The document discusses implementing stored procedures in SQL. It covers creating stored procedures, executing them, passing parameters, modifying procedures, and returning values. Stored procedures offer benefits like improved performance, reduced network traffic, consistency and security. The document provides examples of creating different types of stored procedures, including generic procedures that accept variable input parameters.
The document discusses implementing triggers and transactions in SQL. It provides examples of creating INSERT, DELETE, and UPDATE triggers to enforce data integrity rules. The key points covered include:
- Creating triggers with the CREATE TRIGGER statement and modifying triggers with ALTER TRIGGER.
- Using magic tables (inserted and deleted tables) within triggers to access new and old row data.
- Examples of triggers that check for data integrity rules during INSERT, UPDATE and DELETE operations and roll back transactions if rules are violated.
- Dropping triggers with the DROP TRIGGER statement.
The document discusses transactions in SQL Server and how to implement them. It describes how transactions ensure data consistency and prevent inconsistencies by allowing all modifications to be committed together or none at all. The key aspects covered include:
- Using BEGIN TRANSACTION and COMMIT TRANSACTION statements to explicitly define a transaction.
- Using ROLLBACK TRANSACTION to revert all changes made in a transaction.
- Examples of transactions that update multiple tables and ensuring the changes can be reverted if a condition is not met.
- Discussing savepoints that allow rolling back parts of a transaction instead of the whole transaction.
This document discusses querying databases using SQL. It covers identifying features of client/server architecture, planning SQL queries, and using SELECT statements with logical operators and conditions. Specific topics include creating query outputs, drafting queries to display selected columns, rows, or rows satisfying multiple conditions from tables, and using comparison, logical, and range operators in queries. The document provides examples of SQL queries and discusses executing and verifying query results.
This document discusses various techniques for retrieving result sets in SQL, including using wildcards, NULL values, ordering results, limiting results, removing duplicates, aggregate functions, grouping results, and generating summary reports. The objectives are to use these techniques to query and retrieve data that meets certain conditions and is formatted as required. Examples are provided to illustrate drafting and executing queries using these techniques.
The document discusses using subqueries and managing databases in SQL. It covers using subqueries with clauses like IN and EXISTS, nested and correlated subqueries, and the SELECT INTO statement. It also discusses creating, viewing, renaming, deleting, and modifying databases, as well as the system databases and files that store database objects and data in SQL Server.
This document discusses how to manage data in tables using SQL. It covers creating rules and defaults to enforce constraints without changing the table structure. It also covers using INSERT, UPDATE and DELETE statements to maintain data in tables. Specifically, it provides examples of creating a rule to enforce a zip code format, creating a default value for a country code, and inserting a new record into the RecruitmentAgencies table.
The document discusses common commands used in the Linux operating system. It describes commands for directories (mkdir, rmdir, ls), files (cp, mv, rm), displaying contents (more, less), wildcards (? and *), and getting help (man). It also explains functions of editors and how to use the vi editor to create and edit documents.
The document discusses implementing triggers and transactions in SQL. It provides examples of creating INSERT, DELETE, and UPDATE triggers to enforce data integrity rules. The key points covered include:
- Creating triggers with the CREATE TRIGGER statement and modifying triggers with ALTER TRIGGER.
- Using magic tables (inserted and deleted tables) within triggers to access new and old row data.
- Examples of triggers that check for data integrity rules during INSERT, UPDATE and DELETE operations and roll back transactions if rules are violated.
- Dropping triggers with the DROP TRIGGER statement.
The document discusses transactions in SQL Server and how to implement them. It describes how transactions ensure data consistency and prevent inconsistencies by allowing all modifications to be committed together or none at all. The key aspects covered include:
- Using BEGIN TRANSACTION and COMMIT TRANSACTION statements to explicitly define a transaction.
- Using ROLLBACK TRANSACTION to revert all changes made in a transaction.
- Examples of transactions that update multiple tables and ensuring the changes can be reverted if a condition is not met.
- Discussing savepoints that allow rolling back parts of a transaction instead of the whole transaction.
This document discusses querying databases using SQL. It covers identifying features of client/server architecture, planning SQL queries, and using SELECT statements with logical operators and conditions. Specific topics include creating query outputs, drafting queries to display selected columns, rows, or rows satisfying multiple conditions from tables, and using comparison, logical, and range operators in queries. The document provides examples of SQL queries and discusses executing and verifying query results.
This document discusses various techniques for retrieving result sets in SQL, including using wildcards, NULL values, ordering results, limiting results, removing duplicates, aggregate functions, grouping results, and generating summary reports. The objectives are to use these techniques to query and retrieve data that meets certain conditions and is formatted as required. Examples are provided to illustrate drafting and executing queries using these techniques.
The document discusses using subqueries and managing databases in SQL. It covers using subqueries with clauses like IN and EXISTS, nested and correlated subqueries, and the SELECT INTO statement. It also discusses creating, viewing, renaming, deleting, and modifying databases, as well as the system databases and files that store database objects and data in SQL Server.
This document discusses how to manage data in tables using SQL. It covers creating rules and defaults to enforce constraints without changing the table structure. It also covers using INSERT, UPDATE and DELETE statements to maintain data in tables. Specifically, it provides examples of creating a rule to enforce a zip code format, creating a default value for a country code, and inserting a new record into the RecruitmentAgencies table.
The document discusses common commands used in the Linux operating system. It describes commands for directories (mkdir, rmdir, ls), files (cp, mv, rm), displaying contents (more, less), wildcards (? and *), and getting help (man). It also explains functions of editors and how to use the vi editor to create and edit documents.
The document discusses operators in Java, including unary, binary, arithmetic, bitwise, shift, and instanceof operators. It provides examples of how to use various operators like increment, decrement, arithmetic assignment, bitwise AND, OR, NOT, XOR, right shift, left shift, and unsigned shift. It also covers operator precedence and demonstrates how operators in an expression are evaluated based on their predetermined precedence order.
The document discusses variables, constants, data types, operators, and representing decisions in flowcharts. It provides examples of flowcharts that accept input values, perform calculations using variables and operators, and make decisions based on conditional logic. The key concepts covered include declaring variables, numeric and character data types, arithmetic, relational and logical operators, and using decision boxes in flowcharts to represent conditional statements. Exercises are included to apply these concepts in drawing flowcharts to solve problems involving decisions and calculations.
The document discusses technologies for wide area network (WAN) infrastructure and network security. It covers major WAN switching technologies like circuit switching, virtual circuits, packet switching, and cell switching. It also covers major WAN transmission technologies such as dial-up connections, dedicated/leased lines, Integrated Services Digital Network (ISDN), cable access, Digital Subscriber Line (DSL), and X.25 switched networks. Finally, it discusses identifying network threats and elements of network security like virus protection plans and local network security components.
1. The document discusses installing Windows Logic and Techniques programming using attended installation. It covers input, process, output cycles, flowcharts, and drawing simple flowcharts.
2. Flowcharts use symbols to represent activities like input, processing, output, decisions, and subroutines. Examples show flowcharts for making tea, manipulating numbers, and calculating sales.
3. Exercises provide practice drawing flowcharts for student admission, adding numbers, summing entered numbers, and multiplying a number.
Structured Query Language (SQL) is a computer language which is used for managing and manipulating data in relational databases. SQL helps the application to communicate with the database. Copy the link given below and paste it in new browser window to get more information on SQL:- www.transtutors.com/homework-help/computer-science/sql.aspx
MS SQL Server is a database server produced by Microsoft that enables users to write and execute SQL queries and statements. It consists of several features like Query Analyzer, Profiler, and Service Manager. Multiple instances of SQL Server can be installed on a machine, with each instance having its own set of users, databases, and other objects. SQL Server uses data files, filegroups, and transaction logs to store database objects and record transactions. The data dictionary contains metadata about database schemas and is stored differently in Oracle and SQL Server.
The document provides an overview of SQL Server including:
- The architecture including system databases like master, model, msdb, and tempdb.
- Recovery models like full, bulk-logged, and simple.
- Backup and restore options including full, differential, transaction log, and file group backups.
- T-SQL system stored procedures for administration tasks.
- SQL commands and functions.
- SQL Agent jobs which are scheduled tasks consisting of steps to perform automated tasks.
The document discusses legacy connectivity and protocols. It describes legacy integration as integrating J2EE components with legacy systems. The key approaches to legacy integration are data level integration, application interface integration, method level integration, and user interface level integration. Legacy connectivity can be achieved using Java Native Interface (JNI), J2EE Connector Architecture, and web services. JNI allows Java code to call native methods written in other languages like C/C++. The J2EE Connector Architecture standardizes connectivity through resource adapters. Web services provide a platform-independent approach through XML protocols.
The document discusses various disaster recovery strategies for SQL Server including failover clustering, database mirroring, and peer-to-peer transactional replication. It provides advantages and disadvantages of each approach. It also outlines the steps to configure replication for Always On Availability Groups which involves setting up publications and subscriptions, configuring the availability group, and redirecting the original publisher to the listener name.
This document provides code and outputs for an online examination system developed using C# and ASP.NET. The system allows administrators to create, store and manage exam questions and schedule exams. Students can register accounts, choose subjects to take exams, and view their results. Key technologies used include Microsoft Visual Studio 2010, SQL Server database, and C# programming language.
Optimizing Code Reusability for SharePoint using Linq to SharePoint & the MVP...Sparkhound Inc.
Whether developing a small customization or a large enterprise solution, one goal is to minimize redundancy in Code. In this presentation, Sparkhound Consultant Ted Wagner shows how the MVP design pattern is used in SharePoint to create business models that can be reused easily between other ASP or C# application.
The document introduces Test Driven Development (TDD), Continuous Integration (CI), Inversion of Control (IoC), and Aspect Oriented Programming (AOP). It discusses TDD principles and tools for writing tests first before code. CI aims to integrate code changes frequently to prevent integration problems. IoC and dependency injection improve software design by reducing coupling between components. AOP allows cross-cutting concerns like logging to be coded separately from the main program logic.
Winter Simulation Conference 2021 - Process Wind Tunnel TalkSudhendu Rai
The talk associated with this presentation can be accessed at:
https://youtu.be/VXEVuXW9knU
Abstract
In this talk, we will introduce a simulation-based process improvement framework and methodology called the Process Wind Tunnel. We will describe this framework and introduce the underlying technologies namely process mapping and data collection, data wrangling, exploratory data analysis and visualization, process mining, discrete-event simulation optimization and solution implementation. We will discuss how Process Wind Tunnel framework was utilized to improve a critical business process namely, the post-execution trade settlement process. The work builds upon and generalizes the Lean Document Production solution (2008 Edelman finalist) for optimizing printshops to more general and complex business processes found within the insurance and financial services industry.
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docxketurahhazelhurst
CASE STUDY
Internet/Excel Exercises, page 434, text
Record your findings in a Word document and submit it online
IBM has substantial operations in many countries, including the United States, Canada, and Germany. Go to finance.yahoo.com/q?s=ibm.
1. Click on Historical Prices. (Or apply this exercise to a different MNC.) Set the date range so that you can obtain quarterly values of the U.S. stock index for the last 20 quarters. Insert the quarterly data on a spreadsheet. Compute the percentage change in IBM’s stock price for each quarter. Next go to finance.yahoo.com/stock-center/ and click (under U.S.) on S&P Composite 1500 Index, which represents the U.S. stock market index, so that you can derive the quarterly percentage change in the U.S. stock index over the last 20 quarters. Then run a regression analysis with IBM’s quarterly return (percentage change in stock price) as the dependent variable and the quarterly percentage change in the U.S. stock market’s value as the independent variable. (Appendix C explains how Excel can be used to run regression analysis.) The slope coefficient serves as an estimate of the sensitivity of IBM’s value to the U.S. market returns. Also, check the fit of the relationship based on the R-squared statistic.
2. Go to finance.yahoo.com/stock-center/ and click (under “Europe”) on DAX, which represents the German stock market index. Repeat the process described in exercise 1 so that you can assess IBM’s sensitivity to the German stock market. Compare the slope coefficient between the two analyses. Is IBM’s value more sensitive to the U.S. market or the German market? Does the U.S. market or the German market explain a higher proportion of the variation in IBM’s returns (check the R-squared statistic)? Offer an explanation of your results.
Lab 5 Database Security
Use the script from week 1 for the week 5 lab.
1. Create four new users
a. The first user will have full rights to the database
b. The second user grant access to the Client’s table and allow them the rights to INSERT data into the clients table
c. The third user grant rights to create user logins and reset passwords
d. The fourth user grant column rights to the Course_Activity table allow access to the Course Code and Grade column. Allow user to UPDATE a maximum of 5 times per hour.
2. Login with each user to demonstrate the rights you have given them
a. User 1 login and create a VIEW for user 2 that just displays the Client table
b. User 2 login and add 3 more clients to the Clients table
c. User 3 login create two new users
d. User 4 login and UPDATE two new entries for Course Code and Grade Column for Client 1 and 2
e. For each user run the Show Privileges command to show correct rights and permissions have been applied
3. Show Log Files: For each user show log files (since we do not have MySQL Enterprise we cannot use the Audit function but as a substitute we can use the built-in log file function)
4. Create a Stored Procedure with User ...
Towards explanations for Data-Centric AI using provenance recordsPaolo Missier
In this presentation, given to graduate students at Universita' RomaTre, Italy, we suggest that concepts well-known in Data Provenance can be exploited to provide explanations in the context of data-centric AI processes. Through use cases (incremental data cleaning, training set pruning), we build up increasingly complex provenance patterns, culminating in an open question:
how to describe "why" a specific data item has been manipulated as part of data processing, when such processing may consist of a complex data transformation algorithm.
This presentation discusses code optimization and performance tuning. It covers identifying time and space complexity of algorithms, examining programming constructs like loops and functions, and using performance libraries. Some key points include defining time complexity as the time taken by algorithm steps, optimizing loops by techniques like unrolling and reducing work inside loops, and the advantages of using pre-existing performance libraries like reducing errors and development time.
How Manual Testers Can Break into Automation Without Programming SkillsRanorex
Adoption of automating tests has not happened as quickly as organizations need. As more companies move toward implementing agile development as their software development lifecycle, more features are being implemented and released more quickly. This leaves less time for full regression testing of the system, nonetheless this should still be done. Manual testers need to transform into test automation testers as well.
Learn how to make this jump as a manual tester and focus on the right areas first e.g. automation test structure, object recognition and results interpretation.
This document discusses unit testing ILE procedures in IBM i. It introduces unit testing as a way to identify bugs early and test code as it is written. It outlines how to create a test script in RPG that calls the procedures being tested and produces a report of the inputs, expected outputs, and actual results. The document provides terminology for different types of testing and guidelines for compiling test scripts separately from production code. It emphasizes that unit testing should be integrated into the development process.
Trivadis is an IT consulting firm with over 650 employees across 15 locations. The document provides an overview of Trivadis' mission, expertise, products, key figures, and introduces Markus Flechtner, a principal consultant specializing in Oracle database performance tuning. It then outlines an agenda for a performance issues checklist, covering how to specify problems, performance analysis methodology, and the tools Statspack and Tuning Pack.
The document discusses the use of scripting in SQL Server Integration Services (SSIS). It covers how scripts allow extending package functionality beyond default tasks. Specific topics covered include using scripts to manage packages programmatically via the object model or command line utilities, configuring script tasks, using the log method and handling events from within a script task, and creating a data transformation script component. Demos are provided for various scripting features.
Slide deck to give some theoretical background before stepping into the hands-on tutorial at http://sdnhub.org/tutorials/opendaylight. Compared to earlier version of this slide deck, this tutorial slide deck has been updated to focus more on MD-SAL and YANG modeled app development.
The document discusses computer simulation as a tool for process improvement. It defines computer simulation, outlines the basic steps which include defining the problem, mapping the process, defining inputs, building a model, validating the model, performing simulations, and interpreting results. Reasons for using simulation include testing changes without risk or time, understanding bottlenecks, and verifying expected improvements. Simulation should not be used without proper training or understanding, or when simpler methods can be used.
The document discusses operators in Java, including unary, binary, arithmetic, bitwise, shift, and instanceof operators. It provides examples of how to use various operators like increment, decrement, arithmetic assignment, bitwise AND, OR, NOT, XOR, right shift, left shift, and unsigned shift. It also covers operator precedence and demonstrates how operators in an expression are evaluated based on their predetermined precedence order.
The document discusses variables, constants, data types, operators, and representing decisions in flowcharts. It provides examples of flowcharts that accept input values, perform calculations using variables and operators, and make decisions based on conditional logic. The key concepts covered include declaring variables, numeric and character data types, arithmetic, relational and logical operators, and using decision boxes in flowcharts to represent conditional statements. Exercises are included to apply these concepts in drawing flowcharts to solve problems involving decisions and calculations.
The document discusses technologies for wide area network (WAN) infrastructure and network security. It covers major WAN switching technologies like circuit switching, virtual circuits, packet switching, and cell switching. It also covers major WAN transmission technologies such as dial-up connections, dedicated/leased lines, Integrated Services Digital Network (ISDN), cable access, Digital Subscriber Line (DSL), and X.25 switched networks. Finally, it discusses identifying network threats and elements of network security like virus protection plans and local network security components.
1. The document discusses installing Windows Logic and Techniques programming using attended installation. It covers input, process, output cycles, flowcharts, and drawing simple flowcharts.
2. Flowcharts use symbols to represent activities like input, processing, output, decisions, and subroutines. Examples show flowcharts for making tea, manipulating numbers, and calculating sales.
3. Exercises provide practice drawing flowcharts for student admission, adding numbers, summing entered numbers, and multiplying a number.
Structured Query Language (SQL) is a computer language which is used for managing and manipulating data in relational databases. SQL helps the application to communicate with the database. Copy the link given below and paste it in new browser window to get more information on SQL:- www.transtutors.com/homework-help/computer-science/sql.aspx
MS SQL Server is a database server produced by Microsoft that enables users to write and execute SQL queries and statements. It consists of several features like Query Analyzer, Profiler, and Service Manager. Multiple instances of SQL Server can be installed on a machine, with each instance having its own set of users, databases, and other objects. SQL Server uses data files, filegroups, and transaction logs to store database objects and record transactions. The data dictionary contains metadata about database schemas and is stored differently in Oracle and SQL Server.
The document provides an overview of SQL Server including:
- The architecture including system databases like master, model, msdb, and tempdb.
- Recovery models like full, bulk-logged, and simple.
- Backup and restore options including full, differential, transaction log, and file group backups.
- T-SQL system stored procedures for administration tasks.
- SQL commands and functions.
- SQL Agent jobs which are scheduled tasks consisting of steps to perform automated tasks.
The document discusses legacy connectivity and protocols. It describes legacy integration as integrating J2EE components with legacy systems. The key approaches to legacy integration are data level integration, application interface integration, method level integration, and user interface level integration. Legacy connectivity can be achieved using Java Native Interface (JNI), J2EE Connector Architecture, and web services. JNI allows Java code to call native methods written in other languages like C/C++. The J2EE Connector Architecture standardizes connectivity through resource adapters. Web services provide a platform-independent approach through XML protocols.
The document discusses various disaster recovery strategies for SQL Server including failover clustering, database mirroring, and peer-to-peer transactional replication. It provides advantages and disadvantages of each approach. It also outlines the steps to configure replication for Always On Availability Groups which involves setting up publications and subscriptions, configuring the availability group, and redirecting the original publisher to the listener name.
This document provides code and outputs for an online examination system developed using C# and ASP.NET. The system allows administrators to create, store and manage exam questions and schedule exams. Students can register accounts, choose subjects to take exams, and view their results. Key technologies used include Microsoft Visual Studio 2010, SQL Server database, and C# programming language.
Optimizing Code Reusability for SharePoint using Linq to SharePoint & the MVP...Sparkhound Inc.
Whether developing a small customization or a large enterprise solution, one goal is to minimize redundancy in Code. In this presentation, Sparkhound Consultant Ted Wagner shows how the MVP design pattern is used in SharePoint to create business models that can be reused easily between other ASP or C# application.
The document introduces Test Driven Development (TDD), Continuous Integration (CI), Inversion of Control (IoC), and Aspect Oriented Programming (AOP). It discusses TDD principles and tools for writing tests first before code. CI aims to integrate code changes frequently to prevent integration problems. IoC and dependency injection improve software design by reducing coupling between components. AOP allows cross-cutting concerns like logging to be coded separately from the main program logic.
Winter Simulation Conference 2021 - Process Wind Tunnel TalkSudhendu Rai
The talk associated with this presentation can be accessed at:
https://youtu.be/VXEVuXW9knU
Abstract
In this talk, we will introduce a simulation-based process improvement framework and methodology called the Process Wind Tunnel. We will describe this framework and introduce the underlying technologies namely process mapping and data collection, data wrangling, exploratory data analysis and visualization, process mining, discrete-event simulation optimization and solution implementation. We will discuss how Process Wind Tunnel framework was utilized to improve a critical business process namely, the post-execution trade settlement process. The work builds upon and generalizes the Lean Document Production solution (2008 Edelman finalist) for optimizing printshops to more general and complex business processes found within the insurance and financial services industry.
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docxketurahhazelhurst
CASE STUDY
Internet/Excel Exercises, page 434, text
Record your findings in a Word document and submit it online
IBM has substantial operations in many countries, including the United States, Canada, and Germany. Go to finance.yahoo.com/q?s=ibm.
1. Click on Historical Prices. (Or apply this exercise to a different MNC.) Set the date range so that you can obtain quarterly values of the U.S. stock index for the last 20 quarters. Insert the quarterly data on a spreadsheet. Compute the percentage change in IBM’s stock price for each quarter. Next go to finance.yahoo.com/stock-center/ and click (under U.S.) on S&P Composite 1500 Index, which represents the U.S. stock market index, so that you can derive the quarterly percentage change in the U.S. stock index over the last 20 quarters. Then run a regression analysis with IBM’s quarterly return (percentage change in stock price) as the dependent variable and the quarterly percentage change in the U.S. stock market’s value as the independent variable. (Appendix C explains how Excel can be used to run regression analysis.) The slope coefficient serves as an estimate of the sensitivity of IBM’s value to the U.S. market returns. Also, check the fit of the relationship based on the R-squared statistic.
2. Go to finance.yahoo.com/stock-center/ and click (under “Europe”) on DAX, which represents the German stock market index. Repeat the process described in exercise 1 so that you can assess IBM’s sensitivity to the German stock market. Compare the slope coefficient between the two analyses. Is IBM’s value more sensitive to the U.S. market or the German market? Does the U.S. market or the German market explain a higher proportion of the variation in IBM’s returns (check the R-squared statistic)? Offer an explanation of your results.
Lab 5 Database Security
Use the script from week 1 for the week 5 lab.
1. Create four new users
a. The first user will have full rights to the database
b. The second user grant access to the Client’s table and allow them the rights to INSERT data into the clients table
c. The third user grant rights to create user logins and reset passwords
d. The fourth user grant column rights to the Course_Activity table allow access to the Course Code and Grade column. Allow user to UPDATE a maximum of 5 times per hour.
2. Login with each user to demonstrate the rights you have given them
a. User 1 login and create a VIEW for user 2 that just displays the Client table
b. User 2 login and add 3 more clients to the Clients table
c. User 3 login create two new users
d. User 4 login and UPDATE two new entries for Course Code and Grade Column for Client 1 and 2
e. For each user run the Show Privileges command to show correct rights and permissions have been applied
3. Show Log Files: For each user show log files (since we do not have MySQL Enterprise we cannot use the Audit function but as a substitute we can use the built-in log file function)
4. Create a Stored Procedure with User ...
Towards explanations for Data-Centric AI using provenance recordsPaolo Missier
In this presentation, given to graduate students at Universita' RomaTre, Italy, we suggest that concepts well-known in Data Provenance can be exploited to provide explanations in the context of data-centric AI processes. Through use cases (incremental data cleaning, training set pruning), we build up increasingly complex provenance patterns, culminating in an open question:
how to describe "why" a specific data item has been manipulated as part of data processing, when such processing may consist of a complex data transformation algorithm.
This presentation discusses code optimization and performance tuning. It covers identifying time and space complexity of algorithms, examining programming constructs like loops and functions, and using performance libraries. Some key points include defining time complexity as the time taken by algorithm steps, optimizing loops by techniques like unrolling and reducing work inside loops, and the advantages of using pre-existing performance libraries like reducing errors and development time.
How Manual Testers Can Break into Automation Without Programming SkillsRanorex
Adoption of automating tests has not happened as quickly as organizations need. As more companies move toward implementing agile development as their software development lifecycle, more features are being implemented and released more quickly. This leaves less time for full regression testing of the system, nonetheless this should still be done. Manual testers need to transform into test automation testers as well.
Learn how to make this jump as a manual tester and focus on the right areas first e.g. automation test structure, object recognition and results interpretation.
This document discusses unit testing ILE procedures in IBM i. It introduces unit testing as a way to identify bugs early and test code as it is written. It outlines how to create a test script in RPG that calls the procedures being tested and produces a report of the inputs, expected outputs, and actual results. The document provides terminology for different types of testing and guidelines for compiling test scripts separately from production code. It emphasizes that unit testing should be integrated into the development process.
Trivadis is an IT consulting firm with over 650 employees across 15 locations. The document provides an overview of Trivadis' mission, expertise, products, key figures, and introduces Markus Flechtner, a principal consultant specializing in Oracle database performance tuning. It then outlines an agenda for a performance issues checklist, covering how to specify problems, performance analysis methodology, and the tools Statspack and Tuning Pack.
The document discusses the use of scripting in SQL Server Integration Services (SSIS). It covers how scripts allow extending package functionality beyond default tasks. Specific topics covered include using scripts to manage packages programmatically via the object model or command line utilities, configuring script tasks, using the log method and handling events from within a script task, and creating a data transformation script component. Demos are provided for various scripting features.
Slide deck to give some theoretical background before stepping into the hands-on tutorial at http://sdnhub.org/tutorials/opendaylight. Compared to earlier version of this slide deck, this tutorial slide deck has been updated to focus more on MD-SAL and YANG modeled app development.
The document discusses computer simulation as a tool for process improvement. It defines computer simulation, outlines the basic steps which include defining the problem, mapping the process, defining inputs, building a model, validating the model, performing simulations, and interpreting results. Reasons for using simulation include testing changes without risk or time, understanding bottlenecks, and verifying expected improvements. Simulation should not be used without proper training or understanding, or when simpler methods can be used.
The document discusses computer simulation as a tool for process improvement. It defines computer simulation as using a computer model to simulate a real system. The basic steps for computer simulation are: 1) define the problem, 2) map the process, 3) define inputs, 4) build the model, 5) validate the model, 6) perform simulations, 7) interpret results, and 8) recommend and document solutions. Reasons for using simulation include testing changes without risk or time constraints, understanding bottlenecks, and validating expected improvements. Simulation should not be used without proper training or understanding, or when simpler methods can achieve the goal.
This document discusses various topics related to unit testing, including different unit testing frameworks for different programming languages like JUnit for Java, CppUnit for C++, PyUnit for Python. It also discusses test-driven development (TDD) and the benefits of unit testing such as improving code quality, facilitating refactoring and reducing regressions. MapReduce unit testing using Mockito and the dedicated MRUnit framework is also covered.
Guide to Generate Extent Report in KotlinRapidValue
Kotlin is a general-purpose, open-source, statically typed programming language that combines object-oriented and functional programming features. So, it is a strong and powerful language that helps the automation engineers to write their automation scripts and also develop the Extent Report. This article helps the automation engineers to up skill and develop the extent reports using a different language like Kotlin.
Flink Forward San Francisco 2018: David Reniz & Dahyr Vergara - "Real-time m...Flink Forward
“Customer experience is the next big battle ground for telcos,” proclaimed recently Amit Akhelikar, Global Director of Lynx Analytics at TM Forum Live! Asia in Singapore. But, how to fight in this battle? A common approach has been to keep “under control” some well-known network quality indicators, like dropped calls, radio access congestion, availability, and so on; but this has proven not to be enough to keep customers happy, like a siege weapon is not enough to conquer a city. But, what if it were possible to know how customers perceive services, at least most demanded ones, like web browsing or video streaming? That would be like a squad of archers ready to battle. And even having that, how to extract value of it and take actions in no time, giving our skilled archers the right targets? Meet CANVAS (Customer And Network Visualization and AnaltyticS), one of the first LATAM implementations of a Flink-based stream processing use case for a telco, which successfully combines leading and innovative technologies like Apache Hadoop, YARN, Kafka, Nifi, Druid and advanced visualizations with Flink core features like non-trivial stateful stream processing (joins, windows and aggregations on event time) and CEP capabilities for alarm generation, delivering a next-generation tool for SOC (Service Operation Center) teams.
In this quality assurance training session, you will learn QTP/UFT automation testing. Topics covered in this course are:
• Introduction to QTP
• Features of QTP
• Recording modes of QTP
• Object Repository
• Synchronization point
• Step Generator
• Object Spy
• Checkpoints
• Data-driven testing & Parameterization
• Working with actions
• Reporting in QTP
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
Evaluating Test Driven Development And Parameterized Unit Testing In Dot Net ...mdfachowdhury
This document evaluates test driven development (TDD) and parameterized unit testing (PUT) in the .NET web platform. It covers topics such as TDD in the .NET environment, database unit testing with DBUnit and DB Pro, automated web testing with Selenium and Visual Studio, unit testing with NUnit and Microsoft Test, and load testing. The document also discusses MVC .NET testing, Microsoft PEX for parameterized unit testing, and the strengths and limitations of various testing tools.
Stored procedures allow Actuate reports to execute database tasks like modifying, inserting, or deleting records. Actuate supports stored procedures for various databases like Oracle, Sybase, and Progress. Developers can work with stored procedures using Actuate's automated design facilities, override Basic methods, or directly access stored procedures by preparing statements, defining parameters, executing procedures, and retrieving output or returned rows.
The document discusses messaging and internationalization. It covers messaging using Java Message Service (JMS), including the need for messaging, messaging architecture, types of messaging, messaging models, messaging servers, components of a JMS application, developing effective messaging solutions, and implementing JMS. It also discusses internationalizing J2EE applications.
The document discusses Java 2 Enterprise Edition (J2EE) application security. It covers security threat assessment, the Java 2 security model, and Java security APIs. The Java 2 security model provides access controls and allows downloading and running applications securely. It uses techniques like cryptography, digital signatures, and SSL. The Java Cryptography Extensions API provides methods for encrypting data, generating keys, and authentication.
The document discusses various security tools in Java including keytool, jarsigner, and policytool. Keytool is used to manage keystores containing private keys and certificates. It can generate key pairs, import/export certificates, and list keystore contents. Jarsigner signs JAR files using certificates from a keystore. Policytool creates and edits security policy files specifying user permissions. The document provides details on using each tool's commands and options.
This document discusses EJB technology and provides summaries of key concepts:
1. It defines the EJB container model and describes features like security, distributed access, and lifecycle management.
2. It compares the lifecycles of stateless session beans, stateful session beans, entity beans, and message-driven beans.
3. It contrasts stateful and stateless session beans and discusses differences in client state, pooling, lifecycles, and more. It also compares session beans and entity beans in terms of representing processes versus data.
This document discusses behavioral design patterns and J2EE design patterns. It provides descriptions and class diagrams for several behavioral patterns, including Iterator, Mediator, Memento, Observer, State, Strategy, Template Method, and Visitor. It also defines what a J2EE design pattern is and notes that J2EE patterns are categorized into the presentation, business, and integration tiers of an enterprise application.
This document provides an overview of EJB in J2EE architecture and EJB design patterns. It discusses the key characteristics of using EJB in J2EE architecture, including supporting multiple clients, improving reliability and productivity, supporting large scale deployment, developing transactional applications, and implementing security. It also outlines several EJB design patterns, such as client-side interaction patterns, EJB layer architectural patterns, inter-tier data transfer patterns, and transaction/persistence patterns.
This document discusses design patterns and provides examples of structural and behavioral design patterns. It describes the adapter, bridge, composite, decorator, facade, flyweight, proxy, chain of responsibility, and command patterns. Structural patterns are concerned with relationships and responsibilities between objects, while behavioral patterns focus on communication between objects. Examples of UML diagrams are provided to illustrate how each pattern can be modeled.
The document discusses UML diagrams that can be used to model J2EE applications, including use case diagrams, class diagrams, package diagrams, sequence diagrams, collaboration diagrams, state diagrams, activity diagrams, component diagrams, and deployment diagrams. It provides examples of each diagram type using a case study of an online bookstore system. The use case diagram shows use cases and actors, the class diagram shows classes and relationships, and other diagrams demonstrate how specific interactions, workflows, and system configurations can be modeled through different UML diagrams.
This document discusses design patterns and selecting appropriate patterns based on business requirements. It provides an overview of design patterns available in TheServerSide.com pattern catalog, which are organized into categories like EJB layer architectural patterns, inter-tier data transfer patterns, transaction and persistence patterns, and client-side EJB interaction patterns. Examples of patterns in each category are described. Best practices for developing class diagrams and using proven design patterns are also mentioned.
This document provides an overview of J2EE architecture. It defines architecture as the study of designing J2EE applications and discusses architectural concepts like attributes, models, and terminology. It describes the role of an architect and phases of architectural design. The document outlines the various components of J2EE like clients, web components, business components and containers. It also discusses key aspects of J2EE architecture like application areas, issues, technologies and available application servers.
The document discusses various topics related to collaboration and distributed systems including network communication in distributed environments, application integration using XML, and legacy integration technologies. Specifically, it covers factors that affect network performance like bandwidth and latency. It also describes using XML for data mapping between applications and data stores. Finally, it discusses different legacy integration methods like screen scraping, object mapping tools, and using off-board servers.
The document discusses JavaBean properties, property editors, and the classes used to implement them in Java. It describes the PropertyEditorSupport class and its methods for creating customized property editors. The PropertyDescriptor class and BeanInfo interface provide information about JavaBean properties, events, and methods. The document also provides tips on using sample JavaBeans from BDK1.1 in Java 2 SDK and creating a manifest file for multiple JavaBeans. Common questions about JavaBeans are answered.
The document discusses JavaBean properties and custom events. It defines different types of JavaBean properties like simple, boolean, indexed, bound, and constrained properties. It also explains how to create custom events by defining an event class, event listener interface, and event handler. The event handler notifies listeners when an event occurs. Finally, it demonstrates creating a login JavaBean that uses a custom event to validate that a username and password are not the same.
The document introduces JavaBeans, which are reusable software components created using Java. It discusses JavaBean concepts like properties, methods, and events. It also describes the Beans Development Kit (BDK) environment for creating, configuring, and testing JavaBeans. BDK includes components like the ToolBox, BeanBox, Properties window, and Method Tracer window. The document provides demonstrations of creating a sample JavaBean applet and user-defined JavaBean using BDK. It also covers topics like creating manifest and JAR files for packaging JavaBeans.
The document provides information on working with joins, the JDBC API, and isolation levels in Java database applications. It discusses different types of joins like inner joins, cross joins, and outer joins. It describes the key interfaces in the JDBC API like Statement, PreparedStatement, ResultSet, Connection, and DatabaseMetaData. It also covers isolation levels and how they prevent issues with concurrently running transactions accessing a database.
The document discusses various advanced features of JDBC including using prepared statements, managing transactions, performing batch updates, and calling stored procedures. Prepared statements improve performance by compiling SQL statements only once. Transactions allow grouping statements to execute atomically through commit and rollback. Batch updates reduce network calls by executing multiple statements as a single unit. Stored procedures are called using a CallableStatement object which can accept input parameters and return output parameters.
The document introduces JDBC and its key concepts. It discusses the JDBC architecture with two layers - the application layer and driver layer. It describes the four types of JDBC drivers and how they work. The document outlines the classes and interfaces that make up the JDBC API and the basic steps to create a JDBC application, including loading a driver, connecting to a database, executing statements, and handling exceptions. It provides examples of using JDBC to perform common database operations like querying, inserting, updating, and deleting data.
The document discusses classes and objects in Java, including defining classes with data members and methods, creating objects, using constructors, and the structure of a Java application. It also covers access specifiers, modifiers, compiling Java files, and provides a summary of key points about classes and objects in Java.
The document discusses casting and conversion in Java. It covers implicit and explicit type conversions, including widening, narrowing, and casting conversions. It also discusses overloading constructors in Java by defining multiple constructor methods with the same name but different parameters. The document provides examples of casting integer and double values to byte type, as well as overloading the Cuboid constructor to calculate volumes for rectangles and squares.
The document discusses various Java programming constructs including conditional statements, looping statements, methods, and parameters. It provides examples of if-else statements, switch-case statements, for, while, and do-while loops. It also explains how to define parameterized methods, pass arguments to methods, and define methods that return values.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers