This are my keynote slides from SQL Saturday Oregon 2023 on AI and the Intersection of AI, Machine Learning and Economnic Challenges as a Technical Specialist
The document discusses 9 new technology trends for 2022: 1) Artificial Intelligence and Machine Learning, 2) Robotic Process Automation, 3) Edge Computing, 4) Quantum Computing, 5) Virtual Reality and Augmented Reality, 6) Blockchain, 7) Internet of Things, 8) 5G, and 9) Cyber Security. It provides details on each trend, how they are developing new applications and jobs, and career opportunities within each field. The trends involve both developing new technologies as well as integrating existing technologies in new ways across many industries.
We have recently completed a Market reports which is comprised of 3 different articles based on;
• IoT of Supply Chain
• The emergence of the Cisco coined term “DevNet”
• Interviews with Senior Figures in the Big Data/Data Science market.
We have had various senior figures across our industry provide quotes and add their thoughts to the articles.
If interested in any of the topics written about here, please do not hesitate to get in contact!
Since the new year, we at Glocomms have observed a few related trends in our respected verticals.
From the emergence of connective and programmable networking being used in IoT to the power of Big Data which could not be more topical in the age of surveillance capitalism.
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same CoinIMC Institute
This document discusses cloud computing and its impact. It notes that cloud computing is already widely used, with over 50 billion connected devices expected by 2020. Cloud computing is transforming IT and software industries, allowing access from anywhere on any device. While public clouds provide scalability and cost benefits, security and vendor lock-in are concerns. The document outlines Thailand's growing cloud ecosystem and adoption of cloud services by enterprises and software companies.
In the first interview in this series, which kicks off PwC’s 2018 CEO Survey, chief executive Safra Catz explains the broad culture shift brought on by AI and cloud technologies.
1) The document discusses the high demand for IT professionals through 2012 according to surveys. It also discusses the top spending priorities for IT departments which include PCs, security, cloud computing, virtualization, and mobility.
2) The document outlines high demand careers in IT security, software development, IT leadership positions, and IT management. It also discusses the need for infrastructure and applications specialists to support growing mobile devices.
3) The author, Scott Nash, provides IT staffing solutions and recruitment services. He has 20 years of experience in IT service delivery models and domestic outsourcing of IT services.
Generative AI - The New Reality: How Key Players Are Progressing Vishal Sharma
The document discusses key players in generative AI and their progress. It provides an overview of generative AI including its evolution since 1950, where the spending is focused, how the technology works, and deployment models. It then profiles several major companies leading advancements in generative AI, including their strategies, growth areas, and risks. These companies are TSMC, Nvidia, Microsoft, Google, Amazon, Tesla, Oracle, Salesforce, SAP, and Palo Alto Networks.
The document discusses 9 new technology trends for 2022: 1) Artificial Intelligence and Machine Learning, 2) Robotic Process Automation, 3) Edge Computing, 4) Quantum Computing, 5) Virtual Reality and Augmented Reality, 6) Blockchain, 7) Internet of Things, 8) 5G, and 9) Cyber Security. It provides details on each trend, how they are developing new applications and jobs, and career opportunities within each field. The trends involve both developing new technologies as well as integrating existing technologies in new ways across many industries.
We have recently completed a Market reports which is comprised of 3 different articles based on;
• IoT of Supply Chain
• The emergence of the Cisco coined term “DevNet”
• Interviews with Senior Figures in the Big Data/Data Science market.
We have had various senior figures across our industry provide quotes and add their thoughts to the articles.
If interested in any of the topics written about here, please do not hesitate to get in contact!
Since the new year, we at Glocomms have observed a few related trends in our respected verticals.
From the emergence of connective and programmable networking being used in IoT to the power of Big Data which could not be more topical in the age of surveillance capitalism.
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same CoinIMC Institute
This document discusses cloud computing and its impact. It notes that cloud computing is already widely used, with over 50 billion connected devices expected by 2020. Cloud computing is transforming IT and software industries, allowing access from anywhere on any device. While public clouds provide scalability and cost benefits, security and vendor lock-in are concerns. The document outlines Thailand's growing cloud ecosystem and adoption of cloud services by enterprises and software companies.
In the first interview in this series, which kicks off PwC’s 2018 CEO Survey, chief executive Safra Catz explains the broad culture shift brought on by AI and cloud technologies.
1) The document discusses the high demand for IT professionals through 2012 according to surveys. It also discusses the top spending priorities for IT departments which include PCs, security, cloud computing, virtualization, and mobility.
2) The document outlines high demand careers in IT security, software development, IT leadership positions, and IT management. It also discusses the need for infrastructure and applications specialists to support growing mobile devices.
3) The author, Scott Nash, provides IT staffing solutions and recruitment services. He has 20 years of experience in IT service delivery models and domestic outsourcing of IT services.
Generative AI - The New Reality: How Key Players Are Progressing Vishal Sharma
The document discusses key players in generative AI and their progress. It provides an overview of generative AI including its evolution since 1950, where the spending is focused, how the technology works, and deployment models. It then profiles several major companies leading advancements in generative AI, including their strategies, growth areas, and risks. These companies are TSMC, Nvidia, Microsoft, Google, Amazon, Tesla, Oracle, Salesforce, SAP, and Palo Alto Networks.
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
The document provides predictions from various IT industry experts for trends in 2020. Key predictions include:
- Containers and hybrid cloud adoption will continue to grow.
- Ransomware attacks will remain a major issue, especially for managed service providers.
- Workplace technologies will transform how employees work, engage with technology, and the rise of augmented workers.
- Multi-cloud environments will drive the need for more diverse data protection capabilities.
- Automation and open source tools will fuel growth in network automation.
- Cloud adoption will continue but organizations need to carefully consider total costs and business needs.
- Desktops will increasingly move to the cloud through services like Windows Virtual Desktop.
- Privacy and the
The Microsoft Azure Security Engineer Associate (AZ-500) certification is a cloud security certification that validates your ability to design, implement, and manage a secure Azure environment. It is designed for IT security professionals who want to work with Azure.
The exam covers the following topics:
Security for identity and access
Platform protection
Data and applications
Security operations
Azure security ensures protection of data, applications, and resources in the Azure cloud platform through measures like identity management, network security, data encryption, threat detection, DDoS protection, and compliance adherence.
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
Cloud computing has proven revolutionary for organizations hoping to leverage technology, innovation and digital strategies to stay ahead of the competition. Business units can quickly provision up compute, storage and network resources as they need without IT bottlenecks. But easy access to cloud resources has a dark side—one that’s become a growing problem: Shadow IT. Engineers, developers and even business stakeholders are launching resources that IT is unaware of. And what IT doesn’t know can come back to haunt organizations, preventing the IT department from performing critical functions such as controlling security, compliance and costs.
AI in Business - Key drivers and future valueAPPANION
Artificial Intelligence is undoubtedly a hyped topic at the moment. But what is the reasoning for investors and digital platform players to bet very large amounts of money on this technology right now? To better understand the current market dynamics and to give an overview of renown predictions for the upcoming 2-3 years, we compiled a practical overview of this topic. This report covers the major driving forces of AI, assumptions for the future from the industry thought leaders as well as practical advice on how to start AI projects within your company.
which technology is in demand 2023 the fast-paced world of technology, staying abreast of the latest trends and innovations is not just an option; This is a necessary step
Michael Dell predicts that by 2025, 75% of data will be processed outside traditional datacenters and clouds, pointing to huge growth in edge computing. Edge computing is being accelerated by advances in 5G technology and lower costs of intelligent devices. For edge computing to grow rapidly, various stakeholders like tower companies, network operators, manufacturers, and hyperscalers must collaborate and ensure technologies are integrated, consistent globally, and securely connect diverse edge devices using different protocols. Success at the edge will depend on 5G integration, open collaboration, global consistency, flexible connectivity, and strong security.
Are you exploring the best way for your business to save expenses, enhance margin, or reinvest in the coming years? Check out the top technological advancements in business that are beneficial for business expansion and that result in a technology roadmap that has an impact on a number of the organization's strategic goals.
For more information, see: https://www.albiorixtech.com/blog/technology-trends-in-business/
#technology #technologytrends #webappdevelopment #mobileappdevelopment #softwaredevelopment
Cloud Computing is an information technology gold rush. Everything from social media and smart phones to streaming video and additive games come from the cloud. This revolution has also driven many to wonder how they can retool themselves to take advantage of this massive shift. Many in IT see the technology as an opportunity to accelerate their careers but in their attempt to navigate their cloud computing future, the question of what type of training, vendor-neutral or vendor-specific, is right for them
Since AI is becoming the first choice of most leading businesses in every vertical to take the advantage of the growing technology in recent times.
Check out, all the benefits of AI in cloud computing along with the stated downside of using the same.
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
- The document discusses the future of cloud computing and its potential benefits like cost savings, flexibility, and scalability compared to traditional IT models. However, some industry leaders like Richard Stallman and Larry Ellison have criticized cloud computing as hype.
- Market forecasts predict that cloud computing revenues will grow significantly over the next few years and that 20% of businesses will own no IT assets by 2012. The public cloud computing market in India is currently small but expected to grow rapidly.
- For companies considering cloud adoption, the document recommends starting with storage consolidation and virtualization before moving workloads to private and public clouds over time based on factors like security and control needs.
The future is in the cloud, or at least it's migrating there. Offering scalability, flexibility and agility, the cloud is the obvious solution for businesses seeking to make sense of the deluge of data. Cloud services can also help companies meet sustainability goals and even cut costs. But cloud strategies need to be carefully crafted to avoid the risks of remote storage and realise the potential of cloud-enabled efficiencies.
We are going through a crucial phase of IT innovations leading to business disruption forcing the ‘C’ Level executives to come out of their comfort zone.
It is no more about “How to keep the lights on ?“
It is all about “How to survive this digital storm?”
Shift in IT solutions from “Centralized to Distributed” , “Private to Public”, “Safe to Fail” , “Lean IT to Clean IT” drives the race.
The document discusses predictions for how cloud computing will impact businesses in 2017 and beyond. It predicts that (1) enterprise cloud computing will become the most secure place for IT processing, (2) digital transformation will become the norm for more companies, and (3) 60% of organizations will move their systems management to the cloud while 50% of development and testing workloads will move to the cloud.
The control points that CISOs were responsible for have largely disappeared so innovative CISOs have to deploy a risk-based security approach. And CIOs must move from thinking of their data center as the corporate epicenter, and admit that the Internet is their new corporate network.
This document provides an overview and outline for the course INSE 6620 (Cloud Computing Security and Privacy). It discusses prerequisites, course administration details, exam and grading policies, and projected topics. The course will require strong problem solving and research paper comprehension skills. Exams will focus on applying concepts from lectures and readings. The grading will be based on two exams and a project involving a proposal, report, and presentation. Academic integrity is strictly enforced. Late submissions are allowed with penalties.
Digital Businesses Need to Rethink Their Network StrategiesAbhishek Sood
This report from ZK Research explores why it’s critical that digital businesses rethink their network strategies and embrace a software-defined future. Access now to discover:
The challenges of traditional networks
Why SD-WANs are the foundation for new enterprise networks
How you can chart a path to the SD-WAN
Key criteria for evaluating SD-WAN solution providers
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
The document discusses how to monitor digital dependencies across a modern IT stack. It notes the challenges of enabling digital services across hybrid work locations, networks, cloud infrastructure and more. When issues arise, outages can significantly impact organizations through lost revenue, customer churn and more. The presentation recommends taking a modern operations approach by collecting data across all infrastructure to identify problems, correlating alerts to prioritize issues, and defining workflows to quickly resolve problems. It demonstrates Cisco's ThousandEyes solution for enhancing operations with expanded visibility.
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
The document discusses how to monitor digital dependencies across a modern IT stack. It notes the challenges of enabling digital services across hybrid work locations, networks, cloud infrastructure and more. When issues arise, outages can significantly impact organizations through lost revenue, customer churn and productivity losses. The presentation recommends taking a modern operations approach by collecting data across all infrastructure to identify problems, correlating alerts to prioritize issues, and defining workflows to quickly resolve problems. It demonstrates Cisco's ThousandEyes solution for enhancing operations through expanded visibility across networks and applications.
This document discusses migrating high IO SQL Server workloads to Azure. It begins by explaining that every company has at least one "whale" workload that requires high CPU, memory and IO. These whales can be challenging to move to the cloud. The document then provides tips on determining if a workload's issue is truly high IO or caused by another factor. It discusses various wait events that may indicate IO problems and tools for monitoring IO performance. Finally, it covers some considerations for IO in the cloud.
This document provides an overview of options for running Oracle solutions on Microsoft Azure infrastructure as a service (IaaS). It discusses architectural considerations for high availability, disaster recovery, storage, licensing, and migrating workloads from Oracle Exadata. Key points covered include using Oracle Data Guard for replication and failover, storage options like Azure NetApp Files that can support Exadata workloads, and identifying databases that are not dependent on Exadata features for lift and shift to Azure IaaS. The document aims to help customers understand how to optimize their use of Oracle solutions when deploying to Azure.
More Related Content
Similar to SQLSatOregon_kgorman_keynote_NIAIMLEC.pptx
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
The document provides predictions from various IT industry experts for trends in 2020. Key predictions include:
- Containers and hybrid cloud adoption will continue to grow.
- Ransomware attacks will remain a major issue, especially for managed service providers.
- Workplace technologies will transform how employees work, engage with technology, and the rise of augmented workers.
- Multi-cloud environments will drive the need for more diverse data protection capabilities.
- Automation and open source tools will fuel growth in network automation.
- Cloud adoption will continue but organizations need to carefully consider total costs and business needs.
- Desktops will increasingly move to the cloud through services like Windows Virtual Desktop.
- Privacy and the
The Microsoft Azure Security Engineer Associate (AZ-500) certification is a cloud security certification that validates your ability to design, implement, and manage a secure Azure environment. It is designed for IT security professionals who want to work with Azure.
The exam covers the following topics:
Security for identity and access
Platform protection
Data and applications
Security operations
Azure security ensures protection of data, applications, and resources in the Azure cloud platform through measures like identity management, network security, data encryption, threat detection, DDoS protection, and compliance adherence.
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
Cloud computing has proven revolutionary for organizations hoping to leverage technology, innovation and digital strategies to stay ahead of the competition. Business units can quickly provision up compute, storage and network resources as they need without IT bottlenecks. But easy access to cloud resources has a dark side—one that’s become a growing problem: Shadow IT. Engineers, developers and even business stakeholders are launching resources that IT is unaware of. And what IT doesn’t know can come back to haunt organizations, preventing the IT department from performing critical functions such as controlling security, compliance and costs.
AI in Business - Key drivers and future valueAPPANION
Artificial Intelligence is undoubtedly a hyped topic at the moment. But what is the reasoning for investors and digital platform players to bet very large amounts of money on this technology right now? To better understand the current market dynamics and to give an overview of renown predictions for the upcoming 2-3 years, we compiled a practical overview of this topic. This report covers the major driving forces of AI, assumptions for the future from the industry thought leaders as well as practical advice on how to start AI projects within your company.
which technology is in demand 2023 the fast-paced world of technology, staying abreast of the latest trends and innovations is not just an option; This is a necessary step
Michael Dell predicts that by 2025, 75% of data will be processed outside traditional datacenters and clouds, pointing to huge growth in edge computing. Edge computing is being accelerated by advances in 5G technology and lower costs of intelligent devices. For edge computing to grow rapidly, various stakeholders like tower companies, network operators, manufacturers, and hyperscalers must collaborate and ensure technologies are integrated, consistent globally, and securely connect diverse edge devices using different protocols. Success at the edge will depend on 5G integration, open collaboration, global consistency, flexible connectivity, and strong security.
Are you exploring the best way for your business to save expenses, enhance margin, or reinvest in the coming years? Check out the top technological advancements in business that are beneficial for business expansion and that result in a technology roadmap that has an impact on a number of the organization's strategic goals.
For more information, see: https://www.albiorixtech.com/blog/technology-trends-in-business/
#technology #technologytrends #webappdevelopment #mobileappdevelopment #softwaredevelopment
Cloud Computing is an information technology gold rush. Everything from social media and smart phones to streaming video and additive games come from the cloud. This revolution has also driven many to wonder how they can retool themselves to take advantage of this massive shift. Many in IT see the technology as an opportunity to accelerate their careers but in their attempt to navigate their cloud computing future, the question of what type of training, vendor-neutral or vendor-specific, is right for them
Since AI is becoming the first choice of most leading businesses in every vertical to take the advantage of the growing technology in recent times.
Check out, all the benefits of AI in cloud computing along with the stated downside of using the same.
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
- The document discusses the future of cloud computing and its potential benefits like cost savings, flexibility, and scalability compared to traditional IT models. However, some industry leaders like Richard Stallman and Larry Ellison have criticized cloud computing as hype.
- Market forecasts predict that cloud computing revenues will grow significantly over the next few years and that 20% of businesses will own no IT assets by 2012. The public cloud computing market in India is currently small but expected to grow rapidly.
- For companies considering cloud adoption, the document recommends starting with storage consolidation and virtualization before moving workloads to private and public clouds over time based on factors like security and control needs.
The future is in the cloud, or at least it's migrating there. Offering scalability, flexibility and agility, the cloud is the obvious solution for businesses seeking to make sense of the deluge of data. Cloud services can also help companies meet sustainability goals and even cut costs. But cloud strategies need to be carefully crafted to avoid the risks of remote storage and realise the potential of cloud-enabled efficiencies.
We are going through a crucial phase of IT innovations leading to business disruption forcing the ‘C’ Level executives to come out of their comfort zone.
It is no more about “How to keep the lights on ?“
It is all about “How to survive this digital storm?”
Shift in IT solutions from “Centralized to Distributed” , “Private to Public”, “Safe to Fail” , “Lean IT to Clean IT” drives the race.
The document discusses predictions for how cloud computing will impact businesses in 2017 and beyond. It predicts that (1) enterprise cloud computing will become the most secure place for IT processing, (2) digital transformation will become the norm for more companies, and (3) 60% of organizations will move their systems management to the cloud while 50% of development and testing workloads will move to the cloud.
The control points that CISOs were responsible for have largely disappeared so innovative CISOs have to deploy a risk-based security approach. And CIOs must move from thinking of their data center as the corporate epicenter, and admit that the Internet is their new corporate network.
This document provides an overview and outline for the course INSE 6620 (Cloud Computing Security and Privacy). It discusses prerequisites, course administration details, exam and grading policies, and projected topics. The course will require strong problem solving and research paper comprehension skills. Exams will focus on applying concepts from lectures and readings. The grading will be based on two exams and a project involving a proposal, report, and presentation. Academic integrity is strictly enforced. Late submissions are allowed with penalties.
Digital Businesses Need to Rethink Their Network StrategiesAbhishek Sood
This report from ZK Research explores why it’s critical that digital businesses rethink their network strategies and embrace a software-defined future. Access now to discover:
The challenges of traditional networks
Why SD-WANs are the foundation for new enterprise networks
How you can chart a path to the SD-WAN
Key criteria for evaluating SD-WAN solution providers
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
The document discusses how to monitor digital dependencies across a modern IT stack. It notes the challenges of enabling digital services across hybrid work locations, networks, cloud infrastructure and more. When issues arise, outages can significantly impact organizations through lost revenue, customer churn and more. The presentation recommends taking a modern operations approach by collecting data across all infrastructure to identify problems, correlating alerts to prioritize issues, and defining workflows to quickly resolve problems. It demonstrates Cisco's ThousandEyes solution for enhancing operations with expanded visibility.
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
The document discusses how to monitor digital dependencies across a modern IT stack. It notes the challenges of enabling digital services across hybrid work locations, networks, cloud infrastructure and more. When issues arise, outages can significantly impact organizations through lost revenue, customer churn and productivity losses. The presentation recommends taking a modern operations approach by collecting data across all infrastructure to identify problems, correlating alerts to prioritize issues, and defining workflows to quickly resolve problems. It demonstrates Cisco's ThousandEyes solution for enhancing operations through expanded visibility across networks and applications.
Similar to SQLSatOregon_kgorman_keynote_NIAIMLEC.pptx (20)
This document discusses migrating high IO SQL Server workloads to Azure. It begins by explaining that every company has at least one "whale" workload that requires high CPU, memory and IO. These whales can be challenging to move to the cloud. The document then provides tips on determining if a workload's issue is truly high IO or caused by another factor. It discusses various wait events that may indicate IO problems and tools for monitoring IO performance. Finally, it covers some considerations for IO in the cloud.
This document provides an overview of options for running Oracle solutions on Microsoft Azure infrastructure as a service (IaaS). It discusses architectural considerations for high availability, disaster recovery, storage, licensing, and migrating workloads from Oracle Exadata. Key points covered include using Oracle Data Guard for replication and failover, storage options like Azure NetApp Files that can support Exadata workloads, and identifying databases that are not dependent on Exadata features for lift and shift to Azure IaaS. The document aims to help customers understand how to optimize their use of Oracle solutions when deploying to Azure.
This document provides guidance and best practices for migrating database workloads to infrastructure as a service (IaaS) in Microsoft Azure. It discusses choosing the appropriate virtual machine series and storage options to meet performance needs. The document emphasizes migrating the workload, not the hardware, and using cloud services to simplify management like automated patching and backup snapshots. It also recommends bringing existing monitoring and management tools to the cloud when possible rather than replacing them. The key takeaways are to understand the workload demands, choose optimal IaaS configurations, leverage cloud-enabled tools, and involve database experts when issues arise to address the root cause rather than just adding resources.
This document discusses strategies for managing ADHD as an adult. It begins by describing the three main types of ADHD - inattentive, hyperactive-impulsive, and combined. It then lists some of the biggest challenges of ADHD like executive dysfunction, disorganization, lack of attention, procrastination, and internal preoccupation. The document provides tips and strategies for overcoming each challenge through organization, scheduling, list-making, breaking large tasks into small ones, and using technology tools. It emphasizes finding accommodations that work for the individual and their specific ADHD presentation and challenges.
This document provides guidance and best practices for using Infrastructure as a Service (IaaS) on Microsoft Azure for database workloads. It discusses key differences between IaaS, Platform as a Service (PaaS), and Software as a Service (SaaS). The document also covers Azure-specific concepts like virtual machine series, availability zones, storage accounts, and redundancy options to help architects design cloud infrastructures that meet business requirements. Specialized configurations like constrained VMs and ultra disks are also presented along with strategies for ensuring high performance and availability of database workloads on Azure IaaS.
Kellyn Gorman shares her experience living with ADHD and strategies for turning it into a positive. She discusses how ADHD impacted her childhood and how it still presents challenges as an adult. However, with the right tools and understanding of her needs, she is able to find success. She provides tips for organizing, prioritizing tasks, managing distractions, and accessing support. The key is learning about ADHD and how to structure one's environment and routine to play to one's strengths rather than fighting against the condition.
Migrating Oracle workloads to Azure requires understanding the workload and hardware requirements. It is important to analyze the workload using the Automatic Workload Repository (AWR) report to accurately size infrastructure needs. The right virtual machine series and storage options must be selected to meet the identified input/output and capacity needs. Rather than moving existing hardware, the focus should be migrating the Oracle workload to take advantage of cloud capabilities while ensuring performance and high availability.
This document discusses overcoming silos when implementing DevOps for a new product at a company. The teams involved were dispersed globally and siloed in their tools and processes. Challenges included isolating workload sizes, choosing a Linux image, and team ownership issues. The solution involved aligning teams, automating deployment with Bash scripts called by Terraform and Azure DevOps, and evolving the automation. This improved communication, decreased teams from 120 people to 7, and increased deployments and profits for the successful project.
This document discusses best practices for migrating database workloads to Azure Infrastructure as a Service (IaaS). Some key points include:
- Choosing the appropriate VM series like E or M series optimized for database workloads.
- Using availability zones and geo-redundant storage for high availability and disaster recovery.
- Sizing storage correctly based on the database's input/output needs and using premium SSDs where needed.
- Migrating existing monitoring and management tools to the cloud to provide familiarity and automating tasks like backups, patching, and problem resolution.
This document provides an overview of how to successfully migrate Oracle workloads to Microsoft Azure. It begins with an introduction of the presenter and their experience. It then discusses why customers might want to migrate to the cloud and the different Azure database options available. The bulk of the document outlines the key steps in planning and executing an Oracle workload migration to Azure, including sizing, deployment, monitoring, backup strategies, and ensuring high availability. It emphasizes adapting architectures for the cloud rather than directly porting on-premises systems. The document concludes with recommendations around automation, education resources, and references for Oracle-Azure configurations.
This document discusses the future of data and the Azure data ecosystem. It highlights that by 2025 there will be 175 zettabytes of data in the world and the average person will have over 5,000 digital interactions per day. It promotes Azure services like Power BI, Azure Synapse Analytics, Azure Data Factory and Azure Machine Learning for extracting value from data through analytics, visualization and machine learning. The document provides overviews of key Azure data and analytics services and how they fit together in an end-to-end data platform for business intelligence, artificial intelligence and continuous intelligence applications.
This is the second session of the learning pathway at PASS Summit 2019, which is still a stand alone session to teach you how to write proper Linux BASH scripts
This document discusses techniques for optimizing Power BI performance. It recommends tracing queries using DAX Studio to identify slow queries and refresh times. Tracing tools like SQL Profiler and log files can provide insights into issues occurring in the data sources, Power BI layer, and across the network. Focusing on optimization by addressing wait times through a scientific process can help resolve long-term performance problems.
The document provides tips and tricks for scripting success on Linux. It begins with introducing the speaker and emphasizing that the session will focus on best practices for those already familiar with BASH scripting. It then details various tips across multiple areas: setting the shell and environment variables, adding headers and comments to scripts, validating input, implementing error handling and debugging, leveraging utilities like CRON for scheduling, and ensuring scripts continue running across sessions. The tips are meant to help authors write more readable, maintainable, and reliable scripts.
This document discusses connecting Oracle Analytics Cloud (OAC) Essbase data to Microsoft Power BI. It provides an overview of Power BI and OAC, describes various methods for connecting the two including using a REST API and exporting data to Excel or CSV files, and demonstrates some visualization capabilities in Power BI including trends over time. Key lessons learned are that data can be accessed across tools through various connections, analytics concepts are often similar between tools, and while partnerships exist between Microsoft and Oracle, integration between specific products like Power BI and OAC is still limited.
Mentors provide guidance and support, while sponsors use their influence to advocate for and promote a protege's career. Obtaining both mentors and sponsors is important for advancing in one's field and overcoming biases, yet women often have fewer sponsors than men. The document outlines strategies for how women can find and work with sponsors, and how men can act as allies in supporting women. Developing representation of women in technology fields through mentorship and sponsorship can help initiatives become self-sustaining over time.
Kellyn Pot'Vin-Gorman presented on GDPR compliance. Some key points include:
- GDPR went into effect in May 2018 and covers any data belonging to an EU citizen.
- Fines for non-compliance can be up to 4% of annual revenue or €20 million.
- DBAs play a role in identifying critical data, auditing processes, and reporting on compliance.
- An AI tool assessed the privacy policies of 14 major companies and found they all failed to meet GDPR requirements.
- Achieving compliance requires security frameworks, data mapping, encryption, access controls, and dedicated teams.
This document provides tips for optimizing performance in Power BI by focusing on different areas like data sources, the data model, visuals, dashboards, and using trace and log files. Some key recommendations include filtering data early, keeping the data model and queries simple, limiting visual complexity, monitoring resource usage, and leveraging log files to identify specific waits and bottlenecks. An overall approach of focusing on time-based optimization by identifying and addressing the areas contributing most to latency is advocated.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Leveraging the Graph for Clinical Trials and Standards
SQLSatOregon_kgorman_keynote_NIAIMLEC.pptx
1. z
Navigating the Intersections of
AI, Machine Learning, and
Economic Challenges as a
Technical Specialist
Adapting and Thriving:
2. z
z
Who am I?
Director of Technical Advocacy at Silk
30 Years in the Tech Industry
DBA (Oracle, SQL Server, MySQL…)
DevOps, Analytics and AI
Cloud Migrations and High IO Infrastructure
https://www.linkedin.com/in/kellyngorman/
https://dbakevlar.com
Various Social Media platforms as DBAKevlar!
3. z
In Last Year’s Episode…
Although we were being told our jobs were in jeopardy,
in truth, they would remain, just more cloud savvy.
”Clickbait” now tells us that AI will end our careers, but
there’s a lot of confusion around role vs. hype.
Layoffs to the tech industry were impactful, leading to
extensive stress in the community.
So how do we overcome it all?
5. z
Pandemic and the Economy
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Workers who Went Remote*
Global Supply Chains Disrupted
Stalled Innovations for Business
Startup Failures
Impact of Pandemic
Links in References
6. z
Not Only to
Our
Professional
Lives…
0% 5% 10% 15% 20% 25% 30% 35% 40%
Economic Decline
Unemployment/Joblessness
Mental Health Impact (U.S.)
Average School Year Lost
Personal Impact
Reference Page has Links
7. z
Remote Work
From 2020 on, Remote work was adopted.
Most tools and software couldn’t handle the additional workload of so many
remote workers.
Companies had to pivot to support remote work.
Huge Real Estate impact considering the amount of office space.
Benefits of less commuting, but also remote workers rights matured in 2022
2023 saw an increase in pressure to bring workers back into the office, due to
infrastructure, cyber security threats, etc.
8. z
Supply Chain and Jobs
Decreased workers, flights, shipping and ports
experienced congestion.
Geopolitical tensions and trade restrictions
resulted.
Shift in consumer behavior due to increase in
online shopping and demand for new products.
All this resulted in financial strains and
bankruptcies.
9. z
Decrease in IT Budgets and
Layoffs
During the pandemic, small businesses faced significant impact
and closures.
2022 began the impact to the tech sector, an area that was the
most resilient.
Many tech industries restructured, reallocated resources and
consolidated, leading to layoffs.
Assumption around AI demand drove some decisions as well.
Many roles that may not have had the assumption of AI
inclusion, now included AI features.
11. z
The Crisis of Big Tech
Big Tech has had a large group of specialized roles.
Needs skilled workers for consumers.
Wants to decrease dependency on remote work.
AI options for customer service, customer support.
In the short term, this may appear positive for Big Tech, but
customers and technologists may win in the long run.
https://www.forbes.com/sites/forbesbusinesscouncil/2023/04/27/the-future-of-tech-workers-how-to-address-
the-disconnect-between-perception-and-reality
12. z
z
As more organizations migrate to the
cloud, ensuring the security of data,
applications, and services and
infrastructure in ALL environments
becomes paramount as part of the AI
movement.
The Truth is…
13. z
AI In Enterprise
AI Pioneers
AI/ML is in production
69% 31%
AI Explorers
AI/ML is in Pilot or
POC
28% 30%
16%
27%
Widely
Implemented and
driving critical biz
Implemented
for a few use
cases
Single use
case or a
few depts.
Minor
components of
a broader
strategy
Global Trends in AI Report 2023
14. z
AI is Revenue Driven
0%
20%
40%
60%
80%
100%
120%
$11M-$99M $100M-$499M $500M-$999M $1B-$4.9B $5B+
Company Revenue
AI Pioneers AI Explorers
15. z
Top Challenges for IT with AI
0%
5%
10%
15%
20%
25%
30%
35%
Data Management Security Compute Performance Storage
Percentage of Challenge
16. z
With More AI Comes More Cloud
0%
10%
20%
30%
40%
50%
60%
Public Cloud Data Center 3rd Party Data Center IoT Device/Gtwy
Optimizing Infrastructure
AI Pioneers AI Explorers
All stats for these slides came from white paper from: http://www.spglobal.com/marketintelligence
18. z
AI’s Influence on the Tech
Professional’s Landscape
Automated Tasks: AI streamlines repetitive tasks, allowing technical professionals to focus on
complex problem-solving.
Data Analysis: Enhanced data analytics capabilities lead to more informed decision-making.
Continual Learning: AI's rapid evolution necessitates regular upskilling and adaptation.
New Opportunities: AI opens doors to innovative roles and projects, driving tech's frontier
forward.
Ethical and Security Considerations: Professionals must navigate the ethical implications of
AI deployment and usage.
20. z
z
Tech industry
salaries are
also on the rise.
https://fortune.com/2023/10/05/salaries-hiring-ai-really-happening-with-us-tech-jobs-careers-art-zeilie/
21. z
z
Average time an
unemployed tech
professional is
unemployed, secures
new employment of less
than 2 months.
https://techcrunch.com/2023/06/26/signalfires-state-of-talent-report-2023/
22. z
z Of the 78 million jobs
that AI will eliminate,
there’s an estimated 97
million new jobs AI will
create.
https://edisonandblack.com/pages/over-97-million-jobs-set-
to-be-created-by-ai.html
24. z
Cyber-Security Job Boom
The cybersecurity landscape is evolving rapidly, with old roles evolving quickly:
Threat Hunter: Proactively seeks vulnerabilities before exploited by malicious
actors.
Cloud Security Specialist: Focuses on securing data and applications in the cloud.
Security Consultant: Advises businesses on how to protect themselves from
cyberattacks,
Machine Learning/AI Security Specialist: Works at the intersection of AI and
cybersecurity.
Zero Trust Architect: Builds and implements zero-trust security model.
25. z
The Future of Data Science Jobs are
Promising and Multi-faceted:
64% increase in roles in Data analysts
180% increase in Data Scientists or specialization in data science.
AI Model Trainers: Experts who fine-tune models
Data Engineers: Prepare data for study
Machine Learning Engineers: Design and implement ML apps
Data Science Ethics Roles will be created.
Actual data analysis will become more automated.
26. z
The Relational Database for
the Win with Cyber Security
Principle of Least Privilege: Adopting a "never trust,
always verify" approach, where network access is
restricted based on need-to-know principles.
Micro-segmentation: Breaking up security
perimeters into smaller zones to maintain separate
access for separate parts of the network.
Existing security and policies: Protecting data will
become more prevalent to protect all the data.
27. z
Same DBA Channel, Different DBA Day
Technical positions will be up 84% and database will continue on.
Those with soft skills, along with superior tech skills will overcome.
Don’t rely on just what you already know.
Need to now know both cloud services and infrastructure, not just
database platform.
Automation of tedious tasks will continue to shift the DBA role and the title
with it.
https://pega.com/future-of-it
https://www.bls.gov/opub/mlr/2023/article/industry-and-occupational-employment-projections-overview-and-
highlights-2022-32.htm
28. z
The Return of the Relational
Database…
Structured data can assist in controlling ”data sprawl”.
Data Quality and Integrity is more robust through decades of features.
For advanced/complex AI and ML models, RDBMS scalability is often the go-to.
New extensions for machine learning and AI are included in Oracle and SQL Server.
Critical data and advanced RDBMS level security will win the day.
Support of structured and unstructured data- the RDBMS becomes the evolved
solution.
29. z
The DBA as the Cloud Specialist
Cloud Solution Architect (CSA) in Data and AI OR infrastructure: Most
common role for DBAs transitioning.
Cloud Developer/Engineer
Cloud Site Reliability Engineer: 2nd most popular for DBAs, especially
backup/recovery specialists
Certifications can help, but only slightly.
https://digitalcloud.training/navigating-uncertainty-the-future-of-cloud-jobs-amidst-recent-tech-layoffs/
30. z
Being the Bestest
Consultant
Go small tech and subcontract to Big Tech
Know that big tech laid off the people they needed to ”keep the lights on”
Need varying specialists and generalists.
Learn Data Analytics and AI
Learn Cloud- Azure and GCP, (similar) and AWS services and infrastructure.
31. z
Avoiding Layoffs- Make Yourself More
Bulletproof
Communicate the value you bring, including a weekly status.
Keep your LinkedIn profile up to date.
Network and network more- start looking for your next job a year+.
DON’T overwork on hours. Outside of special situations, I recommend
45 hours a week to avoid burn-out.
Don’t let others waste your time- justify what you spend time on.
32. z
Tips for For Everyone
Your Network is your Lifeline
Redo your CV/Resume and pepper AI in everywhere…
Pursue certifications if they provide you value and you are learning
something you can use.
Know cloud infrastructure and especially services.
Pay more attention to what the role does than the title it’s been
granted in job searches.
33. z
If You Want To Build Your Own Role
Are you hearing, “That’s outside your role” or ”We don’t have anyone to fill that role.” often?
You should be passionate about the main focus of the potential role.
It must encompass an area the business and a loss of revenue that can be proven.
You must have the knowledge, skill and initiative.
Carefully identify what the role should pay and be reasonable.
Build out a full job description and what the value the job role, if filled will bring, including
potential company revenue or savings.
34. z
Self Care (Yeah, it’s Part of This)
• Have hobbies outside of technical work,
(even if it’s doing geeky, technical stuff.)
• When you have a difficult day, do
something for you.
• Have a network of individuals that you
feel comfortable reaching out to for
support.
• Control issues != true leadership skills
40% of
technical
industry has
stated mental
health impact
since the
pandemic.
35. z
Remember, Don’t Stagnate
Learn new skills/technologies
Bridge out to new roles or challenges
Never neglect soft skills
Shift from Negative Online Presence
Foster networking skills
Acceptance that change is the one thing that is constant.
36. z
What We’ve Learned
AI Isn’t REALLY Coming for Our Jobs
AI May Change Many of Our Jobs
AI Will Add More Jobs Than it Will Remove.
We CAN Pivot to Make Ourselves More Resilient
to AI and Economic Downturn Change.
We Can Reinvent Ourselves With New Titles
While Doing Much the Same Job We Already Do
Keep Skills Current and Move With AI, not
Against It.