Best practices for Hyper-V backups by Greg ShieldsVeeam Software
Best practices, VSS process in details and the 3 things you need to ensure for your Hyper-V disaster recovery are discussed in this session with Greg Shields.
Best practices for Hyper-V backups by Greg ShieldsVeeam Software
Best practices, VSS process in details and the 3 things you need to ensure for your Hyper-V disaster recovery are discussed in this session with Greg Shields.
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)Lars Marowsky-Brée
A presentation discussing various aspects that affect performance of Ceph clusters, and how to map, model, and predict their performance.
This lays the groundwork for building a Ceph cluster measurement and benchmark suite that eventually will build up a data corpus on performance characteristics that can be used to answer these key questions:
- How to build a storage system that meets my requirements?
- If I build a system like this, what will its characteristics be?
- If I change XY in my existing system, how will its characteristics change?
This deck was build for a virtualization workshop part of a broader Big Data architecture course at Geeks Academy. It contains a theory part and some hands on exercise.
After you decide to embark upon the big data journey, here are some practical tips on how to design, deploy, tune, and even connect your cluster to existing data sources
Redundant Arrays of independent disks is a family of techniques that use multiple disks that are organized to provide high performance and/or reliability
RAID is the use of multiple disks and data distribution techniques to get better Resilience and/or Performance.
RAID stands for:
Redundant
Array of
Inexpensive / Independent
Disks
Raid- Redundant Array of Inexpensive DisksMudit Mishra
The basically RAID was to combine multiple, small inexpensive disks drive into an array of disk drives which yields performance exceeding that of a Single, Large Expensive Drive(SLED). Additionally this array of drives appear to the computer as a single logical storage unit or drive.
MongoDB World 2015 - A Technical Introduction to WiredTigerWiredTiger
MongoDB 3.0 introduces a new pluggable storage engine API and a new storage engine called WiredTiger. The engineering team behind WiredTiger team has a long and distinguished career, having architected and built Berkeley DB, now the world's most widely used embedded database. In this talk we will describe our original design goals for WiredTiger, including considerations we made for heavily threaded hardware, large on-chip caches, and SSD storage. We'll also look at some of the latch-free and non-blocking algorithms we've implemented, as well as other techniques that improve scaling, overall throughput and latency. Finally, we'll take a look at some of the features we hope to incorporate into WiredTiger and MongoDB in the future.
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)Lars Marowsky-Brée
A presentation discussing various aspects that affect performance of Ceph clusters, and how to map, model, and predict their performance.
This lays the groundwork for building a Ceph cluster measurement and benchmark suite that eventually will build up a data corpus on performance characteristics that can be used to answer these key questions:
- How to build a storage system that meets my requirements?
- If I build a system like this, what will its characteristics be?
- If I change XY in my existing system, how will its characteristics change?
This deck was build for a virtualization workshop part of a broader Big Data architecture course at Geeks Academy. It contains a theory part and some hands on exercise.
After you decide to embark upon the big data journey, here are some practical tips on how to design, deploy, tune, and even connect your cluster to existing data sources
Redundant Arrays of independent disks is a family of techniques that use multiple disks that are organized to provide high performance and/or reliability
RAID is the use of multiple disks and data distribution techniques to get better Resilience and/or Performance.
RAID stands for:
Redundant
Array of
Inexpensive / Independent
Disks
Raid- Redundant Array of Inexpensive DisksMudit Mishra
The basically RAID was to combine multiple, small inexpensive disks drive into an array of disk drives which yields performance exceeding that of a Single, Large Expensive Drive(SLED). Additionally this array of drives appear to the computer as a single logical storage unit or drive.
MongoDB World 2015 - A Technical Introduction to WiredTigerWiredTiger
MongoDB 3.0 introduces a new pluggable storage engine API and a new storage engine called WiredTiger. The engineering team behind WiredTiger team has a long and distinguished career, having architected and built Berkeley DB, now the world's most widely used embedded database. In this talk we will describe our original design goals for WiredTiger, including considerations we made for heavily threaded hardware, large on-chip caches, and SSD storage. We'll also look at some of the latch-free and non-blocking algorithms we've implemented, as well as other techniques that improve scaling, overall throughput and latency. Finally, we'll take a look at some of the features we hope to incorporate into WiredTiger and MongoDB in the future.
engage 2019 - 15 Domino v10 Admin features we LOVEChristoph Adler
Domino 10 shipped jam-packed with new features that will make administrators' lives a breeze. In this talk, we'll share everything we know and love about our 15 new favorites—from the long-awaited NSF size limit boost, to brand-new gems like Domino General Query Facility (DGQF), deletion logging and more. You'll learn how to get the most out of all of them, proven through practical customer examples. You'll walk away from this fast-paced, in-depth session with a solid understanding of the new way to administer Domino 10, as well as a hands-on guide to properly put these great features to use!
The Ultimate IBM and Lotus on Linux Workshop for Windows AdminsBill Malchisky Jr.
Linux is quite simple to learn and understand when you have proper comprehension of the fundamentals. So let's teach attendees about the insights into administering a Linux server, allowing you to manage your IBM/Lotus applications with ease. You will receive highlights of the full training course Bill teaches his clients: application install tips, Linux shell techniques, basic scripting, and your questions answered throughout the class.
Given at Midwest LUG 2012 and UKLUG 2012
My Presentation from the ILUG 2010 Belfast conference.
Here the Abstract: "Come to this session to learn on real examples how to read and understand those NSD files that can give you so mush information for troubleshooting and debugging your Domino Servers, Notes Clients and even your Applications. You will learn how to find what files and documents has been open, what agents has been running and how much memory was available, as the last crash occurred. You will also see all kinds of tips and tricks around the system diagnostics, that will allow you to troubleshoot problems faster and more effective. "
Robust Applications in Mesos using External StorageDavid vonThenen
Containers are starting to reach the masses and people are using them in ways other than what was originally intended. We now find persistent applications like SQL and NoSQL databases being run in container schedulers like Mesos, but how do we guarantee data availability for production applications in the wake of compute node failures? There are options for using direct attached or external storage, but the devil is in the details, as choices in storage types have significant repercussions.
We will discuss the benefits and challenges of using direct attached or external storage and how that impacts applications running in production environments. The trade-offs of each decision have interesting consequences starting from initial deployment to "day 2" operations and even how these applications tolerate system failures.
#DNUG45 - IBM Notes and Domino Performance Boost - ReloadedChristoph Adler
There is always room for improvement!!! Maximizing the IBM Notes client and Domino server to performance doesn't have to be complicated! Reloaded for the latest IBM Notes/Domino 9 version (9.0.1 Feature Pack 10 or later), join Chris and Luis to find out the best and latest performance tuning tips. Learn how to debug your clients(s) and server(s), deal with outdated ODS, network latency, application/mail performance issues and more. Improve your IBM Notes client installations to provide a better experience for happier administration and happier end users! As a special bonus, Chris will show you how to reduce the startup time of virtualized IBM Notes Clients (Citrix / VMWare / etc).
Hadoop is an open-source software framework for storing data and running applications on clusters of commodity hardware.
It provides massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or jobs. The core of Apache Hadoop consists of a storage part (HDFS) and a processing part (MapReduce).
MongoDB: Advantages of an Open Source NoSQL DatabaseFITC
Save 10% off ANY FITC event with discount code 'slideshare'
See our upcoming events at www.fitc.ca
OVERVIEW
The presentation will present an overview of the MongoDB NoSQL database, its history and current status as the leading NoSQL database. It will focus on how NoSQL, and in particular MongoDB, benefits developers building big data or web scale applications. Discuss the community around MongoDB and compare it to commercial alternatives. An introduction to installing, configuring and maintaining standalone instances and replica sets will be provided.
Presented live at FITC's Spotlight:MEAN Stack on March 28th, 2014.
More info at FITC.ca
How to bi your operations with System Center 2012 R2 using Operations Manager...hypervnu
System Center Summer Night - How to bi your operations with System Center 2012 R2 using Operations Manager and Service Manager - Oskar Landman en Walter Eikenboom
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Monitoring Java Application Security with JDK Tools and JFR Events
Windows 8 dddd (beekelaar)
1. Windows 8
Disk Deduplication Deep Dive
Ronald Beekelaar
Virsoft Solutions
ronald@beekelaar.com
Schiphol, 19 jan 2012
2. Introductions
• Presenter
– MVP Security
– MVP Virtual Machine Technology
– E-mail: ronald@beekelaar.com
• Work
– Security consultancy
– Virtualization consultancy
– Create many VM-based labs and demos
– Software to optimize, manage and run VM
– Maintain four datacenters world-wide
• Running Hyper-V labs for customers (MOC, training and demo purposes)
4. What is Disk Deduplication ?
• Goal:
– Use less storage space
• Method:
– Ensure that identical content in multiple (large) files is
only stored once
• Is block-based, post-process, transparant solution
5. Standard deduplication modes
• "Source"
– Prevent transferring data, if duplicate
• Used by Remote Differential Compression
• "Inline"
– Perform deduplication when data is written
• Used by NTFS file compression
• Write process is slowed down
• "Post-Process" (or "Background")
– Perform deduplication later, in background, when idle
• Used by Windows 8 Data Deduplication
6. Other methods to save disk space
• SIS (single-instance-store) in Win2000
– Is file-based, not block-based
• NTFS file compression
– Is inline, not post-process
– Much more CPU intensive
• NTFS hard links
– Is not transparent
– Is file-based, not block-based
7. NTFS Hard Links
• Multiple file entries pointing to same data
• Manage
– Create: mklink /h link.ext target.ext
– List: fsutil hardlink list file.ext
• Is not transparent
– Edit one hardlink file, also changes other files
• Windows uses thousands of hard links (!)
– Good reason not to touch C:Windowswinsxs
8. Windows 8 dedup architecture
• Is file-system filter driver
– Coordinates between file entry, regular storage
and 'chunk' storage
• Dedup service (ddpsvc)
runs jobs to deduplicate
files
9. How does Windows 8 dedup work?
• Dedup service recognizes common 'chunks' in
files, and places those in Chunk Store
– In System Volume Information folder
• Dedup filter driver ensures that applications read
correct file content
• File "size" (= content length) does not change in
Explorer
– Explorer reports "size-on-disk" as 4 KB
11. Windows 8 dedup details
• Dedup works per volume
– Also works on portable disks
– Dedup does NOT work on C: (Windows) volume
• Chunk size is 32-128 KB (average 80 KB)
• By default
– Chunks are compressed in chunk store
• Avoids re-compressing compressed files (zip, etc)
– Dedup service ignores files < 64 KB
– Dedup service ignores files changed in last 30 days
– Dedup service ignores NTFS encrypted files
13. Performance?
• Write has no direct performance hit
– Dedup operations are done post-process
• Read has a ~3% performance hit (if not in cache)
– Due to more disk head operations
– Compare with disk fragmentation
• Windows caching is dedup-aware (!)
– Dedup improves caching efficience
14. Reliable?
• My opinion: Yes - 100%
• Data is check-summed
– Means: invalid data is detected
• Operations are crash consistent
– Means: can interrupt/crash operation at any time without losing
data
• Data is self-describing
– Means: it can be read without external data
• Popular 'chunks' (>100x) are stored multiple times
– Means: avoids creating IO hotspots on disk
January 20, 2012 NIC 2012
15. How to enable Windows 8 dedup?
• Install Data Deduplication role service
• Start Data Duplication Service (ddpsvc)
• Powershell
– import-module Deduplication
– help dedup
– enable-dedupvolume D:
– set-dedupvolume D: -minimumfileagedays 0
• Default is 30 days
– start-dedupjob D: -type Optimization
• Use Unoptimization to undo
– get-dedupjob
– get-dedupstatus
– get-dedupmetadata