These slides were used for the 3rd Wakame Users Group meeting.
http://wakameusersgroup.org/meeting/2014/01/24/wug-003/
Understanding OpenVNet's flow
This meeting will be an in dept explanation of OpenVNet's inner workings. We will talk about which flows are added to Open vSwitch in order to create software defined l2 networks.
This document contains configuration data for a neutral bot, including lists of locations, monsters, items, and status settings. The bot's Lua script defines a HUD interface to display information like the bot's level, experience, and status. It shows the bot's life as an animated bar and displays the bot's stamina in different colors based on amount.
DevOps aims to streamline the process from writing code to deploying applications by encouraging collaboration between developers and operations teams. It utilizes tools that automate the integration, testing and deployment of code changes. The key aspects are using version control systems like Git for code management, branching to allow parallel work without disrupting the main code, and continuous integration pipelines that automatically build, test and deploy code changes. This helps catch bugs early and allows rapid yet stable releases.
Beyond php - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
Beyond php - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
This document provides instructions for configuring and demonstrating the weighted fair queuing (WFQ) queueing mechanism on a router interface. It describes configuring WFQ on Router R2's Serial 0/1 interface, and using show commands to observe its operation and how it handles traffic. The thresholds, queues and other WFQ parameters are modified to test its behavior under heavy traffic loads.
Troubleshooting tips and tricks for Oracle Database Oct 2020Sandesh Rao
This talk presents 15 different tips and tricks using tools to better troubleshoot and debug problems with Database , Oracle RAC and Oracle Clusterware , ASM and how to get the right pieces of data with the least of commands which today most people do manually. This session will cover tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , oratop for pinpointing performance issues and many others to make one feel like a rockstar DBA.
Math in V8 is Broken and How We Can Fix It - Athan Reines, FourierNodejsFoundation
The built-in JavaScript Math library is used in virtually every Node.js application, from generating random ids to calculating exponential back-off times to computing basic performance metrics. When using the Math library, most developers simply assume that the underlying implementations are accurate, performant, and correctly implemented. In this presentation, Athan Reines will discuss why this assumption is often false and show the various ways in which the standard library is broken.
The presentation will present the algorithms used, their performance and accuracy, and how they have downstream effects on users of these libraries. The presentation will conclude by highlighting how community solutions are stepping up to fix these problems and identity opportunities for additional improvements.
This document contains configuration data for a neutral bot, including lists of locations, monsters, items, and status settings. The bot's Lua script defines a HUD interface to display information like the bot's level, experience, and status. It shows the bot's life as an animated bar and displays the bot's stamina in different colors based on amount.
DevOps aims to streamline the process from writing code to deploying applications by encouraging collaboration between developers and operations teams. It utilizes tools that automate the integration, testing and deployment of code changes. The key aspects are using version control systems like Git for code management, branching to allow parallel work without disrupting the main code, and continuous integration pipelines that automatically build, test and deploy code changes. This helps catch bugs early and allows rapid yet stable releases.
Beyond php - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
Beyond php - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
This document provides instructions for configuring and demonstrating the weighted fair queuing (WFQ) queueing mechanism on a router interface. It describes configuring WFQ on Router R2's Serial 0/1 interface, and using show commands to observe its operation and how it handles traffic. The thresholds, queues and other WFQ parameters are modified to test its behavior under heavy traffic loads.
Troubleshooting tips and tricks for Oracle Database Oct 2020Sandesh Rao
This talk presents 15 different tips and tricks using tools to better troubleshoot and debug problems with Database , Oracle RAC and Oracle Clusterware , ASM and how to get the right pieces of data with the least of commands which today most people do manually. This session will cover tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , oratop for pinpointing performance issues and many others to make one feel like a rockstar DBA.
Math in V8 is Broken and How We Can Fix It - Athan Reines, FourierNodejsFoundation
The built-in JavaScript Math library is used in virtually every Node.js application, from generating random ids to calculating exponential back-off times to computing basic performance metrics. When using the Math library, most developers simply assume that the underlying implementations are accurate, performant, and correctly implemented. In this presentation, Athan Reines will discuss why this assumption is often false and show the various ways in which the standard library is broken.
The presentation will present the algorithms used, their performance and accuracy, and how they have downstream effects on users of these libraries. The presentation will conclude by highlighting how community solutions are stepping up to fix these problems and identity opportunities for additional improvements.
Beyond PHP - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just writing PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
This document discusses fuzzing and exploiting OSX vulnerabilities for security research purposes. It provides an overview of passive fuzzing frameworks and techniques, and describes an approach the authors took using interception and poisoning of upstream data to create chaos and identify vulnerabilities downstream in the kernel. Specific implementation details are covered, such as the architecture of their passive fuzzing system, how they hook targeted functions and tamper with input data while checking for crashes or memory leaks, and how they use whitelisting and stack tracing to filter results and focus fuzzing.
Anonymous Remote Arbitrary Code Execution in Alien ArenaJason Geffner
This presentation discusses how an anonymous remote attacker can execute arbitrary code on the computers of Alien Arena's networked players. This vulnerability was responsibly disclosed to the authors of the game and this advisory was not released until a fixed build of the game was released.
This document discusses binary vulnerabilities and methods for identifying and exploiting them. It covers topics like stack overflows, heap overflows, integer overflows, and pointer vulnerabilities. It also discusses vulnerability metrics, identifiers, and tools that can be used for analysis like fuzzers, symbolic execution, and decompilers. Exploitation techniques like bypassing protections and transferring control are also mentioned.
This document discusses binary vulnerabilities and methods for finding and exploiting them. It covers different types of vulnerabilities like stack overflows, heap overflows, and integer overflows. It also discusses vulnerability metrics, identifiers, and tools that can be used to analyze binaries both statically and dynamically like fuzzers, symbolic execution, and taint analysis. Exploitation techniques like bypassing protections and ROP are also mentioned.
Cisco Networking Class Final AssignmentMorgan Tucker
The document describes a network design for a school district consisting of two elementary schools, two middle schools, a high school, and a superintendent building. The design includes:
- A partial mesh network using OSPF routing and PPP authentication for WAN links.
- Private addressing with NAT translations to public IPs through the border router.
- VLANs separating administrator, faculty, staff, and student networks at each school.
- ACLs to prevent unauthorized access between networks.
The document describes a Secure Active Switch (SAS) system that implements modifications to the Linux kernel bridge to prevent ARP poisoning attacks on a local network. The SAS runs on an embedded system using a ColdFire Motorola processor. It functions as an active network switch that can detect and block ARP attacks by monitoring packets and learning the MAC-IP bindings. Testing showed the SAS successfully blocked ARP poisoning attempts while only adding around 1% more latency to regular network traffic.
Troubleshooting Tips and Tricks for Database 19c ILOUG Feb 2020Sandesh Rao
This session will focus on 19 troubleshooting tips and tricks for DBAs covering tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , oratop for pinpointing performance issues and many others to make one feel like a rockstar DBA
This document provides information about a wireless serial communication RF modem module that operates at 2.4 GHz with a range of 30 meters. It can transmit and receive data at multiple baud rates and supports half-duplex communication. The module has features such as multiple channel selection, operation in the unlicensed 2.4 GHz band, and a standard UART interface. Example applications and specifications are also provided, along with code samples for interfacing the module with an 8051 microcontroller and a PC.
This document provides information about a wireless serial communication RF modem module that operates at 2.4 GHz with a range of 30 meters. It can transmit and receive data at multiple baud rates and supports half-duplex communication. The module has features such as multiple channel selection, compatibility with the unlicensed 2.4 GHz ISM band, and plug-and-play operation. Specifications, pinouts, operating instructions, and code examples for interfacing the module with an 8051 microcontroller and PC are also included.
The serial interface is up but the line protocol is down. This indicates that while the physical layer connection is up, the data link layer is not establishing properly. Common reasons for this include:
- Mismatched encapsulation types on either end (e.g. one side PPP other side HDLC)
- Authentication failure if using PPP (e.g. wrong username/password)
- Layer 1 issues like clock rate mismatch if using HDLC
So in summary, the interface is physically up but the data link layer is failing to establish due to a configuration mismatch between the two directly connected routers.
The document describes the architecture of Cassandra, including its startup process, layers (API, Dynamo, database), services (StorageProxy, MessagingService, Gossip), and failure handling. It also details how nodes communicate via the Gossip protocol to exchange state information and maintain a consistent cluster view.
This document discusses MPLS Traffic Engineering (TE) configurations using IS-IS as the IGP. It covers topics such as MPLS TE tunnel setup with IS-IS, explicit paths, bandwidth reservations, metric manipulation, static routing, targeted LDP, fast reroute, inter-area MPLS TE using IS-IS areas, and inter-AS MPLS TE. Diagrams are provided to illustrate the various MPLS TE concepts and configurations.
Beyond PHP - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just writing PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
The document discusses techniques that JavaScript engines use to optimize performance, including:
- Just-in-time compilation to generate optimized native machine code from JavaScript bytecode. This includes tracing optimizations and register allocation.
- Inline caching to speed up property lookups by caching the results of previous lookups.
- Type inference to determine types statically to avoid slow dynamic checks.
- Built-in optimizations in engines like V8 such as hidden classes, precise garbage collection, and Crankshaft, its optimizing compiler.
Troubleshooting Tips and Tricks for Database 19c - Sangam 2019Sandesh Rao
DBA's always have a bunch of scripts to do their daily tasks. How to find that stuck session, how to find who is consuming the most resources, how do I take a stack of multiple processes? This session will focus on troubleshooting tips and tricks for DBA's covering tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , Oratop for pinpointing performance issues and many other native Database features like short stacks, system state summaries, quickly spot hangs across RAC clusters among some of them to make your jobs a lot more efficient and make you look good to your bosses !!
The document discusses the Assembly programming language. It covers Assembly registers and instructions, the ELF file format, using objdump and readelf to disassemble and inspect Assembly programs, and examples of building Assembly programs and using inline Assembly in C code. Key topics include common Assembly registers like EAX, EBP, ESP; basic instructions like mov, add, jumps; the ELF header and section structure; and using tools like objdump to disassemble Assembly code.
This document provides an overview of configuring a router, including naming the router, setting passwords, examining show commands, configuring serial and Ethernet interfaces, saving configuration changes, and more. It discusses important topics like using different command modes, setting the clock rate on a serial interface where one router is the data communication equipment (DCE) and provides the clocking signal, and using show commands to examine interface details.
The document compares the performance of MySQL with the InnoDB and TokuDB storage engines on a system with high-performance SSD storage. It finds that InnoDB has better performance than TokuDB for most workloads tested, especially when thread counts increase. However, TokuDB provides much better data compression, nearly halving the storage size compared to InnoDB. For systems with very fast storage, InnoDB's compression is not as beneficial, but its performance is still superior in most tests.
This document describes the design and implementation of a MIPS processor using Verilog. It begins with an overview of the MIPS architecture and instruction set. It then provides Verilog code for the top-level processor module, controller, datapath, register file, ALU, and other components. Diagrams of the processor microarchitecture and multicycle controller state machine are also shown. The document focuses on hierarchically designing the MIPS processor using a structural Verilog approach and parameterized modules.
Beyond PHP - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just writing PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
This document discusses fuzzing and exploiting OSX vulnerabilities for security research purposes. It provides an overview of passive fuzzing frameworks and techniques, and describes an approach the authors took using interception and poisoning of upstream data to create chaos and identify vulnerabilities downstream in the kernel. Specific implementation details are covered, such as the architecture of their passive fuzzing system, how they hook targeted functions and tamper with input data while checking for crashes or memory leaks, and how they use whitelisting and stack tracing to filter results and focus fuzzing.
Anonymous Remote Arbitrary Code Execution in Alien ArenaJason Geffner
This presentation discusses how an anonymous remote attacker can execute arbitrary code on the computers of Alien Arena's networked players. This vulnerability was responsibly disclosed to the authors of the game and this advisory was not released until a fixed build of the game was released.
This document discusses binary vulnerabilities and methods for identifying and exploiting them. It covers topics like stack overflows, heap overflows, integer overflows, and pointer vulnerabilities. It also discusses vulnerability metrics, identifiers, and tools that can be used for analysis like fuzzers, symbolic execution, and decompilers. Exploitation techniques like bypassing protections and transferring control are also mentioned.
This document discusses binary vulnerabilities and methods for finding and exploiting them. It covers different types of vulnerabilities like stack overflows, heap overflows, and integer overflows. It also discusses vulnerability metrics, identifiers, and tools that can be used to analyze binaries both statically and dynamically like fuzzers, symbolic execution, and taint analysis. Exploitation techniques like bypassing protections and ROP are also mentioned.
Cisco Networking Class Final AssignmentMorgan Tucker
The document describes a network design for a school district consisting of two elementary schools, two middle schools, a high school, and a superintendent building. The design includes:
- A partial mesh network using OSPF routing and PPP authentication for WAN links.
- Private addressing with NAT translations to public IPs through the border router.
- VLANs separating administrator, faculty, staff, and student networks at each school.
- ACLs to prevent unauthorized access between networks.
The document describes a Secure Active Switch (SAS) system that implements modifications to the Linux kernel bridge to prevent ARP poisoning attacks on a local network. The SAS runs on an embedded system using a ColdFire Motorola processor. It functions as an active network switch that can detect and block ARP attacks by monitoring packets and learning the MAC-IP bindings. Testing showed the SAS successfully blocked ARP poisoning attempts while only adding around 1% more latency to regular network traffic.
Troubleshooting Tips and Tricks for Database 19c ILOUG Feb 2020Sandesh Rao
This session will focus on 19 troubleshooting tips and tricks for DBAs covering tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , oratop for pinpointing performance issues and many others to make one feel like a rockstar DBA
This document provides information about a wireless serial communication RF modem module that operates at 2.4 GHz with a range of 30 meters. It can transmit and receive data at multiple baud rates and supports half-duplex communication. The module has features such as multiple channel selection, operation in the unlicensed 2.4 GHz band, and a standard UART interface. Example applications and specifications are also provided, along with code samples for interfacing the module with an 8051 microcontroller and a PC.
This document provides information about a wireless serial communication RF modem module that operates at 2.4 GHz with a range of 30 meters. It can transmit and receive data at multiple baud rates and supports half-duplex communication. The module has features such as multiple channel selection, compatibility with the unlicensed 2.4 GHz ISM band, and plug-and-play operation. Specifications, pinouts, operating instructions, and code examples for interfacing the module with an 8051 microcontroller and PC are also included.
The serial interface is up but the line protocol is down. This indicates that while the physical layer connection is up, the data link layer is not establishing properly. Common reasons for this include:
- Mismatched encapsulation types on either end (e.g. one side PPP other side HDLC)
- Authentication failure if using PPP (e.g. wrong username/password)
- Layer 1 issues like clock rate mismatch if using HDLC
So in summary, the interface is physically up but the data link layer is failing to establish due to a configuration mismatch between the two directly connected routers.
The document describes the architecture of Cassandra, including its startup process, layers (API, Dynamo, database), services (StorageProxy, MessagingService, Gossip), and failure handling. It also details how nodes communicate via the Gossip protocol to exchange state information and maintain a consistent cluster view.
This document discusses MPLS Traffic Engineering (TE) configurations using IS-IS as the IGP. It covers topics such as MPLS TE tunnel setup with IS-IS, explicit paths, bandwidth reservations, metric manipulation, static routing, targeted LDP, fast reroute, inter-area MPLS TE using IS-IS areas, and inter-AS MPLS TE. Diagrams are provided to illustrate the various MPLS TE concepts and configurations.
Beyond PHP - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just writing PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
The document discusses techniques that JavaScript engines use to optimize performance, including:
- Just-in-time compilation to generate optimized native machine code from JavaScript bytecode. This includes tracing optimizations and register allocation.
- Inline caching to speed up property lookups by caching the results of previous lookups.
- Type inference to determine types statically to avoid slow dynamic checks.
- Built-in optimizations in engines like V8 such as hidden classes, precise garbage collection, and Crankshaft, its optimizing compiler.
Troubleshooting Tips and Tricks for Database 19c - Sangam 2019Sandesh Rao
DBA's always have a bunch of scripts to do their daily tasks. How to find that stuck session, how to find who is consuming the most resources, how do I take a stack of multiple processes? This session will focus on troubleshooting tips and tricks for DBA's covering tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , Oratop for pinpointing performance issues and many other native Database features like short stacks, system state summaries, quickly spot hangs across RAC clusters among some of them to make your jobs a lot more efficient and make you look good to your bosses !!
The document discusses the Assembly programming language. It covers Assembly registers and instructions, the ELF file format, using objdump and readelf to disassemble and inspect Assembly programs, and examples of building Assembly programs and using inline Assembly in C code. Key topics include common Assembly registers like EAX, EBP, ESP; basic instructions like mov, add, jumps; the ELF header and section structure; and using tools like objdump to disassemble Assembly code.
This document provides an overview of configuring a router, including naming the router, setting passwords, examining show commands, configuring serial and Ethernet interfaces, saving configuration changes, and more. It discusses important topics like using different command modes, setting the clock rate on a serial interface where one router is the data communication equipment (DCE) and provides the clocking signal, and using show commands to examine interface details.
The document compares the performance of MySQL with the InnoDB and TokuDB storage engines on a system with high-performance SSD storage. It finds that InnoDB has better performance than TokuDB for most workloads tested, especially when thread counts increase. However, TokuDB provides much better data compression, nearly halving the storage size compared to InnoDB. For systems with very fast storage, InnoDB's compression is not as beneficial, but its performance is still superior in most tests.
This document describes the design and implementation of a MIPS processor using Verilog. It begins with an overview of the MIPS architecture and instruction set. It then provides Verilog code for the top-level processor module, controller, datapath, register file, ALU, and other components. Diagrams of the processor microarchitecture and multicycle controller state machine are also shown. The document focuses on hierarchically designing the MIPS processor using a structural Verilog approach and parameterized modules.
Similar to WUG #003 - Understanding OpenVNet's flow (20)
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio, Inc.
Alluxio Webinar
June. 18, 2024
For more Alluxio Events: https://www.alluxio.io/events/
Speaker:
- Jianjian Xie (Staff Software Engineer, Alluxio)
As Trino users increasingly rely on cloud object storage for retrieving data, speed and cloud cost have become major challenges. The separation of compute and storage creates latency challenges when querying datasets; scanning data between storage and compute tiers becomes I/O bound. On the other hand, cloud API costs related to GET/LIST operations and cross-region data transfer add up quickly.
The newly introduced Trino file system cache by Alluxio aims to overcome the above challenges. In this session, Jianjian will dive into Trino data caching strategies, the latest test results, and discuss the multi-level caching architecture. This architecture makes Trino 10x faster for data lakes of any scale, from GB to EB.
What you will learn:
- Challenges relating to the speed and costs of running Trino in the cloud
- The new Trino file system cache feature overview, including the latest development status and test results
- A multi-level cache framework for maximized speed, including Trino file system cache and Alluxio distributed cache
- Real-world cases, including a large online payment firm and a top ridesharing company
- The future roadmap of Trino file system cache and Trino-Alluxio integration
Boost Your Savings with These Money Management AppsJhone kinadey
A money management app can transform your financial life by tracking expenses, creating budgets, and setting financial goals. These apps offer features like real-time expense tracking, bill reminders, and personalized insights to help you save and manage money effectively. With a user-friendly interface, they simplify financial planning, making it easier to stay on top of your finances and achieve long-term financial stability.
Superpower Your Apache Kafka Applications Development with Complementary Open...Paul Brebner
Kafka Summit talk (Bangalore, India, May 2, 2024, https://events.bizzabo.com/573863/agenda/session/1300469 )
Many Apache Kafka use cases take advantage of Kafka’s ability to integrate multiple heterogeneous systems for stream processing and real-time machine learning scenarios. But Kafka also exists in a rich ecosystem of related but complementary stream processing technologies and tools, particularly from the open-source community. In this talk, we’ll take you on a tour of a selection of complementary tools that can make Kafka even more powerful. We’ll focus on tools for stream processing and querying, streaming machine learning, stream visibility and observation, stream meta-data, stream visualisation, stream development including testing and the use of Generative AI and LLMs, and stream performance and scalability. By the end you will have a good idea of the types of Kafka “superhero” tools that exist, which are my favourites (and what superpowers they have), and how they combine to save your Kafka applications development universe from swamploads of data stagnation monsters!
Consistent toolbox talks are critical for maintaining workplace safety, as they provide regular opportunities to address specific hazards and reinforce safe practices.
These brief, focused sessions ensure that safety is a continual conversation rather than a one-time event, which helps keep safety protocols fresh in employees' minds. Studies have shown that shorter, more frequent training sessions are more effective for retention and behavior change compared to longer, infrequent sessions.
Engaging workers regularly, toolbox talks promote a culture of safety, empower employees to voice concerns, and ultimately reduce the likelihood of accidents and injuries on site.
The traditional method of conducting safety talks with paper documents and lengthy meetings is not only time-consuming but also less effective. Manual tracking of attendance and compliance is prone to errors and inconsistencies, leading to gaps in safety communication and potential non-compliance with OSHA regulations. Switching to a digital solution like Safelyio offers significant advantages.
Safelyio automates the delivery and documentation of safety talks, ensuring consistency and accessibility. The microlearning approach breaks down complex safety protocols into manageable, bite-sized pieces, making it easier for employees to absorb and retain information.
This method minimizes disruptions to work schedules, eliminates the hassle of paperwork, and ensures that all safety communications are tracked and recorded accurately. Ultimately, using a digital platform like Safelyio enhances engagement, compliance, and overall safety performance on site. https://safelyio.com/
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...kalichargn70th171
Visual testing plays a vital role in ensuring that software products meet the aesthetic requirements specified by clients in functional and non-functional specifications. In today's highly competitive digital landscape, users expect a seamless and visually appealing online experience. Visual testing, also known as automated UI testing or visual regression testing, verifies the accuracy of the visual elements that users interact with.
Enhanced Screen Flows UI/UX using SLDS with Tom KittPeter Caitens
Join us for an engaging session led by Flow Champion, Tom Kitt. This session will dive into a technique of enhancing the user interfaces and user experiences within Screen Flows using the Salesforce Lightning Design System (SLDS). This technique uses Native functionality, with No Apex Code, No Custom Components and No Managed Packages required.
🏎️Tech Transformation: DevOps Insights from the Experts 👩💻campbellclarkson
Connect with fellow Trailblazers, learn from industry experts Glenda Thomson (Salesforce, Principal Technical Architect) and Will Dinn (Judo Bank, Salesforce Development Lead), and discover how to harness DevOps tools with Salesforce.
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
The Role of DevOps in Digital Transformation.pdfmohitd6
DevOps plays a crucial role in driving digital transformation by fostering a collaborative culture between development and operations teams. This approach enhances the speed and efficiency of software delivery, ensuring quicker deployment of new features and updates. DevOps practices like continuous integration and continuous delivery (CI/CD) streamline workflows, reduce manual errors, and increase the overall reliability of software systems. By leveraging automation and monitoring tools, organizations can improve system stability, enhance customer experiences, and maintain a competitive edge. Ultimately, DevOps is pivotal in enabling businesses to innovate rapidly, respond to market changes, and achieve their digital transformation goals.
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid
IBM watsonx Code Assistant for Z, our latest Generative AI-assisted mainframe application modernization solution. Mainframe (IBM Z) application modernization is a topic that every mainframe client is addressing to various degrees today, driven largely from digital transformation. With generative AI comes the opportunity to reimagine the mainframe application modernization experience. Infusing generative AI will enable speed and trust, help de-risk, and lower total costs associated with heavy-lifting application modernization initiatives. This document provides an overview of the IBM watsonx Code Assistant for Z which uses the power of generative AI to make it easier for developers to selectively modernize COBOL business services while maintaining mainframe qualities of service.
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...The Third Creative Media
"Navigating Invideo: A Comprehensive Guide" is an essential resource for anyone looking to master Invideo, an AI-powered video creation tool. This guide provides step-by-step instructions, helpful tips, and comparisons with other AI video creators. Whether you're a beginner or an experienced video editor, you'll find valuable insights to enhance your video projects and bring your creative ideas to life.
Stork Product Overview: An AI-Powered Autonomous Delivery FleetVince Scalabrino
Imagine a world where instead of blue and brown trucks dropping parcels on our porches, a buzzing drove of drones delivered our goods. Now imagine those drones are controlled by 3 purpose-built AI designed to ensure all packages were delivered as quickly and as economically as possible That's what Stork is all about.
4. Flows on OpenVNet
vnflows outputs the flows in a nice format
[root@dev1 ~]# ovs-ofctl -O Openflow13 dump-flows br0 | vnflows!
!
(0): TABLE_CLASSIFIER!
0-00 174 0 =>
actions=write_metadata:REMOTE(0x80000000000/0xc0000000000),goto_table:TABLE_TUNNEL_PORTS(3)!
0-01 2 0 => tun_id=0 actions=drop!
0-02 220 0 => in_port=3 actions=write_metadata:TYPE_INTERFACE|
LOCAL(0x700040000000005/0xff000c00ffffffff),goto_table:TABLE_INTERFACE_EGRESS_CLASSIFIER(15)!
0-02 310 0 => in_port=1 actions=write_metadata:TYPE_INTERFACE|
REMOTE(0x700080000000001/0xff000c00ffffffff),goto_table:TABLE_INTERFACE_INGRESS_CLASSIFIER(10)!
0-02 180 0 => in_port=LOCAL
actions=write_metadata:LOCAL(0x40000000000/0xc0000000000),goto_table:TABLE_LOCAL_PORT(6)!
0-02 4 0 => in_port=CONTROLLER actions=write_metadata:LOCAL|
NO_CONTROLLER(0x4040000000000/0x40c0000000000),goto_table:TABLE_CONTROLLER_PORT(7)
Next : take one piece of flows to see how it is formed….
!4
5. Flows on OpenVNet
Table Num of packets
Priority
Timeout Match Action
!
0-02 220 0 => in_port=3 actions=write_metadata:TYPE_INTERFACE|
LOCAL(0x700040000000005/0xff000c00ffffffff),goto_table:TABLE_INTERFACE_EGRES
S_CLASSIFIER(15)!
“Metadata: a maskable register value that is used to carry
information from one table to the next.”
–OpenFlow Switch Specification Version 1.1.0
!5
6. Metadata
OpenVNet has its own usage of the metadata
63 0
metadata value field
0 - 31 (32bits)
56 55 40 31
metadata flag field
40 - 55 (16bits)
metadata type field
56 - 63 (8bits)
!6
8. Matching metadata
Suppose a flow contains the following condition match
metadata=TYPE_INTERFACE(0x70000000000000d/0xff000000ffffffff)
& filter == 0x70000000000000d
ex.)
metadata
metadata carried from another table
10-10 128 0 => metadata=TYPE_INTERFACE(0x700000000000001/0xff000000ffffffff)
actions=goto_table:TABLE_INTERFACE_INGRESS_MAC(11)
!8
9. We look at…
Packet from VM1 to VM5 (only ARP REQUEST)
but it helps you understand flows for other packets
!9
10. VM1 sends an ARP REQUEST packet
0-02 221 0 => in_port=2 actions=write_metadata:TYPE_INTERFACE|
LOCAL(0x700040000000004/0xff000c00ffffffff),goto_table:TABLE_INTERFACE_EGRESS_CLASSIFIER
(15)
public line
datapath
eth0
eth1
2 3
VM1
vna
VM2
host1
Don’t forget metadata value!!
we use a lot…
metadata = 0x700040000000004
!10
11. 15-40 5 0 =>
arp,metadata=TYPE_INTERFACE(0x700000000000004/0xff000000ffffffff)
,dl_src=02:00:00:00:00:01,arp_spa=10.101.0.10,arp_sha=02:00:00:00
:00:01
actions=write_metadata:TYPE_NETWORK(0x300000000000002/0xff000000f
fffffff),goto_table:TABLE_INTERFACE_EGRESS_FILTER(18)
metadata = 0x700040000000004
public line
datapath
eth0
eth1
2 3
VM1
vna
VM2
host1
MAC address
02:00:00:00:00:01
!
IP address
10.101.0.10
0x300040000000002
!11
15. DatapathNetwork
52-01 2 0 =>
metadata=TYPE_NETWORK(0x300000000000002/0xff000000ffffffff)
actions=set_field:02:00:00:bb:00:01->eth_dst,output:
1,set_field:ff:ff:ff:ff:ff:ff-
>eth_dst,goto_table:TABLE_FLOOD_TUNNELS(53)
Pseudo broadcast MAC address internally used by OpenVNet
datapath
eth0
eth1
2 3
VM1
vna
VM2
datapath
eth0
eth1
2 3
VM3
vna
VM4
host1 host2
Modify 02:00:00:bb:00:01
to ff:ff:ff:ff:ff:ff then send
to VM3
!15
16. Set tunnel ID then output to GRE port
53-01 2 0 =>
metadata=TYPE_NETWORK(0x300000000000002/0xff000000ffffffff)
actions=set_field:0x80000002->tun_id,output:19
public line
datapath
eth0
eth1
2 3
VM1
vna
L3 switch
GRE tunnel
VM2
datapath
eth0
eth1
2 3
VM5
vna
VM6
host1 host3
!16
17. Packet arrived to host3
Write METADATA_FLAG_REMOTE because the packet came
from another host
0-00 345 0 =>
actions=write_metadata:REMOTE(0x80000000000/0xc0000000000),goto_
table:TABLE_TUNNEL_PORTS(3)
metadata = 0x000080000000002
!17
tun_id = 0x80000002
18. port number of GRE tunnel on host3
3-30 175 0 => in_port=38
actions=goto_table:TABLE_TUNNEL_NETWORK_IDS(4)!
!
4-30 174 0 => tun_id=0x80000002
actions=write_metadata:TYPE_NETWORK(0x300000000000002/0xff000000
ffffffff),goto_table:TABLE_NETWORK_SRC_CLASSIFIER(20)!
!
20-40 391 0 =>
metadata=TYPE_NETWORK(0x300000000000002/0xff000000ffffffff)
actions=goto_table:TABLE_VIRTUAL_SRC(21)
0x300080000000002
metadata = 0x000080000000002
!18
tun_id = 0x80000002
19. Mac learning
21-81 5 0 => arp,metadata=TYPE_NETWORK|
REMOTE(0x300080000000002/0xff000c00ffffffff)
actions=learn(table=41,idle_timeout=36000,priority=35,cookie=0x4000000000
00002,metadata=0x300040000000002,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:N
XM_NX_TUN_ID[]-
>NXM_NX_TUN_ID[],output:NXM_OF_IN_PORT[]),goto_table:TABLE_ROUTE_INGRESS_
INTERFACE(30)
public line
datapath
eth0
MAC address
02:00:00:00:00:01
!
IP address
10.101.0.10
eth1
2 3
VM1
vna
GRE tunnel L3 switch
VM2
datapath
eth0
2 3
VM5
vna
VM6
Learning MAC address!
02:00:00:00:00:01!
comes from eth0
host1 host3
!19
21. 50-00 7 0 =>
actions=goto_table:TABLE_FLOOD_LOCAL(51)!
51-01 3 0 =>
metadata=TYPE_NETWORK(0x300000000000002/0xff000000ffffffff)
actions=output:2,goto_table:TABLE_FLOOD_SEGMENT(52)!
!
52-10 6 0 =>
metadata=REMOTE(0x80000000000/0xc0000000000) actions=drop
Packet public line
is sent to port 2,
which is associated with VM5
datapath
eth0
It then drops the packet
since no more forwarding is needed.
metadata = 0x300080000000002
eth1
2 3
VM1
vna
L3 switch
GRE tunnel
VM2
datapath
eth0
2 3
VM5
vna
VM6
host1 host3
!21