The Why and How of the imodernize(d) Application Architecture
|
|
- Ross Pearson
- 5 years ago
- Views:
Transcription
1 The Why and How of the imodernize(d) Application Architecture David Andruchuk Sr. Architect Computer Systems Design Associates, Inc. What can i do..i can do Modernized
2 IBM i is very different from the other operating systems in the industry, and the differences are related to its unique architecture. From the birth of the AS/400, the goal of the operating system was to create a platform that would allow a business to be insulated from the complexity of IT technology. Our customers want to "run the business, not the computer." The five architectural elements below are not just marketing words -- they are built into millions of lines of operating system code -- and their purpose is to make IBM i stable, simple, secure and scalable.
3
4 DB2 for i & Single Level Store: We build intelligence and expertise into our handling of customer data. DB2 on IBM i is a part of the operating system, and it automates many functions that require human analysis and management on other operating systems. Single Level Store is a way of treating all storage attached to IBM i as if it is one huge set of memory. Working with DB2, our storage management spreads data across a customer's DASD in order to optimize data access. For these two reasons, customers rarely have to hire storage administrators or database administrators for their IBM i environments, and those professionals who are hired spend more time on analysis than on day-today management.
5 Object-Based Architecture: AS/400 was built understanding that security would be a key requirement of all businesses. Each object on IBM i has a set of well-defined functions, and it is architecturally impossible to treat an object in a way that violates its intended use. For example, two common methods of spreading viruses or Trojan Horses in other operating systems are to modify code in a compiled executable, or to rename an object so that a program looks like something that is not dangerous -- sending a program in an but making it appear to be a photo, for example. Neither of these two attacks can be done to software compiled as IBM i programs, because those operations are simply not allowed by the architecture.
6 Integration: We believe that the only software a typical customer really wants to deal with is the software that runs its business directly -- the applications that are developed by the customer or that they buy from our ISVs. For that reason, our operating system comes integrated with all of the necessary "middleware" a business application might need: Not only DB2, but also web servers, security services, user identity management and so on. These pieces of middleware must be added on top of other operating systems. We incorporate them into IBM i, and we ensure they fit into the architecture of the system, including the objectbased architecture, as well as the virtualization and TIMI.
7 Work Management: The AS/400 was built assuming that a business would rather have one physical system that is capable of running all of the workloads it needs, rather than buying a new system for each workload. To support that idea, IBM i has a "subsystem" concept that allows an ERP application to sit next to a CRM application, which sits next to a web server and so on -- all of them sharing resources such as the database, but not colliding with one another. This is very different from typical competing operating systems, where it is architecturally difficult to run multiple workloads safely on one machine -- or one virtual machine - - and so the industry has had tremendous "sprawl" as customers of other platforms have had to buy a new system for each application or workload. Yes, today these other operating systems solve the problem their architectures created with virtualization. Subsystems are a virtualization technology that existed since the beginning of the operating system, and they allow an IBM i client to spend less on managing multiple environments.
8 Technology Independent Machine Interface: IBM i is split into two pieces, and the TIMI separates them. The TIMI also provides a layer of abstraction that does two important things. First, it allows programs that were compiled on older releases to run unchanged -- without even recompiling -- as IBM i changes technology beneath those applications. The operating system moved from a 48-bit CISC hardware architecture to today's Power architecture without the need for customers to recompile code. Second, the TIMI works together with some of the IBM i-specific capabilities built into POWER processors to keep system memory separate from user memory, protecting the operating system from intentional or unintentional interference. An interesting point though, is that all of the IBM i "device drivers" for I/O are beneath this TIMI. To protect the integrity of the operating system, and by extension the customer s data, IBM i cannot have a "device driver" authored by another provider.
9 The Why of the imodernize(d) Application Architecture SQL adoption on the IBM i has lagged for the past 10 years Yet it was one of the first platforms to be 100% ANSI 2008 SQL compliant Standards Compliancy SQL is portable and widely accepted Openness Allow access to your DB to 3 rd party products Performance 64K path versus an 8-32K path using SQE versus CQE Skills SQL skills are readily available and transferable Functionality Large object data types, Encryption, Identity columns, etc.. Data Integrity Constraints, Referential Integrity, etc.. for all DB access
10 The Why of the imodernize(d) Application Architecture The greatest strengths of IBM i have caused its greatest weakness Applications keep running despite changes to the processor and database Business needs are not being met using DDS and RLA This can risk applications and data being moved to another system Data Encryption Protect sensitive data using AES, RC2 or TDES (Triple DES) encryption
11 Goals of the imodernize(d) Application Architecture Drive as much work down into the database management system as possible to gain consistency for all application platforms. Define business rules as part of the database to gain flexibility and rules applied to all interfaces Take advantage of SQL only capabilities to gain performance and modification of the database without affecting programs Database evolves to gain expandability to meet new business requirements and new technologies
12 The ROI of the imodernize(d) Application Architecture Faster IT response to business requirements Reduced software development and maintenance costs More reliable data to run our business on Improved performance and scalability Sensitive data protection and referential integrity Better documentation and data modeling tools Access to larger pool of talented developers
13 Program Centric vs Data Centric Most AS/400 Shops Most HLL / OO Shops Program Centric Traditional RLA I/O based Slows Down as # of rows increase Less Efficient Less Flexible Program(ers) Determine Access Method of Data Single Layer Architecture Row Based Data Access Data Centric SQL I/O Based Speeds up as # of rows increase Very Efficient Very Flexible to Changing Business Database Determines Access Method of Data Multi Layer Architecture Set Based Data Access
14 Program Centric vs Data Centric
15 Program Centric Architecture OPTIONAL - Business / Data Layer (Service Programs or Stored Procedures attached to Data) U/I Data Layer (Green Screen programs attached to Data)
16 Program Centric Architecture Slower Processing Larger Application (more lines of code) DBMS resources are not doing much work Inconsistent results (business rules in each program) 1 row at a time (Small Pipe) Mult Files opened HLL Program RLA
17 Data Centric Architecture UI User Interface Layer (RPG / HLL UI) Business Logic Layer (Service Programs) Data Access Layer (Stored Procedures) Logical Data Layer (Views) Physical Data Layer (Tables / Indexes)
18 Data Centric Architecture Faster Processing Smaller Application (less lines of code) DBMS resources are doing lots of work for you Consistent Results (business rules in DBMS) HLL Program SQL Mult rows at a time (Large Pipe) Set based processing SQL View Select columns From tables Where condition DBMS Physical Data
19 Current Application Architecture Data (PF, LF) UI Business Logic
20 The How of the imodernize(d) Application Architecture Application modernization happens on three levels The database, the development environment and the user interface DDS to SQL DDL Reverse Engineering Converting our source for recompilation Migrating the database Create SQL Tables, Indexes and Views Isolating the database Create I/O access via Stored Procedures external to our applications Enhancing the database Adding Referential Integrity, moving business rules to the DB 25 Years to create our databases this will not be changed overnight...if it was that easy, we d be done!
21
22 Modernization DB2 Database Prior to Modernization RPG PGM I/O Existing LF (Access Path) I/O Physical File
23 Modernization DB2 Database After Modernization RPG PGM I/O Existing LF Access Path From new SQL index I/O SQL Table After creating the new DDL based SQL table(s) Create SQL indexes identical to old LF access paths Create LF named as old PF
24
25
26
27
28
29 Database Reengineering
30 Modernizing IBM i Application Access
31 Modernizing IBM i Application Access
32 Modernizing IBM i Application Access
33 Modernizing IBM i Application Access
34 Modernizing IBM i Application Access
35 Real Life Examples Business Analyst complaining about query taking too much time. Prior to Performance Tuning Table had a LF by datefield and zip Query took 25 minutes to run on 100 million rows Suggested Performance Tuning Create an EVI index by datefield After Performance Tuning Query took 1minute 45 seconds to run on 100 million rows
36 Real Life Examples Need to add and expand columns to an existing table Requirements: Input Primary RPG program IP File is Join LF with Select / Omit (Dynamic Selection) Implemented Level Breaks Users complaining that it was taking too long to run Solution: Create VIEW with same fields as Join LF Define cursor in one time section of program Fetch from cursor at each cycle Look for field value changes for Level Breaks Total development time was 30 minutes including testing Run time went from 27 minutes to 2 minutes
37 Real Life Examples Need to add and expand columns to an existing table Requirements: Expand Name and Address columns in our marketing table in order to account for longer data for our business. Add new language preference column in our contact table to support web. Issue: How do we do this with out modifying and recompiling 100s of programs? Solution: ALTER TABLE CONTACTS ALTER COLUMN ADDRESS_LINE1 SET DATA TYPE CHAR (50 ) CCSID 37 NOT NULL ALTER TABLE CONTACTS ADD COLUMN LANGPRF CHAR(5) You only have to change/recompile the Applications that need the new column OR that need the expanded column size as there is no Format Level ID change
38 THINK An exploration into making the world work better
G.O.L.F. on IBM i. David Andruchuk Sr. Architect Computer Systems Design Associates, Inc. What can i do..i can do Database
G.O.L.F. on IBM i David Andruchuk Sr. Architect Computer Systems Design Associates, Inc. What can i do..i can do Database What are we covering today? Program vs Data Design Program Centric Data Centric
More informationData Centric Application Architecture. Jim Ritchhart
Jim Ritchhart AS/400 shops Application Architecture PROGRAMS Sunday, March 03, 2013 Jim Ritchhart 2 IT Development Goals Fast delivery Accurate delivery Fast execution of programs Flexibility to ever changing
More informationS.Q.L. in SQL. David Andruchuk Sr. Architect Computer Systems Design Associates, Inc. What can i do..i can do SQL
S.Q.L. in SQL David Andruchuk Sr. Architect Computer Systems Design Associates, Inc. What can i do..i can do SQL What are we covering today? SQL Objects (Objects written in SQL and known to the DBMS) File
More informationLive Tweet. Getting Started. My Twitter. Company Twitter. Hashtag for #AppMod4i
Getting Started Brian May IBM i Modernization Specialist Profound Logic Software Live Tweet My Twitter @BMayTheYiP Company Twitter @ProfoundLogic Hashtag for Event #AppMod4i 1 Overview Three critical areas
More informationIBM i/db2 Modernization to SQL
IBM i/db2 Modernization to SQL About Your Presenter IBM i Professional for 16 Years. Primary Focus is IBM i Engineering / Programming Well Versed in 2E. Well Versed in RPG (All Flavors) Well Versed in
More information9 th CA 2E/CA Plex Worldwide Developer Conference 1
1 Introduction/Welcome Message Modern CA:2E 8.7 allows us to transform our database from traditional DDS specifications, to more modern and accepted SQL. This session will show the process of moving from
More informationDB Fundamentals Exam.
IBM 000-610 DB2 10.1 Fundamentals Exam TYPE: DEMO http://www.examskey.com/000-610.html Examskey IBM 000-610 exam demo product is here for you to test the quality of the product. This IBM 000-610 demo also
More informationChoosing the level that works for you!
The Encryption Pyramid: Choosing the level that works for you! Eysha S. Powers eysha@us.ibm.com IBM, Enterprise Cryptography Extensive use of encryption is one of the most impactful ways to help reduce
More informationAPPLICATION MODERNIZATION. Brian May IBM i Modernization Specialist
APPLICATION MODERNIZATION Brian May IBM i Modernization Specialist APPLICATION MODERNIZATION Three critical areas of modernization The future of RPG and Rational Open Access, RPG Edition MVC Modernize
More informationApplication Migration with X-Analysis
MANAGEMENT OVERVIEW A GUIDE TO THE BENEFITS OF USING APPLICATION MIGRATION Application Migration with X-Analysis Databorough Ltd. 66 York Road Weybridge UK info@databorough.com Phone +44 (0)1932 848564
More informationASNA Case Study. ASNA Wings: Re-imagining Modernization at INFOCON Both Ways. Leaders in IBM i Modernization
ASNA Case Study ASNA Wings: Re-imagining Modernization at INFOCON Both Ways. Modernizing for a GUI doesn t mean you have to give up the power of RPG. By Thomas M. Stockwell Fueled by the talent of more
More informationSQL Support in 2E. 9 th CA 2E/CA Plex Worldwide Developer Conference
SQL Support in 2E 1 Introduction/Welcome Message Modern CA:2E 8.7 allows us to transform our database from traditional DDS specifications, to more modern and accepted SQL. This training session will show
More informationAO IBM i Advanced Modernization Workshop Curriculum
AO IBM i Advanced Modernization Workshop Curriculum This workshop is intended to provide the IBM i professional, specifically the RPG programmer, with an overview of the newest capabilities which have
More informationIBM EXAM - C DB Fundamentals. Buy Full Product.
IBM EXAM - C2090-610 DB2 10.1 Fundamentals Buy Full Product http://www.examskey.com/c2090-610.html Examskey IBM C2090-610 exam demo product is here for you to test the quality of the product. This IBM
More informationFundamentals of Information Systems, Seventh Edition
Chapter 3 Data Centers, and Business Intelligence 1 Why Learn About Database Systems, Data Centers, and Business Intelligence? Database: A database is an organized collection of data. Databases also help
More informationForeword Preface Db2 Family And Db2 For Z/Os Environment Product Overview DB2 and the On-Demand Business DB2 Universal Database DB2 Middleware and
Foreword Preface Db2 Family And Db2 For Z/Os Environment Product Overview DB2 and the On-Demand Business DB2 Universal Database DB2 Middleware and Connectivity DB2 Application Development DB2 Administration
More informationIndex *EXTIND option, ADDPFTRG command. See CL command Alias CREATE ALIAS for, 62, 64 for a column, 22, for a table, 15-17, 62, 66-67,
Index *EXTIND option, 202-203 ADDPFTRG command. See CL command Alias CREATE ALIAS for, 62, 64 for a column, 22, 349-350 for a table, 15-17, 62, 66-67, 291, 293, 343 ALLOCATE CURSOR, 219, 221 ALTER TABLE,
More informationDB2 for z/os: Programmer Essentials for Designing, Building and Tuning
Brett Elam bjelam@us.ibm.com - DB2 for z/os: Programmer Essentials for Designing, Building and Tuning April 4, 2013 DB2 for z/os: Programmer Essentials for Designing, Building and Tuning Information Management
More informationDB2 is a complex system, with a major impact upon your processing environment. There are substantial performance and instrumentation changes in
DB2 is a complex system, with a major impact upon your processing environment. There are substantial performance and instrumentation changes in versions 8 and 9. that must be used to measure, evaluate,
More informationIntroduction. A Brief Description of Our Journey
Introduction If you still write RPG code as you did 20 years ago, or if you have ILE RPG on your resume but don t actually use or understand it, this book is for you. It will help you transition from the
More informationIBM i: JOURNEY TO THE CENTER OF THE CLOUD
IBM i: JOURNEY TO THE CENTER OF THE CLOUD Prepared by Matt Shannon, Sr. Solutions Specialist and Jeffrey Whicker, Sr. Solutions Specialist Sirius Computer Solutions, Inc. July 2017 Contents Executive Summary...
More informationWelcome to this IBM podcast, Realizing More. Value from Your IMS Compiler Upgrade. I'm Kimberly Gist
IBM Podcast [ MUSIC ] Welcome to this IBM podcast, Realizing More Value from Your IMS Compiler Upgrade. I'm Kimberly Gist with IBM. System z compilers continue to deliver the latest programming interfaces
More information5. Technology Applications
5. Technology Applications 5.1 What is a Database? 5.2 Types of Databases 5.3 Choosing the Right Database 5.4 Database Programming Tools 5.5 How to Search Your Database 5.6 Data Warehousing and Mining
More informationDatabase Technology Introduction. Heiko Paulheim
Database Technology Introduction Outline The Need for Databases Data Models Relational Databases Database Design Storage Manager Query Processing Transaction Manager Introduction to the Relational Model
More informationAn Introduction to SQL for System i. A beginning overview of SQL in System i Navigator and Embedded SQL in RPGLE
An Introduction to SQL for System i A beginning overview of SQL in System i Navigator and Embedded SQL in RPGLE Quote heard from IBM at a Conference 80% of everything you will need to know three years
More informationDatabasesystemer, forår 2005 IT Universitetet i København. Forelæsning 8: Database effektivitet. 31. marts Forelæser: Rasmus Pagh
Databasesystemer, forår 2005 IT Universitetet i København Forelæsning 8: Database effektivitet. 31. marts 2005 Forelæser: Rasmus Pagh Today s lecture Database efficiency Indexing Schema tuning 1 Database
More informationTestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges
Db2 for z/os Test Data Management Revolutionized TestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges The challenge in creating realistic representative test data lies in extracting
More informationNormalization in DBMS
Unit 4: Normalization 4.1. Need of Normalization (Consequences of Bad Design-Insert, Update & Delete Anomalies) 4.2. Normalization 4.2.1. First Normal Form 4.2.2. Second Normal Form 4.2.3. Third Normal
More informationTwo Success Stories - Optimised Real-Time Reporting with BI Apps
Oracle Business Intelligence 11g Two Success Stories - Optimised Real-Time Reporting with BI Apps Antony Heljula October 2013 Peak Indicators Limited 2 Two Success Stories - Optimised Real-Time Reporting
More informationpurequery Deep Dive Part 2: Data Access Development Dan Galvin Galvin Consulting, Inc.
purequery Deep Dive Part 2: Data Access Development Dan Galvin Galvin Consulting, Inc. Agenda The Problem Data Access in Java What is purequery? How Could purequery Help within My Data Access Architecture?
More informationMCP in a Modern Integrated Environment (UN 4015 D) Tim Schulz Enterprise Architect
MCP in a Modern Integrated Environment (UN 4015 D) Tim Schulz Enterprise Architect Agenda: CoreLink Development Struggles Data Integration 2 The Setting CoreLink Administrative Solutions Spin off company
More informationContents. part 1: ILE Basics...7. Acknowledgments...iv
Contents Acknowledgments...iv Introduction...1 A Brief Description of Our Journey...1 From Old Problematic Monoliths to Innovative, Lightweight, Efficient Programs...3 Why ILE? OPM Has Served Me Fine So
More informationOverview. Data Integrity. Three basic types of data integrity. Integrity implementation and enforcement. Database constraints Transaction Trigger
Data Integrity IT 4153 Advanced Database J.G. Zheng Spring 2012 Overview Three basic types of data integrity Integrity implementation and enforcement Database constraints Transaction Trigger 2 1 Data Integrity
More informationCSE 344 Final Review. August 16 th
CSE 344 Final Review August 16 th Final In class on Friday One sheet of notes, front and back cost formulas also provided Practice exam on web site Good luck! Primary Topics Parallel DBs parallel join
More informationThe SD-WAN security guide
The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More informationB.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION. Ch. 1 :- Introduction Database Management System - 1
Basic Concepts :- 1. What is Data? Data is a collection of facts from which conclusion may be drawn. In computer science, data is anything in a form suitable for use with a computer. Data is often distinguished
More informationSQL. History. From Wikipedia, the free encyclopedia.
SQL From Wikipedia, the free encyclopedia. Structured Query Language (SQL) is the most popular computer language used to create, modify and retrieve data from relational database management systems. The
More informationz/os Db2 Batch Design for High Performance
Division of Fresche Solutions z/os Db2 Batch Design for High Performance Introduction Neal Lozins SoftBase Product Manager All tests in this presentation were run on a dedicated zbc12 server We used our
More informationX-Resize. M a n a g e m e n t O v e r v i e w
X-Resize M a n a g e m e n t O v e r v i e w For more information contact info@databorough.com Producers of X-Analysis www.databorough.com Copyright 2009. Databorough Ltd. Databorough believes the information
More informationVendor: IBM. Exam Code: C Exam Name: DB Fundamentals. Version: Demo
Vendor: IBM Exam Code: C2090-610 Exam Name: DB2 10.1 Fundamentals Version: Demo QUESTION 1 If the following command is executed: CREATE DATABASE test What is the page size (in kilobytes) of the database?
More informationEXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!
EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : C2090-610 Title : DB2 10.1 Fundamentals Version
More informationHOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018
HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018 Table of Contents A short technology overview 3 How micro-segmentation
More informationCSE 530A ACID. Washington University Fall 2013
CSE 530A ACID Washington University Fall 2013 Concurrency Enterprise-scale DBMSs are designed to host multiple databases and handle multiple concurrent connections Transactions are designed to enable Data
More informationModernizing Business Intelligence and Analytics
Modernizing Business Intelligence and Analytics Justin Erickson Senior Director, Product Management 1 Agenda What benefits can I achieve from modernizing my analytic DB? When and how do I migrate from
More informationSeveral major software companies including IBM, Informix, Microsoft, Oracle, and Sybase have all released object-relational versions of their
Several major software companies including IBM, Informix, Microsoft, Oracle, and Sybase have all released object-relational versions of their products. These companies are promoting a new, extended version
More informationIntroduction to Database Management Systems
Introduction to Database Management Systems Excerpt from Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 What Is a DBMS? A very large, integrated collection of data. Models real-world
More informationSixth Edition. Building an E-commerce Web Site. Building an E-commerce Site: A Systematic Approach. Most important management challenges:
E-commerce business. technology. society. Sixth Edition Chapter 4 Kenneth C. Laudon Carol Guercio Traver Building an E-commerce Web Site Copyright 2009 Pearson Education, Inc. Education, Inc. Slide 4-1
More informationA Visual Guide to Automated MVC Reengineering
D a t a b o r o u g h A Visual Guide to Automated MVC Reengineering Steve Kilner This guide has the following sections: 1. Three Steps To New and Improved Systems 2. Why Reengineer? 3. Bad Practices of
More informationPart I What are Databases?
Part I 1 Overview & Motivation 2 Architectures 3 Areas of Application 4 History Saake Database Concepts Last Edited: April 2019 1 1 Educational Objective for Today... Motivation for using database systems
More informationDATABASE SYSTEMS. Database programming in a web environment. Database System Course, 2016
DATABASE SYSTEMS Database programming in a web environment Database System Course, 2016 AGENDA FOR TODAY Advanced Mysql More than just SELECT Creating tables MySQL optimizations: Storage engines, indexing.
More informationAdvanced ODBC and JDBC Access to Salesforce Data
Advanced ODBC and JDBC Access to Salesforce Data DATA SHEET FEATURES BENEFITS Use significantly less memory to do more work Expose Salesforce data to a full spectrum of custom and commercial apps Secure
More informationDatabase Applications (15-415)
Database Applications (15-415) The Relational Model Lecture 3, January 18, 2015 Mohammad Hammoud Today Last Session: The entity relationship (ER) model Today s Session: ER model (Cont d): conceptual design
More information10 Things to expect from a DB2 Cloning Tool
10 Things to expect from a DB2 Cloning Tool This document gives a brief overview of functionalities that can be expected from a modern DB2 cloning tool. The requirement to copy DB2 data becomes more and
More informationIT1105 Information Systems and Technology. BIT 1 ST YEAR SEMESTER 1 University of Colombo School of Computing. Student Manual
IT1105 Information Systems and Technology BIT 1 ST YEAR SEMESTER 1 University of Colombo School of Computing Student Manual Lesson 3: Organizing Data and Information (6 Hrs) Instructional Objectives Students
More informationEngineering Robust Server Software
Engineering Robust Server Software Scalability Other Scalability Issues Database Load Testing 2 Databases Most server applications use databases Very complex pieces of software Designed for scalability
More informationIBM i 7.2. Therese Eaton Client Technical Specialist
IBM i 7.2 Therese Eaton Client Technical Specialist IBM i 7.2 Therese Eaton Client Technical Specialist IBM i Decades of ultimate integration & workload optimization that all the vendors in the IT industry
More informationProtecting Your Data With Encryption
Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies Thank you Sponsors! o Please visit the sponsors during the vendor break from 2:45 3:15 and enter their end-of-day raffles Event
More informationHigh-Performance Distributed DBMS for Analytics
1 High-Performance Distributed DBMS for Analytics 2 About me Developer, hardware engineering background Head of Analytic Products Department in Yandex jkee@yandex-team.ru 3 About Yandex One of the largest
More information32 nd Annual Spring Conference Tuesday All Day Session
32 nd Annual Spring Conference Tuesday All Day Session *NEW* Lunch is included SQL Programming Overview Tuesday 09:00 AM to 4:00 PM Session Abstract Learn how to use advanced SQL features and syntax that
More informationIBM Storage. Leading the 21st Century Growth. Freddy Lee Advanced Technical Support
IBM Storage Leading the 21st Century Growth Freddy Lee Advanced Technical Support Why IBM System Storage? Heritage of Distinction 50+ years in storage business Innovation leadership - Invented many of
More information8) A top-to-bottom relationship among the items in a database is established by a
MULTIPLE CHOICE QUESTIONS IN DBMS (unit-1 to unit-4) 1) ER model is used in phase a) conceptual database b) schema refinement c) physical refinement d) applications and security 2) The ER model is relevant
More informationCSE Database Management Systems. York University. Parke Godfrey. Winter CSE-4411M Database Management Systems Godfrey p.
CSE-4411 Database Management Systems York University Parke Godfrey Winter 2014 CSE-4411M Database Management Systems Godfrey p. 1/16 CSE-3421 vs CSE-4411 CSE-4411 is a continuation of CSE-3421, right?
More informationModule - P7 Lecture - 15 Practical: Interacting with a DBMS
Introduction to Modern Application Development Prof. Tanmai Gopal Department of Computer Science and Engineering Indian Institute of Technology, Madras Module - P7 Lecture - 15 Practical: Interacting with
More informationIBM DB2 11 DBA for z/os Certification Review Guide Exam 312
Introduction IBM DB2 11 DBA for z/os Certification Review Guide Exam 312 The purpose of this book is to assist you with preparing for the IBM DB2 11 DBA for z/os exam (Exam 312), one of the two required
More informationPortrait of a Hybrid IT Organisation
Portrait of a Hybrid IT Organisation Hong Kong 2017 Hong Kong 2017 INTRODUCTION KEY FINDINGS RECOMMENDATIONS DEMOGRAPHICS FULL SURVEY RESULTS 3 4 6 8 9 Introduction Cloud computing s mounting importance
More informationPractical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems
Practical Database Design Methodology and Use of UML Diagrams 406.426 Design & Analysis of Database Systems Jonghun Park jonghun@snu.ac.kr Dept. of Industrial Engineering Seoul National University chapter
More informationSystems Analysis & Design
Systems Analysis & Design Dr. Arif Sari Email: arif@arifsari.net Course Website: www.arifsari.net/courses/ Slide 1 Adapted from slides 2005 John Wiley & Sons, Inc. Slide 2 Course Textbook: Systems Analysis
More informationE-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Sixth Edition
E-commerce business. technology. society. Sixth Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2010 2009 Pearson Education, Inc. Slide 4-1 Building an E-commerce Web Site Copyright 2010 2009
More informationPortrait of a Hybrid IT Organization
Portrait of a Hybrid IT Organization North America 2017 North America 2017 INTRODUCTION KEY FINDINGS RECOMMENDATIONS DEMOGRAPHICS FULL SURVEY RESULTS 3 4 7 9 10 Introduction Cloud computing s mounting
More informationInformation Systems (Informationssysteme)
Information Systems (Informationssysteme) Jens Teubner, TU Dortmund jens.teubner@cs.tu-dortmund.de Summer 2016 c Jens Teubner Information Systems Summer 2016 1 Part VIII Transaction Management c Jens Teubner
More informationIn This Lecture. SQL Data Definition SQL SQL. Non-Procedural Programming. Notes. Database Systems Lecture 5 Natasha Alechina
This Lecture Database Systems Lecture 5 Natasha Alechina The language, the relational model, and E/R diagrams CREATE TABLE Columns Primary Keys Foreign Keys For more information Connolly and Begg chapter
More informationHow HomeAway uses Node.js to Rev Operations to Scale and Tame Acquisition Woes
How HomeAway uses Node.js to Rev Operations to Scale and Tame Acquisition Woes HomeAway acquired several smaller vacation rental companies and was itself acquired by Expedia. Through it all, were the common,
More informationSQL Server 2016 Query Store
SQL Server 2016 Query Store Sergio Govoni Twitter: @segovoni Blog: http://sqlblog.com/blogs/sergio_govoni Sergio Govoni SQL Server MVP sqlblog.com/blogs/sergio_govoni @segovoni ugiss.org manning.com/delaney
More informationCICS VSAM Transparency
Joe Gailey Senior IT Specialists Client Technical Specialist for CICS z/os Tools 10 th May 2013 CICS VSAM Transparency AGENDA Business Issue IBM s Solution How CICS VT Works (Deep Dive) Conclusions / Questions
More informationShifting focus: Internet of Things (IoT) from the security manufacturer's perspective
Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective Published on 27 Nov 2018 The term Internet of Things (IoT) has almost been beaten to death at this point, as more and
More informationChoosing the Right Container Infrastructure for Your Organization
WHITE PAPER Choosing the Right Container Infrastructure for Your Organization Container adoption is accelerating rapidly. Gartner predicts that by 2018 more than 50% of new workloads will be deployed into
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationIntroduction to Data Management. Lecture #4 (E-R Relational Translation)
Introduction to Data Management Lecture #4 (E-R Relational Translation) Instructor: Mike Carey mjcarey@ics.uci.edu Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Announcements v Today
More informationSQL Server 2014 Performance Tuning and Optimization
SQL Server 2014 Performance Tuning and Optimization 55144B; 5 Days, Instructor-led Course Description This course is designed to give the right amount of Internals knowledge, and wealth of practical tuning
More informationMaximizing the speed of time based SQL injection data retrieval
Maximizing the speed of time based SQL injection data retrieval 30c3, Hamburg, 29.12.2013 Arnim' ; DROP TABLE students;-- ) Introduction SQL injection SQLi is #1 of OWASP Top 10 Web vulnerabilities Sample
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationTransforming OPNQRYF programs to an SQL access model
Transforming OPNQRYF programs to an SQL access model. Gene Cobb ISV Business Strategy and Enablement March 2008 Copyright IBM Corporation, 2008. All Rights Reserved. All trademarks or registered trademarks
More informationIntroduction to Azure DocumentDB. Jeff Renz, BI Architect RevGen Partners
Introduction to Azure DocumentDB Jeff Renz, BI Architect RevGen Partners Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing user created content
More informationAgenda. Jim Oberholtzer Senior Technical Architect
iseries Performance Configuration and Tools September 13, 2005 Jim Oberholtzer Senior Technical Architect INFORMATION S O L U T I O N S THAT WORK FOR BUSINESS GREEN BAY MILWAUKEE MINNEAPOLIS Agenda Work
More informationArchitecture: Caching Issues in Performance
Architecture: Caching Issues in Performance Mike Bailey mjb@cs.oregonstate.edu Problem: The Path Between a CPU Chip and Off-chip Memory is Slow CPU Chip Main Memory This path is relatively slow, forcing
More informationThe Value of Automated Penetration Testing White Paper
The Value of Automated Penetration Testing White Paper Overview As an information security expert and the security manager of the company, I am well aware of the difficulties of enterprises and organizations
More informationCARAVEL. Performance analysis in modernization projects BASE100. BASE 100, S.A.
CARAVEL Performance analysis in modernization projects BASE100 BASE 100, S.A. www.base100.com Copyright BASE 100, S.A. All rights reserved. Information contained in this document is subject to changes
More informationInteract with Mainframe and Non-mainframe Data in a Common, Intuitive Manner
Interact with Mainframe and Non-mainframe Data in a Common, Intuitive Manner Topaz for Enterprise Data, part of the Topaz suite of mainframe development and testing tools, enables developers and data architects
More informationIBM i Version 7.3. Database Administration IBM
IBM i Version 7.3 Database Administration IBM IBM i Version 7.3 Database Administration IBM Note Before using this information and the product it supports, read the information in Notices on page 45.
More informationArchitecture: Caching Issues in Performance
Architecture: Caching Issues in Performance Mike Bailey mjb@cs.oregonstate.edu Problem: The Path Between a CPU Chip and Off-chip Memory is Slow CPU Chip Main Memory This path is relatively slow, forcing
More informationHere, we consider Database bottleneck as a problem and provide solution for some of common problems.
Enhancing EHR Performance for Better Business Outcomes Business Problem An EHR with high volume of data and users often complains about performance glitches in certain sections of an application. Different
More informationElementary IR: Scalable Boolean Text Search. (Compare with R & G )
Elementary IR: Scalable Boolean Text Search (Compare with R & G 27.1-3) Information Retrieval: History A research field traditionally separate from Databases Hans P. Luhn, IBM, 1959: Keyword in Context
More informationDon t Let ICIs put your DB2 applications in the ICU!
Don t Let ICIs put your DB2 applications in the ICU! Craig Mullins & Roy Boxwell SEGUS & SOFTWARE ENGINEERING Session Code: V8 On May 25, 2016 at 10:30 Platform: DB2 z/os Photo by Steve from Austin, TX,
More informationThe Relational Model. Relational Data Model Relational Query Language (DDL + DML) Integrity Constraints (IC)
The Relational Model Relational Data Model Relational Query Language (DDL + DML) Integrity Constraints (IC) Why Study the Relational Model? Most widely used model in Commercial DBMSs: Vendors: IBM, Microsoft,
More informationHow to speed up a database which has gotten slow
Triad Area, NC USA E-mail: info@geniusone.com Web: http://geniusone.com How to speed up a database which has gotten slow hardware OS database parameters Blob fields Indices table design / table contents
More informationEngineering Robust Server Software
Engineering Robust Server Software Scalability Other Scalability Issues Database Load Testing 2 Databases Most server applications use databases Very complex pieces of software Designed for scalability
More informationORACLE DATABASE 12C INTRODUCTION
SECTOR / IT NON-TECHNICAL & CERTIFIED TRAINING COURSE In this training course, you gain the skills to unleash the power and flexibility of Oracle Database 12c, while gaining a solid foundation of database
More informationExam Questions C
Exam Questions C2090-610 DB2 10.1 Fundamentals https://www.2passeasy.com/dumps/c2090-610/ 1.If the following command is executed: CREATE DATABASE test What is the page size (in kilobytes) of the database?
More informationOracle and Tangosol Acquisition Announcement
Oracle and Tangosol Acquisition Announcement March 23, 2007 The following is intended to outline our general product direction. It is intended for information purposes only, and may
More information