The document discusses new features in Informix 11.70, including:
- Table and storage space defragmentation tools to improve performance.
- Enhancements to storage space administration through utilities to generate schemas and commands.
- Tools for deploying and embedding Informix instances through the Deployment Assistant and Utility.
- Increased usability through features like automatic DBA procedures, table location, and event alarms.
This document provides a summary of Sitaram Chalasani's work experience and qualifications. He has over 8 years of experience administering servers running operating systems like Red Hat Linux, AIX, Solaris, and Unix. Some of his responsibilities have included implementing NTP servers, Red Hat clustering, backup solutions, and coordinating with vendors. He has a bachelor's degree from Nagarjuna University and certifications in Red Hat engineering and Microsoft server administration. He is proficient in technologies like Linux, AIX, Solaris, clustering, virtualization, storage solutions, backup tools, databases, networking tools, and monitoring tools.
The document discusses SUMA, a tool that automates the download of maintenance and technology levels from a fix server on AIX systems. It provides examples of using SUMA to list configuration settings, schedule periodic downloads of the latest fixes, and download specific fixes like APARs or filesets. SUMA allows flexibility in configuring fix types, actions, scheduling, logging and generating reports for download tasks.
AIX 6.1 introduces several new security features including role-based access control (RBAC) which allows privileged tasks to be delegated to non-privileged users. It also includes an encrypted filesystem that encrypts data for protection and an updated security tool called AIX Security Expert for centralized security management. The document discusses these features and others such as the new secure by default installation option and systems director console.
The document discusses tools for deploying Informix instances, including the Informix Deployment Assistant (DA) and Informix Deployment Utility (DU). The DA allows users to create snapshots of Informix instances and data for deployment on other computers. The DU is then used to rapidly deploy the packaged instances. Key points covered include the components and usage of each tool, as well as limitations such as difficulty deploying production instances or supporting raw devices. The configuration file used by the DU to customize deployments is also described.
The document provides an overview of installing and configuring Linux, including installing Linux, configuring the system, networking, sharing with Windows, printer configuration, user management, and system maintenance. Key steps covered are choosing hardware compatibility, disk partitioning, boot loader installation, root password setup, package selection, network configuration, sharing files with Windows using Samba, adding users and groups, and maintaining the system using package managers. Cost effective options like network booting and single CD distributions like Knoppix are also summarized.
Linux is a freely distributed implementation of a UNIX-like kernel developed by Linus Torvalds. The document discusses installation of Red Hat Enterprise Linux from DVD/CD, including language selection, partitioning, boot loader configuration, network configuration, package selection, and completion. It also covers file systems, including ext3, swap, RAID, and LVM, and the File System Hierarchy Standard.
BrainShare 2010 SLC - ELS306 Linux Disaster Recovery Made EasySchlomo Schapiro
The document discusses Linux disaster recovery solutions. It begins by describing different disaster recovery strategies for Linux systems, then discusses advantages of Linux for disaster recovery. It introduces the ReaR (Relax and Recover) open source disaster recovery tool, which uses disk imaging and file backups to easily restore a Linux system after a disaster. ReaR works with various backup software and supports creating bootable rescue media to restore a system. A demo of how ReaR performs disaster recovery is also provided.
This document provides a summary of Sitaram Chalasani's work experience and qualifications. He has over 8 years of experience administering servers running operating systems like Red Hat Linux, AIX, Solaris, and Unix. Some of his responsibilities have included implementing NTP servers, Red Hat clustering, backup solutions, and coordinating with vendors. He has a bachelor's degree from Nagarjuna University and certifications in Red Hat engineering and Microsoft server administration. He is proficient in technologies like Linux, AIX, Solaris, clustering, virtualization, storage solutions, backup tools, databases, networking tools, and monitoring tools.
The document discusses SUMA, a tool that automates the download of maintenance and technology levels from a fix server on AIX systems. It provides examples of using SUMA to list configuration settings, schedule periodic downloads of the latest fixes, and download specific fixes like APARs or filesets. SUMA allows flexibility in configuring fix types, actions, scheduling, logging and generating reports for download tasks.
AIX 6.1 introduces several new security features including role-based access control (RBAC) which allows privileged tasks to be delegated to non-privileged users. It also includes an encrypted filesystem that encrypts data for protection and an updated security tool called AIX Security Expert for centralized security management. The document discusses these features and others such as the new secure by default installation option and systems director console.
The document discusses tools for deploying Informix instances, including the Informix Deployment Assistant (DA) and Informix Deployment Utility (DU). The DA allows users to create snapshots of Informix instances and data for deployment on other computers. The DU is then used to rapidly deploy the packaged instances. Key points covered include the components and usage of each tool, as well as limitations such as difficulty deploying production instances or supporting raw devices. The configuration file used by the DU to customize deployments is also described.
The document provides an overview of installing and configuring Linux, including installing Linux, configuring the system, networking, sharing with Windows, printer configuration, user management, and system maintenance. Key steps covered are choosing hardware compatibility, disk partitioning, boot loader installation, root password setup, package selection, network configuration, sharing files with Windows using Samba, adding users and groups, and maintaining the system using package managers. Cost effective options like network booting and single CD distributions like Knoppix are also summarized.
Linux is a freely distributed implementation of a UNIX-like kernel developed by Linus Torvalds. The document discusses installation of Red Hat Enterprise Linux from DVD/CD, including language selection, partitioning, boot loader configuration, network configuration, package selection, and completion. It also covers file systems, including ext3, swap, RAID, and LVM, and the File System Hierarchy Standard.
BrainShare 2010 SLC - ELS306 Linux Disaster Recovery Made EasySchlomo Schapiro
The document discusses Linux disaster recovery solutions. It begins by describing different disaster recovery strategies for Linux systems, then discusses advantages of Linux for disaster recovery. It introduces the ReaR (Relax and Recover) open source disaster recovery tool, which uses disk imaging and file backups to easily restore a Linux system after a disaster. ReaR works with various backup software and supports creating bootable rescue media to restore a system. A demo of how ReaR performs disaster recovery is also provided.
This document lists and briefly describes the most commonly used AIX commands by the author. Some of the commands listed include acledit for changing access control lists, aclget for showing access control lists, alt_disk_install for installing an alternate root volume group, chdev for changing device parameters, chfs for changing file system sizes, cp for copying files, df for displaying disk space usage, and find to search for files and directories.
The document provides a summary of the hardware, licenses, and features of a Data Domain system. It includes:
- Hardware information such as memory, disks, network cards, and enclosure details.
- License keys for shelf capacities in the active and archive tiers, as well as feature licenses for encryption, expanded storage, and secure multi-tenancy.
- Descriptions of the different licenses and what features they enable, such as encryption of the filesystem or sharing the system among multiple tenants.
Ibm aix technical deep dive workshop advanced administration and problem dete...solarisyougood
1. The system initialization process begins with the system POST which checks and initializes hardware. The bootstrap code then loads the boot image from the boot list which typically includes the internal disk as the first option.
2. The boot image contains the AIX kernel, RAMFS, and a reduced ODM. The kernel is loaded into memory and initializes basic system services while the RAMFS acts as a temporary root file system.
3. If the system is unable to boot, common issues include hardware errors, an empty boot list, or a corrupted boot image on the boot logical volume. The system can be booted into maintenance mode from external media to access the root volume group and repair or rebuild the boot logical volume to
Relax and Recover (ReaR) is an open source bare metal disaster recovery solution for Linux (http://rear.sf.net). This session will introduce you to advanced Linux disaster recovery concepts and will feature a live demonstration on how to automatically recover a failed system with ReaR. Finally, this session will cover common best practice usage scenarios of ReaR and introduce you to basic setup and configuration for ReaR.
This presentation gives introduction to kernel module programming with sample kernel module.
It helps to start with kernel programming and how it can be used to develop various types of device drivers.
The document discusses Linux device drivers, including how they interface between user programs and hardware using a file interface, are implemented as loadable kernel modules (LKMs) that are inserted into the kernel, and how common operations like open, read, write, and release are mapped to kernel functions through a file operations structure.
SLIM (Single Linux Image Management) is a solution that allows a central server to manage and deploy a single Linux image across multiple networked client PCs. The key concept is for a SLIM server to hold a single Linux OS image that is exported via the network to client PCs to boot and run Linux locally. System administration and management is done on the SLIM server, allowing for centralized updates and management across all clients using the shared Linux image.
The document discusses how to configure, compile, and install a custom Linux kernel, including downloading the source code, configuring options such as file systems and drivers, compiling and installing the kernel, and enabling features like SMP and SELinux support. Instructions are provided for both manual and DEB package installation of the custom kernel. Key steps involve obtaining the source, running make menuconfig to configure options, compiling with make, and installing the new kernel and initrd files.
This document outlines the key components of a Linux character device driver, including modules, major and minor numbers, data structures like struct file and struct file_operations, driver registration, and core functions like open, release, read and write. It provides an introduction to character device drivers in Linux and their basic architecture.
A Linux device driver summary:
1. Device drivers are implemented as kernel modules that can be dynamically loaded and unloaded. They provide access to hardware devices through the file system.
2. There are three main types of device drivers: character, block, and network. Character drivers provide a stream of bytes interface, block drivers handle block-based storage, and network drivers manage network interfaces.
3. The file_operations structure contains function pointers that drivers implement to handle operations like open, close, read, and write on character devices. This structure associates the driver with a major/minor number range allocated using functions like alloc_chrdev_region.
This document discusses various methods for migrating an existing VAX system to a virtual VAX environment, including using tape backups, direct disk migration, DECnet backups, cluster migration, CD migration, and FTP transfers. It provides high-level steps for each migration method and considerations around advantages, disadvantages, and post-migration configuration tasks.
The document provides an overview of the key components of the Linux operating system, including:
1) The Linux kernel, which acts as a resource manager for processes, memory, and hardware devices.
2) Process and memory management systems that control how processes are allocated and memory is allocated and freed.
3) The file system which organizes how files are stored and accessed.
4) Device drivers that allow the operating system to interface with hardware.
5) The network stack which handles network protocols and connections.
6) Architecture-dependent code that provides hardware-specific implementations of core functions.
The document discusses device drivers in Windows Embedded CE 6.0, covering topics such as driver basics, implementing stream interface drivers, configuring and loading drivers, and implementing interrupt mechanisms in drivers. It provides details on driver architectures, the stream interface API, registry settings for loading drivers, and interrupt handling architecture in CE.
CS 167 is an operating systems course that involves writing five programs of increasing difficulty in C and completing homeworks and exams. Students will build their own operating system by developing a kernel and adding features like virtual file systems and virtual memory. The course requires skills in C programming, debugging, and computer architecture. An operating system provides convenient abstractions of hardware like files instead of disks and threads instead of processors to make the underlying system easier for programmers to use while managing concerns like performance, sharing, security and reliability.
The document discusses kernel, modules, and drivers in Linux. It provides an introduction to the Linux kernel, explaining what it is and its main functions. It then covers compiling the Linux kernel from source, including downloading the source code, configuring options, and compiling and installing the new kernel. It also discusses working with the GRUB 2 boot loader, including making temporary and persistent changes to the boot menu.
This document provides an overview of Linux device drivers. It discusses what a device driver is, the Linux driver architecture, different driver classes like character and block drivers, kernel modules, driver initialization and cleanup functions, compiling and loading modules, module parameters, differences between modules and applications, and key concepts like major/minor numbers and file operations.
The Linux kernel acts as an interface between applications and hardware, managing system resources and providing access through system calls; it uses a monolithic design where all components run in the kernel thread for high performance but can be difficult to maintain, though Linux allows dynamic loading of modules. Device drivers interface hardware like keyboards, hard disks, and network devices with the operating system, and are implemented as loadable kernel modules that are compiled using special makefiles and registered with the kernel through system calls.
Linux device drivers act as an interface between hardware devices and user programs. They communicate with hardware devices and expose an interface to user applications through system calls. Device drivers can be loaded as kernel modules and provide access to devices through special files in the /dev directory. Common operations for drivers include handling read and write requests either through interrupt-driven or polling-based I/O.
Gafisa reported financial and operating results for 3Q13. Key highlights included:
- Launches totaled R$498 million in 3Q13, up 8.1% q-o-q and 10.3% y-o-y.
- Consolidated pre-sales reached R$1.2 billion in 9M13.
- Net income was R$15.8 million in 3Q13, reversing a net loss in 2Q13.
- Positive free cash flow of R$32.1 million in 3Q13, compared to a cash burn in 2Q13.
SQLite es una pequeña librería de código abierto que implementa un motor de base de datos SQL. No requiere configuración y almacena datos en archivos directamente en el disco duro. Se utiliza comúnmente en aplicaciones pequeñas debido a su tamaño ligero y facilidad de uso.
SQLite es un sistema de gestión de bases de datos relacional compatible con ACID contenido en una librería de C de 500kb. Es creado por D. Richard Hipp como proyecto de dominio público, no requiere configuración, servidor o red, almacena el archivo de base de datos de forma individual, es compatible con múltiples plataformas, compacto, de código abierto y compila sentencias SQL a código de máquina virtual.
This document lists and briefly describes the most commonly used AIX commands by the author. Some of the commands listed include acledit for changing access control lists, aclget for showing access control lists, alt_disk_install for installing an alternate root volume group, chdev for changing device parameters, chfs for changing file system sizes, cp for copying files, df for displaying disk space usage, and find to search for files and directories.
The document provides a summary of the hardware, licenses, and features of a Data Domain system. It includes:
- Hardware information such as memory, disks, network cards, and enclosure details.
- License keys for shelf capacities in the active and archive tiers, as well as feature licenses for encryption, expanded storage, and secure multi-tenancy.
- Descriptions of the different licenses and what features they enable, such as encryption of the filesystem or sharing the system among multiple tenants.
Ibm aix technical deep dive workshop advanced administration and problem dete...solarisyougood
1. The system initialization process begins with the system POST which checks and initializes hardware. The bootstrap code then loads the boot image from the boot list which typically includes the internal disk as the first option.
2. The boot image contains the AIX kernel, RAMFS, and a reduced ODM. The kernel is loaded into memory and initializes basic system services while the RAMFS acts as a temporary root file system.
3. If the system is unable to boot, common issues include hardware errors, an empty boot list, or a corrupted boot image on the boot logical volume. The system can be booted into maintenance mode from external media to access the root volume group and repair or rebuild the boot logical volume to
Relax and Recover (ReaR) is an open source bare metal disaster recovery solution for Linux (http://rear.sf.net). This session will introduce you to advanced Linux disaster recovery concepts and will feature a live demonstration on how to automatically recover a failed system with ReaR. Finally, this session will cover common best practice usage scenarios of ReaR and introduce you to basic setup and configuration for ReaR.
This presentation gives introduction to kernel module programming with sample kernel module.
It helps to start with kernel programming and how it can be used to develop various types of device drivers.
The document discusses Linux device drivers, including how they interface between user programs and hardware using a file interface, are implemented as loadable kernel modules (LKMs) that are inserted into the kernel, and how common operations like open, read, write, and release are mapped to kernel functions through a file operations structure.
SLIM (Single Linux Image Management) is a solution that allows a central server to manage and deploy a single Linux image across multiple networked client PCs. The key concept is for a SLIM server to hold a single Linux OS image that is exported via the network to client PCs to boot and run Linux locally. System administration and management is done on the SLIM server, allowing for centralized updates and management across all clients using the shared Linux image.
The document discusses how to configure, compile, and install a custom Linux kernel, including downloading the source code, configuring options such as file systems and drivers, compiling and installing the kernel, and enabling features like SMP and SELinux support. Instructions are provided for both manual and DEB package installation of the custom kernel. Key steps involve obtaining the source, running make menuconfig to configure options, compiling with make, and installing the new kernel and initrd files.
This document outlines the key components of a Linux character device driver, including modules, major and minor numbers, data structures like struct file and struct file_operations, driver registration, and core functions like open, release, read and write. It provides an introduction to character device drivers in Linux and their basic architecture.
A Linux device driver summary:
1. Device drivers are implemented as kernel modules that can be dynamically loaded and unloaded. They provide access to hardware devices through the file system.
2. There are three main types of device drivers: character, block, and network. Character drivers provide a stream of bytes interface, block drivers handle block-based storage, and network drivers manage network interfaces.
3. The file_operations structure contains function pointers that drivers implement to handle operations like open, close, read, and write on character devices. This structure associates the driver with a major/minor number range allocated using functions like alloc_chrdev_region.
This document discusses various methods for migrating an existing VAX system to a virtual VAX environment, including using tape backups, direct disk migration, DECnet backups, cluster migration, CD migration, and FTP transfers. It provides high-level steps for each migration method and considerations around advantages, disadvantages, and post-migration configuration tasks.
The document provides an overview of the key components of the Linux operating system, including:
1) The Linux kernel, which acts as a resource manager for processes, memory, and hardware devices.
2) Process and memory management systems that control how processes are allocated and memory is allocated and freed.
3) The file system which organizes how files are stored and accessed.
4) Device drivers that allow the operating system to interface with hardware.
5) The network stack which handles network protocols and connections.
6) Architecture-dependent code that provides hardware-specific implementations of core functions.
The document discusses device drivers in Windows Embedded CE 6.0, covering topics such as driver basics, implementing stream interface drivers, configuring and loading drivers, and implementing interrupt mechanisms in drivers. It provides details on driver architectures, the stream interface API, registry settings for loading drivers, and interrupt handling architecture in CE.
CS 167 is an operating systems course that involves writing five programs of increasing difficulty in C and completing homeworks and exams. Students will build their own operating system by developing a kernel and adding features like virtual file systems and virtual memory. The course requires skills in C programming, debugging, and computer architecture. An operating system provides convenient abstractions of hardware like files instead of disks and threads instead of processors to make the underlying system easier for programmers to use while managing concerns like performance, sharing, security and reliability.
The document discusses kernel, modules, and drivers in Linux. It provides an introduction to the Linux kernel, explaining what it is and its main functions. It then covers compiling the Linux kernel from source, including downloading the source code, configuring options, and compiling and installing the new kernel. It also discusses working with the GRUB 2 boot loader, including making temporary and persistent changes to the boot menu.
This document provides an overview of Linux device drivers. It discusses what a device driver is, the Linux driver architecture, different driver classes like character and block drivers, kernel modules, driver initialization and cleanup functions, compiling and loading modules, module parameters, differences between modules and applications, and key concepts like major/minor numbers and file operations.
The Linux kernel acts as an interface between applications and hardware, managing system resources and providing access through system calls; it uses a monolithic design where all components run in the kernel thread for high performance but can be difficult to maintain, though Linux allows dynamic loading of modules. Device drivers interface hardware like keyboards, hard disks, and network devices with the operating system, and are implemented as loadable kernel modules that are compiled using special makefiles and registered with the kernel through system calls.
Linux device drivers act as an interface between hardware devices and user programs. They communicate with hardware devices and expose an interface to user applications through system calls. Device drivers can be loaded as kernel modules and provide access to devices through special files in the /dev directory. Common operations for drivers include handling read and write requests either through interrupt-driven or polling-based I/O.
Gafisa reported financial and operating results for 3Q13. Key highlights included:
- Launches totaled R$498 million in 3Q13, up 8.1% q-o-q and 10.3% y-o-y.
- Consolidated pre-sales reached R$1.2 billion in 9M13.
- Net income was R$15.8 million in 3Q13, reversing a net loss in 2Q13.
- Positive free cash flow of R$32.1 million in 3Q13, compared to a cash burn in 2Q13.
SQLite es una pequeña librería de código abierto que implementa un motor de base de datos SQL. No requiere configuración y almacena datos en archivos directamente en el disco duro. Se utiliza comúnmente en aplicaciones pequeñas debido a su tamaño ligero y facilidad de uso.
SQLite es un sistema de gestión de bases de datos relacional compatible con ACID contenido en una librería de C de 500kb. Es creado por D. Richard Hipp como proyecto de dominio público, no requiere configuración, servidor o red, almacena el archivo de base de datos de forma individual, es compatible con múltiples plataformas, compacto, de código abierto y compila sentencias SQL a código de máquina virtual.
SQLite es una biblioteca de código abierto que implementa un motor de base de datos SQL ligero, sin servidor y autocontenido. Fue desarrollado originalmente para su uso personal por Richard Hipp mientras trabajaba para la Armada de los Estados Unidos. SQLite almacena la base de datos completa en un solo archivo y se enlaza directamente con las aplicaciones para proporcionar acceso rápido a los datos. Es ampliamente utilizado en aplicaciones móviles y de escritorio debido a su pequeño tamaño, portabilidad y rendimiento.
SQLite es un sistema de gestión de bases de datos relacional ligero que almacena la base de datos completa en un solo archivo. Puede usarse como motor de base de datos local en aplicaciones de escritorio o como extensión de PHP sin necesidad de instalar un servidor de base de datos. Algunas de sus ventajas son su pequeño tamaño, rendimiento, portabilidad entre plataformas y que es de código abierto. Es utilizado por muchas aplicaciones como Firefox, Photoshop Elements y Skype.
Informix es una familia de productos RDBMS adquirida por IBM en 2001. Fue concebido en los años 1970 y su compañía fundada en 1980, siendo el segundo sistema de bases de datos más popular en los años 1990. Actualmente IBM sigue apostando por esta base de datos y la última versión lanzada fue la 10.0 en 2010.
SQLite es una pequeña biblioteca de aproximadamente 500KB programada en C que funciona como un sistema de gestión de base de datos relacional. No requiere un proceso separado como servidor, ya que lee y escribe directamente sobre archivos en el disco duro. Es multiplataforma, rápido, portable y de código abierto.
This document provides information about installing and configuring Linux, Apache web server, PostgreSQL database, and Apache Tomcat on a Linux system. It discusses installing Ubuntu using VirtualBox, creating users and groups, setting file permissions, important Linux files and directories. It also covers configuring Apache server and Tomcat, installing and configuring PostgreSQL, and some self-study questions about the Linux boot process, run levels, finding the kernel version and learning about NIS, NFS, and RPM package management.
The document provides an overview of DB2 and discusses key concepts such as instances, databases, tablespaces, and recovery. It describes how to install and configure DB2, create instances and databases, load and move data between databases, and perform backups and recovery. Examples are given of commands used to create tablespaces and load data. The document also mentions tools for visualizing queries and monitoring performance.
The Enterprise IT Checklist for Docker Operations Nicola Kabar
Enterprises often have hundreds of legacy applications developed by development teams across multiple business units. This presents a series of challenges to IT teams as they architect and support a complex and diverse IT environment. Add to that Docker, containers, and cloud - going beyond the pilot environment to production requires both the technology and best practices. In this session, we will go through a checklist of considerations and best practices providing a framework for smooth Docker production operations.
Linux is an open-source operating system designed as a free alternative to Unix, with a reputation for efficiency and performance; it was developed by Linus Torvalds in 1991 and is now developed collaboratively under the GNU license. The document also provides descriptions of common Linux commands like pwd, cd, ls, and examples of how to use them.
Ugif 09 2013 new environment and dynamic setting in ids 12.10UGIF
The document discusses new features in Informix Dynamic Server (IDS) 12.10 related to environment and configuration management. It describes how IDS 12.10 allows administrators to start the database server by reading settings from a file rather than setting environment variables manually. It also details how more configuration parameters can now be modified dynamically at runtime using new onstat and SQL administration API commands, without needing to restart the server. Exporting and importing configuration settings to files is also introduced as a way to manage multiple parameter changes.
This document summarizes the server configuration and Active Directory setup at a school. It describes the primary and secondary ESXi servers that run domain controllers, file servers, backup servers, and terminal servers. It explains how the domain controllers manage computers and users across different domains, including the staff1, student1, and root ocaat1 domains. It provides instructions for adding user accounts, setting up group policies, configuring the DHCP and DNS servers, and establishing file sharing permissions.
Linux is a free, open-source operating system that provides functionality similar to Unix systems. The document then lists and describes several common Linux commands used to navigate directories, view files and system information, manage processes, and edit text files. It also includes a diagram of the standard Linux directory structure and brief descriptions of the purpose of each top-level directory.
The Forefront of the Development for NVDIMM on Linux KernelYasunori Goto
This is talk for Open Source Summit Japan 2020
--------------------------
NVDIMM (Non Volatile DIMM) is the most interesting device, because it has not only characteristic of memory but also storage. To support NVDIMM, Linux kernel provides three access methods for users. - Storage (Sector) mode - Filesystem DAX(=Direct Access) mode - Device DAX mode. In the above three methods, Filesystem DAX is the most expected access method, because applications can write data to the NVDIMM area directory, and it is easier to use than Device DAX mode. So, some software already uses it with official support. However, Filesystem-DAX is still "experimental status" in the upstream community due to some difficult issues . In this session, Yasunori Goto will talk to the forefront of the development of NVDIMM, and Ruan Shiyang will talk about his challenge with the latest status from CLK2019.
Automated Out-of-Band management with Ansible and RedfishJose De La Rosa
Ansible is an open source automation engine that automates complex IT tasks such as cloud provisioning, application deployment and a wide variety of system administration tasks. It is a one-to-many agentless mechanism where complex deployment tasks can be controlled and monitored from a central control machine.
Redfish is an open industry-standard specification and schema designed for modern and secure management of platform hardware. On Dell EMC PowerEdge servers the Redfish management APIs are available via the integrated Dell Remote Access Controller (iDRAC), which can be used by IT administrators to easily monitor and manage at scale their entire infrastructure using a wide array of clients on devices such as laptops, tablets and smart phones.
Together, Ansible and Redfish can be used by system administrators to fully automate at large scale server monitoring, provisioning and update tasks from one central location, significantly reducing complexity and helping improve the productivity and efficiency of IT administrators.
Hyper-V best practices document provides recommendations in three main areas:
1. Host server hardware configuration including standardized hardware, latest drivers, and optimized power settings.
2. Hyper-V installation and configuration including roles, features, paths, and antivirus exclusions.
3. Virtual machine configuration best practices such as Generation 2 VMs, optimized devices, and automatic stop settings.
The document provides an introduction to Linux and device drivers. It discusses Linux directory structure, kernel components, kernel modules, character drivers, and registering drivers. Key topics include dynamically loading modules, major and minor numbers, private data, and communicating with hardware via I/O ports and memory mapping.
Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...Nicolas Desachy
This document discusses new security features in IBM Informix Dynamic Server (IDS), including mapped users, trusted context, and selective row-level auditing. Mapped users allow authenticating external users without an operating system account by mapping them to an existing OS user or database-defined UID/GID pair. Trusted context allows reusing a database connection for a different user without establishing a new connection. Selective row-level auditing provides more granular auditing capabilities.
UGIF 12 2010 - new security features in IDS - nov 2010UGIF
This document discusses new security features in IBM Informix Dynamic Server (IDS), including mapped users, trusted context, and selective row-level auditing. Mapped users allow authenticating external users without an operating system account by mapping them to an existing OS user or database-defined UID/GID pair. Trusted context allows reusing a database connection for a different user without establishing a new connection. Selective row-level auditing provides more granular auditing capabilities.
This document discusses Linux namespaces, which allow isolation and virtualization of system resources like process IDs, network interfaces, mounted filesystems, and more. It provides examples of different namespace types like UTS, user, PID, IPC, mount, and network namespaces. It also covers the kernel configuration and software implementation using clone() and setns() system calls to create and join namespaces.
This document provides instructions for installing and configuring IBM Tivoli System Automation on AIX to provide high availability for a DB2 UDB BCU. It describes downloading and installing Tivoli System Automation and required policies. It then discusses preparing the nodes, configuring Tivoli System Automation resources like NFS and DB2, and testing the failover of those resources.
This document discusses Informix's new partition defragmenter feature. It begins with background on partitions and extents, and explains how fragmented partitions can degrade performance. The defragmenter works by using new SQL functions to consolidate partition extents, logging the process. It can run online and is recoverable. Considerations include avoiding locks and logging overhead. The feature is available via SQL APIs and in OAT for automated optimization. An example demonstrates defragmenting three fragmented tables.
Android boot time optimization involves measuring boot times, analyzing the results, and reducing times. Key areas of focus include the bootloader, kernel initialization, zygote class preloading, and system service startup. Hibernation technologies like QuickBoot and Fast-On can improve resume speeds by saving a system image to flash. The "R-Loader" concept aims to minimize hardware re-initialization on resume by directly loading a suspended kernel image.
Von A bis Z-itrix: Installieren Sie den stabilsten und schnellsten HCL Notes-...panagenda
Aufnahme: https://pan.news/20191105de
Abstract: Notes auf Citrix. Sie wollten es haben um Ihr Leben und das Ihrer Endbenutzer einfacher zu machen. Aber wie so oft stellt sich heraus, dass alles seine Nachteile hat. Es gibt eine ganze Reihe von Fallstricken und Problemen beim Installieren und Konfigurieren des Clients. Im Betrieb zeigen sich dann lange Startzeiten und ein langsames UI als echte Produktivitätskiller - dank Datenverzeichnissen auf Netzlaufwerken scheint dies unvermeidbar.
Kein Grund zur Verzweiflung! Sie können all diese Themen in den Griff bekommen!
In diesem Webinar zeigen wir Ihnen Schritt für Schritt wie sie den perfekten Notesclient auf Citrix installieren und konfigurieren. Befehlszeileneinstellungen für die Installation, NotesShareClasses, jvm.properties/rcp-install.properties, stub-notes.ini, config-file und mehr - alles wird detailliert erklärt.
Sie werden auch sehen, wie sie MarvelClient Roaming einsetzen können, um Startzeiten und UI-Performance drastisch verbessern. Es ist möglich: Zentrale Installation mit Datenverzeichnis auf Netzlaufwerken, aber so schnell wie ein lokal installierter Client!
Wenn Sie fertig sind, haben Sie das ultimative Rezept für Notes auf Citrix in Ihren Händen. Worauf warten Sie noch?
The document outlines the agenda for a meeting of the User Group Informix France on September 12, 2013. The agenda includes presentations on Informix strategies within IBM's offerings, open source solutions with Informix, analytics technologies for analyzing data via IWA, new configuration and startup methods in Informix version 12, indexing techniques in Informix, and solutions and support updates. It also lists upcoming Informix events and details the new editions, bundles, and trade-up options available in Informix 12.1 being released on March 26, 2013.
PSM (Primary Storage Manager) bundled with Informix 12.1 provides faster and easier backup and restore capabilities compared to previous methods. PSM integrates tightly with onbar to allow parallel backups to file devices with performance similar to or better than ontape. It maintains a catalog of backup objects and can expire backups, addressing limitations of previous methods. Setting the transfer buffer size higher in PSM further improves performance for onbar backups.
User Group Informix France - Axional Web Studio - Informix Warehouse Accelerator, IWA
Axional Analytics Une manière facile pour analyser vos données via IWA
The document summarizes an IBM presentation on benchmarks performed at the IBM PSSC Customer Center in Montpellier, France. It discusses an Informix benchmark on POWER7 systems published in 2012 that showed scalability up to 330% growth. It also describes IBM System x servers like the Flex System x240 and blade servers like the HS23 that are suited for enterprise workloads.
The document discusses the on-disk structures of an Informix database instance. It describes how data is stored across partitions, pages, chunks, and dbspaces. It provides examples of using oncheck commands to view the root chunk, pages, and partitions that make up an Informix instance on disk. The key concepts covered include how partitions, pages, and extents are used to store and organize table and index data across a database server's storage devices.
Ugif 10 2012 lycia2 introduction in 45 minutesUGIF
Querix provides tools for modernizing 4GL applications and migrating them to new platforms. This includes tools for Java, ESQL/C, C, C++ and other languages on databases and operating systems. Querix also offers consulting services to help with application migration. Migrating to Lycia 4GL provides benefits like modernized interfaces, improved development lifecycles, faster time to market for new applications, and maximized returns on existing investments.
This document discusses IBM's Informix database and provides updates on recent developments. It notes that IBM continues investing in Informix, which runs on IBM's PureSystems platform and features new in-memory and columnar technologies. The document outlines IBM's business imperatives for Informix, including delighting existing customers, differentiating the product, creating a proactive sales culture, and building new revenue streams. It highlights some major Informix customers and a benchmark test showing Informix TimeSeries' ability to efficiently manage smart meter data for millions of meters.
Update Statistics provides concise summaries of document changes in 3 sentences:
The document discusses changes to statistics collection and use in Informix versions 11.10, 11.50, and 11.70, including "Smart Statistics" which only updates statistics if data changes exceed a threshold. It also describes the "Auto Update Statistics" scheduler tasks which automatically determine and run appropriate UPDATE STATISTICS commands based on guidelines. The document provides examples showing how statistics are updated and not updated depending on whether the UPDATE STATISTICS command is run or data change thresholds are exceeded.
This document discusses managing large amounts of data from smart utility meters. It notes that smart meters can generate huge volumes of data as readings become more frequent. It introduces IBM's Informix TimeSeries database as a solution, highlighting its performance, space savings, and support for time series data. Key benefits include handling high data insertion rates, reducing storage needs by 50% compared to a standard relational layout, and providing functions optimized for time series analysis.
The document discusses trends in data warehousing and analytics, including the rise of data warehouse appliances, column-oriented databases, and in-memory databases. It then introduces Informix Warehouse Accelerator, which combines row and columnar storage, compression, and in-memory technologies to provide extreme performance for data warehousing workloads. Key technologies of the accelerator include 3:1 data compression, frequency partitioning for efficient parallel scanning, and predicate evaluation directly on compressed data.
The document provides an overview of new features in IBM Informix TimeSeries versions xC3 and xC4. Some key new features in xC3 include support for additional platforms, a demo that populates smart meter data, removal of an 18-character limit on names, pre-defined calendars, container statistics, and improved delete performance. New features in xC4 are also presented but not described in detail.
Informix 11.7 delivers smarter data management through three key capabilities:
1) Informix Flexible Grid provides high availability, scalability and workload management.
2) The Informix Warehouse Accelerator delivers unprecedented query response times.
3) Informix Genero enables faster development of mobile and cloud applications.
- Storage provisioning allows automatic expansion of database spaces to prevent "out of space" errors. It can extend existing chunks or create new chunks from a storage pool as needed.
- The storage pool is a list of raw devices, files, or directories that IDS can allocate space from. Spaces and chunks can be created from or dropped to the storage pool.
- The feature has manual and automatic modes and can be accessed via SQL commands or the OAT graphical interface. It provides high availability and reduces downtime from space-related errors.
This document discusses an upcoming IIUG conference from May 15-18 in Kansas City, KS with 3 speakers from France. It also mentions that Jean-Georges Perrin is running for reelection to the IIUG board and provides information about some web tools called VoiceObserver and MashupXFeed that are built using Informix and Java. Finally, it provides a brief technical overview of the architecture and implementation.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
1. Informix 11.70: fonctionalités
Olivier Bourdin
olivier.bourdin@fr.ibm.com
Mardi 30 Novembre 2010
User Group Informix France
2. Overview
Introduction
Administration
Usability/Extensibility
Performance/Warehousing
Grid Availability
Security
RAS
User Group Informix France
3. Administration
Table Defragmenter (OLTR)
Storage Provisioning
Storage Space Schema
Embedability Toolkit
Deployment Utility and Assistant
Informix 11.70 Install Changes
User Group Informix France
4. Table Defragmenter - OLTR
Perform similar task as PC Disk defragmenter
Reorganize the table into fewer and larger
contiguous extent(s)
Can be performed online, so no downtime, no
unavailability of the table
Originally called Table Reorganization (OLTR)
User Group Informix France
5. Storage Provisioning
Highly configurable, automatic expansion of
dbspaces, temporary dbspaces, sbspaces,
temporary sbspaces and blobspaces
Chunks are extended and/or created as needed
IDS can also expand spaces before they are full
Feature is fully incorporated into OAT.
User Group Informix France
6. Storage space Schema
An enhancement of dbschema utility
Generate schemas for dbspace, chunks,
physical logs and logical logs
Generated necessary commands for recreate
existing dbspaces, chunks, physical log and
logical logs
– Commands can be SQL Admin API
– Alternatively onspaces and onparams (non-sql)
commands
User Group Informix France
7. Storage space Schema
Usage:
dbschema -
USAGE:
dbschema { [-q] [-t tabname] [-s user] [-p user] [-r role] [-f procname]
[-hd tabname] -d dbname [-w passwd] [-seq sequence] [-l [num]]
[-u [ia] udtname [all]] [-it [Type]] [-ss [-si]] [filename]
[-sl length] [-nw] } |
{ [-q] -c [-ns] [filename] }
-q Suppress the db version from header
-t table name or "all" for all tables
-s synonyms created by user name
or "all" for all users
…
…
-c generate storage space and logical log definitions
-ns generate commands in non-sql format
User Group Informix France
8. Storage space Schema
Admin API output:
-- Dbspace 1 -- Chunk 1
-- EXECUTE FUNCTION TASK
('create dbspace', 'rootdbs', '/usr2/as_support/sanjitc/1170/rootdbs',
'200000', '0', '2', '500', '100');
-- Dbspace 2 -- Chunk 2
EXECUTE FUNCTION TASK
('create dbspace', 'datadbs1', '/usr2/as_support/sanjitc/1170/
datadbs1_1170', '1000', '8', '2', '100', '100');
-- Dbspace 3 -- Chunk 3
EXECUTE FUNCTION TASK
('create dbspace', 'datadbs3', '/usr2/as_support/sanjitc/1170/
datadbs3_1170', '1000', '0', '4', '200', '200');
EXECUTE FUNCTION TASK
('add mirror', 'datadbs3', '/usr2/as_support/sanjitc/1170/datadbs3_1170',
'0', '/usr2/as_support/sanjitc/1170/mdatadbs3_1170', '12');
EXECUTE FUNCTION TASK
('start mirroring', 'datadbs3');
User Group Informix France
10. Embeddability Toolkit
Informix Embeddability Toolkit empowers the
customer with the tools and the information they
need for easy automation of reduced footprint
Informix deployments.
It includes:
• Informix Deployment Assistant (DA)
• Informix Deployment Utility (DU)
• DU's Configuration File
• Additional Scripts for Embedding Informix
• A Tutorial on an end to end Deployment Solution
User Group Informix France
11. Deployment Assistant (DA)
Enables users to take snapshots of Informix
instances and / or data spaces for deployment
on other target computers.
Allows for reduction of the packaged instance to
the user's minimum desired configuration
Provides both GUI and Command-Line
Interfaces developed using Java/Eclipse SWT
Snapshots produced by DA are ready for use by
the Deployment Utility (DU) for deployment on
the target computers
User Group Informix France
12. Deployment Assistant (DA)
Specify the location in which
the snapshot of the Informix
instance and/or data will be
saved.
The archive formats
available are:
• BZip2 (*.tar.bz2)
• GZip (*.tar.gz)
• Tar (*.tar)
• Zip (*.zip)
User Group Informix France
13. Deployment Assistant (DA)
A summary of the
snapshot to be created
is presented
Selecting Next will
begin creation of the
snapshot with the
selected features and/or
data
User Group Informix France
14. Deployment Utility (DU)
Standalone tool to rapidly deploy packaged Informix instances in
an embedded environment
Configuration file - $INFORMIXDIR/etc/ifxdeploy.conf
Command line tool with customization options during deployment
ifxdeploy
[-config <configfile>] [-clone] [-extractcmd <command>]
[-verbose] [-l <logfile>] [-p <password>] [-silent] [-sqliport <port>]
[-drdaport <port>] [-servernum <num>] [-rootpath <rootdbs>]
[-file <tgz file>] [-relocate <path>] [-force] [-keepdis]
[-start [<secs>] [-autorecommend] [-y]
User Group Informix France
15. Usability/Extensibility
Automatic DBA Procedures
Automatic Table Locator
Core Programability Enhancements
Unique Event Alarms
SPL Debugger
Auto Registration
User Group Informix France
16. Autonomic DBA Procedures
A collection of new database administration tasks templates is now
added to the sysadmin database. They enable the DBA executing
core and useful administration task automatically by the database
server using the scheduler functionality instead of implement and
running them manually.
There are the new tasks
– Detect and recreate bad indexes
– InPlace alter removal
– Automatic CPU allocation at database server start
– Detect and remove idle user sessions
– Detect fragments which are candidates for a compression, repack, shrink
or defragmentation (Data compaction)
User Group Informix France
17. Automatic Table location
New table space location and fragment management introduction
using the sysadmin task() function interface
Space management
– predefined one or more dbspaces attached to the database for locating newly
created tables
EXECUTE FUNCTION SYSADMIN:TASK(“autolocate database”, “stores_demo” , “datadbs”)
Fragmentation management
– automatically create a fragmented table in the dbspaces assigned to the current
database
– add new fragments to the table for out of disk space or server limitation like out of
fragments conditions
– deferred extent allocation until first rows are inserted
Table content management
– round robin will not blindly add the row to the next fragment, empty or smaller
fragments are preferred for choosing a target table fragment for the insert
User Group Informix France
18. Core Programability Enhance.
Consistent return codes for server initialization
– Very helpful in Informix embedded environments
– Take appropriate action based on return code
#!/bin/sh
# Execute the oninit program
oninit
#Get the return code from oninit execution
RC=$?
# Validate the retun code and take necessary action
case $RC in
0) echo "RC=0: The database server was initialized successfully." ;;
1) echo "RC=1: Server initialization has failed." ;;
187) echo "RC=187: Check the entries in sqlhosts file." ;;
221) echo "RC=221: DUMPDIR missing. Creating DUMPDIR."
mkdir $INFORMIXDIR/tmp
chmod 770 $INFORMIXDIR/tmp ;;
*) echo "Return Code=$RC !" ;;
esac
User Group Informix France
19. Unique Event Alarms
IDS uses the event alarm mechanism to notify the DBA about any
major problems in the database server.
Change in alarmprogram.sh/.bat
EVENT_SEVERITY=$1
EVENT_CLASS=$2
EVENT_MSG="$3"
EVENT_ADD_TEXT="$4"
EVENT_FILE="$5"
EVENT_UNIQID="$6“
IDS 11.70 has 79 Event Class Ids
Class ID: 22 Class message: Long transaction detected
Event ID: 22002 message: Continuing Long Transaction (for COMMIT): tx:
Class ID:22 Class message: Long transaction detected
Event ID:22003 message: Aborting Long Transaction: tx:
User Group Informix France
20. Auto Registration
Terminology change Built-in DataBlade Modules are now known as
“Database Extensions”
The Following Database Extensions will be Automatically Registered
upon there first use after instance initialization:
• Basic Text Search
• Hierarchical Data Type (Aka Node Type)
• Binary Data Type
• Informix Web Feature Service for Geospatial Data
• Large Object Management
• MQ Messaging
In addition the following DataBlade Modules will be Automatically
Installed and Automatically Registered
• Spatial DataBlade
• Timeseries DataBlade
On the fly create sbspaces, start VP
User Group Informix France
21. Performance/Warehousing
Forest of Trees (FOT)
MULTI-INDEX Scan
STAR Index
Fragment Level Statistics
Fragment Level List/Interval
C-UDR Preload
User Group Informix France
22. Forest Of Trees (FOT)
This is a variation of a normal B-tree index and might
provide an increase in performance depending on certain
factors and usage. The creation of a FoT index is simple
as it is a small addition to the create index syntax.
Two problems were seen with a B-tree index ...
• Root Node contention can occur when many session are reading the
same index at the same time.
• The depth of large B-tree index increases the number of levels created,
which results in more buffer reads required.
The FoT feature will address these problems by ...
• Splitting a B-tree index into smaller subtrees.
• Each of these will have a separate Root Node, so queues will be
shorter and quicker because we have spread the mutex contention
cross many Root Nodes.
• Each smaller subtree will have less levels to navigate.
User Group Informix France
23. Forest Of Trees (FOT)
create [ unique ] index index_name on table ( column1 [, column2 ] ) [ in dbspace ]
hash on ( column1 ) with N buckets;
Hash on key value to pick a bucket / rootnode
Bucket 1 Bucket 2 Bucket 3
2,189,... 1,198,... 4,201,... Rootnodes
2,... 189,... 1,... 198,... 4,... 201,... Leaves
Key Value Bucket
1 2
2 1
3 2
... ...
47 3
221 1
User Group Informix France
24. Forest Of Trees (FOT)
When to consider using a FoT index ...
– onstat -g spi output showing spin locks with large numbers of waits
and loops:
Num Waits Num Loops Avg Loop/Wait Name
1427723 60715268 42.53 fast mutex, 7:bf[299] 0x3400006 0x108b7908000 security_s_symb_s_co_id
879324 40682456 46.27 fast mutex, 7:bf[24] 0x3400003 0x108b74bc000 pk_fk_last_trade
477038 19177763 40.20 fast mutex, 3:bf[391] 0x320000a 0x10177fe2000 daily_market_idx
436564 17239046 39.49 fast mutex, 7:bf[26] 0x3400004 0x108b74c4000 ecurity_s_symb_s_num_out
330244 14563521 44.10 fast mutex, 7:bf[30] 0x3400008 0x108b74d4000 security_s_symb_s_ex_id_s
176874 5183331 29.31 fast mutex, 7:bf[38] 0x3400008 0x108b74f4000 security_s_symb_s_ex_id_
27050 3636325 134.43 mutex lock, name = log
16555 1301066 78.59 fast mutex, lockhash[3104]
18101 885933 48.94 fast mutex, AIOSHCB lock
17274 879611 50.92 fast mutex, 3:bf[319] 0x1800002 0x10177f52000 trade_history_idx
– Reduces the B-Tree depth on larger tables ...
• Reducing a 4-level B-tree index to a 3-level B-Tree might reduce the buffer reads
by 25 percent.
User Group Informix France
25. STAR/Snowflake Join Support
Star Join is a new query processing method (ported over
from XPS)
Improves query performance for star and snow flake
schema queries
Utilize multi-index scan and skip scan
Uses pushdown technology
User Group Informix France
26. MULTI-INDEX Scan
Queries with multiple predicates on columns of a table will use the
composite index only if the query has equality predicates on the leading
columns of the index.
• Composite index (c1,c2) will be used for “c1 = 10 and c2 between 1 and 5”
• Cannot be used for “c1 between 1 and 10 and c2 = 5”; needs another index (c2,c1)
• For varying combination of the predicates, various combinations of composite
indexes with the same set of columns will have to be created
Multi-Index scan can now use multiple single column indexes
Improves performance of queries that have predicates on multiple
columns
Reduces the total number of indexes as the various composite indices
are not needed; reduces disk usage as a result
User Group Informix France
27. Fragment Level Statistics
Allows storing of statistics at the fragment level and
aggregating table level statistics from its constituent
fragment's statistics.
New catalog table sysfragdist stores statistics for
each fragment for each table-column.
Fragment level statistics are encrypted and stored in
a smartblob column “encdist” in sysfragdist catalog.
Controlled by new table property STATLEVEL
[CREATE | ALTER] TABLE ... STATLEVEL [TABLE | FRAGMENT | AUTO]
User Group Informix France
28. Fragmentation List / Interval
2 new fragmentation strategies – LIST and INTERVAL
LIST – Useful when fragment key has finite set of values.
e.g: departments in an organization, colors, states of the
country
INTERVAL – Fragmentation based on an interval (days,
months, hour, integer value)
– DBA does not have to create all the possible fragments; defines the interval
value and initial fragments
– IDS will automatically create new interval fragments (if not present) when
rows are inserted with fragment key values in that interval
Supports these ALTER FRAGMENT options:
– ADD/DROP fragment or dbspace name, ATTACH/DETACH fragment, INIT,
MODIFY partition name/expression/dbspace, ONLINE(altered table not
exclusively locked)
User Group Informix France
29. Fragmentation List / Interval
Fragments data based on a list of discrete values
– e.g. states in the country, departments in an organization,
colors
User Group Informix France
31. C-UDR Preload
Preloading a C-UDR shared library allows IDS threads to migrate from
one cpuvp to another during the execution of the C-UDR
With is feature, Lift the thread binding restriction.
– Eliminate the thread binding and unbinding maintenance code
Allowing thread migration during C-UDR execution can increase
performance.
Onconfig parameter PRELOAD_DLL_FILE
– PRELOAD_DLL_FILE $INFORMIXDIR/extend/bts2.0/bts.bld
– PRELOAD_DLL_FILE /app/myudr.so
User Group Informix France
32. C-UDR Preload
Preloading a C-UDR shared library allows IDS threads to migrate from
one cpuvp to another during the execution of the C-UDR
With is feature, Lift the thread binding restriction.
– Eliminate the thread binding and unbinding maintenance code
Allowing thread migration during C-UDR execution can increase
performance.
Onconfig parameter PRELOAD_DLL_FILE
– PRELOAD_DLL_FILE $INFORMIXDIR/extend/bts2.0/bts.bld
– PRELOAD_DLL_FILE /app/myudr.so
User Group Informix France
33. GRID / ER / MACH11
DDL on Updatable secondaries
Rolling Upgrade support
Replicate data using ER without PK
ER: Logical log lag action configuration
MACH11: Transaction Survival
CDR Check repair with Timestamps
Connection Manager for ER
Informix Flexible Grid
User Group Informix France
34. DDL on Updatable Secondaries
This feature allows sessions that are connected to any type of
updatable secondary to perform DDL SQL statements.
This feature is enabled as soon as onconfig parameter,
UPDATABLE_SECONDARY, is set to a value > 0.
List of DDL commands which still can not be run:
Update statistics, Create database (with no logging)
Create raw table, Create temp table (with logging)
Create external table, Create/Drop xadatasource,
Create/Drop xadatasource type, Creating any type of virtual table
User Group Informix France
35. Rolling Upgrade Support
Provide a server side infrastructure to support rolling
upgrade of HDR or RSS system
Two main usages of this feature
• Easily instantiate an ER system
• Convert existing HDR or RSS system into an ER system for rolling upgrade support
Ability to convert HDR or RSS pair to ER and setup replicate
for every table in the system automatically
• Uses ERKEY on tables with no primary key
One of the nodes continue to be online and allow queries
including DML while the other undergo product upgrade
“Product upgrade without downtime”
User Group Informix France
36. Rolling Upgrade Support
Provide a server side infrastructure to support rolling
upgrade of HDR or RSS system
Two main usages of this feature
• Easily instantiate an ER system
• Convert existing HDR or RSS system into an ER system for rolling upgrade support
Ability to convert HDR or RSS pair to ER and setup replicate
for every table in the system automatically
• Uses ERKEY on tables with no primary key
One of the nodes continue to be online and allow queries
including DML while the other undergo product upgrade
“Product upgrade without downtime”
User Group Informix France
37. ER without PK
This is a feature that enable replication of tables without primary key.
The idea behind this feature is to support rolling upgrade and grid
replication.
Two new external interfaces added to SQL and CDR utility to enable
automatic creation of primary key.
• create table .... with erkey
• alter table ... add erkey
Three erkey columns, two integer type and one smallint will be added to
table.
The table will have an unique key constraint built on the 3 erkeys.
User Group Informix France
38. ER: Logical log lag action
When using Enterprise Replication if the current log position comes close
to overwriting a log that has not yet been processed then the db server
may take one of two actions:
• Add additional logical logs.
• Enter DDRBLOCK mode.
Whilst in DDRBLOCK mode user update operations are blocked.
The Logical Log Lag Action configuration parameter
CDR_LOG_LAG_ACTION provides additional options:
• 1 Logical log staging
• 2 Dynamic log addition
• 3 Ignore
• 4 Shutdown (ER)
• 5 DDRBLOCK
User Group Informix France
39. Transaction Survival
Transaction survival allows transactions started on updatable secondaries to
survive failover to a new primary, in the event of the original primary's failure.
Turned on with 1 new onconfig parameter: FAILOVER_TX_TIMEOUT
New
Primary
Primary
Clients
RSS
Clients HDR
Secondary
User Group Informix France
40. Connection Manager for ER
Connection Manager on ER provides a form of Network
Virtualization for application clients connecting to a named
“Grid” of Enterprise Replication nodes within an ER Domain
Network Virtualization for the Grid
• Provide the ability to distribute connections from client applications via
Service Level Agreement definitions to designated Grid nodes
• Distribution based on LATENCY, FAILURE and WORKLOAD
– Note for LATENCY and FAILURE SLAs, Quality Of Data monitoring must be
defined and started
Enables customers to automate allocation of client
connections to appropriate nodes within a Grid
• A database administrator may want to implement Connection Manager
for ER in order to ensure appropriate distribution of connections
User Group Informix France
41. CDR check repair with timestamps
Cdr check currently uses a master node to sync
other nodes to
• Mismatched rows on target are updated to values contained on source
• Missing rows on target are inserted to match source
• Extra rows on target are deleted unless using the --extratargetrows option
Cdr check can now synchronize data based on
timestamps from any server
• Timestamp – all servers are updated with row containing the highest
timestamp
• Deletewins – if row exists in delete table it is deleted, otherwise the
highest timestamp wins
User Group Informix France
42. Grid Replication
Grid is an extension to Enterprise Replication that allows ER
to replicate the execution of statements
DML/DDL statements, procedures, and functions can be
replicated to, then run on grid target servers
Replicates can be automatically created when new tables
are created
Eliminates the need for a primary key for replicates
Adds the means to support Connection Manager on top of
ER
User Group Informix France
43. Grid Replication
Grid is an extension to Enterprise Replication that allows ER
to replicate the execution of statements
DML/DDL statements, procedures, and functions can be
replicated to, then run on grid target servers
Replicates can be automatically created when new tables
are created
Eliminates the need for a primary key for replicates
Adds the means to support Connection Manager on top of
ER
User Group Informix France
44. Grid Replication
Grid greatly simplifies administration of database objects for many
servers
Let's say we have 1000 servers in a grid. If we want to create a new table
on all 1000 servers we only have to run the create table command one
time
We can also set up replication automatically when creating tables, thus
reducing the effort and knowledge required to use ER
Admin api routines can also be replicated across servers in a grid to
reduce the effort of performing server administration tasks
User Group Informix France
45. RAS
Oninit –i block
Ifxcollect
Dbschema no name
User Group Informix France
46. Security
Row Level Auditing - SRLA
Database Mapped Users
Trusted Context
User Group Informix France
47. Row Level Auditing (SLRA)
This feature allow to specify which tables are audited at row
level
The purpose is to avoid performance drop during auditing
whenever all tables and rows are audited
This feature is turned on by setting ADTROWS in adtcfg file,
or dynamically with onaudit -R <value>
• Backward compatibility
New SQL command are provided to define which tables are
audited at row level
An audit trail file is generated and filtered with onshowaudit
utility
User Group Informix France
48. Database Mapped User
Authenticate external users without an OS account
Database users no longer need
• An account Look-up in the local OS
• Enable password properties for external authenticators
The DBSA “maps” an external user to:
• An existing OS user or
• A database defined UIG/GID pair
Uses an extension to the GRANT/REVOKE SQL statement
Requires PAM or SSO authentication
Traditional password based authentication is still available
User Group Informix France
49. Trusted Context
This feature allow to reuse a connection for a different user without the
need to establish a new connection
The purpose is to avoid connection overhead when there is a need to
connect on behalf of new users, which is the case in application server
This also provide higher security level and better auditing granularity, as
each user connect and switch on a trusted connection with their own
credentials and privilege
New SQL statement are provided and/or enhanced to create trusted
context, establish trusted connection and provide connection switch
capabilities
All users properties are reported for the switched connection user when
established
User Group Informix France
50. Merci
Olivier Bourdin
olivier.bourdin@fr.ibm.com
Mardi 30 Novembre 2010
User Group Informix France