Presenter: Dean Richards of Confio Software
If you're a developer or DBA, this presentation will outline a method for determining the best execution plan for a query every time by utilizing SQL Diagramming techniques.
Whether you're a beginner or expert, this approach will save you countless hours tuning a query.
You Will Learn:
* SQL Tuning Methodology
* Response Time Tuning Practices
* How to use SQL Diagramming techniques to tune SQL statements
* How to read executions plans
Customer Relationship Management (CRM) and The Real Estate ProfessionalIXACT Contact
Effective customer relationship management (CRM) is important for real estate professionals to develop strong relationships with clients and contacts over time. Maintaining rich contact profiles in a CRM system allows agents to have meaningful interactions and stay informed on clients' personal details. Regular communication outlined in a plan is key to nurturing relationships and generating referrals. Selecting a full-featured real estate CRM provides tools for tasks like email marketing, calendar management and wireless syncing to efficiently run a business.
The document discusses SAS Insurance Analytics Architecture, which provides a solution for insurers' business intelligence and analytical requirements. It addresses challenges from siloed and inconsistent data by creating a single data model and implementing data integration and quality tools. The architecture supports various business processes and provides reporting, visualization, and predictive analytics capabilities to help insurers make better decisions.
This document discusses techniques for hardening a Salesforce org against cybersecurity threats. It covers Salesforce security at the infrastructure and application levels. It also recommends best practices like using two-factor authentication, auditing permissions, and providing security training for users. The document promotes the Salesforce Toolkit and a free online cybersecurity course for further resources.
Database in Kubernetes: Diagnostics and MonitoringSveta Smirnova
Kubernetes is the new cool in 2023. Many database installations are on Kubernetes now. And this creates challenges for Support engineers because traditional monitoring and diagnostic tools work differently on bare hardware and Kubernetes. In this session, I will focus on differences in methods we use to collect metrics, describe challenges that Percona Support hits when working with database installations on Kubernetes, and discuss how we resolve them. This talk will cover all database technologies we support: MySQL, MongoDB, and PostgreSQL.
Presented at Percona Live 2023
This presentation template contains over 35 slide layouts for creating Salesforce presentations. It provides guidelines on typesetting, imagery, and icons to maintain a consistent brand style. Editable elements like maps, devices, and line art icons allow for customizing slides directly in PowerPoint.
The document discusses a presentation on Apex Enterprise Patterns by Amit Jain. It includes a safe harbor statement noting that any forward-looking statements in the presentation are subject to risks and uncertainties that could cause actual results to differ materially. It also notes that unreleased services mentioned may not be delivered on time or at all, and purchase decisions should be based on currently available features.
Presenter: Dean Richards of Confio Software
If you're a developer or DBA, this presentation will outline a method for determining the best execution plan for a query every time by utilizing SQL Diagramming techniques.
Whether you're a beginner or expert, this approach will save you countless hours tuning a query.
You Will Learn:
* SQL Tuning Methodology
* Response Time Tuning Practices
* How to use SQL Diagramming techniques to tune SQL statements
* How to read executions plans
Customer Relationship Management (CRM) and The Real Estate ProfessionalIXACT Contact
Effective customer relationship management (CRM) is important for real estate professionals to develop strong relationships with clients and contacts over time. Maintaining rich contact profiles in a CRM system allows agents to have meaningful interactions and stay informed on clients' personal details. Regular communication outlined in a plan is key to nurturing relationships and generating referrals. Selecting a full-featured real estate CRM provides tools for tasks like email marketing, calendar management and wireless syncing to efficiently run a business.
The document discusses SAS Insurance Analytics Architecture, which provides a solution for insurers' business intelligence and analytical requirements. It addresses challenges from siloed and inconsistent data by creating a single data model and implementing data integration and quality tools. The architecture supports various business processes and provides reporting, visualization, and predictive analytics capabilities to help insurers make better decisions.
This document discusses techniques for hardening a Salesforce org against cybersecurity threats. It covers Salesforce security at the infrastructure and application levels. It also recommends best practices like using two-factor authentication, auditing permissions, and providing security training for users. The document promotes the Salesforce Toolkit and a free online cybersecurity course for further resources.
Database in Kubernetes: Diagnostics and MonitoringSveta Smirnova
Kubernetes is the new cool in 2023. Many database installations are on Kubernetes now. And this creates challenges for Support engineers because traditional monitoring and diagnostic tools work differently on bare hardware and Kubernetes. In this session, I will focus on differences in methods we use to collect metrics, describe challenges that Percona Support hits when working with database installations on Kubernetes, and discuss how we resolve them. This talk will cover all database technologies we support: MySQL, MongoDB, and PostgreSQL.
Presented at Percona Live 2023
This presentation template contains over 35 slide layouts for creating Salesforce presentations. It provides guidelines on typesetting, imagery, and icons to maintain a consistent brand style. Editable elements like maps, devices, and line art icons allow for customizing slides directly in PowerPoint.
The document discusses a presentation on Apex Enterprise Patterns by Amit Jain. It includes a safe harbor statement noting that any forward-looking statements in the presentation are subject to risks and uncertainties that could cause actual results to differ materially. It also notes that unreleased services mentioned may not be delivered on time or at all, and purchase decisions should be based on currently available features.
MySQL Database Monitoring: Must, Good and Nice to HaveSveta Smirnova
It is very easy to find if a database installation is having issues. You only need to enable Operating System monitoring. A disk, memory, or CPU usage change will alert you about the problems. But they would not show *why* the trouble happens. You need the help of database-specific monitoring tools.
As a Support Engineer, I am always very upset when handling complaints about the database behavior lacking specific database monitoring data because I cannot help!
There are two reasons database and system administrators do not enable necessary instrumentation. The first is a natural or expected performance impact. Second is the lack of knowledge on what needs to be on to resolve a particular issue.
In this talk, I will cover both concerns.
I will show which monitoring instruments will give information on what causes disk, memory, or CPU problems.
I will teach you how to use them.
I will uncover which performance impact these instruments have.
I will use both MySQL command-line client and open-source graphical instrument Percona Monitoring and Management (PMM) for the examples.
Microsoft Dynamics 365 is a suite of business applications that include sales, customer service, field service, project service automation, operations, finance, and marketing. It runs on a common application platform with PowerApps, Microsoft Flow, and Common Data Service. Dynamics 365 has evolved from previous Microsoft offerings like Dynamics CRM and AX. It is available in two editions - Enterprise for larger organizations and Business for smaller organizations. The Enterprise edition provides more functionality across various modules while the Business edition focuses on financials, sales, purchasing, inventory and project management. Licensing is structured with full users and light users.
Org-dependent unlocked packages are a variation of unlocked packages that allow you to create packages that depend on unpackaged metadata in the installation org. You can use org-dependent unlocked packages when untangling your production org metadata is a daunting project. When you use org-dependent unlocked packages, metadata validation occurs during package installation, instead of during package version creation.
Using Personas for Salesforce Accessibility and SecuritySalesforce Admins
The document provides an overview of using personas for Salesforce permissions and security configurations. It discusses how personas can group users based on shared behaviors, goals, and tasks to help design more targeted security profiles and permission sets. The speakers then provide examples of two personas - a "Pipeline Builder" and "Deal Closer" - and how their different behaviors and tasks would translate to customized security configurations and sharing rules. Resources for learning more about personas and Salesforce security best practices are also listed.
Salesforce Security Best Practices for Every AdminCloud Analogy
In this presentation, we will discuss Salesforce Security Best Practices for Every Admin.
Following these advanced Salesforce Security best practices will help us get most of the powerful and out-of-the-box Salesforce CRM system. Through it, Salesforce admins can easily leverage all of the platform’s features to safeguard their company and customers' data.
Sales Excellence does not describe a state, but rather a continuous process. The Kienbaum Sales Excellence Model provides guidance in this process. It serves on a theoretical, as well as practical level, as it guides through the ten fundamental components of sales. It has proven itself in practice as an analytical and optimization tool used in various industries and sales segments.
Webinar: PostgreSQL continuous backup and PITR with BarmanGabriele Bartolini
How can you achieve an RTO of 5 minutes for the backups of your PostgreSQL databases? And what about RPO=0 for zero data loss backups?
This webinar gave an answer to those questions, by providing an overview of Disaster Recovery of PostgreSQL databases with Barman, covering its major features.
Barman, Backup and Recovery Manager for PostgreSQL, is an open source tool that was conceived by 2ndQuadrant about 10 years ago and released open source in 2012 under GNU GPL 3.
It is now one of the most popular backup and recovery tools in the PostgreSQL ecosystem.
Video available at https://resources.2ndquadrant.com/en/webinar-postgresql-continuous-backup-and-pitr-with-barman
1. The document discusses breaking trusts between Active Directory forests by leveraging compromised unconstrained delegation and the "printer bug" to coerce authentication across forest boundaries.
2. It explains how a compromised server with unconstrained delegation in one forest can be used to extract ticket granting tickets (TGTs) that can then be reused to access resources in a separate, trusting forest.
3. The "printer bug" allows remotely forcing authentication and is used to extract TGTs from the separate forest to circumvent typical cross-forest security restrictions. This bypasses the assumption that forests provide a security boundary when two-way trusts exist between them.
Replication Troubleshooting in Classic VS GTIDMydbops
This presentation talk will assist you in troubleshooting MySQL replication for the most common issues we might face with a simple comparison of how can we get them solved in the different replication methods (Classic VS GTID).
0wn-premises: Bypassing Microsoft Defender for IdentityNikhil Mittal
This document discusses bypassing alerts from Microsoft Defender for Identity (MDI). It begins with an introduction to MDI and the types of alerts it generates. It then explores techniques for bypassing alerts during different phases of an attack like reconnaissance, credential compromise, and lateral movement. These include using alternative tools, limiting interactions with domain controllers, and complying with Kerberos policies. The document also notes techniques like silver tickets that are not detected by MDI. It concludes by acknowledging limitations of only testing alerts and not coupled defenses.
Salesforce sharing and visibility Part 1Ahmed Keshk
This document provides an overview of Salesforce sharing and visibility settings including profiles, permission sets, field level security, record level security, organization wide defaults, and role hierarchies. It discusses how profiles control user access and permissions. Permission sets extend user access without changing profiles. Field level security controls field visibility. Record level security and organization wide defaults specify default sharing while role hierarchies ensure managers have access to subordinate records.
This document discusses Uber's machine learning platform called Michelangelo. It describes how ML is used across Uber for applications like ETAs, Uber Eats, autonomous vehicles, and more. It outlines the goals and components of the Michelangelo platform, including a feature store, scalable training, partitioned models, visualization, sharded deployment, and live monitoring. The platform aims to standardize ML workflows and tools to make ML more accessible and accelerate development.
How to Manage Scale-Out Environments with MariaDB MaxScaleMariaDB plc
MaxScale is a database proxy that provides load balancing, connection pooling, and replication capabilities for MariaDB and MySQL databases. It can be used to scale databases horizontally across multiple servers for increased performance and availability. The document provides an overview of MaxScale concepts and capabilities such as routing, filtering, security features, and how it can be used for operational tasks like query caching, logging, and data streaming. It also includes instructions on setting up MaxScale with a basic example of configuring read/write splitting between a master and slave database servers.
Best Practices of HA and Replication of PostgreSQL in Virtualized EnvironmentsJignesh Shah
This document discusses best practices for high availability (HA) and replication of PostgreSQL databases in virtualized environments. It covers enterprise needs for HA, technologies like VMware HA and replication that can provide HA, and deployment blueprints for HA, read scaling, and disaster recovery within and across datacenters. The document also discusses PostgreSQL's different replication modes and how they can be used for HA, read scaling, and disaster recovery.
Do you want to learn how to build a completely generic interface architecture that can call any external class from within a managed package? Join us as we review an extension architecture that implements an interface to generically call external packages, plus methods in a target org that are unknown during base package build. You'll learn how to build dynamic and robust managed packages that can handle many unknowns, like different editions, custom objects or unknown sharing models.
This document provides an overview of five steps to improve PostgreSQL performance: 1) hardware optimization, 2) operating system and filesystem tuning, 3) configuration of postgresql.conf parameters, 4) application design considerations, and 5) query tuning. The document discusses various techniques for each step such as selecting appropriate hardware components, spreading database files across multiple disks or arrays, adjusting memory and disk configuration parameters, designing schemas and queries efficiently, and leveraging caching strategies.
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...Perficient, Inc.
Learn how your company can benefit from Salesforce Identity:
Connect and collaborate with employees, customers and partners— securely from anywhere, with single sign-on
Modernize and unify your identity management in the cloud
Customize and define rules for viewing and sharing data
Distribute apps through your private, company-branded AppExchange
The document discusses usage scenarios and patterns for enterprise service buses (ESBs). It provides an overview of how ESBs simplify connectivity between different applications and data formats. It then describes common usage patterns for ESBs, such as extending existing applications, connecting file and online systems, integrating remote devices, and getting the most from packaged applications. The document also discusses processing scenarios involving service virtualization, message-based integration, and event-driven integration. It provides examples of typical customer use cases.
IBM Managed File Transfer Portfolio - IBMImpact 2014Leif Davidsen
The data held in files can represent some of the most valuable assets that a business has. If this data is trapped in a file in a remote system then it loses value. IBM has recently updated its portfolio of Managed File Transfer offerings, simplifying choice for the business user and offering better value for money, while extending the access to this valuable data. Here about different managed file transfer use cases and suggested solutions
MySQL Database Monitoring: Must, Good and Nice to HaveSveta Smirnova
It is very easy to find if a database installation is having issues. You only need to enable Operating System monitoring. A disk, memory, or CPU usage change will alert you about the problems. But they would not show *why* the trouble happens. You need the help of database-specific monitoring tools.
As a Support Engineer, I am always very upset when handling complaints about the database behavior lacking specific database monitoring data because I cannot help!
There are two reasons database and system administrators do not enable necessary instrumentation. The first is a natural or expected performance impact. Second is the lack of knowledge on what needs to be on to resolve a particular issue.
In this talk, I will cover both concerns.
I will show which monitoring instruments will give information on what causes disk, memory, or CPU problems.
I will teach you how to use them.
I will uncover which performance impact these instruments have.
I will use both MySQL command-line client and open-source graphical instrument Percona Monitoring and Management (PMM) for the examples.
Microsoft Dynamics 365 is a suite of business applications that include sales, customer service, field service, project service automation, operations, finance, and marketing. It runs on a common application platform with PowerApps, Microsoft Flow, and Common Data Service. Dynamics 365 has evolved from previous Microsoft offerings like Dynamics CRM and AX. It is available in two editions - Enterprise for larger organizations and Business for smaller organizations. The Enterprise edition provides more functionality across various modules while the Business edition focuses on financials, sales, purchasing, inventory and project management. Licensing is structured with full users and light users.
Org-dependent unlocked packages are a variation of unlocked packages that allow you to create packages that depend on unpackaged metadata in the installation org. You can use org-dependent unlocked packages when untangling your production org metadata is a daunting project. When you use org-dependent unlocked packages, metadata validation occurs during package installation, instead of during package version creation.
Using Personas for Salesforce Accessibility and SecuritySalesforce Admins
The document provides an overview of using personas for Salesforce permissions and security configurations. It discusses how personas can group users based on shared behaviors, goals, and tasks to help design more targeted security profiles and permission sets. The speakers then provide examples of two personas - a "Pipeline Builder" and "Deal Closer" - and how their different behaviors and tasks would translate to customized security configurations and sharing rules. Resources for learning more about personas and Salesforce security best practices are also listed.
Salesforce Security Best Practices for Every AdminCloud Analogy
In this presentation, we will discuss Salesforce Security Best Practices for Every Admin.
Following these advanced Salesforce Security best practices will help us get most of the powerful and out-of-the-box Salesforce CRM system. Through it, Salesforce admins can easily leverage all of the platform’s features to safeguard their company and customers' data.
Sales Excellence does not describe a state, but rather a continuous process. The Kienbaum Sales Excellence Model provides guidance in this process. It serves on a theoretical, as well as practical level, as it guides through the ten fundamental components of sales. It has proven itself in practice as an analytical and optimization tool used in various industries and sales segments.
Webinar: PostgreSQL continuous backup and PITR with BarmanGabriele Bartolini
How can you achieve an RTO of 5 minutes for the backups of your PostgreSQL databases? And what about RPO=0 for zero data loss backups?
This webinar gave an answer to those questions, by providing an overview of Disaster Recovery of PostgreSQL databases with Barman, covering its major features.
Barman, Backup and Recovery Manager for PostgreSQL, is an open source tool that was conceived by 2ndQuadrant about 10 years ago and released open source in 2012 under GNU GPL 3.
It is now one of the most popular backup and recovery tools in the PostgreSQL ecosystem.
Video available at https://resources.2ndquadrant.com/en/webinar-postgresql-continuous-backup-and-pitr-with-barman
1. The document discusses breaking trusts between Active Directory forests by leveraging compromised unconstrained delegation and the "printer bug" to coerce authentication across forest boundaries.
2. It explains how a compromised server with unconstrained delegation in one forest can be used to extract ticket granting tickets (TGTs) that can then be reused to access resources in a separate, trusting forest.
3. The "printer bug" allows remotely forcing authentication and is used to extract TGTs from the separate forest to circumvent typical cross-forest security restrictions. This bypasses the assumption that forests provide a security boundary when two-way trusts exist between them.
Replication Troubleshooting in Classic VS GTIDMydbops
This presentation talk will assist you in troubleshooting MySQL replication for the most common issues we might face with a simple comparison of how can we get them solved in the different replication methods (Classic VS GTID).
0wn-premises: Bypassing Microsoft Defender for IdentityNikhil Mittal
This document discusses bypassing alerts from Microsoft Defender for Identity (MDI). It begins with an introduction to MDI and the types of alerts it generates. It then explores techniques for bypassing alerts during different phases of an attack like reconnaissance, credential compromise, and lateral movement. These include using alternative tools, limiting interactions with domain controllers, and complying with Kerberos policies. The document also notes techniques like silver tickets that are not detected by MDI. It concludes by acknowledging limitations of only testing alerts and not coupled defenses.
Salesforce sharing and visibility Part 1Ahmed Keshk
This document provides an overview of Salesforce sharing and visibility settings including profiles, permission sets, field level security, record level security, organization wide defaults, and role hierarchies. It discusses how profiles control user access and permissions. Permission sets extend user access without changing profiles. Field level security controls field visibility. Record level security and organization wide defaults specify default sharing while role hierarchies ensure managers have access to subordinate records.
This document discusses Uber's machine learning platform called Michelangelo. It describes how ML is used across Uber for applications like ETAs, Uber Eats, autonomous vehicles, and more. It outlines the goals and components of the Michelangelo platform, including a feature store, scalable training, partitioned models, visualization, sharded deployment, and live monitoring. The platform aims to standardize ML workflows and tools to make ML more accessible and accelerate development.
How to Manage Scale-Out Environments with MariaDB MaxScaleMariaDB plc
MaxScale is a database proxy that provides load balancing, connection pooling, and replication capabilities for MariaDB and MySQL databases. It can be used to scale databases horizontally across multiple servers for increased performance and availability. The document provides an overview of MaxScale concepts and capabilities such as routing, filtering, security features, and how it can be used for operational tasks like query caching, logging, and data streaming. It also includes instructions on setting up MaxScale with a basic example of configuring read/write splitting between a master and slave database servers.
Best Practices of HA and Replication of PostgreSQL in Virtualized EnvironmentsJignesh Shah
This document discusses best practices for high availability (HA) and replication of PostgreSQL databases in virtualized environments. It covers enterprise needs for HA, technologies like VMware HA and replication that can provide HA, and deployment blueprints for HA, read scaling, and disaster recovery within and across datacenters. The document also discusses PostgreSQL's different replication modes and how they can be used for HA, read scaling, and disaster recovery.
Do you want to learn how to build a completely generic interface architecture that can call any external class from within a managed package? Join us as we review an extension architecture that implements an interface to generically call external packages, plus methods in a target org that are unknown during base package build. You'll learn how to build dynamic and robust managed packages that can handle many unknowns, like different editions, custom objects or unknown sharing models.
This document provides an overview of five steps to improve PostgreSQL performance: 1) hardware optimization, 2) operating system and filesystem tuning, 3) configuration of postgresql.conf parameters, 4) application design considerations, and 5) query tuning. The document discusses various techniques for each step such as selecting appropriate hardware components, spreading database files across multiple disks or arrays, adjusting memory and disk configuration parameters, designing schemas and queries efficiently, and leveraging caching strategies.
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...Perficient, Inc.
Learn how your company can benefit from Salesforce Identity:
Connect and collaborate with employees, customers and partners— securely from anywhere, with single sign-on
Modernize and unify your identity management in the cloud
Customize and define rules for viewing and sharing data
Distribute apps through your private, company-branded AppExchange
The document discusses usage scenarios and patterns for enterprise service buses (ESBs). It provides an overview of how ESBs simplify connectivity between different applications and data formats. It then describes common usage patterns for ESBs, such as extending existing applications, connecting file and online systems, integrating remote devices, and getting the most from packaged applications. The document also discusses processing scenarios involving service virtualization, message-based integration, and event-driven integration. It provides examples of typical customer use cases.
IBM Managed File Transfer Portfolio - IBMImpact 2014Leif Davidsen
The data held in files can represent some of the most valuable assets that a business has. If this data is trapped in a file in a remote system then it loses value. IBM has recently updated its portfolio of Managed File Transfer offerings, simplifying choice for the business user and offering better value for money, while extending the access to this valuable data. Here about different managed file transfer use cases and suggested solutions
Getting started with Enterprise Application Integration (EAI) using Enterpris...Tamim Khan
Hybrid Integration is the concept of federated on-premises and cloud-based integration combined with the improved interoperability of existing and new middleware silos of application, business-to-business (B2B), business process management (BPM), business events, business rules, and data integration.
This document discusses different integration architectures: point-to-point, hub-and-spoke, distributed, and service-oriented. It notes the advantages and disadvantages of each. Hub-and-spoke was an early formal integration technology but does not scale well. Distributed integration addresses scalability by distributing work across multiple agents. Service-oriented architecture uses loosely coupled web services. The document discusses how enterprise service buses have become the standard for creating service-oriented architectures, noting their core features and benefits like scalability, ease of expansion, and support for incremental adoption.
Independientemente de la industria, todas las compañías tienen procesos de negocio core o de misión crítica que dependen del intercambio de archivos.
Sin embargo, las empresas no cuentan con soluciones para resolver centralizadamente estos desafíos, lo que lleva a 3 problemas principales: problemas de imagen en el mercado por archivos perdidos, gastos escondidos e inconvenientes en el cumplimiento estándares de archivos.
Conozca cómo IBM a través de su suite de Sterling puede ayudarle a disminuir errores, acelerar respuesta a requerimientos y eliminar gastos escondidos de TI.
Oficina Privada Virtual Servicio en la Nube Grupo_Quando
Este documento describe un servicio de oficina privada virtual en la nube que ofrece las siguientes ventajas: requiere una inversión mínima en infraestructura, permite un despliegue rápido incluso para nuevas delegaciones, garantiza la disponibilidad constante de datos y procesos de trabajo, proporciona comunicaciones seguras, y permite la impresión local de datos remotos. El servicio incluye aplicaciones de Office, correo electrónico, almacenamiento, copias de seguridad, antivirus, acceso a Internet, y soporte técn
Este documento describe una solución modular de transferencia de archivos que permite mover y procesar archivos grandes y sensibles de forma segura, eficiente y automática entre sistemas, usuarios internos y externos. La solución cuenta con módulos opcionales para auditoría y reportes, seguridad, transferencia web, encriptación PGP, automatización de procesos y alta disponibilidad. Ha sido reconocida como líder del mercado y ayuda a empresas a cumplir con regulaciones de privacidad y seguridad de datos.
Portafolio de servicios Gerencia Tecnológica.pptxGrupoInnsumoda
Este documento describe los servicios de gerencia tecnológica que una empresa ofrece a otras empresas. Brindan soporte para servidores en la nube, telefonía VoIP, cableado estructurado e instalación de cámaras de seguridad con el objetivo de mejorar la productividad, reducir costos y brindar tranquilidad y seguridad a los clientes. También mencionan algunos de los problemas comunes de los servidores locales y los beneficios de migrar a servidores en la nube.
El documento habla sobre la optimización de infraestructura tecnológica para lograr alta disponibilidad. Explica la importancia de la gobernanza TI y los desafíos de complejidad y costos de TI. También describe soluciones como servidores blade, replicación de datos y aplicaciones, y el software MIMIX ha1 para proveer alta disponibilidad y recuperación ante desastres.
Datapower: Aceleración y Seguridad XML Sura Gonzalez
Los dispositivos Datapower ayudan a simplificar, asegurar, acelerar y gobernar su tráfico XML, servicios de Web, B2B así como amplían su infraestructura SOA.
Es una solución líder en el mercado por estar especialmente diseñada para ser desplegada rápidamente en entornos heterogéneos y que el retorno de la inversión sea inmediato. Son dispositivos que aumentan la eficacia, reducen los gastos operacionales, y mejoran el rendimiento de la inversión optimizando el uso de los activos existentes e incrementando la seguridad.
Escalabilidad en azure web sites y sql databaseEduardo Castro
Este documento presenta varios escenarios relacionados con la escalabilidad de sitios web de Azure y bases de datos SQL. Describe tres pasos para cada escenario: 1) identificar un problema de escalabilidad, adaptación al cambio o entornos múltiples, 2) proponer una solución usando características de Azure, y 3) demostrar la solución. Los escenarios incluyen escalabilidad, cambios en el código y datos, despliegues, y entornos de desarrollo, prueba y producción.
Sample Master® iMobile permite a los usuarios cargar datos de pruebas de campo en tiempo real desde dispositivos móviles al sistema LIMS sin necesidad de documentos en papel, ahorrando tiempo y dinero. La información se transmite de forma segura al laboratorio para su incorporación rápida, mejorando la eficiencia, reduciendo costos y satisfaciendo a los clientes.
Introduction to People Centric IT management? Overview unified management devices ConfigMgr R2 and Windows Intune? Sneak Peak in ConfigMgr 2012 R2 and Windows Intune
Este documento presenta los servicios y soluciones Metro Ethernet de Cisco. Explica que las nuevas necesidades de ancho de banda de las empresas están impulsando la demanda de servicios de alto ancho de banda. Describe los servicios Metro Ethernet que ofrece Cisco, como líneas Ethernet punto a punto y redes LAN Ethernet multipunto, y cómo pueden implementarse sobre diferentes tecnologías de red. También destaca los beneficios que proporcionan estos servicios a los usuarios empresariales.
Este documento describe los desafíos de la gestión de la información en la era digital, incluyendo el rápido crecimiento de los datos, la necesidad de disponibilidad y seguridad de la información, y los riesgos relacionados. También presenta las soluciones de Symantec para la gestión integral del ciclo de vida de la información, incluyendo el almacenamiento, la continuidad del negocio, la seguridad y la gestión del riesgo de información.
IBM Softlayer Webinar - 20141002 - Especial SeguridadManuel Daza
Presentación realizada en el último webinar de la oferta de cloud computing de IBM SoftLayer, el jueves 2 de octubre de 2014.
Infraestructura como Servicio, con especial énfasis en la seguridad.
Demostración: ¿Cómo acelera la plataforma Denodo su tiempo para obtener infor...Denodo
Watch full webinar here: https://bit.ly/3N6Jc6G
In this demo session, we will illustrate the power of Denodo and delve into how Denodo helps organisations make sense of disparate silos of data. We will demonstrate the Denodo advanced data catalog and our AI/ML features that help organizations democratize and govern their data.
Para desarrollar una intranet corporativa se necesita una plataforma como un servidor Pentium o RISC, un servidor de web, un servidor de mensajería, servidores de seguridad como proxy y cortafuegos, servidores de bases de datos, recursos humanos como un administrador de red y diseñador web, y un plan estratégico.
Este documento describe una solución para integrar un sistema SAP con un portal de comercio electrónico utilizando PostgreSQL como base de datos. La solución permite a los clientes realizar consultas de productos y generar pedidos en línea las 24 horas, los cuales se procesan automáticamente en SAP. El servidor PostgreSQL recibe datos del e-commerce y los sincroniza con la base de datos central para tener información centralizada. Esto reduce el tiempo de procesamiento de órdenes de 5 minutos por hora a 1 minuto por hora.
Orquestación de Microservicios Introducción a arquitecturas de desarrollo mod...ssuserc860fb
Este documento presenta una introducción a las arquitecturas de microservicios. Explica conceptos clave como definición, evolución, ventajas y componentes necesarios para una implementación correcta como descubrimiento, balanceo de carga, enrutamiento, manejo de errores y monitoreo. También cubre patrones comunes como Domain Driven Design, CQRS y arquitectura basada en eventos.
Esta presentación es el fruto de la colaboración entre Oracle Ibérica y Yo cuando prestaba servicios a Thales information Systems, es un estudio previo de la consolidación de varias bases de datos con la información de todos los aeropuertos españoles, en una única fuente de datos.
Técnicas para optimizar tus aplicaciones de SQL Server con herramientas disponibles desde SQL Server 2005. Charla de la maratón de 24 horas del capítulo virtual de SQL Pass en español.
puertos de red
XML broker, Data collector
Session Sharing, Session Reliability
module.ini: canales virtuales ICA
ica handshake
licencias de Terminal Server
WinLogon.exe
msgina, ctxgina
csrss.exe
user profiles: local, roaming, mandatory, hybrid
UserInit.exe: CmStart.exe, WfShell.exe, CltMgr.exe, UsrLogon.cmd
Seamless Windows
Autocreación de Impresoras
UPHClean
Problemas de perfiles en logoff
Problemas de latencia
Mi Carnaval, sistema utilizará algoritmos de ML para optimizar la distribució...micarnavaltupatrimon
El sistema utilizará algoritmos de ML para optimizar la distribución de recursos, como el transporte, el alojamiento y la seguridad, en función de la afluencia prevista de turistas. La plataforma ofrecerá una amplia oferta de productos, servicios, tiquetería e información relevante para incentivar el uso de está y generarle valor al usuario, además, realiza un levantamiento de datos de los espectadores que se registran y genera la estadística demográfica, ayudando a reducir la congestión, las largas filas y otros problemas, así como a identificar áreas de alto riesgo de delincuencia y otros problemas de seguridad.
La estructura organizativa del trabajo que tenga una empresa influye directamente en la percepción que pueda tener un trabajador de sus condiciones laborales y en su rendimiento profesional.
Actividad Sumativa #2 Realizado por Luis Leal..pptx
IBM® Sterling Connect Direct
1. IBM® Sterling Connect:Direct®
Aumenta el rendimiento y maneja el
crecimiento de las transferencias de archivos
sin necesidad de añadir recursos de TI
1
2. IBM® Sterling Connect:Direct®
Maneja el crecimiento de las transferencias de archivos, aumentando
el rendimiento, sin necesidad de añadir recursos de TI
Prevenir el acceso no autorizado Transferencias de archivos punto-a-punto
IBM® Sterling Connect:Direct® Secure Plus IBM® Sterling Connect:Direct®
2
3. IBM® Sterling Connect:Direct®
La solución confiable para las transferencias seguras de archivos punto a punto
• ¿Qué hace?
– Alto volumen, gran tamaño, alto rendimiento en la transferencia de archivos
– Automatización, re-intento/rearranque, para operaciones desatendidas
– Seguridad certificada para transferir datos sensibles
– Aumenta la velocidad de transferencia a través de redes de alta velocidad, superando los
problemas de latencia*
• ¿Qué entrega?
– Aplicación cliente-servidor, optimizada para alto volumen, que asegura la entrega de datos
– API bien definida que soporta a múltiples clientes y programa las transferencias en una sola vez,
en forma recurrente, o en forma continua
– Un protocolo inventado por IBM Sterling que jamás ha sido violado
* Capacidad disponible a través de IBM ® Sterling File
Accelerator 3
4. IBM® Sterling Connect:Direct®
• ¿Qué le permite hacer?
– Mover archivos con confianza y librarse de FTP que es poco fiable y no ofrece garantías
– Simplificar la codificación y automatización de los enlaces vía transferencia de archivos
– Manejar el crecimiento en el volumen de datos y en su tamaño, sin aumentar el staff
• ¿Cómo sabe que lo necesita?
– Sus volúmenes de transferencia de archivos aumentan y, al mismo tiempo, disminuye el gasto en TI
– Los requisitos regulatorios y los requerimientos de seguridad y conformidad sobre las industrias y
las empresas continúan creciendo
– Las operaciones de negocios requieren un suministro seguro de los datos críticos
• ¿Que diferencia a IBM Sterling?
– Fiabilidad - Elimina las interrupciones de transferencia de archivos por fallas del software
– Seguridad - Protege la privacidad y la integridad de los datos debido a que el protocolo de IBM
Sterling nunca ha sido violado*
*Encriptación adaptable adicional puede ser añadida al protocolo seguro de IBM® Sterling Connect:Direct® con las capacidades de IBM® Sterling Connect:Direct® Secure Plus
4
5. La oportunidad de valor de
IBM® Sterling Connect:Direct®
• Fiabilidad
– Automatización, reintento, recuperación de errores, checkpoint-restart, visibilidad y la
capacidad de notificación de alertas, se combinan para reducir al mínimo las fallas -una tasa
verificada del 99,9997%, de transferencia de archivos éxitosas1
• Seguridad
– El protocolo de IBM Sterling nunca ha sido violado
– El costo promedio para mitigar una falla de seguridad es de US$ 6.65M2
• Productividad del personal mejorada
– Reducción de los costos de soporte con la automatización, el monitoreo proactivo a través de
la consola central, y minimizar el tiempo de resolución
– El costo promedio para solucionar problemas de transferencia de archivos es US$ 0,05221
1Los datos indicados en esta presentación hacen referencia a los hallazgos de un estudio de IDC Research por encargo de IBM® Sterling - "Sterling
Commerce MFT suite resultados de ROI 10 de diciembre de 2009"
2 Datos de Instituto Ponemon Año 2009 "El costo de la violación de los datos" realizado en EE.UU.
5
6. IBM® Sterling Connect:Direct® con FTP+
Actualice la seguridad y la fiabilidad del FTP existen-
te, sin recodificar las secuencias de comandos
Reemplace o actualice FTP
IBM® Sterling Connect:Direct® with FTP+
6
7. IBM® Sterling Connect:Direct® - FTP+
Agregue las capacidades de IBM® Sterling Connect:Direct®, sin recodificar las secuencias de comandos FTP
existentes
• ¿Qué hace?
– Agrega las capacidades de IBM Sterling Connect:Direct al FTP existente e incrementa las transferencias seguras
mediante: reintento automático, compresión, y checkpoint/restart
– Mejora la seguridad del FTP existente (autenticación y cifrado de datos con IBM Sterling Connect:Direct Secure Plus,
utilizando el protocolo de Sterling Connect:Direct)
– Proporciona capacidades de auditoría y registro (cliente y servidor de registro)
– Permite la visibilidad del servidor a través de IBM ® Sterling Control Center
• ¿ Cómo se entrega?
– Un componente gratuito de Sterling Connect:Direct
– Viene en 2 partes:
• FTP+ Client- funciona como un cliente FTP, puede iniciar enviar o recibir con el servidor de Sterling Connect:Direct (aunque el servidor
Sterling Connect:Direct no puede iniciar transferencias de FTP+)
• FTP+ Plug-in- para Producción , donde los servidores Sterling Connect:Direct intercambioan con FTP+ client
– Compatible con UNIX y Linux, Microsoft Windows, y z/OS
7
8. Capacidades de IBM® Sterling
Connect:Direct®-FTP+
• ¿Qué permite a los clientes hacer?
– Mover archivos con confianza, sin volver a codificar las secuencias de comandos existentes
– Actualiza la seguridad y la fiabilidad de los servidores FTP, incluyendo el procesamiento por lotes de FTP en
el mainframe
– Transferencia de archivos ad hoc mediante “command line client” o GUI
– Transferencias basadas en secuencias de comandos con el “command line client” y la interfaz de JES batch
• ¿Cómo sé que lo necesito?
– Las auditorías denuncian fallas en la seguridad
– Mandatos regulatorios, de la industria o la empresa para la actualización de o el reemplazo de FTP
– Las operaciones del negocio que dependen de FTP para la entrega de los datos críticos se retrasan, o fallan
• ¿Qué distingue a IBM Sterling?
– Actualiza FTP a las capacidades principales de la industria, sin quitar y reemplazar
– Seguridad - Protege la privacidad e integridad de los datos, ya que el Protocolo de IBM Sterling Connect:
Direct, jamás ha sido violado
8
9. Capacidades de IBM ® Sterling Connect: Direct ® - FTP +, muestra de los cambios
requeridos
FTP IBM® Sterling Connect:Direct® FTP+
//CD$FTPJF JOB (CDHOSTD), //CD$FTPJF JOB (CDHOSTD),
// '-FTP-', TIME=(1440),CLASS=Q, // '-FTP-', TIME=(1440),CLASS=Q,
// REGION=0M,MSGLEVEL=(1,1), // REGION=0M,MSGLEVEL=(1,1),
//MSGCLASS=X,NOTIFY=&SYSUID //MSGCLASS=X,NOTIFY=&SYSUID
//FTP EXEC PGM=FTP (1) //FTP EXEC PROC=CDFTP (1)
//OUTPUT DD SYSOUT=* (2) //CDFTP.OUTPUT DD SYSOUT=* (2)
//INTPUT DD* (2) //CDFTP.INTPUT DD* (2)
MVSB MVSB
TPYLA3 password TPYLA3 password
cd 'TPYLA1.' cd 'TPYLA1.'
lcd 'TPYLA3.' lcd 'TPYLA3.'
get TRACE.TEXT (REPLACE get TRACE.TEXT (REPLACE
quit quit
/* /*
9
10. Ejemplo de JCL de IBM ® Sterling
•
•
•
•
Connect: Direct ® FTP + para z / OS
//CD$FTPJC JOB (CDFTPCLI),'CD FTP+ CLIENT',CLASS=N,
// NOTIFY=&SYSUID,MSGCLASS=X,TIME=1440,REGION=0M
/*JOBPARM LINES=999999
//* *******************************************************
• //* * CONNECT:DIRECT (C:D FTP+ CLIENT) *
• //* *******************************************************
• //LIBS JCLLIB ORDER=($CD.SAMPLIB)
• //CDFTPCLI EXEC PROC=CDFTP
• //CDFTP.NETRC DD DISP=SHR,DSN=$CD.SAMPLIB(NETRC)
• //CDFTP.FTPTRACE DD SYSOUT=*
• //CDFTP.OUTPUT DD SYSOUT=*
• //CDFTP.INPUT DD SYSOUT=*
• MVSB (exit
• ebcdic
• cd /u/userid
• delimit
• mkdir cdftptestlib
• cd cdftptestlib
• lcd 'USERA.CDFTP.TESTLIB'
• delimit
• bin
• site sbdataconn=(IBM-037,ISO8859-1)
• locsite sbdataconn=(IBM-037,ISO8859-1)
• put CDFTPJC1
• ebcdic
• put CDFTPJC1 CDFTPJC2
• dir
• ls
• mdelete CDFTPJC*
• cdup
• rmdir cdftptestlib
• close
•
10 •
quit
//
11. Consultas?
• Web Site
• LinkedIN
• Twitter
• Google+
• eMail
Gracias!
11