A Multifaceted Dependency Map of MySQL
|
|
- Sabrina Lee
- 6 years ago
- Views:
Transcription
1 Lattix White Paper A Multifaceted Dependency Map of MySQL Lattix White Paper April 2016 Copyright 2016 Lattix, Inc. All rights reserved
2 Analyzing MySQL Introduction MySQL is one of the most popular open source databases and an integral part of the infrastructure of the Internet. MySQL is a modern database. It came into prominence at a time when relational databases were well established, SQL was standardized, and C++ was already in wide use. Our interest is in exploring MySQL s code to discover its various parts and to understand how they relate to each other. Using Lattix Architect we will identify all code elements such as methods, structs, classes, and global variables and discover the dependencies among them. This creates the underlying dependency map that can be explored both in terms of how the source code is organized into its file directory structure and in terms of how relationships manifest themselves in the binary artifacts. The result is a view that provides high level visibility along with the ability to drill down to a specific line in code. Starting out MySQL is not one program As developers we started out by building the MySQL source distribution. One of the first things to notice is that MySQL is not one program. Instead, it is a collection of binaries, one of which is the database server (mysqld). However, it also includes multiple libraries including ones that sql client applications can link into, along with many other utilities and test programs. When we built MySQL we saw close to 100 binaries. As a first step, we started our exploration to develop an understanding of the relationships between these binaries. Our goal is to create a dependency map and to answer a number of interesting questions: 1. What are the various executables and libraries and how are they related? For instance, can we say exactly what libraries the program mysqld uses and identify those dependencies down to the line in code? 2. How coupled are each of the individual executables and libraries? Which ones have greater coupling? 3. Are some header files being included needlessly? Are there header files included indirectly even though there are direct dependencies on them? Are external declarations being used to circumvent including header files? These are thorny questions that have an important bearing on the compilation speed and in managing the complexity of the C/C++ code. 4. Can we identify and prioritize the dependencies that lead to unwanted coupling? 5. When we change one or more files, how does that change ripple through the code and what components are affected? 6. What are the differences between various versions of MySQL? Can we examine trends of stability, coupling, and other important architectural metrics? 7. Ultimately, how closely does our implementation match the intended architecture and what can we do to make it more modular so that it becomes easier to understand, maintain, and test? Creating a project Analyzing MySQL is a two-step process: 1. Configure the MySQL build. Run make through the utility lxbuild (lxbuild make) to build MySQL while lxbuild captures the build options. The output of this process is a build specification file. 2. Run lattixarchitect to take the build specification file as the input to generate a Lattix Architect project. A Dependency Map of MySQL Page 2 Copyright 2016 Lattix, Inc. All rights reserved
3 Once this process is complete, the resulting Lattix Architect project is the dependency map. We can query it, report on it, and view it in different ways. It is easy to identify the bad dependencies, trace them to the line in code, and understand the impact of change. We ended up analyzing about 2.5 million lines of code organized into 1,369 files. View organized by source structure Hierarchical decomposition Reordering algorithms help reveal the architecture Users can identify the cyclic dependencies and then drill down to the actual code for those dependencies. Dependencies by Source Code Organization The hierarchy of the map aggregates the dependencies so you can see how various source code directories relate to each other. The hierarchy also allows you to drill down to the lowest level element (method, data, struct, etc.) and jump directly to the source code. A partitioning algorithm was applied to order the subsystems in such a way as to reveal the underlying design intent. Notice how the dbug and test directories move to the top because they have dependencies to the libraries but the libraries don t have dependencies on the tests directory (as would be expected). Furthermore, elements in each layer were ordered to minimize the strength A Dependency Map of MySQL Page 3 Copyright 2016 Lattix, Inc. All rights reserved
4 above the diagonal. For instance, the automatic ordering reveals that mysys is at a lower level compared to client as would be expected because the client programs depend on the common code in mysys. View organized by datasource (programs and libraries) Dependencies by Datasource This view shows the dependencies organized by programs and libraries (called datasources in Lattix Architect). To get an even bigger picture view, the datasources are organized by their file and directory structure. We can see that the major coupling is between storage and sql, which together contain 60% of the source files. Further drill down will show programs such as mysqld, mysql, mysqladmin, mysqldump, libraries such as libmyisam.a, ha_innodb.a, libmysqlclient.a, and many others. This means that you can identify, down to the line in code, how programs and libraries depend on each other. Drilling further down into each of the datasources reveals the source organization. Not only can you see the dependencies across datasources, you can also identify to the line of source code exactly what those dependencies are. A Dependency Map of MySQL Page 4 Copyright 2016 Lattix, Inc. All rights reserved
5 Conclusion The dependency map of MySQL allows us to see the big picture view and then drill down to the lowest level element and ultimately to the source code. This means that unwanted coupling can be identified quickly and efficiently. The dependency map also allows us to perform detailed include file analysis to reduce the complexity and to streamline the inclusion of header files. By analyzing successive versions of the code, it is easy to see what has changed from one version to another and to see whether those changes are contributing to further erosion of the intended design. Try Lattix on your Project Is your software complex, buggy and hard to maintain? Do you want to see what your code looks like and what you can do to modularize it? If so, contact Lattix: A Dependency Map of MySQL Page 5 Copyright 2016 Lattix, Inc. All rights reserved
Creating a Lattix Dependency Model The Process
Creating a Lattix Dependency Model The Process Whitepaper January 2005 Copyright 2005-7 Lattix, Inc. All rights reserved The Lattix Dependency Model The Lattix LDM solution employs a unique and powerful
More informationImplementation Work Flow. CSC 532: Advanced Software Engineer Louisiana Tech University
Implementation Work Flow CSC 532: Advanced Software Engineer Louisiana Tech University Topics to cover Introduction Artifacts Workers Activities Introduction l Fundamental goal is to build a working version
More informationElement: Relations: Topology: no constraints.
The Module Viewtype The Module Viewtype Element: Elements, Relations and Properties for the Module Viewtype Simple Styles Call-and-Return Systems Decomposition Style Uses Style Generalization Style Object-Oriented
More informationMonitor database health in a dashboard
Monitor database health in a dashboard Published: 2018-04-20 When someone reports that a database query failed or is too slow, several questions come to mind. Finding the answers can be a time-consuming
More informationSoftware Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software
Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software Chapter 9 Introduction to Design Patterns Copy Rights Virtual University of Pakistan 1 Design
More informationPerformance improvements through a strong cooperation between the well-known functions and a new clear and thorough layout.
Workflow 8.0 big changes with big improvements Performance improvements through a strong cooperation between the well-known functions and a new clear and thorough layout. A noticeable development has led
More informationJunior Circle Meeting 3 Circuits and Paths. April 18, 2010
Junior Circle Meeting 3 Circuits and Paths April 18, 2010 We have talked about insect worlds which consist of cities connected by tunnels. Here is an example of an insect world (Antland) which we saw last
More informationQlik. 10 key elements of a successful data strategy and modern analytics platform. February 2019 Julie Kae Executive Director, Qlik.
Qlik 10 key elements of a successful data strategy and modern analytics platform February 2019 Julie Kae Executive Director, Qlik.org Legal Disclaimer Qlik roadmaps provide a general overview of our anticipated
More informationiserver Free Archimate ArchiMate 1.0 Template Stencil: Getting from Started Orbus Guide Software Thanks for Downloading the Free ArchiMate Template! Orbus Software have created a set of Visio ArchiMate
More informationONOS OVERVIEW. Architecture, Abstractions & Application
ONOS OVERVIEW Architecture, Abstractions & Application WHAT IS ONOS? Open Networking Operating System (ONOS) is an open source SDN network operating system (controller). Mission: to enable Service Providers
More informationSteelCentral Packet Analyser Walkthrough
SteelCentral Packet Analyser Walkthrough The aim of this demo is to show how to perform simple analysis of packets using the SteelCentral Packet Analyser in conjunction with NetShark. We will talk through
More informationCAMELOT Configuration Overview Step-by-Step
General Mode of Operation Page: 1 CAMELOT Configuration Overview Step-by-Step 1. General Mode of Operation CAMELOT consists basically of three analytic processes running in a row before the email reaches
More informationCS519: Computer Networks. Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol) More ICMP messages These were added over time RFC1191: Path MTU Discovery Added the size of the limiting MTU to the ICMP Packet
More informationIntroduction to System Design
Introduction to System Design Software Requirements and Design CITS 4401 Lecture 8 System Design is a creative process no cook book solutions goal driven we create a design for solving some problem constraint
More informationCS519: Computer Networks
: Computer Networks Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol) More ICMP messages These were added over time RFC1191: Path MTU Discovery Added the size of the limiting MTU to the ICMP Packet
More informationAutomatic network discovery, documentation & visualization. IP Explorer
Automatic network discovery, documentation & visualization IP Explorer IP Explorer FOR TELECOMMUNICATION SERVICE PROVIDERS, UTILITIES AND ENTERPRISES Lack of up to date network information makes daily
More informationSoftware Design Fundamentals. CSCE Lecture 11-09/27/2016
Software Design Fundamentals CSCE 740 - Lecture 11-09/27/2016 Today s Goals Define design Introduce the design process Overview of design criteria What results in a good design? Gregory Gay CSCE 740 -
More informationTopics in Object-Oriented Design Patterns
Software design Topics in Object-Oriented Design Patterns Material mainly from the book Design Patterns by Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides; slides originally by Spiros Mancoridis;
More informationESET Remote Administrator 6. Version 6.0 Product Details
ESET Remote Administrator 6 Version 6.0 Product Details ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation
More informationThis is a brief tutorial that explains how to make use of Sqoop in Hadoop ecosystem.
About the Tutorial Sqoop is a tool designed to transfer data between Hadoop and relational database servers. It is used to import data from relational databases such as MySQL, Oracle to Hadoop HDFS, and
More informationCisco Network Assurance Engine with ServiceNow Cisco Network Assurance Engine, the industry s first SDN-ready intent assurance suite, integrates with
Solution brief Cisco Network Assurance Engine Integration with ServiceNow Continuous network verification and analysis with closed-loop incident management Challenge In monitoring service health, identifying
More informationObject-Oriented Design
Object-Oriented Design Lecturer: Raman Ramsin Lecture 10: Analysis Packages 1 Analysis Workflow: Packages The analysis workflow consists of the following activities: Architectural analysis Analyze a use
More informationHow to Harvest Reusable Components in Existing Software. Nikolai Mansurov Chief Scientist & Architect
How to Harvest Reusable Components in Existing Software Nikolai Mansurov Chief Scientist & Architect Overview Introduction Reuse, Architecture and MDA Option Analysis for Reengineering (OAR) Architecture
More informationAnalysis and Modeling of Evolving Database-centric Web Applications
Analysis and Modeling of Evolving Database-centric Web Applications SistaVenkataMadhavaKrishna + IIT Guwahati Abhishek Biswas Old Dominion University Karnati Satyadeep + IIT Guwahati Jagannathan Srinivasan
More informationLasso Your Business Users by Designing Information Pathways to Optimize Standardized Reporting in SAS Visual Analytics
Paper 2960-2015 Lasso Your Business Users by Designing Information Pathways to Optimize Standardized Reporting in SAS Visual Analytics ABSTRACT Stephen Overton, Zencos Consulting SAS Visual Analytics opens
More informationCS 390 Chapter 2 Homework Solutions
CS 390 Chapter 2 Homework Solutions 2.1 What is the purpose of... System calls are used by user-level programs to request a service from the operating system. 2.5 What is the purpose of... The purpose
More informationEnterprise Workflow Resource Management
Enterprise Workflow Resource Management Weimin Du and Ming-Chien Shan Hewlett-Packard Laboratories 1501 Page Mill Road, Palo Alto, CA 94304 1 Abstract Resource management is a key issue in providing resource
More informationConsider The Source. Express Logic, Inc.
Consider The Source John A. Carbone Express Logic, Inc. Outline How do embedded developers value RTOS source code? Why is RTOS source code important? What constitutes Good Code? What makes a good RTOS
More informationHow Listing Distribution Affects the Accuracy of Online Data
How Listing Distribution Affects the Accuracy of Online Data STUDY Part 1 of 2 In order to understand the efficacy of listing management tools, Vendasta analyzed over 17,000 subscribers and 200,000 non-subscribers
More information(Team Name) (Project Title) Software Design Document. Student Name (s):
(Team Name) (Project Title) Software Design Document Student Name (s): TABLE OF CONTENTS 1. INTRODUCTION 2 1.1Purpose 2 1.2Scope 2 1.3Overview 2 1.4Reference Material 2 1.5Definitions and Acronyms 2 2.
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationManaging Data Resources
Chapter 7 OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Managing Data Resources Describe how a database management system
More information5/15/16. Computational Methods for Data Analysis. Massimo Poesio UNSUPERVISED LEARNING. Clustering. Unsupervised learning introduction
Computational Methods for Data Analysis Massimo Poesio UNSUPERVISED LEARNING Clustering Unsupervised learning introduction 1 Supervised learning Training set: Unsupervised learning Training set: 2 Clustering
More informationIntro to Modelling and UML
CSCD01 Engineering Large Software Systems Intro to Modelling and UML Joe Bettridge Winter 2018 With thanks to Anya Tafliovich and Steve Easterbrook Getting Started So, you ve just started working on a
More informationWHAT IS SOFTWARE ARCHITECTURE?
WHAT IS SOFTWARE ARCHITECTURE? Chapter Outline What Software Architecture Is and What It Isn t Architectural Structures and Views Architectural Patterns What Makes a Good Architecture? Summary 1 What is
More informationDesigning Component-Based Architectures with Rational Rose RealTime
Designing Component-Based Architectures with Rational Rose RealTime by Reedy Feggins Senior System Engineer Rational Software Rose RealTime is a comprehensive visual development environment that delivers
More informationAppendix A: Scenarios
Appendix A: Scenarios Snap-Together Visualization has been used with a variety of data and visualizations that demonstrate its breadth and usefulness. Example applications include: WestGroup case law,
More informationTop five Docker performance tips
Top five Docker performance tips Top five Docker performance tips Table of Contents Introduction... 3 Tip 1: Design design applications as microservices... 5 Tip 2: Deployment deploy Docker components
More informationThe Software Design Process. CSCE 315 Programming Studio, Fall 2017 Tanzir Ahmed
The Software Design Process CSCE 315 Programming Studio, Fall 2017 Tanzir Ahmed Outline Challenges in Design Design Concepts Heuristics Practices Challenges in Design A problem that can only be defined
More informationWeb Applications (Part 2) The Hackers New Target
Web Applications (Part 2) The Hackers New Target AppScan Source Edition Terence Chow Advisory Technical Consultant An IBM Rational IBM Software Proof of Technology Hacking 102: Integrating Web Application
More informationOracle Endeca Information Discovery
Oracle Endeca Information Discovery Glossary Version 2.4.0 November 2012 Copyright and disclaimer Copyright 2003, 2013, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered
More information6 TOOLS FOR A COMPLETE MARKETING WORKFLOW
6 S FOR A COMPLETE MARKETING WORKFLOW 01 6 S FOR A COMPLETE MARKETING WORKFLOW FROM ALEXA DIFFICULTY DIFFICULTY MATRIX OVERLAP 6 S FOR A COMPLETE MARKETING WORKFLOW 02 INTRODUCTION Marketers use countless
More informationQueries give database managers its real power. Their most common function is to filter and consolidate data from tables to retrieve it.
1 2 Queries give database managers its real power. Their most common function is to filter and consolidate data from tables to retrieve it. The data you want to see is usually spread across several tables
More informationSOFTWARE DESIGN COSC 4353 / Dr. Raj Singh
SOFTWARE DESIGN COSC 4353 / 6353 Dr. Raj Singh UML - History 2 The Unified Modeling Language (UML) is a general purpose modeling language designed to provide a standard way to visualize the design of a
More informationCoding and Unit Testing! The Coding Phase! Coding vs. Code! Coding! Overall Coding Language Trends!
Requirements Spec. Design Coding and Unit Testing Characteristics of System to be built must match required characteristics (high level) Architecture consistent views Software Engineering Computer Science
More informationAn Introduction to Big Data Formats
Introduction to Big Data Formats 1 An Introduction to Big Data Formats Understanding Avro, Parquet, and ORC WHITE PAPER Introduction to Big Data Formats 2 TABLE OF TABLE OF CONTENTS CONTENTS INTRODUCTION
More informationChapter 11 Database Concepts
Chapter 11 Database Concepts INTRODUCTION Database is collection of interrelated data and database system is basically a computer based record keeping system. It contains the information about one particular
More informationObject-Oriented Design
Object-Oriented Design Lecture 14: Design Workflow Department of Computer Engineering Sharif University of Technology 1 UP iterations and workflow Workflows Requirements Analysis Phases Inception Elaboration
More informationLe nouveau Morfik est arrivé (The new Morfik has arrived)
Le nouveau Morfik est arrivé (The new Morfik has arrived) Michaël Van Canneyt April 7, 2008 Abstract Soon, it will be 2 years ago since the first review of Morfik in this magazine. When the current issue
More informationMonitor DNS errors in a dashboard
Monitor DNS errors in a dashboard Published: 2018-04-20 The Domain Name System (DNS) is an essential service for resolving hostnames to IP addresses. Any system that needs to locate and communicate with
More informationVerification and Validation
Chapter 5 Verification and Validation Chapter Revision History Revision 0 Revision 1 Revision 2 Revision 3 Revision 4 original 94/03/23 by Fred Popowich modified 94/11/09 by Fred Popowich reorganization
More informationChapter 10 Error Detection and Correction 10.1
Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy
More informationMICROSOFT VISUAL STUDIO 2010 Overview
MICROSOFT VISUAL STUDIO 2010 Overview Visual studio 2010 delivers the following key ADVANCES: Enabling emerging trends Every year the industry develops new technologies and new trends. With Visual Studio
More informationStatic Conformance Checking of Runtime Architectures Tool Demonstration
Static Conformance Checking of Runtime Architectures Tool Demonstration Marwan Abi-Antoun Jonathan Aldrich School of Computer Science Carnegie Mellon University The problem: architectural conformance Architects
More informationA Systems Approach to Dimensional Modeling in Data Marts. Joseph M. Firestone, Ph.D. White Paper No. One. March 12, 1997
1 of 8 5/24/02 4:43 PM A Systems Approach to Dimensional Modeling in Data Marts By Joseph M. Firestone, Ph.D. White Paper No. One March 12, 1997 OLAP s Purposes And Dimensional Data Modeling Dimensional
More informationIdentify and Eliminate Oracle Database Bottlenecks
Identify and Eliminate Oracle Database Bottlenecks Improving database performance isn t just about optimizing your queries. Oftentimes the infrastructure that surrounds it can inhibit or enhance Oracle
More informationData Structures Lecture 2 : Part 1: Programming Methodologies Part 2: Memory Management
0 Data Structures Lecture 2 : Part 2: Memory Management Dr. Essam Halim Houssein Lecturer, Faculty of Computers and Informatics, Benha University 2 Programming methodologies deal with different methods
More informationConcord OneClick for ehealth
Focus on Value Concord OneClick for ehealth The new administration console for ehealth provides a single user interface from which multiple administrators can quickly and easily manage ehealth systems
More informationSoftware Service Engineering
Software Service Engineering Lecture 4: Unified Modeling Language Doctor Guangyu Gao Some contents and notes selected from Fowler, M. UML Distilled, 3rd edition. Addison-Wesley Unified Modeling Language
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationSplunk Review. 1. Introduction
Splunk Review 1. Introduction 2. Splunk Splunk is a software tool for searching, monitoring and analysing machine generated data via web interface. It indexes and correlates real-time and non-real-time
More informationClient Code - the code that uses the classes under discussion. Coupling - code in one module depends on code in another module
Basic Class Design Goal of OOP: Reduce complexity of software development by keeping details, and especially changes to details, from spreading throughout the entire program. Actually, the same goal as
More informationAccelerating BI on Hadoop: Full-Scan, Cubes or Indexes?
White Paper Accelerating BI on Hadoop: Full-Scan, Cubes or Indexes? How to Accelerate BI on Hadoop: Cubes or Indexes? Why not both? 1 +1(844)384-3844 INFO@JETHRO.IO Overview Organizations are storing more
More informationModel-Based Design for Large High Integrity Systems: A Discussion Regarding Model Architecture
Model-Based Design for Large High Integrity Systems: A Discussion Regarding Model Architecture By Mike Anthony and Jon Friedman MathWorks Inc, Natick, MA, 01760 INTRODUCTION From complex controls problems
More informationJAVASCRIPT CHARTING. Scaling for the Enterprise with Metric Insights Copyright Metric insights, Inc.
JAVASCRIPT CHARTING Scaling for the Enterprise with Metric Insights 2013 Copyright Metric insights, Inc. A REVOLUTION IS HAPPENING... 3! Challenges... 3! Borrowing From The Enterprise BI Stack... 4! Visualization
More informationOracle - MySQL Developer Techniques with Advanced
Oracle - MySQL Developer Techniques with Advanced Stored Procedures Code: Lengt h: URL: D76152GC10 5 days View Online This MySQL Developer Techniques with Advanced Stored Procedures training will cover
More informationIntroduction to MySQL Cluster: Architecture and Use
Introduction to MySQL Cluster: Architecture and Use Arjen Lentz, MySQL AB (arjen@mysql.com) (Based on an original paper by Stewart Smith, MySQL AB) An overview of the MySQL Cluster architecture, what's
More informationCh 1: The Architecture Business Cycle
Ch 1: The Architecture Business Cycle For decades, software designers have been taught to build systems based exclusively on the technical requirements. Software architecture encompasses the structures
More informationContemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements.
Contemporary Design We have been talking about design process Let s now take next steps into examining in some detail Increasing complexities of contemporary systems Demand the use of increasingly powerful
More informationelektronik Security for Software and IT ECU ENERGY STORAGE TESTING COVER STORY Gasoline Direct Injection in-the-loop
www.atzonline.com 03 May 2015 Volume 10 elektronik W O R L D W I D E COVER STORY Security for Software and IT ECU Gasoline Direct Injection in-the-loop TESTING Tablets in Mobile Measurement Technique ENERGY
More informationAttackers Process. Compromise the Root of the Domain Network: Active Directory
Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH
More informationFor our next chapter, we will discuss the emulation process which is an integral part of virtual machines.
For our next chapter, we will discuss the emulation process which is an integral part of virtual machines. 1 2 For today s lecture, we ll start by defining what we mean by emulation. Specifically, in this
More informationPHP Composer 9 Benefits of Using a Binary Repository Manager
PHP Composer 9 Benefits of Using a Binary Repository Manager White Paper Copyright 2017 JFrog Ltd. March 2017 www.jfrog.com Executive Summary PHP development has become one of the most popular platforms
More informationChapter 2 Assignment (due Thursday, April 19)
(due Thursday, April 19) Introduction: The purpose of this assignment is to analyze data sets by creating histograms and scatterplots. You will use the STATDISK program for both. Therefore, you should
More informationMAKE THE MOST OF SEO HOW TO BRING CUSTOMERS TO YOUR DOOR
MAKE THE MOST OF SEO HOW TO BRING CUSTOMERS TO YOUR DOOR INTERNET SEARCHES ARE BUSINESSES NEW FRONT DOORS. More than half of the people who visit company websites get there because the site comes up in
More informationEnabling Performance & Stress Test throughout the Application Lifecycle
Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge
More informationUX Research: Good to Go website
UX Research: Good to Go website https://www.wsdot.wa.gov/goodtogo/default.htm Report by Jen Bailey The story Overview The Good to Go website is a division of Washington State Department of Transportation
More informationCourse Outline. MySQL Database Administration & Design. Course Description: Pre-requisites: Course Content:
MySQL Database Administration & Design Course Description: MySQL is the open source community's most popular Relational Database Management System (RDBMS) offering, and is a key part of LAMP - Linux, Apache,
More informationMARKING KEY The University of British Columbia MARKING KEY Computer Science 260 Midterm #2 Examination 12:30 noon, Thursday, March 15, 2012
MARKING KEY The University of British Columbia MARKING KEY Computer Science 260 Midterm #2 Examination 12:30 noon, Thursday, March 15, 2012 Instructor: K. S. Booth Time: 70 minutes (one hour ten minutes)
More informationPYRAMID Headline Features. April 2018 Release
PYRAMID 2018.03 April 2018 Release The April release of Pyramid brings a big list of over 40 new features and functional upgrades, designed to make Pyramid s OS the leading solution for customers wishing
More informationDeveloping SQL Databases (762)
Developing SQL Databases (762) Design and implement database objects Design and implement a relational database schema Design tables and schemas based on business requirements, improve the design of tables
More informationSoftware Design Document (SDD) Template (summarized from IEEE STD 1016)
Software Design Document (SDD) Template (summarized from IEEE STD 1016) Software design is a process by which the software requirements are translated into a representation of software components, interfaces,
More informationTwo-Tier Oracle Application
Two-Tier Oracle Application This tutorial shows how to use ACE to analyze application behavior and to determine the root causes of poor application performance. Overview Employees in a satellite location
More informationTeiid Designer User Guide 7.5.0
Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata
More informationAn Empirical Study of Architectural Decay in Open-Source Software
An Empirical Study of Architectural Decay in Open-Source Software Duc M. Le Annual Research Review 4/2017 Center for Systems and Software Engineering Motivation Explicitly manifest as Issues Problems Implicitly
More informationEMC VMAX UNISPHERE 360
EMC VMAX UNISPHERE 360 ABSTRACT Unisphere 360 is a new application designed to consolidate and simplify data center management of VMAX Storage systems. WHITE PAPER To learn more about how EMC products,
More informationDELL EMC VMAX UNISPHERE 360
DELL EMC VMAX UNISPHERE 360 ABSTRACT Using Unisphere 360 to consolidate the management of VMAX storage system offers many benefits. This management interface offers a single interface where all enrolled
More informationTOP New Features of Oracle Business Intelligence 11g
10 TOP New Features of Oracle Business Intelligence 11g TABLE OF CONTENTS Feature 1 New Chart Choices Funnel Chart 2 Trellis Chart 3 Waterfall 4 Tile Diagram 5 Feature 2 Recommended Visualization 6 Feature
More informationCHAPTER 9 DESIGN ENGINEERING. Overview
CHAPTER 9 DESIGN ENGINEERING Overview A software design is a meaningful engineering representation of some software product that is to be built. Designers must strive to acquire a repertoire of alternative
More informationGFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway
GFI Product Comparison GFI WebMonitor 2015 vs. McAfee Web Gateway Features GFI WebMonitor 2015 McAfee Web Gateway General features Platforms Windows servers and workstation OS Standalone proxy Win 7, 8,
More informationCSE 374 Programming Concepts & Tools. Hal Perkins Fall 2015 Lecture 19 Introduction to C++
CSE 374 Programming Concepts & Tools Hal Perkins Fall 2015 Lecture 19 Introduction to C++ C++ C++ is an enormous language: All of C Classes and objects (kind of like Java, some crucial differences) Many
More informationMySQL Worst Practices. Introduction. by Jonathan Baldie
MySQL Worst Practices by Jonathan Baldie Introduction MySQL and MariaDB are two of the most popular database engines in the world. They re rightly chosen for their speed potential, portability, and the
More informationComponent-Based Software Engineering TIP
Component-Based Software Engineering TIP X LIU, School of Computing, Napier University This chapter will present a complete picture of how to develop software systems with components and system integration.
More informationUnit 10 Databases. Computer Concepts Unit Contents. 10 Operational and Analytical Databases. 10 Section A: Database Basics
Unit 10 Databases Computer Concepts 2016 ENHANCED EDITION 10 Unit Contents Section A: Database Basics Section B: Database Tools Section C: Database Design Section D: SQL Section E: Big Data Unit 10: Databases
More information1Z Oracle. MySQL 5 Database Administrator Certified Professional Part I
Oracle 1Z0-873 MySQL 5 Database Administrator Certified Professional Part I Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-873 A. Use the --log-queries-indexes option. B. Use the
More informationData Warehouse Testing. By: Rakesh Kumar Sharma
Data Warehouse Testing By: Rakesh Kumar Sharma Index...2 Introduction...3 About Data Warehouse...3 Data Warehouse definition...3 Testing Process for Data warehouse:...3 Requirements Testing :...3 Unit
More informationAFFILIATE FAQ: CNN NEWSOURCE UPGRADED VIDEO INTERFACE Updated July 7, 2015
AFFILIATE FAQ: CNN NEWSOURCE UPGRADED VIDEO INTERFACE Updated July 7, 2015 The Big Picture Q: What is this about? *Updated* On July 11 th 2015, CNN Newsource will debut a new video experience. Clients
More informationIBM Tivoli Netcool Service Quality Manager V4.1.1
000-430 IBM Tivoli Netcool Service Quality Manager V4.1.1 Version: 3.0 QUESTION NO: 1 During the IBM Tivoli Netcool Service Quality Manager planning stages, which two standard options are available to
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization
More informationDELL POWERVAULT ML6000
DELL POWERVAULT ML6000 Intelligent Backup with the PowerVault ML6000 Modular Tape Library A whitepaper from Dell PowerVault Storage CONTENTS INTELLIGENT BACKUP WITH THE POWERVAULT ML6000 MODULAR TAPE LIBRARY
More information