AUTOMATED HEAPDUMP ANALYSIS FOR DEVELOPERS, TESTERS, AND SUPPORT EMPLOYEES
|
|
- Malcolm Osborne
- 5 years ago
- Views:
Transcription
1 AUTOMATED HEAPDUMP ANALYSIS FOR DEVELOPERS, TESTERS, AND SUPPORT EMPLOYEES Krum Tsvetkov Andreas Buchen TS-5729
2 Find memory leaks WITHOUT working with Memory Analyzer 2008 JavaOne SM Conference java.sun.com/javaone 2
3 Agenda Introduction Use Case Technical Support Use Case Development Use Case Testing Summary Q & A 2008 JavaOne SM Conference java.sun.com/javaone 3
4 Manual Memory Analysis Is Complex Requires experience with tools Requires expertise in the analyzed coding People with diverse skills are faced with memory problems 2008 JavaOne SM Conference java.sun.com/javaone 4
5 What Are the Goals of Memory Analyzer? Reduce complexity of handling memory issues Provide results of analysis, not only features to analyze Accommodate diverse skills and demands 2008 JavaOne SM Conference java.sun.com/javaone 5
6 Agenda Introduction Use Case Technical Support Use Case Development Use Case Testing Summary Q & A 2008 JavaOne SM Conference java.sun.com/javaone 6
7 Automated Problem Finding Helps Support Automatically detect and describe problem suspects Enable discovery of known solutions Facilitate the dispatching of new problems Collect details for in-depth analysis by the code experts 2008 JavaOne SM Conference java.sun.com/javaone 7
8 Automated Leak Suspects Discovery 2008 JavaOne SM Conference java.sun.com/javaone 8
9 What Happened Behind the Scenes? First, parsing of the heapdump is triggered Indexes for fast access to the data are generated A dominator tree of the object graph is computed It models the keep-alive dependences among the objects It helps to distinguish the biggest objects Analysis is triggered and the report is generated 2008 JavaOne SM Conference java.sun.com/javaone 9
10 Find Suspects in the Dominator Tree Leak Suspect Dominator Tree Treat very big objects in the dominator tree as suspects Accumulation Point A Significant drop in the retained sizes shows the accumulation point 2008 JavaOne SM Conference java.sun.com/javaone 10
11 Find Who Is Keeping The Suspect Alive Dominator Tree Shortest Path From A GC Root The chain of objects and references which keep the suspect alive 2008 JavaOne SM Conference java.sun.com/javaone 11
12 What Is the Suspect Keeping Alive? Dominator Tree The objects which have been accumulated 2008 JavaOne SM Conference java.sun.com/javaone 12
13 How Problem Suspects Are Found? Treat the biggest objects in the dominator tree as suspects A significant drop in the retained sizes shows the accumulation point 2008 JavaOne SM Conference java.sun.com/javaone 13
14 Heavy Request Analysis 2008 JavaOne SM Conference java.sun.com/javaone 14
15 How Are Request Details Extracted? If the Suspect is a Thread, then Thread Dominator Tree name Extract Activity Details <Java Local> Analyze the local variables and method parameters of the thread to determine its activity 2008 JavaOne SM Conference java.sun.com/javaone 15
16 Agenda Introduction Use Case Technical Support Use Case Development Use Case Testing Summary Q & A 2008 JavaOne SM Conference java.sun.com/javaone 16
17 A Developer-tailored Report Helps To Optimize Memory Footprint Help developers focus on their own component Give hints where footprint can be optimized Check for known anti-patterns Let developers implement their own checks 2008 JavaOne SM Conference java.sun.com/javaone 17
18 Component Footprint Analysis 2008 JavaOne SM Conference java.sun.com/javaone 18
19 Agenda Introduction Use Case Technical Support Use Case Development Use Case Testing Summary Q & A 2008 JavaOne SM Conference java.sun.com/javaone 19
20 What Can Be Done in the Testing Phase? Compare on a regular basis The retained sizes of a predefined list of components The sizes of some important objects Sessions Caches Regularly perform the report from the developers use case Regularly execute custom-specific reports that Check for unreleased resources (e.g. bundles, application loaders) Check for static fields referencing session data And so on 2008 JavaOne SM Conference java.sun.com/javaone 20
21 Agenda Introduction Use Case Technical Support Use Case Development Use Case Testing Summary Q & A 2008 JavaOne SM Conference java.sun.com/javaone 21
22 Summary Automated analysis of memory leaks and footprint Innovative features as building blocks SAP has contributed Memory Analyzer as open source 2008 JavaOne SM Conference java.sun.com/javaone 22
23 For More Information Memory Eclipse Memory Analyzer SAP Java+Memory+Analysis BLOGs: JavaOne SM Conference java.sun.com/javaone 23
24 Krum Tsvetkov Andreas Buchen TS JavaOne SM Conference java.sun.com/javaone 24
Practical Lessons in Memory Analysis
Practical Lessons in Memory Analysis Krum Tsvetkov SAP AG Andrew Johnson IBM United Kingdom Limited GOAL > Learn practical tips and tricks for the analysis of common memory-related problems 2 Agenda >
More informationEclipse Memory Analyzer Release Review
Eclipse Memory Analyzer Release Review Review Date: Dec 10, 2008 Community Channel: mailto:mat-dev@eclipse.org http://www.eclipse.org/newsportal/thread.php?group=eclipse.technology.memory-analyzer Author:
More informationEclipse Memory Analyzer Release Review 0.8
Eclipse Memory Analyzer Release Review 0.8 Review Date: May 29, 2008 Community Channel: mailto:mat-dev@eclipse.org http://www.eclipse.org/newsportal/thread.php?group=eclipse.technology.memory-analyzer
More informationEffective Java Heap Memory Analysis on Enterprise-Scale SAP Memory Analyzer. Vedran Lerenc, SAP NetWeaver Java Server Technology October 11th 2007
Effective Java Heap Memory Analysis on Enterprise-Scale SAP Memory Analyzer Vedran Lerenc, SAP NetWeaver Java Server Technology October 11th 2007 Memory 101 Heap MB Full Garbage Collection 2 a.m. Out Of
More informationEclipse Memory Analyzer Graduation, Move and 1.0 Release Review
Eclipse Memory Analyzer Graduation, Move and 1.0 Release Review Review Date: 28 April 2010 Community Channel: mailto:mat-dev@eclipse.org http://www.eclipse.org/forums/index.php?t=thread&frm_id=62& Author:
More informationBasic Steps and Features Walk-through
Welcome to the SAP Memory Analyzer SAP Memory Analyzer: Basic Steps and Features Walk-through SAP AG 2007, Memory Analysis with SAP Memory Analyzer / 1 Basic Steps with SAP Memory Analyzer (1) Get Heap
More informationSAP Memory Analyzer: Multi-Gigabyte Java Heap Dumps Are Nothing to Fear Now
SAP Memory Analyzer: Multi-Gigabyte Java Heap Dumps Are Nothing to Fear Now Applies to: Java development in general Summary SAP has developed a tool for Java memory analysis which is helpful to all Java
More informationTest Patterns in Java
Test Patterns in Java Jaroslav Tulach, Jesse Glick, Miloš Kleint Sun Microsystems http://www.netbeans.org 2006 JavaOne SM Conference Session BOF 0220 Automated Testing Test is a Kind of Documentation Learn
More informationVirtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services
Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as
More informationSun Java TM Composite Applications Platform Suite Implementing Selected EAI Patterns
Sun Java TM Composite Applications Platform Suite Implementing Selected EAI Patterns Michael Czapski, Enterprise Architect, Sun Microsystems Frank Kieviet, Senior Staff Engineer, Sun Microsystems TS-5301
More informationMemoryLint. Petr Nejedlý, Radim Kubacki SUN Microsystems, BOF-9066
MemoryLint Petr Nejedlý, Radim Kubacki SUN Microsystems, http://www.sun.com/, http://www.netbeans.org BOF-9066 2007 JavaOne SM Conference Session BOF-9066 Goal Get ideas how to analyze content of Java
More informationReal Time: Understanding the Trade-offs Between Determinism and Throughput
Real Time: Understanding the Trade-offs Between Determinism and Throughput Roland Westrelin, Java Real-Time Engineering, Brian Doherty, Java Performance Engineering, Sun Microsystems, Inc TS-5609 Learn
More informationSwinging from the Outside
Swinging from the Outside A guide to navigating Swing from the outside of Sun Brian Mason, Dir Software of Engineering, Teseda S295599 Space is big, really big. You might think it is a long way down to
More informationHeapy a memory profiler and debugger for Python
Heapy a memory profiler and debugger for Python Sverker Nilsson sverker.is@home.se June 2, 2006 Goal Make a tool for the Python programming language Support memory debugging and optimization Provide data
More informationJava Language Modularity With Superpackages
Java Language Modularity With Superpackages Alex Buckley JSR 294 Co-spec lead Sun Microsystems Andreas Sterbenz JSR 294 Co-spec lead Sun Microsystems TS-2401 2007 JavaOne SM Conference Session 2401 Goal
More informationDeveloping an Object- Oriented Database for Embedded Systems on Java ME
YOUR LOGO HERE Developing an Object- Oriented Database for Embedded Systems on Java ME Konstantin Knizhnik Software Engineer, McObject TS-5617 2007 JavaOne SM Conference Session TS-5617 OODBMS for Java
More informationA NEW PLATFORM FOR A NEW ERA. Copyright 2014 Pivotal. All rights reserved.
A NEW PLATFORM FOR A NEW ERA 1 2 Java Memory Leaks in Modular Environments Mark Thomas November 2016 Introductions Mark Thomas markt@apache.org Tomcat committer and PMC member Joined Tomcat community in
More informationWriting a Sony PlayStation Emulator Using Java Technology
Writing a Sony PlayStation Emulator Using Java Technology Graham Sanderson Matt Howitt Lombardi Software www.lombardisoftware.com TS-5547 2006 JavaOne SM Conference Session TS-5547 High Performance Java
More informationBuilding a Java ME Test Suite in 15 Minutes
Building a Java ME Test Suite in 15 Minutes Mikhail Gorshenev, Senior Staff Engineer Roman Zelov, Member of Technical Staff Alexander Glasman, Member of Technical Staff Sun Microsystems, Inc. http://www.sun.com/
More informationCreating Professional Swing UIs Using the NetBeans GUI Builder
Creating Professional Swing UIs Using the NetBeans GUI Builder Tomas Pavek, Jan Stola, Scott Violet Sun Microsystems http://www.netbeans.org http://swinglabs.dev.java.net TS-4916 Copyright 2006, Sun Microsystems,
More informationTHE MINION SEARCH ENGINE: INDEXING, SEARCH, TEXT SIMILARITY AND TAG GARDENING
THE MINION SEARCH ENGINE: INDEXING, SEARCH, TEXT SIMILARITY AND TAG GARDENING Jeff Alexander, Member of Technical Staff, Sun Microsystems Stephen Green, Senior Staff Engineer, Sun Microsystems TS-5027
More informationInteroperable Business Web Services Using Project Metro and.net 3.5
Interoperable Business Web Services Using Project Metro and.net 3.5 Harold Carr, Metro Lead Architect, Sun Microsystems Kevin Wittkopf, Senior Solutions Architect, Microsoft TS-6128 Learn how to architect
More informationGarbage Collection. Steven R. Bagley
Garbage Collection Steven R. Bagley Reference Counting Counts number of pointers to an Object deleted when the count hits zero Eager deleted as soon as it is finished with Problem: Circular references
More informationOpen source tools used in effective testing
Open source tools used in effective testing Abhishek Talwar Hexaview Technologies abhi@hexaviewtech.com Agenda Story so far Some advantages of open source tools Some hard hitting tools Community Downsides
More informationBuilding JavaServer Faces Applications
IBM Software Group St. Louis Java User Group Tim Saunders ITS Rational Software tim.saunders@us.ibm.com 2005 IBM Corporation Agenda JSF Vision JSF Overview IBM Rational Application Developer v6.0 Build
More informationAPI Testing with GreenPepper Challenges and Best Practices
Pa g e 1 API Testing with GreenPepper Challenges and Best Practices Software Testing Conference, India, 2013 Dhaval S. Koradia Ashwini A. Khaladkar Datamatics Global Services Limited, Mumbai, India. Pa
More informationThe Garbage-First Garbage Collector
The Garbage-First Garbage Collector Tony Printezis, Sun Microsystems Paul Ciciora, Chicago Board Options Exchange #TS-9 Trademarks And Abbreviations (to get them out of the way...) Java Platform, Standard
More informationThinking Beyond Search with Solr Understanding How Solr Can Help Your Business Scale. Magento Expert Consulting Group Webinar July 31, 2013
Thinking Beyond Search with Solr Understanding How Solr Can Help Your Business Scale Magento Expert Consulting Group Webinar July 31, 2013 The presenters Magento Expert Consulting Group Udi Shamay Head,
More informationAutomated testing in ERP using Rational Functional Tester
Automated testing in ERP using Rational Functional Tester A.Josephine Prapulla 1, Dr.L.Manjunatha Rao 2 1 Research Scholar, Bharathiar University. Coimbatore. 2 Professor and Director Dr. B. R. Ambedkar
More informationENTERPRISE JAVABEANS TM (EJB TM ) 3.1 TECHNOLOGY
ENTERPRISE JAVABEANS TM (EJB TM ) 3.1 TECHNOLOGY Kenneth Saks Senior Staff Engineer SUN Microsystems TS-5343 Learn what is planned for the next version of Enterprise JavaBeans (EJB ) technology 2008 JavaOne
More informationSamsung SDS Enterprise Cloud
Samsung SDS Enterprise Cloud Middleware JBoss EAP/WS WildFly Apache Tomcat JEUS WebLogic Enterprise Cloud Middleware JBoss EAP/WS Open source-based, enterprise-class Java web application server JBoss EAP
More informationUsing Aspect-Oriented Programming to Streamline Mobile Application Development
Allen Lau TS-5363 Using Aspect-Oriented Programming to Streamline Mobile Application Development CTO and Co-Founder Tira Wireless tirawireless.com 2007 JavaOne SM Conference Session TS-5363 Goal of This
More informationBridging Organizational Gaps with Monitoring: ITM/ITCAM for WebSphere Production Applications
IBM WebSphere Software Bridging Organizational Gaps with Monitoring: ITM/ITCAM for WebSphere Production Applications Mike Polan (mpolan@ca.ibm.com) Lewis Lo (lewisl@ca.ibm.com) Winfield Choi (winchoi@ca.ibm.com)
More informationProfiling and Debugging OpenCL Applications with ARM Development Tools. October 2014
Profiling and Debugging OpenCL Applications with ARM Development Tools October 2014 1 Agenda 1. Introduction to GPU Compute 2. ARM Development Solutions 3. Mali GPU Architecture 4. Using ARM DS-5 Streamline
More informationThis section describes the following provisioning operation use cases:
CHAPTER 7 This chapter describes the most common Cisco Broadband Access Center (BAC) use cases. These use cases are directly related to device provisioning and device management provisioning. Many system
More informationNASA World Wind Java SDK
NASA World Wind Java SDK Tom Gaskins NWW Technical Director http://worldwind.arc.nasa.gov TS-3489 2007 JavaOne SM Conference Session TS-3489 Today s Agenda Build an Application Deploy with Java Web Start
More informationApache OFBiz: Real-World Open Source Java Platform ERP
Apache OFBiz: Real-World Open Source Java Platform ERP Ean Schuessler Open for Business Project, Apache Foundation http://ofbiz.apache.org TS-7900 2007 JavaOne SM Conference Session XXXX Apache OFBiz Manage
More informationScaling Out Tier Based Applications
Scaling Out Tier Based Applications Nati Shalom CTO GigaSpaces www.gigaspaces.com TS-1595 2006 JavaOne SM Conference Session TS-1595 Objectives Learn how to transform existing tier-based applications into
More informationiknow Use Cases Michael Br ands Senior Product Manager
iknow Use Cases Michael Br ands Senior Product Manager Agenda iknow in the InterSystems offering Breakthrough Characteristics Steps in Deployment New Features Use Cases The InterSystems Technology Unlock
More informationEfficiency of Java Code for Mobile Application Development
1. Introduction Mobiles applications are written in many programing codes. Mobile application beginners assume that Java programming best practices are equally applicable to mobiles applications programming.
More informationCollecting Hollywood s Garbage Avoiding Space-Leaks in Composite Events
Collecting Hollywood s Garbage Avoiding Space-Leaks in Composite Events Tomáš Petříček Faculty of Mathematics and Physics Charles University in Prague tomas@tomasp.net Don Syme Microsoft Research Cambridge,
More informationConnect Your Clouds with Force.com
Connect Your Clouds with Force.com Developer Track Jeff Douglas, Senior Technical Consultant, Appirio Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This
More informationHow to Build, Run, and Develop Code With the phoneme Open Source Project Stuart Marks Hinkmond Wong Sun Microsystems, Inc.
How to Build, Run, and Develop Code With the phoneme Open Source Project Stuart Marks Hinkmond Wong Sun Microsystems, Inc. http://phoneme.dev.java.net TS-5712 2007 JavaOne SM Conference Session TS-5712
More informationPushing Java Technology to the Limits: Turning a General-Purpose PC Into an HDTV
Pushing Java Technology to the Limits: Turning a General-Purpose PC Into an HDTV Brandon Wuest, Senior Software Engineer TS-5251 To showcase how Java Technology can be used to develop performance intensive
More informationJ2EE Application Development : Conversion and Beyond Osmond Ng
IBM Software Group J2EE Application Development : Conversion and Beyond Osmond Ng IBM Software Group Practitioner View Point IBM Rational Application Developer J2EE/EJB Tooling J2EE construction tools
More informationDefective Java Code: Turning WTF code into a learning experience
Defective Java Code: Turning WTF code into a learning experience William Pugh, Professor, Univ. of Maryland TS-6589 Examine some defective Java code to become a better developer, and discuss how to turn
More informationFives: the specialist for Tube & Pipe equipment A leading provider of ERW tube & pipe mills and finishing equipment
A leading provider of ERW tube & pipe mills and finishing equipment March 2014 Who we are A strong company, with the capacity to run projects everywhere The largest range of mill finishing equipment, ERW
More informationJava performance - not so scary after all
Java performance - not so scary after all Holly Cummins IBM Hursley Labs 2009 IBM Corporation 2001 About me Joined IBM Began professional life writing event framework for WebSphere 2004 Moved to work on
More informationPKI Enhancements in Windows 7 and Windows Server 2008 R2
Security At a glance: Server Consolidation Improved Existing Scenarios Software + Services Strong Authentication PKI Enhancements in Windows 7 and Windows Server 2008 R2 John Morello This article is based
More informationJavaServer Faces Technology, AJAX, and Portlets: It s Easy if You Know How!
TS-6824 JavaServer Faces Technology, AJAX, and Portlets: It s Easy if You Know How! Brendan Murray Software Architect IBM http://www.ibm.com 2007 JavaOne SM Conference Session TS-6824 Goal Why am I here?
More informationFUJITSU Cloud Service K5 CF Service Functional Overview
FUJITSU Cloud Service K5 CF Service Functional Overview December 2016 Fujitsu Limited - Unauthorized copying and replication of the contents of this document is prohibited. - The contents of this document
More informationDefective Java Code: Turning WTF code into a learning experience
Defective Java Code: Turning WTF code into a learning experience William Pugh, Professor, Univ. of Maryland TS-6589 Examine some defective Java code to become a better developer, and discuss how to turn
More informationJSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level
JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level Kay Glahn Consultant Mobile Service Architecture, Vodafone http://www.vodafone.com Erkki Rysä Technologist Nokia Corporation http://www.nokia.com
More informationGWT and jmaki: Expanding the GWT Universe. Carla Mott, Staff Engineer, Sun Microsystems Greg Murray, Ajax Architect, Sun Microsystems
GWT and jmaki: Expanding the GWT Universe Carla Mott, Staff Engineer, Sun Microsystems Greg Murray, Ajax Architect, Sun Microsystems Learn how to enhance Google Web Toolkit (GWT) to include many Ajax enabled
More informationTroubleshooting High CPU Caused by the BGP Scanner or BGP Router Process
Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Document ID: 107615 Contents Introduction Before You Begin Conventions Prerequisites Components Used Understanding BGP Processes
More informationMaintain, Repair, Rebuild, Protect. Solutions for Industrial Asset Maintenance and Reliability
Maintain, Repair, Rebuild, Protect Solutions for Industrial Asset Maintenance and Reliability Henkel. Solutions for All Your Maintenance Challenges. Maintain, Repair, Rebuild and Protect Industrial Equipment.
More informationBytecode Manipulation Techniques for Dynamic Applications for the Java Virtual Machine
Bytecode Manipulation Techniques for Dynamic Applications for the Java Virtual Machine Eugene Kuleshov, Terracotta Tim Eck, Terracotta Tom Ware, Oracle Corporation Charles Nutter, Sun Microsystems, Inc.
More informationOpen Programmable Architecture
Open Programmable Architecture for Java-enabled Network Devices A Revolution! Tal Lavian Technology Center Nortel Networks tlavian@nortelnetworks.com 8/15/99 1 Programmable Network Devices Openly Programmable
More informationDB2 10 Capturing Tuning and Trending for SQL Workloads - a resource and cost saving approach
DB2 10 Capturing Tuning and Trending for SQL Workloads - a resource and cost saving approach Roy Boxwell SOFTWARE ENGINEERING GmbH Session Code: V05 15.10.2013, 11:30 12:30 Platform: DB2 z/os 2 Agenda
More informationAutomating Information Lifecycle Management with
Automating Information Lifecycle Management with Oracle Database 2c The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationPause-Less GC for Improving Java Responsiveness. Charlie Gracie IBM Senior Software charliegracie
Pause-Less GC for Improving Java Responsiveness Charlie Gracie IBM Senior Software Developer charlie_gracie@ca.ibm.com @crgracie charliegracie 1 Important Disclaimers THE INFORMATION CONTAINED IN THIS
More informationAutomated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers
ILMT Central Team Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers Information These slides were just the deck of the ILMT Central Team Questions&Answers session.
More informationJavaOne Topics. Keynotes Talks overview Interoperability, jini Real-time and Embedded XML and Java Cool Recommendations
JavaOne 2000 Topics Keynotes Talks overview Interoperability, jini Real-time and Embedded XML and Java Cool Recommendations First Keynote (McNeally( McNeally,, Jobs) 9 Gbits/s cross the Atlantic (m:m)
More informationNew Methods for Integrated Cross-layer Network Health Testing November 2008
New Methods for Integrated Cross-layer Network Health Testing November 2008 Harshang Pandya Product Planner Broadband Deployment Testing Agilent Technologies Singapore +65-6215-8041 Harshang_pandya@agilent.com
More informationE : Web Application Servers. Architecture and Design
E6998-04: Web Application Servers Dr. Donald F. Ferguson, IBM Fellow Chief Architect, IBM Software Group dff@us.ibm.com, or donff2@aol.com BLOG: http://www.ibm.com/developerworks/blogs/page/donferguson
More informationPeopleSoft Testing: Taming The Two-Headed Monster
PeopleSoft Testing: Taming The Two-Headed Monster Sandy Welp Regional Sales Director Newmerix The Newmerix product suite reduces the cost and complexity of managing the ongoing, extensive changes inherent
More informationShenandoah: An ultra-low pause time garbage collector for OpenJDK. Christine Flood Principal Software Engineer Red Hat
Shenandoah: An ultra-low pause time garbage collector for OpenJDK Christine Flood Principal Software Engineer Red Hat 1 Why do we need another Garbage Collector? OpenJDK currently has: SerialGC ParallelGC
More informationWhite Paper. RingCentral. Professional Services Implementation & Onboarding Methodology
White Paper RingCentral Professional Services Implementation & Onboarding Methodology RingCentral Professional Services Implementation & Onboarding Methodology Any technology transition can be challenging;
More informationOracle - Oracle Database: Program with PL/SQL Ed 2
Oracle - Oracle Database: Program with PL/SQL Ed 2 Code: Lengt h: URL: DB-PLSQL 5 days View Online This Oracle Database: Program with PL/SQL training starts with an introduction to PL/SQL and then explores
More informationmacos Security Checklist:
WHITE PAPER macos Security Checklist: implementing the Center for Internet Security Benchmark for macos Recommendations for securing macos The Center for Internet Security (CIS) benchmark for macos is
More informationSimple to purchase, flexible to use
Simple to purchase, flexible to use IBM Rational Professional Bundle Highlights One bundle of desktop tools Capabilities for the Architect with one license and UML 2.0 modeling maintenance agreement Pattern/Transform
More informationRide the wave of automation to survive the digital transformation storm. December, 2017
Ride the wave of automation to survive the digital transformation storm December, 2017 Today s speakers Sheli Ashkenazi Product Management Experitest Ruth Zamir Director of Marketing Experitest 2 01 The
More informationFilthy Rich Clients: Filthier. Richer. Clientier. Romain Guy, Google Chet Haase, Adobe Systems
Filthy Rich Clients: Filthier Richer Clientier Romain Guy, Google Chet Haase, Adobe Systems Learn techniques for making cooler, better, and just darned funner applications. Get filthy. 2008 JavaOne SM
More informationDB2 10 Capturing Tuning and Trending for SQL Workloads - a resource and cost saving approach. Roy Boxwell SOFTWARE ENGINEERING GmbH
1 DB2 10 Capturing Tuning and Trending for SQL Workloads - a resource and cost saving approach Roy Boxwell SOFTWARE ENGINEERING GmbH 3 Agenda 1. DB2 10 technology used by SQL WorkloadExpert (WLX) 2. The
More informationJava Performance Tuning From A Garbage Collection Perspective. Nagendra Nagarajayya MDE
Java Performance Tuning From A Garbage Collection Perspective Nagendra Nagarajayya MDE Agenda Introduction To Garbage Collection Performance Problems Due To Garbage Collection Performance Tuning Manual
More informationWeb Services in Cincom VisualWorks. WHITE PAPER Cincom In-depth Analysis and Review
Web Services in Cincom VisualWorks WHITE PAPER Cincom In-depth Analysis and Review Web Services in Cincom VisualWorks Table of Contents Web Services in VisualWorks....................... 1 Web Services
More informationFederated Web Services with Mobile Devices
Federated Web Services with Mobile Devices Rajeev Angal Architect Sun Microsystems Pat Patterson Architect Sun Microsystems Session TS-6673 Copyright 2006, Sun Microsystems, Inc., All rights reserved.
More informationThe Script Bowl Featuring Groovy, JRuby, Jython and Scala. Raghavan Rags N. Srinivas CTO, Technology Evangelism
The Script Bowl Featuring Groovy, JRuby, Jython and Scala Raghavan Rags N. Srinivas CTO, Technology Evangelism The Script Bowl: Groovy Style Guillaume Laforge VP Technology at G2One, Inc. Groovy Project
More informationUtilising the teaching of international formal technical standards to inspire confidence in networking students
Utilising the teaching of international formal technical standards to inspire confidence in networking students Gill Whitney Middlesex University G.Whitney@mdx.ac.uk My Background I have worked to use
More informationSecuring Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely
Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing
More informationPERFORMANCE. Rene Damm Kim Steen Riber COPYRIGHT UNITY TECHNOLOGIES
PERFORMANCE Rene Damm Kim Steen Riber WHO WE ARE René Damm Core engine developer @ Unity Kim Steen Riber Core engine lead developer @ Unity OPTIMIZING YOUR GAME FPS CPU (Gamecode, Physics, Skinning, Particles,
More informationCurriculum Guide. Integrity 11
Curriculum Guide Integrity 11 Live Classroom Curriculum Guide Requirements Engineering with Integrity 11 Test Management with Integrity 11 Workflows and Documents with Integrity 11 Requirements Engineering
More informationChapter 17: Distributed Systems (DS)
Chapter 17: Distributed Systems (DS) Silberschatz, Galvin and Gagne 2013 Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication
More informationSAP ENTERPRISE PORTAL. Scalability Study - Windows
SAP NetWeaver SAP ENTERPRISE PORTAL Scalability Study - Windows ABOUT SAP ENTERPRISE PORTAL ABOUT THIS STUDY SAP Enterprise Portal is a key component of the SAP NetWeaver platform. SAP Enterprise Portal
More informationCA Security Management
CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate
More informationDIS10.3:CYBER FORENSICS AND INVESTIGATION
DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information
More informationIOS PERFORMANCE. Getting the most out of your Games and Apps
IOS PERFORMANCE Getting the most out of your Games and Apps AGENDA Intro to Performance The top 10 optimizations for your games and apps Instruments & Example Q&A WHO AM I? Founder of Prop Group www.prop.gr
More informationAjax and JSF: Natural Synergy
Ajax and JSF: Natural Synergy Kito D. Mann, Principal Consultant TS-6482 Learn how JSF transparently supports Ajax development. 2008 JavaOne SM Conference java.sun.com/javaone 2 Kito D. Mann Virtua, Inc
More informationSDL Web Certification Program Syllabus
SDL Web Certification Program Syllabus 1. Introduction 4 General information about the program 4 Background of the program 5 Purpose of the program 5 Certification Details 6 Expert Details 6 About this
More informationServlet Performance and Apache JServ
Servlet Performance and Apache JServ ApacheCon 1998 By Stefano Mazzocchi and Pierpaolo Fumagalli Index 1 Performance Definition... 2 1.1 Absolute performance...2 1.2 Perceived performance...2 2 Dynamic
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationLearn Atlassian and more with the experts
Learn Atlassian and more with the experts Clearvision s training courses are designed to transform your teams with a hands on, practical journey of learning. Browse our courses and find out more. 3 Clearvision
More informationEfficient Android Threading
.... - J.', ' < '.. Efficient Android Threading Anders Göransson Beijing Cambridge Farnham Köln Sebastopol Tokyo O'REILLY Table of Contents Preface xi 1. Android Components and the Need for Multiprocessing
More informationIntroduction to Graph Processing Chapter 02: Graph Processing on SAP HANA
Introduction to Graph Processing Chapter 02: Graph Processing on SAP HANA 2016 SAP UCC Magdeburg. All rights reserved. 1 Agenda Graph Engine in SAP HANA Technical basis for Graph Processing The SAP HANA
More informationValue of managing and running automated functional tests with Rational Quality Manager
Value of managing and running automated functional tests with Rational Quality Manager Shinoj Zacharias (Shinoj.zacharias@in.ibm.com) Senior Software Engineer, Technical Lead IBM Software Fariz Saracevic
More informationWeb 2.0: Next Generation Communities With Rich Java -Based Applications
Web 2.0: Next Generation Communities With Rich Java -Based Applications Matthew Schmidt VP of Technology DeveloperZone, Inc. http://www.developerzone.com TS-1375 Michael Urban Software Engineer DeveloperZone,
More informationIncident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles
Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of
More informationTS7720 Implementation in a 4-way Grid
TS7720 Implementation in a 4-way Grid Rick Adams Fidelity Investments Monday August 6, 2012 Session Number 11492 Agenda Introduction TS7720 Components How a Grid works Planning Considerations TS7720 Setup
More informationCORPORATE ARCHITECTURE ENGINEERING CONSULTING
CORPORATE ARCHITECTURE ENGINEERING CONSULTING BUSINESS-DRIVEN SOLUTIONS At RS&H, designing facilities is just the beginning we re redefining client service to meet the needs of businesses growing in an
More informationIntroduction to Federation Server
Introduction to Federation Server Alex Lee IBM Information Integration Solutions Manager of Technical Presales Asia Pacific 2006 IBM Corporation WebSphere Federation Server Federation overview Tooling
More information