Managing complexity in large SAS system applications John Niss Hansen, HAFNIA ( Denmark)
|
|
- Easter Mason
- 5 years ago
- Views:
Transcription
1 Managing complexity in large SAS system applications John Niss Hansen, HAFNIA ( Denmark) The paper will address problems in large SAS applications, where data from many sources are extracted periodically from a constantly changing and sometimes even turbulent production environment and placed in both SAS and DB2 tables. Objectives of application management are achieved through an active data dictionary based on the Relational data model and a macro execution facility based on the data flow principle. The system is managed from a version 6 SCL application for monitoring the history of execution and for updating the system definition and documentation. The application was born with the success of single tabulate, based on a SAS dataset easily created from a few tapes with some minor data fiddling. The success should soon be repeated just with new figures and little column more. Heard the story? Well after a while you have several sources of data, many SAS libraries, format libraries, source and JCL libraries, catalogs etc. So what? Here are some headlines for the next few chapters. 1. Increasing amount and diversity of data. 2. From adhoc to periodic update. 3. Handling breakdowns. 4. Handling changes and consistent definitions. 5. Documentation. 33
2 1. INCREASING AMOUNT AND DIVERSITY OF DATA. It's a problem to keep track off all the names, fysical and logical representations and how they are interrelated. Data flows in and out of the system and even BDP professionals have problems to fully comprehend the system. The none professional trust the professional, -which mayor especially may not have written something down. In order to get rid of this mess, we have made a data dictionary. It contains information of all SAS libraries, what members they contain, which variables are on each member. All variables are declared only once in a special sasdataset. In addition to this each member are declared with a primary key, that is the set of variables that determines each observation uniquely, which in fact turns each member into a relation in accordance with the relational data model. The definition of a new member is always entered in the dictionary before the actual creation. In fact the dictionary supports the member creation through a macro call. In addition to have operational support, we can now answer questions about where the data are and what they mean. A variable are defined the same way everywhere and can also be changed (fx the label or the length) from a single place. The data dictionary is maintained interactively through SAS/AF + FSP and SCL., J. 34
3 2. FROM ADHOC TO PERIODIC UPDATE. From the first adhoc jobs to the later periodic executions, you may observe that some additional bookkeeping has entered the stage. Files are no longer that distinct, they now comes in series with generation number or otherwise codified names and with running creation dates. As long as your application depend on only of a few of these, you keep an eye with the file catalog and watch the proper arrivals and then submits the jobs with only a few changes. A few generation datasets more and you are in trouble, especially if you want some hollidays also. There becomes too many things to keep track of. A solution here wold be to let the operations staff take over, with tools like OPC or UCC7. But here I have experienced problems in how to specify what it is you want. Every installation has its own manual that in less than 500 pages describe how you document your system in detail. The casual SAS user, can easily use a week on this inter price. The next problem is when he wants to change the programs. Here security and other procedures, may slow down the humble SAS programmer. What we have done is to make frequent lookups in the file catalog via the IDCAMS utility. This gives transactions for maintaining the history of changes in the file catalog as a SAS data set. Here we can see files turning up and others leaving the stage. Macros can then wait for the proper file(s) to turn up and then be released for execution. This is the Data flow principle. Here we have to keep track of which macroes reads which files, but instead of describing this via JCL, we use a SAS dataset for the relation and the filename/libname statement for the dynamic allocation. In this way we spare both JCL and job submission systems like OPC. On top of it, we get significant information about the application in tabular form, serving the purpose of dynamic documentation. 35
4 3 HANDLING BREAKDOWNS. One of the more timeconsuming task, is handling breakdowns. Here is a list of the most frequent causes of abends. Program errors Shortage of disk space Tapemount rejects Collision with other users during updates Program errors, due to lack of proper test facilities, lack of time or lack of good luck. Whatever the reason was, you correct the bad statements and rerun the job. If the job is a large one, it may have done a lot of good work before it went down and therefore you may consider an adhoc version of the job where the more succesfull part has been cut away. This job is a typical onetime job and a good candidate for yet another failure. What we have done is to have macro execution facility, that orders the execution of macros. Keep track of which macros were executed succesfull and performs a rollback for those that abened. There is only two jobs that performs the actual execution. The first is the master that do all the bookkeeping, the second will take the macros found ready for execution one at a time, allocate the necessary files, execute the macro and then report the success. If the second job went down, it is simply resubmitted. It will then perform the rollback, set the bad macro aside and find another macro that is ready and then go on with that one instead. To reach such a level of flexibility we have added several things. A macro is not just a bunch code, its an object that can be in se veral different states, even without being executed. To keep explicit track of these states is one of the secrets. Here are some of them. Waiting for time. A macro that runs one time each month, will be in this state for the rest of the month after the succesfull execution. Waiting for data. When we reach the first day in a new month, the time has come to see if the new data has come. Ready for execution. Here all the input data is in place. Active. Here the macro is actually executing. Succesfull end. The macro has just fulfilled its job and will soon be waiting for time again. 36
5 Abended. The macro missed and the whole thing went down. Someone have to take a look at it, correct it, and restart it in the macro state waiting for data. In the meantime many other macros may run, except those that use the data that the abended macro should have updated. The system will take care of that. Describing a macro as an object opens up for the introduction of other state variables as fx. priority and schedulation frequency. Back to breakdowns. Shortage of disk space is another frequent reason for abends. When this happened the procedure is almost the same as for programming errors, except that we may choose to optimize for space usage instead of correcting an error. By systematic collecting of vtoc information for our SAS libraries, we can in fact predict potential breakdowns and to some degree prevent this sort of abends. The last two reasons of breakdowns, shows up unpredictable as you want access to some data. If the data is on tape you may get a tapemount reject due to unawailable free tape units or you may want to update a SAS library that is already in use by another user. What we do here is that we wait nonbusy a few minutes and then try again. If we after some trials still can't get in touch with the data, we perform a rollback and exit SAS without abending. The macro will be schedulated again at a later time, without any human intervention. 37
6 4 HANDLING CHANGES AND CONSISTENT DEFINITIONS. When edp systems grow large, they become increasingly difficult to change in a safe and consistent manner. When you make changes in one place, something may go wrong later at some other place. Traditional documentation is often missing or unreliable due to its separation from the operational system it is supposed to describe. When you create new members in sas libraries, how do you assure that variables are spelled the same way, have same (minimal) length and type as in other places? Do you alays put on a label? If you decide to delete a variable from a SAS dataset, how do you find the programs that may be affected? Being able to reuse old variable definitions in new table definitions give us a rich opportunity for consistency in use of names. With the data dictionary and the macro execution facility we have most of what is needed to analyze the relationships between tables and macros (programs). The data is operational and therefore also up to date. The question we may ask can be answered with simple programs. Often used queries are embedded in SCL under SAS/AF. A query like 'Which macros could be affected if i change the macro named POLICER.' can be answered graphically (see graph on last page). The same graph may also apply to the query: 'Which macros should possibly rerun in case the macro POLICER should rerun.'. 38
7 , 5 DOCUMENTATION. Also the old 'infant terrible', written documentation, has got new possibilities with a system like this. In case of documentation for the user, we produce a table manual of the more than 200 SAS datasets and more than 40 DB2 tables. The document is more than 300 pages of generated SCRIPT. The manual comes every second month. When old users see the manual they immediate turn the index of changes, to see what has happened since that date when they last retrieved a documentation. Should anyone be excited by or have experience with a system like this, don't hesitate to contact me or one of my colleagues. John Niss Hansen Hafnia Insurance Holmens Kanal Copenhagen Denmark. t f t,. r f t f i t I f : J r. i \ 39
8 Dependencies of the macro POLICER KUNDISIC J [1 PORTMAN VlRTDDTA J ' t :...,. i VlRTDDEA USERKBONI VIRTDDPA I., " ;.J { POLPROD ERSTAFSL f... r-----i VIRTDDSA I : k i. f:: IpOUCER KWIP I REGNSI<AB VIRTDDRA I <-,.,' \' ':: 'J,',, 1- " I 5 f ii j, ' :' J; t " " 1: ". I I I I.; :. BESIGllG J TAPEPOL I ACTOMKOD I MANAGE VlRTDDOA I POUCESP PORTBEV VIRTDDQA I Each box is a macro. Each rlll8 is a stream of data., '1: j; Ii: 40
10 Things to expect from a DB2 Cloning Tool
10 Things to expect from a DB2 Cloning Tool This document gives a brief overview of functionalities that can be expected from a modern DB2 cloning tool. The requirement to copy DB2 data becomes more and
More informationTestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges
Db2 for z/os Test Data Management Revolutionized TestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges The challenge in creating realistic representative test data lies in extracting
More informationOLinks Tables, Creating and Submitting. [edit] Introduction and Important Notes
OLinks Tables, Creating and Submitting From AldenStaff Jump to: navigation, search Contents [hide] 1 Introduction and Important Notes 2 Creating OLinks Tables, Method One (Preferred): Use Excel VBA Macro
More informationCBS For Windows CDROM Backup System Quick Start Guide Installation Preparation:
CBS For Windows CDROM Backup System Quick Start Guide Installation If you have your CBS CD Writer Backup system on CD, simply insert the CD. It will automatically start and install the software. If you
More informationIMS Backup & Recovery Insurance Are you covered?
IMS Backup & Recovery Insurance Are you covered? Rosemary Galvan & Nick Griffin BMC Software Thursday, March 15,2012 Session Number : 10816 Agenda Backup and Recovery Solution for IMS from BMC Software
More informationDeadlock and Starvation
Chapter 6 Deadlock and Starvation We now look into two more issues that make concurrent processing so much more difficult: deadlock and starvation. We will look at the problems first, and discuss a few
More informationMake $400 Daily. With Only. 5 Minutes Of Work
Make $400 Daily With Only 5 Minutes Of Work Hello friends, I am not a professional copywriter, so you will find a lot of mistakes and lack of professional touch in this e-book. But I have not made this
More informationYour step-by-step instructions to getting started on ipage. Includes:
Your step-by-step instructions to getting started on ipage. Includes: Ordering Setting up Selection Lists What's on ipage Managing Your Relationship with Spring Arbor Through ipage Welcome to ipage, Spring
More informationBackground. $VENDOR wasn t sure either, but they were pretty sure it wasn t their code.
Background Patient A got in touch because they were having performance pain with $VENDOR s applications. Patient A wasn t sure if the problem was hardware, their configuration, or something in $VENDOR
More informationThruPut Manager AE Product Overview From
Intro ThruPut Manager AE (Automation Edition) is the only batch software solution in its class. It optimizes and automates the total z/os JES2 batch workload, managing every job from submission to end
More informationChapter 3: Deadlocks
Chapter 3: Deadlocks Overview Resources Why do deadlocks occur? Dealing with deadlocks Ignoring them: ostrich algorithm Detecting & recovering from deadlock Avoiding deadlock Preventing deadlock Resources
More informationSECTION 5 USING STUDENT
SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling
More informationWindows 10: The Personal Trainer Free Ebooks PDF
Windows 10: The Personal Trainer Free Ebooks PDF Your personalized 350-page guide to Windows 10 from one of the world's foremost Windows experts. Learn the new Microsoft operating system using this hands-on
More informationshortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge
shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically
More informationOne SAS To Rule Them All
SAS Global Forum 2017 ABSTRACT Paper 1042 One SAS To Rule Them All William Gui Zupko II, Federal Law Enforcement Training Centers In order to display data visually, our audience preferred Excel s compared
More informationEffective Testing for Live Applications. March, 29, 2018 Sveta Smirnova
Effective Testing for Live Applications March, 29, 2018 Sveta Smirnova Table of Contents Sometimes You Have to Test on Production Wrong Data SELECT Returns Nonsense Wrong Data in the Database Performance
More informationAn Introduction to Business Disaster Recovery
An Introduction to Business Disaster Recovery Martin Hynes - Commercial Director Sounds scary right? When the words disaster and recovery are mentioned our primal survival instincts kick in. Business Disaster
More informationParcel QA/QC: Video Script. 1. Introduction 1
1. Introduction 1 Hi! It s been a while since you heard from us. I am Ara Erickson with the University of Washington. We are taking this opportunity to do a quick introduction and explain a few things
More informationWebsite minute read. Understand the business implications, tactics, costs, and creation process of an effective website.
Website 101 Understand the business implications, tactics, costs, and creation process of an effective website. 8 minute read Mediant Web Development What to Expect 1. Why a Good Website is Crucial 2.
More informationA Guide to Condor. Joe Antognini. October 25, Condor is on Our Network What is an Our Network?
A Guide to Condor Joe Antognini October 25, 2013 1 Condor is on Our Network What is an Our Network? The computers in the OSU astronomy department are all networked together. In fact, they re networked
More informationFrequently Asked Questions about the NDIS
Frequently Asked Questions about the NDIS Contents 3 4 5 5 5 5 6 6 7 7 8 8 8 8 8 9 9 9 9 9 10 10 10 10 11 11 11 11 12 12 12 12 13 13 13 14 14 What is the NDIS and how is it different to current funding
More informationSTAUNING Credit Application Internet Sales Process with /Voic Templates to Non-Responsive Prospects 2018 Edition
STAUNING Credit Application Internet Sales Process with Email/Voicemail Templates to Non-Responsive Prospects 2018 Edition Contents 30-DAY CREDIT APPLICATION INTERNET SALES PROCESS... 2 DAY 1 AUTO-RESPONSE
More informationHow to use XINFO for migrations
How to use XINFO for migrations Information is a prerequisite for any conversion. That s why any substantial conversion project begins with an analysis of the current status. This usually involves SMF
More informationGOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail
GOOGLE APPS GETTING STARTED Page 02 Prerequisites What You Will Learn INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail DRIVE Page 07 Uploading Files to Google Drive Sharing/Unsharing
More informationMedia-Ready Network Transcript
Media-Ready Network Transcript Hello and welcome to this Cisco on Cisco Seminar. I m Bob Scarbrough, Cisco IT manager on the Cisco on Cisco team. With me today are Sheila Jordan, Vice President of the
More informationExperiences using SASI ASSIST software for Query and Reporting from DB2.
Experiences using SASI ASSIST software for Query and Reporting from DB2. Bent Melgaard ALKA Forsikring, Denmark Introduction. The experiences are based on 2 weeks use of 'Query and Reporting from 062'
More informationHow to Improve Your Campaign Conversion Rates
How to Improve Your Email Campaign Conversion Rates Chris Williams Author of 7 Figure Business Models How to Exponentially Increase Conversion Rates I'm going to teach you my system for optimizing an email
More informationHighway Motor Policies at Lloyd s
at Lloyd s My name is Stephen Dunn and I am the Syndicate Statistician for Highway Motor Policies at Lloyd s. Highway is capitalised through the Lloyd s insurance market in London and is managed by the
More informationGrant permissions sql server Grant permissions sql server 2008.zip
Grant permissions sql server 2008 Grant permissions sql server 2008.zip 12/01/2011 I am trying to set column level permissions on a table in SQL Server 2008. These are the steps I took: Right-click on
More informationWho am I? I m a python developer who has been working on OpenStack since I currently work for Aptira, who do OpenStack, SDN, and orchestration
Who am I? I m a python developer who has been working on OpenStack since 2011. I currently work for Aptira, who do OpenStack, SDN, and orchestration consulting. I m here today to help you learn from my
More informationDER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet?
DER GOBBLE Good Secure Crypto Wallet Practices When it comes to crypto currencies and securing your money, the absolute best 99% guaranteed security for your wallets is YOU. You are the one that will expose
More informationBBC Learning English Face up to Phrasals Mark's Mistake
BBC Learning English Face up to Phrasals Mark's Email Mistake Episode 1: Email Fun? Mark: Hey Ali, did you check out that email I sent you the one about stupid Peter, saying how stupid he is? Oh dear.
More informationPackages in Julia. Downloading Packages A Word of Caution Sawtooth, Revisited
Packages in Julia Downloading Packages A Word of Caution Sawtooth, Revisited Downloading Packages Because Julia is an open-source language, there are a ton of packages available online that enable such
More informationDB2 is a complex system, with a major impact upon your processing environment. There are substantial performance and instrumentation changes in
DB2 is a complex system, with a major impact upon your processing environment. There are substantial performance and instrumentation changes in versions 8 and 9. that must be used to measure, evaluate,
More informationSpecifying Acceptance Criteria
Freelance SQL Server Consultant Specifying Acceptance Criteria I have worked with some agile product owners who when the write user stories, the like to go epic on the acceptance criteria, in fact when
More informationSpam. Time: five years from now Place: England
Spam Time: five years from now Place: England Oh no! said Joe Turner. When I go on the computer, all I get is spam email that nobody wants. It s all from people who are trying to sell you things. Email
More informationOut for Shopping-Understanding Linear Data Structures English
Out for Shopping-Understanding Linear Data Structures English [MUSIC PLAYING] [MUSIC PLAYING] TANZEELA ALI: Hi, it's Tanzeela Ali. I'm a software engineer, and also a teacher at Superior University, which
More informationMigrating from ISAM to SQL with Go Up Technology s Solution
Migrating from ISAM to SQL with Go Up Technology s Solution 10 reasons why converting your applications and their database via Go Up Technology s 100% true automated solution, can make all the difference
More informationDatacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score
Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract
More informationJCL JOB CONTROL LANGUAGE
Mainframe Concepts:- What is Mainframe Difference between Open source Applications and Mainframe Application Where do we use Mainframe Applications Operating System information Resource Access Control
More informationHow To Manage Disk Effectively with MPG's Performance Navigator
How To Manage Disk Effectively with MPG's Performance Navigator Today s Agenda: How To Really Understand Your Disk Environment a) Managing Disk is Hard It Doesn t Have To Be b) Measure Individual ASPs
More informationComputational Steering
Computational Steering Nate Woody 10/23/2008 www.cac.cornell.edu 1 What is computational steering? Generally, computational steering can be thought of as a method (or set of methods) for providing interactivity
More informationIT101. Characters: from ASCII to Unicode
IT101 Characters: from ASCII to Unicode Java Primitives Note the char (character) primitive. How does it represent the alphabet letters? What is the difference between char and String? Does a String consist
More informationMobile County Public School System Builds a More Secure Future with AMP for Endpoints
Mobile County Public School System Builds a More Secure Future with AMP for Endpoints Cisco AMP for Endpoints met our needs from all security standpoints. We re seeing more and AMP is catching things that
More informationContents. What's New. Upcoming new version. Newsletter #43 (Aug 6, 2017) A couple quick reminders:
Campground Master Newsletter #43 (Aug 6, 2017) 1 Newsletter #43 (Aug 6, 2017) Contents A couple quick reminders: Make Backups! It's so sad when we hear from someone whose computer has crashed and they
More informationPrintable View of: Week 13: Miscelaneous cool features. Returns from standard functions. returns from standard functions: scanf(), fopen()
1 of 6 9/11/2009 12:57 PM Printable View of: Week 13: Miscelaneous cool features Print Save to File File: returns from standard functions: scanf(), fopen() returns from standard functions: scanf(), fopen()
More informationCASE STUDY IT. Albumprinter Adopting Redgate DLM
CASE STUDY IT Albumprinter Adopting Redgate DLM "Once the team saw they could deploy all their database changes error-free at the click of a button, with no more manual scripts, it spread by word of mouth.
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationFour Essential Steps for Removing Risk and Downtime from Your POWER9 Migration
Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Syncsort Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration With the introduction of IBM s POWER9
More informationIntroduction to Data Management. Lecture #1 (Course Trailer ) Instructor: Chen Li
Introduction to Data Management Lecture #1 (Course Trailer ) Instructor: Chen Li 1 Today s Topics v Welcome to one of my biggest classes ever! v Read (and live by) the course wiki page: http://www.ics.uci.edu/~cs122a/
More informationVoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES
VoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES VoIP Internet-based phone systems chock full of features TABLE OF CONTENTS What is VoIP? Switching to VoIP is easy Business Telecom Features Improved
More informationGUARD1 PLUS Documentation. Version TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks
GUARD1 PLUS Documentation Version 3.02 2000-2005 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks i of TimeKeeping Systems, Inc. Table of Contents Welcome to Guard1 Plus...
More informationSpeed Up Windows by Disabling Startup Programs
Speed Up Windows by Disabling Startup Programs Increase Your PC s Speed by Preventing Unnecessary Programs from Running Windows All S 630 / 1 When you look at the tray area beside the clock, do you see
More informationawarding excellence Parnassus FAQs
Parnassus FAQs This document is designed to help answer frequently asked questions and resolve problems that you might encounter when using Parnassus. Please note that some of the screen shots will not
More informationHeuristic Evaluation Project
INFSCI 2470: Interactive System Design Heuristic Evaluation Project Evaluated System: Course Agent http://wwwsispittedu/~cagent Group Members Abdul Raqeeb Abdul Azeez Arash Farsi Sriranjani Mandayam Denis
More informationA Legislative Bill Text Retrieval and Distribution System Using SAS, PROC SQL, and SAS/Access to DB2
A Legislative Bill Text Retrieval and Distribution System Using SAS, PROC SQL, and SAS/Access to DB2 John Turman and Kathe Richards Technical Support, Application Systems Division Texas Comptroller of
More information* Parameter... 1:18. B Backward References... 5:8 Blocksize: Choosing... 3:19
* Parameter... 1:18 A Abnormal Disposition... 2:7 ACB: Access Method Control Block... 11:7 Accounting Information... 1:9, 8:15 ACCT Parameter - Account... 1:15 Allocation and Termination Messages... 1:25
More informationTraining Registration Handbook
Training Registration Handbook Version: 7-31-16 West Virginia State Training and Registry System 611 7th Ave, Suite 322 Huntington, WV 25701 Phone: (304) 522-7827 or (855) 822-STAR www.wvstars.org Email:
More informationRunning Minitab for the first time on your PC
Running Minitab for the first time on your PC Screen Appearance When you select the MINITAB option from the MINITAB 14 program group, or click on MINITAB 14 under RAS you will see the following screen.
More informationSECURITY AND DATA REDUNDANCY. A White Paper
SECURITY AND DATA REDUNDANCY A White Paper Security and Data Redundancy Whitepaper 2 At MyCase, Security is Our Top Priority. Here at MyCase, we understand how important it is to keep our customer s data
More informationDatabase Developers Forum APEX
Database Developers Forum APEX 20.05.2014 Antonio Romero Marin, Aurelien Fernandes, Jose Rolland Lopez De Coca, Nikolay Tsvetkov, Zereyakob Makonnen, Zory Zaharieva BE-CO Contents Introduction to the Controls
More informationIt Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek
Seite 1 von 5 Issue Date: FoxTalk July 2000 It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek This month, Paul Maskens and Andy Kramek discuss the problems of validating data entry.
More informationBriefing Session Guide. Sending Message Basics.
22 Briefing Session Guide Portal Briefing Session Administrators Guide: Part How one: To How do I series Sending Message Basics. Page - 2 - of 31 Administrator Basics Part 1 Sending Message Basics Contents
More informationBalancing the pressures of a healthcare SQL Server DBA
Balancing the pressures of a healthcare SQL Server DBA More than security, compliance and auditing? Working with SQL Server in the healthcare industry presents many unique challenges. The majority of these
More informationEnable Spark SQL on NoSQL Hbase tables with HSpark IBM Code Tech Talk. February 13, 2018
Enable Spark SQL on NoSQL Hbase tables with HSpark IBM Code Tech Talk February 13, 2018 https://developer.ibm.com/code/techtalks/enable-spark-sql-onnosql-hbase-tables-with-hspark-2/ >> MARC-ARTHUR PIERRE
More informationSIMPLE FREEDOM: Follow Up Training Plan, Scripts, and Booklet
SIMPLE FREEDOM: Follow Up Training Plan, Scripts, Email and Booklet (Be sure to print this out and swipe the voice mail and emails below. That's very important as this will get you going faster with your
More informationWith the growth of data, the reduction in of DBA staffing, tight budgets, and the business goal to be 24x7 it is becoming more important to automate
1 With the growth of data, the reduction in of DBA staffing, tight budgets, and the business goal to be 24x7 it is becoming more important to automate as much Database Administration work as possible.
More informationUSING EXISTING DATASETS
Chapter 2 USING EXISTING DATASETS SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Coding DD statement parameters for existing datasets. Coding statements for tape datasets. Concatenating
More informationRobust Memory Management Schemes
Robust Memory Management Schemes Prepared by : Fadi Sbahi & Ali Bsoul Supervised By: Dr. Lo ai Tawalbeh Jordan University of Science and Technology Robust Memory Management Schemes Introduction. Memory
More informationLeakDAS Version 4 The Complete Guide
LeakDAS Version 4 The Complete Guide SECTION 4 LEAKDAS MOBILE Second Edition - 2014 Copyright InspectionLogic 2 Table of Contents CONNECTING LEAKDAS MOBILE TO AN ANALYZER VIA BLUETOOTH... 3 Bluetooth Devices...
More informationManual Trigger Sql Server 2008 Insert Multiple Rows At Once
Manual Trigger Sql Server 2008 Insert Multiple Rows At Once Adding SQL Trigger to update field on INSERT (multiple rows) However, if there are multiple records inserted (as in the user creates several
More informationTHE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP!
THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! Latest Macrium survey results take a detailed look into the backup and recovery space. INTRODUCTION WHO DID WE SPEAK TO? Where are you responsible
More informationHow to Implement the One-Time Methodology Mark Tabladillo, Ph.D., MarkTab Consulting, Atlanta, GA Associate Faculty, University of Phoenix
Paper PO-09 How to Implement the One-Time Methodology Mark Tabladillo, Ph.D., MarkTab Consulting, Atlanta, GA Associate Faculty, University of Phoenix ABSTRACT This paper demonstrates how to implement
More informationMonitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins
Monitoring Tool Made to Measure for SharePoint Admins By Stacy Simpkins Contents About the Author... 3 Introduction... 4 Who s it for and what all can it do?... 4 SysKit Insights Features... 6 Drillable
More informationPeer-To-Peer Network!
Computer Networks! Introduction. I've been asked to create a PowerPoint on two different kinds of computer networks to be able to discuss the strengths and weaknesses of both. In this PowerPoint I will
More informationEvent Venue Planner. 1. Story. 2. Point of View. opensap 2016 Development Challenge. Build Your Own SAP Fiori App in the Cloud 2016 Edition
opensap 2016 Development Challenge Build Your Own SAP Fiori App in the Cloud 2016 Edition Week 9 Submission (6 PDF pages + 2.52 min video = 9 submission units) Event Venue Planner 1. Story The purpose
More informationHow To Make 3-50 Times The Profits From Your Traffic
1 How To Make 3-50 Times The Profits From Your Traffic by Chris Munch of Munchweb.com Copyright Munchweb.com. All Right Reserved. This work cannot be copied, re-published, or re-distributed. No re-sell
More informationFormal Methods of Software Design, Eric Hehner, segment 24 page 1 out of 5
Formal Methods of Software Design, Eric Hehner, segment 24 page 1 out of 5 [talking head] This lecture we study theory design and implementation. Programmers have two roles to play here. In one role, they
More informationT01F3nnn - FTP3 Messages
CHAPTER 18 T01F3nnn - FTP3 Messages This chapter describes the messages issued by the FTP3 program. These include messages T01F3001 through T01F3999. T01F3nnn T01F3000I FTP Cisco IOS for S/390 version
More informationIntroduction to Data Management. Lecture #1 (Course Trailer )
Introduction to Data Management Lecture #1 (Course Trailer ) Instructor: Mike Carey mjcarey@ics.uci.edu Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Today s Topics v Welcome to one
More informationQuick Campaign Optimization Tips
Quick Campaign Optimization Tips 1. Our minimum CPM is as low as $0.1 so I suggest you start with something around $1.5 which you can always change while the campaign is running. 2. Try to use our 'Optimization'
More informationBeyond the Annual Report
Beyond the Annual Report Web Analytics for Evidence-Based User Experience Decisions Adrienne Lai Jonathan Kift Introduce self & Jonathan Today s presentation wrangle Google Analytics so we can understand
More informationEleven+ Views of Semantic Search
Eleven+ Views of Semantic Search Denise A. D. Bedford, Ph.d. Goodyear Professor of Knowledge Management Information Architecture and Knowledge Management Kent State University Presentation Focus Long-Term
More informationRaft and Paxos Exam Rubric
1 of 10 03/28/2013 04:27 PM Raft and Paxos Exam Rubric Grading Where points are taken away for incorrect information, every section still has a minimum of 0 points. Raft Exam 1. (4 points, easy) Each figure
More information10 Tips for Real Estate Agents looking for an Internet Fax Service
10 Tips for Real Estate Agents looking for an Internet Fax Service June 22, 2006 Wendy Lowe 1 Agenda 10 Tips for Real Estate agents looking to purchase Internet Fax Introduction to MyFax Q&A 2 Real Estate
More informationErlang in the battlefield. Łukasz Kubica Telco BSS R&D Department Cracow Erlang Factory Lite, 2013
Erlang in the battlefield Łukasz Kubica Telco BSS R&D Department Cracow Erlang Factory Lite, 2013 Agenda Introduction to the SCM Erlang vm and upgrades Tracing Mnesia Final thoughts Questions 2 The Session
More informationTransactional Block Store
Transactional Block Store 1 Introduction The goal of this project is to construct a transactional block store The block store must be transactional. You must use the write anywhere file layout (WAFL) scheme
More informationBasics of Database Corruption Repair
Basics of Database Corruption Repair When Corruption Strikes, will you be ready? Steve Stedman, Managing Technology Partner, SQL Data Partners 2 Please silence cell phones Explore everything PASS has to
More informationerequest for Beginners Contents Introduction to erequests Enter New erequest Approving Searching
erequest for Beginners http://cfaesfinance.osu.edu CFAES Business Office, Columbus Contents Introduction to erequests Enter New erequest Approving Searching 8/5/2014 1 Introduction to erequest What is
More informationBest Practice for Creation and Maintenance of a SAS Infrastructure
Paper 2501-2015 Best Practice for Creation and Maintenance of a SAS Infrastructure Paul Thomas, ASUP Ltd. ABSTRACT The advantage of using metadata to control and maintain data and access to data on databases,
More information1 In simple cases, an array may be created like this: string AAA[1000]; but sometimes a declaration in this form is needed: string * BBB;
1 In simple cases, an array may be created like this: string AAA[1000]; but sometimes a declaration in this form is needed: string * BBB; Short Answers: i. What other step is required before BBB can actually
More informationSQL Solutions Case Study SOUTH WALES POLICE DEPARTMENT. How South Wales PD Improves their SQL Server Management with IDERA
SQL Solutions Case Study SOUTH WALES POLICE DEPARTMENT How South Wales PD Improves their SQL Server Management with IDERA OVERVIEW The South Wales Police Department is responsible for an area of around
More informationRe-enrollment in Blackbaud
Re-enrollment in Blackbaud It is an exciting new day at Westminster Christian Academy. We are thrilled to be implementing a robust system that will streamline all communication and processes between parents
More informationMemorandum Participants Method
Memorandum To: Elizabeth Pass, Associate Professor, School of Writing, Rhetoric and Technical Communication From: Andrew Carnes, WRTC 456 Section 1[ADC] Date: February 2, 2016 Re: Project 1 Competitor
More informationWhat's Wrong with Lifehacker? of effort is not the reason for bad design, but rather a misunderstanding of what is useable.
What's Wrong with Lifehacker? Having a website that is both functional and usable is a key aspect in keeping visitors on any site, so why are there so many sites with bad designs on the web? For many of
More informationHow to assess and nominate applications for Commonwealth Scholarships or Fellowships Frequently Asked Questions
How to assess and nominate applications for Commonwealth Scholarships or Fellowships Frequently Asked Questions Questions about the general application process Q: What is a Nominating Agency? Questions
More informationRyan Parsons Chad Price Jia Reese Alex Vassallo
Ryan Parsons - Paper Prototype, Writing Chad Price - Paper Prototype, Digital Mockup Jia Reese - Paper Prototype, Usability Testing Alex Vassallo - Usability Testing, Writing All we have to decide is what
More informationSAS Solutions for the Web: Static and Dynamic Alternatives Matthew Grover, S-Street Consulting, Inc.
SAS Solutions for the Web: Static and Dynamic Alternatives Matthew Grover, S-Street Consulting, Inc. Abstract This paper provides a detailed analysis of creating static and dynamic web content using the
More informationONLINE EVALUATION FOR: Company Name
ONLINE EVALUATION FOR: Company Name Address Phone URL media advertising design P.O. Box 2430 Issaquah, WA 98027 (800) 597-1686 platypuslocal.com SUMMARY A Thank You From Platypus: Thank you for purchasing
More informationThe SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries
1 2 The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries performed by SRS. Oops, the wrong SRS! OK, the Real
More information