologies and cloud-based recovery plans. It works by configuring protection through a recovery plan, replicating VMs from Site A to Site B using Hyper-V Replica, and enabling the recovery of services through the orchestrated failover of VMs if Site A fails. Customers can use it to reduce the impact of planned downtime when a secondary site is available.
This document summarizes an overview presentation on SQL Server basics for non-database administrators. It covers SQL Server 2005 platform features, managing databases, database maintenance and protection, securing SQL Server, and managing database objects. The document provides high-level information on these SQL Server administration topics in less than 3 sentences.
This document provides an overview of a book about SQL Server backup and restore. It discusses the importance of database backups for disaster recovery and the responsibilities of a DBA to have an effective backup and restore plan. The book will cover topics like different backup types, recovery models, planning backup storage and schedules, restoring databases, and using tools like SQL Backup Pro. It is intended to help DBAs create and test backup solutions tailored to their specific database requirements.
A database is a collection of related data organized into tables. Data is any raw fact or statistic, and is important because all decisions depend on underlying data. A database management system (DBMS) is used to organize data into tables to avoid problems with file-based storage like inconsistency, redundancy, integrity issues, and security problems. It allows for concurrent access. DBMS are widely used in real-world applications like movie theaters, prisons, and banks to manage related information. A table in a database contains records organized into rows with attributes or fields forming the columns. A key uniquely identifies each record.
The document provides an overview of basic concepts related to SQL server databases including database objects, file systems, storage structures, and query processing. It discusses topics like SQL server databases, storage files and file groups, data pages and extents, data organization in heaps vs indexed tables, and how queries are processed through either full table scans or using indexes.
The document provides an overview of SQL Server including:
- The architecture including system databases like master, model, msdb, and tempdb.
- Recovery models like full, bulk-logged, and simple.
- Backup and restore options including full, differential, transaction log, and file group backups.
- T-SQL system stored procedures for administration tasks.
- SQL commands and functions.
- SQL Agent jobs which are scheduled tasks consisting of steps to perform automated tasks.
This document provides information about SQL queries and joins. It begins by introducing SQL (Structured Query Language) which is used to communicate with databases and retrieve required information. It describes the basic CRUD (Create, Read, Update, Delete) functions of SQL. It then discusses different types of SQL queries - aggregate function queries, scalar function queries, and join queries. It provides the syntax and explanation of inner joins, outer joins (left, right, full) which are used to query data from multiple tables based on relationships between columns. The document is presented by Hammad, Bilal and Awais.
AMicrosoft azure hyper v recovery manager overviewAbhishek Sur
This document discusses Windows Azure Hyper-V Recovery Manager, a service that protects virtual machines running in a private cloud by replicating them to a secondary site. It monitors the health of System Center Virtual Machine Manager clouds and orchestrates quick recovery of VMs if an outage occurs at the primary site. The service automates replication using in-box technologies and cloud-based recovery plans. It works by configuring protection through a recovery plan, replicating VMs from Site A to Site B using Hyper-V Replica, and enabling the recovery of services through the orchestrated failover of VMs if Site A fails. Customers can use it to reduce the impact of planned downtime when a secondary site is available.
This document summarizes an overview presentation on SQL Server basics for non-database administrators. It covers SQL Server 2005 platform features, managing databases, database maintenance and protection, securing SQL Server, and managing database objects. The document provides high-level information on these SQL Server administration topics in less than 3 sentences.
This document provides an overview of a book about SQL Server backup and restore. It discusses the importance of database backups for disaster recovery and the responsibilities of a DBA to have an effective backup and restore plan. The book will cover topics like different backup types, recovery models, planning backup storage and schedules, restoring databases, and using tools like SQL Backup Pro. It is intended to help DBAs create and test backup solutions tailored to their specific database requirements.
A database is a collection of related data organized into tables. Data is any raw fact or statistic, and is important because all decisions depend on underlying data. A database management system (DBMS) is used to organize data into tables to avoid problems with file-based storage like inconsistency, redundancy, integrity issues, and security problems. It allows for concurrent access. DBMS are widely used in real-world applications like movie theaters, prisons, and banks to manage related information. A table in a database contains records organized into rows with attributes or fields forming the columns. A key uniquely identifies each record.
The document provides an overview of basic concepts related to SQL server databases including database objects, file systems, storage structures, and query processing. It discusses topics like SQL server databases, storage files and file groups, data pages and extents, data organization in heaps vs indexed tables, and how queries are processed through either full table scans or using indexes.
The document provides an overview of SQL Server including:
- The architecture including system databases like master, model, msdb, and tempdb.
- Recovery models like full, bulk-logged, and simple.
- Backup and restore options including full, differential, transaction log, and file group backups.
- T-SQL system stored procedures for administration tasks.
- SQL commands and functions.
- SQL Agent jobs which are scheduled tasks consisting of steps to perform automated tasks.
This document provides information about SQL queries and joins. It begins by introducing SQL (Structured Query Language) which is used to communicate with databases and retrieve required information. It describes the basic CRUD (Create, Read, Update, Delete) functions of SQL. It then discusses different types of SQL queries - aggregate function queries, scalar function queries, and join queries. It provides the syntax and explanation of inner joins, outer joins (left, right, full) which are used to query data from multiple tables based on relationships between columns. The document is presented by Hammad, Bilal and Awais.
Azure service fabric for building micro service based applications. Comparison of monolythic application with cloud based micro service application, hosting over cloud containers like docker
C# is being continually updated with new features. C# 6.0 introduced many new features such as auto-property initializers, getter-only auto-properties, and null propagation. C# 7.0 may include additional features like binary literals, nested methods, and pattern matching. The .NET Compiler Platform makes it easier for Microsoft to improve and extend the C# language over time.
In this presentation, I presented how to build an angular JS Application with SPA in mind and also make sure you use up all the available concepts to create versatile and creative web application with less boilerplate javascript code.
This document discusses streaming data and event processing in the cloud. It notes that event data is already distributed globally and stored in the cloud, so processing should be done by bringing the computation to the data rather than moving the data. It also outlines some key considerations for building a cloud-based event processing solution such as infrastructure provisioning, coding for data ingestion and egress, resilience planning, solution design, and monitoring.
Designing azure compute and storage infrastructureAbhishek Sur
How to design compute and storage, description of premium tier machines and demonstration using Iometer to compare two different tier machines comparing cost and performance.
The document outlines the debugging tools available in Microsoft Edge browser. It describes the DOM Explorer (CTRL + 1), Console (CTRL + 2), Debugger (CTRL + 3), Network (CTRL + 4), Performance (CTRL + 5), Memory (CTRL + 6), Emulator (CTRL + 7), and Experiment (CTRL + 8) tools. Each tool is used for inspecting different aspects of web pages, like the DOM structure, running JavaScript, network activity, performance issues and more. The document provides details on the features available in each debugging tool to help developers test and troubleshoot web pages.
The document provides an overview of Microsoft Azure Mobile Services, including features like structured storage, authentication, backend logic, push notifications, scheduling, and more. It discusses the REST API, JSON to SQL type mappings, auto-generated columns, server-side table scripts, custom APIs, file storage, notification hubs, offline synchronization, the command line interface, and scaling options. Live demos are presented on topics like adding data validation logic, push notifications, authentication, and using the CLI.
The document discusses Windows Azure Pack, which brings key capabilities of Microsoft Azure to an organization's on-premises infrastructure. It allows organizations to build and manage a private cloud using familiar Windows Server and System Center technologies. Windows Azure Pack supports multi-tenant cloud services, virtual networking, automation, and integration with third-party applications and developer tools. It provides a way for enterprises and service providers to offer Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) capabilities on private infrastructure.
The document discusses different methods for integrating third party systems with SAP Business One (B1), including DI API, B1 Web Services (B1WS), and DI Server. It provides details on each method, including advantages and limitations. The presenter is Abhishek Sur, Product Head for InSync Solutions, who has expertise in Microsoft technologies and SAP B1 integration.
Working with Cortana is fun. This presentation is for people who are seasoned developer and want to learn more on integrating Cortana with Windows Phone Apps.
This document provides tips for improving the performance of ASP.NET applications. It discusses ways to optimize ASP.NET pages by reducing page size, minimizing viewstate, and adding caching. It also recommends optimizing database queries, using asynchronous calls judiciously, and profiling SQL to identify inefficient queries. Configuration tips include enabling compression, removing unnecessary HTTP modules, and setting the application pool start mode to AlwaysRunning.
This document provides an overview of key features of the Windows Presentation Foundation (WPF) including resolution independence, XAML usage, data binding, control templates, graphics and animation support, the MVVM pattern, triggers, data templates, and value converters. WPF allows building visually stunning Windows applications with vector graphics, templates, bindings, and animations while remaining resolution independent. It follows an MVVM pattern to separate user interface from application logic and data access.
This document discusses new features in SQL Server 2012 including Always On, contained databases, columnstore indexes, Visual Studio integration, and TSQL enhancements. It provides details on columnstore indexes, query pagination using new features, windowing functions using the OVER clause, sequences, metadata discovery using new DMVs and stored procedures, enhanced functions, and general TSQL improvements including THROW and extended events.
Dev days Visual Studio 2012 EnhancementsAbhishek Sur
This document discusses various enhancements to the user interface in Visual Studio 2012. It describes improvements to Solution Explorer including search capabilities, navigation, filtering, and properties previews. It also outlines enhancements to debugging tools such as setting breakpoints, evaluating hover values, and using tracepoints. The document notes expanded JavaScript and HTML5 IntelliSense as well as improved code analysis, metrics, and cloning tools.
This document discusses key aspects of the .NET infrastructure including user interfaces, services, data access layers, and core components. It covers topics like loops and iterators, delegates and events, generics and extension methods, anonymous types and LINQ, dynamic types, and asynchronous patterns in .NET.
ASP.NET 4.5 introduces strongly typed data controls that are bound to models. This provides compile time checking and navigation support. Data controls now support model binding, which allows selecting, filtering, editing and validating data without needing to write additional code. Validation is supported through data annotations. Custom value providers and validation attributes can also be created to extend model binding functionality.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Azure service fabric for building micro service based applications. Comparison of monolythic application with cloud based micro service application, hosting over cloud containers like docker
C# is being continually updated with new features. C# 6.0 introduced many new features such as auto-property initializers, getter-only auto-properties, and null propagation. C# 7.0 may include additional features like binary literals, nested methods, and pattern matching. The .NET Compiler Platform makes it easier for Microsoft to improve and extend the C# language over time.
In this presentation, I presented how to build an angular JS Application with SPA in mind and also make sure you use up all the available concepts to create versatile and creative web application with less boilerplate javascript code.
This document discusses streaming data and event processing in the cloud. It notes that event data is already distributed globally and stored in the cloud, so processing should be done by bringing the computation to the data rather than moving the data. It also outlines some key considerations for building a cloud-based event processing solution such as infrastructure provisioning, coding for data ingestion and egress, resilience planning, solution design, and monitoring.
Designing azure compute and storage infrastructureAbhishek Sur
How to design compute and storage, description of premium tier machines and demonstration using Iometer to compare two different tier machines comparing cost and performance.
The document outlines the debugging tools available in Microsoft Edge browser. It describes the DOM Explorer (CTRL + 1), Console (CTRL + 2), Debugger (CTRL + 3), Network (CTRL + 4), Performance (CTRL + 5), Memory (CTRL + 6), Emulator (CTRL + 7), and Experiment (CTRL + 8) tools. Each tool is used for inspecting different aspects of web pages, like the DOM structure, running JavaScript, network activity, performance issues and more. The document provides details on the features available in each debugging tool to help developers test and troubleshoot web pages.
The document provides an overview of Microsoft Azure Mobile Services, including features like structured storage, authentication, backend logic, push notifications, scheduling, and more. It discusses the REST API, JSON to SQL type mappings, auto-generated columns, server-side table scripts, custom APIs, file storage, notification hubs, offline synchronization, the command line interface, and scaling options. Live demos are presented on topics like adding data validation logic, push notifications, authentication, and using the CLI.
The document discusses Windows Azure Pack, which brings key capabilities of Microsoft Azure to an organization's on-premises infrastructure. It allows organizations to build and manage a private cloud using familiar Windows Server and System Center technologies. Windows Azure Pack supports multi-tenant cloud services, virtual networking, automation, and integration with third-party applications and developer tools. It provides a way for enterprises and service providers to offer Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) capabilities on private infrastructure.
The document discusses different methods for integrating third party systems with SAP Business One (B1), including DI API, B1 Web Services (B1WS), and DI Server. It provides details on each method, including advantages and limitations. The presenter is Abhishek Sur, Product Head for InSync Solutions, who has expertise in Microsoft technologies and SAP B1 integration.
Working with Cortana is fun. This presentation is for people who are seasoned developer and want to learn more on integrating Cortana with Windows Phone Apps.
This document provides tips for improving the performance of ASP.NET applications. It discusses ways to optimize ASP.NET pages by reducing page size, minimizing viewstate, and adding caching. It also recommends optimizing database queries, using asynchronous calls judiciously, and profiling SQL to identify inefficient queries. Configuration tips include enabling compression, removing unnecessary HTTP modules, and setting the application pool start mode to AlwaysRunning.
This document provides an overview of key features of the Windows Presentation Foundation (WPF) including resolution independence, XAML usage, data binding, control templates, graphics and animation support, the MVVM pattern, triggers, data templates, and value converters. WPF allows building visually stunning Windows applications with vector graphics, templates, bindings, and animations while remaining resolution independent. It follows an MVVM pattern to separate user interface from application logic and data access.
This document discusses new features in SQL Server 2012 including Always On, contained databases, columnstore indexes, Visual Studio integration, and TSQL enhancements. It provides details on columnstore indexes, query pagination using new features, windowing functions using the OVER clause, sequences, metadata discovery using new DMVs and stored procedures, enhanced functions, and general TSQL improvements including THROW and extended events.
Dev days Visual Studio 2012 EnhancementsAbhishek Sur
This document discusses various enhancements to the user interface in Visual Studio 2012. It describes improvements to Solution Explorer including search capabilities, navigation, filtering, and properties previews. It also outlines enhancements to debugging tools such as setting breakpoints, evaluating hover values, and using tracepoints. The document notes expanded JavaScript and HTML5 IntelliSense as well as improved code analysis, metrics, and cloning tools.
This document discusses key aspects of the .NET infrastructure including user interfaces, services, data access layers, and core components. It covers topics like loops and iterators, delegates and events, generics and extension methods, anonymous types and LINQ, dynamic types, and asynchronous patterns in .NET.
ASP.NET 4.5 introduces strongly typed data controls that are bound to models. This provides compile time checking and navigation support. Data controls now support model binding, which allows selecting, filtering, editing and validating data without needing to write additional code. Validation is supported through data annotations. Custom value providers and validation attributes can also be created to extend model binding functionality.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .