The Z-Files: Field reports from the world of business critical PHP applications
|
|
- Rose Watkins
- 5 years ago
- Views:
Transcription
1 The Z-Files: Field reports from the world of business critical PHP applications By Axel Schinke Senior Manager of Global Operations for Global Services
2 About this webinar Field reports from Zend Consulting Different topic areas Performance Architecture & Scalability Coaching & Mentoring Zend Software Sometimes it s not PHP Anonymized selection from Zend s global customer base To ensure data privacy: No security issues will be dealt with Overview: Zend Consulting 2
3 Performance
4 Performance Case #1 Our website is running stable, but slow. It was built using a selfdeveloped framework. The site needs definitely more hardware ressources than we have. 4
5 Performance - Case #1 3 days Time & Material Consulting - Remote Analysis of the architecture Because of security reasons parts of the data were saved encrypted Decrypting and displaying this data again, made the system slow down massively Definition and implementation of different caching scenarios (caching on disk, memory etc. / also with Zend Server) Use of the Zend Server JobQueue for long running tasks 5
6 Performance - Case #2 Our website has a performance problem. Normally the site is performing well except on Wednesdays. We have already invested a lot of effort in finding the problem, but weren t successful so far. 6
7 Performance - Case #2 Performance Audit -Remote Every Wednesday several web spiders called a certain page of the customer website which showed the whole overview of products 1,100 DB requests per user per page view Result: The 1,100 queries could be reduced to 11 queries doing actually the same (1.5 sec. instead of 15 sec./call). 7
8 Performance - Case #3 Our webshop is under heavy load in christmas time. We have to make sure that it will perform well at these times. We are connecting to quite a few external web services. Can this be the reason? 8
9 Performance - Case #3 Performance Audit Remote Result of the audit: The external web services (connected via SOAP interface) were running using a very low bandwidth connection At the same time the amount of transferred data was very large Solution: Many parts of the external web services were reproduced locally. In addition some intelligent caching mechanisms have been implemented Final result: The ecommerce website was working 3-10 times faster than before 9
10 Performance - Case #4 Our portal for partners/distributors has performance problems. Sometimes a page needs sec. to load instead of normally sec. Our partners are already complaining about this situation 10
11 Performance - Case #4 Performance Audit Remote Result: The configuration of the Apache web server was suboptimal Solution: Modification of the configuration brought the time to render the page again into normal dimensions Small changes to the database setup saved another 0.3 seconds per call for even better performance Alongside: Various security issues have been found in the code and have been brought to the attention of the customer 11
12 Architecture & Scalability
13 Architecture & Scalability - Case #1 We are planning an extended version of our web application. The complexity will be 10 times higher than before. We are not sure whether our existing application and DB architecture is capable to handle the planned changes. 13
14 Architecture & Scalability - Case #1 Architecture/Scalability Audit on-site Application with a very complex rights management component Obstacle: Can the database handle the expected load? Approach: Analysis of the existing source code Solution: Outlining a new database structure, which can cope with the new application architecture without any problems 14
15 Architecture & Scalability - Case #2 Our new Web 2.0 intranet is online since 1.5 years. Some pages need more than 10 sec. to load We have built it using Zend Framework, but lately the response times of the site are getting unacceptable. 15
16 Architecture & Scalability - Case #2 5 days Time & Material Consulting on-site Approach: Use of the profiling features of Zend Studio to localize the problems Solution: Minor changes to the architecture Result: Response time dropped from 10 sec. to under a second without the need to rewrite the whole application Alongside: Together with the customer s developer team several other optimizations have been made to the architecture to ensure sustainability of the code 16
17 Architecture & Scalability - Case #3 An important internal application needs sometimes 5 minutes to deliver the results. We have many thousand customers, which suffer from this and cannot use our service in a comfortable way. 17
18 Architecture & Scalability - Case #3 3 days Time & Material Consulting on-site (initially) Guidelines from the customer: The Zend Consultant had only access to the PHP code changes to the database or the architecture were not allowed for delivering a solution. Approach: Analysis on-site followed by additional remote work Result: The performance could be raised by the factor of 4,100 (!). Average performance gain in all application modules: factor
19 Architecture & Scalability - Case #4 We have millions of customers. We have to be technically state of the art to foster additional growth. We have problems with scalability. Our current infrastructure has to be reviewed and updated. 19
20 Architecture & Scalability - Case #4 5 days Time & Material Consulting on-site (initially) Cause: The very complex application of the customer has been constantly extended based only on customer requests without having an overall plan or vision. The grown application structure has prevented the option for scalability The original database structure has massive problems coping with the current amount of data Solution: Continuous consulting of the customer s development team during the whole time of the development 20
21 Coaching & Mentoring
22 Coaching & Mentoring - Case #1 Our development team knows PHP already We have already trained ourselves concerning Zend Framework. We have the impression that our developers are not feeling confident concerning the architecture 22
23 Coaching & Mentoring - Case #1 3 days Time & Material Consulting on-site Initial situation: Knowledge about Zend Framework was existing, but not much experience concerning the architecture of applications Solution: Staying 3 days on-site, the Zend Consultant defined a robust and scalable structure together with the customer s developer team. This structure is still working until now and was already extended independently by the customer himself 23
24 Coaching & Mentoring - Case #2 We need a prototype within a short timeframe and it has to be done in PHP and to run on IBM System i. At the same time the PHP prototype has to communicate with our legacy systems to exchange data. 24
25 Coaching & Mentoring - Case #2 5 days Time & Material Consulting on-site Approach: Together with a developer from the customer, a Zend Consultant designed an application via training on the job Result: The newly created application was able to call existing RPG programs and to exchange data with them Alongside: Afterwards the developer was able to extend the application on his own and to interface to additional legacy data sources in his company infrastructure. 25
26 Coaching & Mentoring - Case #3 Our application, used by many important customers, is standing at the crossroads concerning the architecture. The application has grown over the years, but we failed on consistently monitoring the architectural guidelines. 26
27 Coaching & Mentoring - Case #3 3 days training and 3 days Time & Material Consulting on-site 1 st step: On-Site-Training Zend Framework Fundamentals for the development team of the customer 2 nd step: Evaluating the application together with the development team Result: Over 25 recommendations concerning the models, database, documentation, unit testing, Zend Server, error handling, Apache configuration, ACL implementation etc. Alongside: Afterwards the developers were able to extend the application on their own. 27
28 Coaching & Mentoring - Case #4 We want to build a new application based on the complete Zend stack. We need support for a successful start of the project. The application shall operate with 100,000 users and over 40,000 parallel users. 28
29 Coaching & Mentoring - Case #4 10 days Time & Material Consulting on-site Solution: Zend Consulting was involved in the project in a very early stage Approach: Implementation of aggressive caching strategies into the application In addition, the system and code integrity was analyzed in the different phases of the project and valuable feedback was given to the development teams. Before the starting the development: Installation and optimized configuration of the Zend Software on all related customer systems by a Zend Consultant 29
30 Get the maximum out of the Zend software
31 Get the maximum out of the Zend software We are not sure, whether our installation and configuration of the Zend software makes sense. The time for calling the most complex page got reduced from 1.5 sec. to 180 ms but maybe we can reach an even better performance? 31
32 Get the maximum out of the Zend software 1 day Time & Material Consulting on-site Approach: Explaining the substantial possibilities of performance optimization with the Zend software on-site by a Zend Consultant Optimizing the configuration of the Zend Software and also the PHP code of the customer to achieve best results Result: The time to display the mentioned page could again be reduced by 50% (180 ms 80 ms). Alongside: The Zend Consultant gave many helpful hints to the customer s development team in how to write well performing PHP code 32
33 Sometimes it s not PHP
34 Sometimes it s not PHP - Case #1 Every time, when sending out an newsletter to our customers, our website has enormous amounts of visitors Sadly our PHP is breaking down every time when this happens. 34
35 Sometimes it s not PHP - Case #1 Performance Audit Remote Approach: Performance Audit Result: The customer system was running Windows and the allowed number of incoming connections was limited concerning the ports Solution: The wrong setup of the TCP stack was re-configured and optimized and afterwards the problem was gone 35
36 Sometimes it s not PHP - Case #2 Our PHP is running too slow! The rendering of the pages in our intranet application is slow. Probably the reason for this is the bad performance of PHP on Windows systems. 36
37 Sometimes it s not PHP - Case #2 1 day Time & Material Consulting on-site Approach: Profiling of the intranet application Solution: The database in use was not optimally configured for the current purpose 37
38 Sometimes it s not PHP - Case #3 We have a very strange problem when opening files via PHP We see very strange error messages, which only show up on our production environment and not on our development system 38
39 Sometimes it s not PHP - Case #3 1 day Time & Material Consulting - Remote Approach: Using the Zend Debugger in connection with Zend Studio Solution: A PHP internal function for working with the file system showed completely different behavior in FreeBSD (production system) than in Linux (development system) although the source code and the PHP version were identical Result: Modifications to the PHP code, because FreeBSD was mandatory for the production system 39
40 Sometimes it s not PHP - Case #4 Actually our PHP based website is running fine, but with many parallel visitors it happens sometimes that a login is not possible anymore. After a restart of the Apache web server, everything runs fine, but after 30 minutes the same problem occurs again. 40
41 Sometimes it s not PHP - Case #4 1 day Time & Material Consulting - Remote Reason: Number of Apache processes was limited. In addition the keep alive time was quite high. Result: No new Apache processes could be created Solution: Re-configuration of the web server Alongside: Several security issues have been brought to the attention of the customer. A security audit followed. 41
42 Overview: Zend Consulting
43 Advantages of Zend Consulting Unlike others Zend consultants have access to the creators of PHP and thus can bring in a very strong level of knowledge when it comes to PHP and LAMP environments. In 2009 they worked with worldwide over 90 customers in multiple industries with a lot of different application types Zend experts use internally developed methodologies and tools, which are constantly tweaked and optimized during the multiple audits that Zend conducts at customer sites. 43
44 Performance Audit Selection of topics to be dealt with (depending on the customer situation) Identification of application bottlenecks Audit of the executed PHP code itself Profiling of the scripts / optimization potential of the scripts OS / file system performance Web server configuration Database query analysis / optimization potential Analysis of the load balancing Analysis of used caching techniques 44
45 Architecture/Scalability Audit Selection of topics to be dealt with (depending on the customer situation) Analysis of the horizontal scalability of the application Analysis of the database scalability Analysis of the session clustering Analysis of the load balancing Does the architecture and configuration of the web server(s) make sense? 45
46 Security Audit The Security Audit is divided in two phases Pre-Audit (1 day) Black-Box Test, to find some of the very obvious problems Complete Security Audit (several days) Detailed Security Audit incl. optional audit of the source code 46
47 Security Audit Selection of topics to be dealt with during a complete Security Audit (depending on the customer situation) Penetration Testing Cross Site Request Forgeries Analysis of the PHP config JavaScript Vulnerabilities Output Analysis Denial Of Service Analysis Input Filtering Analysis Header Injection SQL Injection Script Analysis Session Security Cross Site Scripting Vulnerabilities Analysis of the Shell Execution Security 47
48 Zend Audits Advantages A detailed written REPORT with recommendations is delivered at the end of the audit: By knowing what the issues are, the customer can make informed decisions regarding next steps to address them and ensure that his applications run reliably and securely. After the audit the customer has the freedom of choice to hire Zend to help him fix the found issues or bring in someone else to do this 48
49 Custom Consulting Based on Time & Material, for example PHP application architecture: Design & Mentoring Zend Framework applications: Design & Mentoring Analysis of scalability and performance problems Support with the integration of Zend products (i.e. Job Queue system design, caching optimizations etc.) Audit services for projects with more than 50K LOC (lines of code) 49
50 Thank you! For any questions, please contact:
Improve Web Application Performance with Zend Platform
Improve Web Application Performance with Zend Platform Shahar Evron Zend Sr. PHP Specialist Copyright 2007, Zend Technologies Inc. Agenda Benchmark Setup Comprehensive Performance Multilayered Caching
More informationInterCall Virtual Environments and Webcasting
InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT
More informationHigh Availability/ Clustering with Zend Platform
High Availability/ Clustering with Zend Platform David Goulden Product Manager goulden@zend.com Copyright 2007, Zend Technologies Inc. In this Webcast Introduction to Web application scalability using
More informationScaling DreamFactory
Scaling DreamFactory This white paper is designed to provide information to enterprise customers about how to scale a DreamFactory Instance. The sections below talk about horizontal, vertical, and cloud
More informationOh yes, wpcache comes with a dashboard wpcache is not Plugin!
1 What is Happening? Oh yes, wpcache comes with a dashboard wpcache is not Plugin! Performance. Speed. Scalability. wpcache delivers world-class content delivery solutions. You are empowered to increase
More informationA guide for assembling your Jira Data Center team
A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices
More informationHelp! I need more servers! What do I do?
Help! I need more servers! What do I do? Scaling a PHP application 1 2-Feb-09 Introduction A real world example The wonderful world of startups Who am I? 2 2-Feb-09 Presentation Overview - Scalability
More informationCIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )
Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant
More informationBalancing the pressures of a healthcare SQL Server DBA
Balancing the pressures of a healthcare SQL Server DBA More than security, compliance and auditing? Working with SQL Server in the healthcare industry presents many unique challenges. The majority of these
More informationSEARCH ENGINE MARKETING (SEM)
D I G I TA L M A R K E T I N G S E A R C H E N G I N E O P T I M I Z AT I O N ( S E O ) SEARCH ENGINE MARKETING (SEM) C O N T E N T S T R AT E G Y SEARCH ENGINE OPTIMIZATION (SEO) 90% of all website traffic
More informationImproving Application Performance by Submitting Scripts to Batch using Zend Server for IBM i
Improving Application Performance by Submitting Scripts to Batch using Zend Server for IBM i Mike Pavlak Solution Consultant mike.p@zend.com Insert->Header 1 & Footer Agenda Overview of Zend Server Advantages
More informationEnsuring the Success of E-Business Sites. January 2000
Ensuring the Success of E-Business Sites January 2000 Executive Summary Critical to your success in the e-business market is a high-capacity, high-availability and secure web site. And to ensure long-term
More information[PHP DEVELOPMENT] February 27, Summation IT
We Have The Strong & Experienced PHP Teams: Summation IT is an Indian based Custom Software Development provider with profound technical expertise on Web Development such as PHP Development, PHP Frameworks
More informationCluster Upgrade Procedure with Job Queue Migration.
Cluster Upgrade Procedure with Job Queue Migration. Zend Server 5.6 Overview Zend Server 5.6 introduces a new highly-reliable Job Queue architecture, based on a MySQL database storage backend. This document
More informationSECURITY AND DATA REDUNDANCY. A White Paper
SECURITY AND DATA REDUNDANCY A White Paper Security and Data Redundancy Whitepaper 2 At MyCase, Security is Our Top Priority. Here at MyCase, we understand how important it is to keep our customer s data
More informationCompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018
Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible
More informationHello, and welcome to a searchsecurity.com. podcast: How Security is Well Suited for Agile Development.
[ MUSIC ] Hello, and welcome to a searchsecurity.com podcast: How Security is Well Suited for Agile Development. My name is Kyle Leroy, and I'll be moderating this podcast. I'd like to start by introducing
More informationBrocade Virtual Traffic Manager and Parallels Remote Application Server
White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4
More informationPower Systems Academic Initiative (PSAI)
Power Systems Academic Initiative (PSAI) Program Overview March 2018 Power Systems Academic Initiative 2015 IBM Corporation Teaching IBM Power Skills for 21 Years Historical Perspective 1996 2002 2004
More informationTIBCO Cloud Integration Security Overview
TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized
More informationASNA Case Study. ASNA Wings: Re-imagining Modernization at INFOCON Both Ways. Leaders in IBM i Modernization
ASNA Case Study ASNA Wings: Re-imagining Modernization at INFOCON Both Ways. Modernizing for a GUI doesn t mean you have to give up the power of RPG. By Thomas M. Stockwell Fueled by the talent of more
More informationCase Study Ecommerce Store For Selling Home Fabrics Online
Case Study Ecommerce Store For Selling Home Fabrics Online www.brainvire.com 2013 Brainvire Infotech Pvt. Ltd Page 1 of 1 Client Requirement Client is a reputed home fabric dealer in the United States
More informationBEYOND CLOUD HOSTING. Andrew Melck, Regional Manager DACH,
BEYOND CLOUD HOSTING Andrew Melck, Regional Manager DACH, Platform.sh @drewmelck Once upon a time When is flying dangerous? Change and stability were a contradiction At takeoff and landing. In the air,
More informationIBM and Centerfield Technology
IBM and Centerfield Technology The purpose of this document is to describe the differences between Centerfield s HomeRun suite of tools and iseries Navigator. The functional areas covered by each tool
More informationArchive-Tools. Powering your performance
Archive-Tools Powering your performance Archive-Tools Go for Smaller. Better. Faster. Stronger. Archive-Tools help you maximize your Return on Investment. Our products are designed to prolong the life
More informationThe Need for (Build) Speed
The Need for (Build) Speed Lasse Koskela (Please go ahead and pre-fill those feedback forms. I appreciate that. It also brings you that much closer to beer.) Lasse Koskela works as a coach, trainer, consultant
More informationJohn Coggeshall Copyright 2006, Zend Technologies Inc.
PHP Security Basics John Coggeshall Copyright 2006, Zend Technologies Inc. Welcome! Welcome to PHP Security Basics Who am I: John Coggeshall Lead, North American Professional Services PHP 5 Core Contributor
More informationWeb Application Penetration Testing
Web Application Penetration Testing COURSE BROCHURE & SYLLABUS Course Overview Web Application penetration Testing (WAPT) is the Security testing techniques for vulnerabilities or security holes in corporate
More informationFour Essential Steps for Removing Risk and Downtime from Your POWER9 Migration
Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Syncsort Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration With the introduction of IBM s POWER9
More informationOrchestrator ver
EPAM Cloud Infrastructure Orchestrator ver. 2.0.29 What s New April 2013 CIWN-S29 Version 1.0 Content Content... 2 1. OVERVIEW... 3 2. NEW FEATURES... 3 2.1. Custom User Scripts... 3 2.2. Mobile User Interface...
More informationSecure Login for SAP Single Sign-On Sizing Guide
PUBLIC SAP Single Sign-On Document Version: 1.1 2018-07-31 Secure Login for SAP Single Sign-On 3.0 - Sizing Guide 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Introduction....3
More informationBusiness Objects Performance Testing
Business Objects Performance Testing EXECUTIVE SUMMARY Performance testing informs decisions about the allocation of resources. Performance testing software like Apache JMeter and Micro Focus LoadRunner
More informationLife as a Service. Scalability and Other Aspects. Dino Esposito JetBrains ARCHITECT, TRAINER AND CONSULTANT
Life as a Service Scalability and Other Aspects Dino Esposito JetBrains ARCHITECT, TRAINER AND CONSULTANT PART I Scalability and Measurable Tasks SCALABILITY Scalability is the ability of a system to expand
More informationAmyyon customers can t wait to get their hands on it s new application, developed in Uniface.
customers can t wait to get their hands on it s new application, developed in Uniface. 1 CUSTOMER SECTOR Information Technology COUNTRY Netherlands CHALLENGE Migrate the rich functionality of a client/server
More informationTN3270 AND TN5250 INTERNET STANDARDS
51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization
More informationJBoss World 2009 Aaron Darcy
1 Java Application Platforms for Lightweight Workloads Insight into Red Hat's Application Platform Strategy Aaron Darcy JBoss Product Line Director Red Hat September 2009 2 About Me JBoss Product Line
More informationHow Rust is Tilde s Competitive Advantage
Jan. 2018 Rust Case Study: How Rust is Tilde s Competitive Advantage The analytics startup innovates safely with the help of Rust Copyright 2018 The Rust Project Developers All rights reserved graphics
More informationUsing Wireshark as an Applica1on Support Engineer Tim Poth. Senior Priority Response Analyst Bentley Systems, Inc.
Using Wireshark as an Applica1on Support Engineer Tim Poth Senior Priority Response Analyst Bentley Systems, Inc. tim.poth@bentley.com 1 Agenda Quick intro to Bentley Systems, Inc How the Priority Response
More informationCommon Optimization Mistakes
Common Optimization Mistakes ZendCon 2009 Ilia Alshanetsky http://ilia.ws 1 Premature Optimization = Solve the business case, before optimizing the solution 2 Don t Over Engineer Understand your audience
More informationChapter 3. Technology Adopted. 3.1 Introduction
Chapter 3 Technology Adopted 3.1 Introduction The previous chapter described difference between the propose system and traditional methods and also about the existing similar systems. In this chapter,
More informationIBM i: JOURNEY TO THE CENTER OF THE CLOUD
IBM i: JOURNEY TO THE CENTER OF THE CLOUD Prepared by Matt Shannon, Sr. Solutions Specialist and Jeffrey Whicker, Sr. Solutions Specialist Sirius Computer Solutions, Inc. July 2017 Contents Executive Summary...
More informationWeak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann
Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile
More informationCoreMax Consulting s Cyber Security Roadmap
CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows
More informationMAME - Compilingscript V2.3a
- by Mucci Logo created by JackC 2016 by Mucci Contents Introduction...3 Chapter 1: Installing...4 Chapter 2: How to handle the script...16 Chapter 3: Using the script...17 Chapter 4: Troubleshooting...26
More informationOutline Key Management CS 239 Computer Security February 9, 2004
Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your
More informationepldt Web Builder Security March 2017
epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication
More informationDB2 is a complex system, with a major impact upon your processing environment. There are substantial performance and instrumentation changes in
DB2 is a complex system, with a major impact upon your processing environment. There are substantial performance and instrumentation changes in versions 8 and 9. that must be used to measure, evaluate,
More informationSenior Technical Specialist, IBM. Charles Price (Primary) Advisory Software Engineer, IBM. Matthias Falkenberg DX Development Team Lead, IBM
Session ID: DDX-15 Session Title: Building Rich, OmniChannel Digital Experiences for Enterprise, Social and Storefront Commerce Data with Digital Data Connector Part 2: Social Rendering Instructors: Bryan
More informationWEB CMS SELECTION: How to Go From Shortlist to Final Selection
WEB CMS SELECTION: How to Go From Shortlist to Final Selection 1 Choosing the right CMS isn t easy. Beyond scalability, there are key concerns around user experience, ease of integration, customizability,
More informationTo Kill a Monolith: Slaying the Demons of a Monolith with Node.js Microservices on CloudFoundry. Tony Erwin,
To Kill a Monolith: Slaying the Demons of a Monolith with Node.js Microservices on CloudFoundry Tony Erwin, aerwin@us.ibm.com Agenda Origins of the Bluemix UI Demons of the Monolith Slaying Demons with
More informationPartial Backup Interview Questions And Answers In Oracle 10g Pl Sql
Partial Backup Interview Questions And Answers In Oracle 10g Pl Sql You'll find out here all Upwork (odesk) test answers for Oracle 10g Test 2015. Questions and answers are regularly updated. of Cover
More informationAdvanced Topics on the Mirth Connect Interface Engine. July 6, 2016
Advanced Topics on the Mirth Connect Interface Engine July 6, 2016 You have been automatically muted. Please use the Q&A panel to submit questions during the presentation PRESENTER Nate Bessa Technical
More informationPHP PERFORMANCE. Principles and Tools. By Kevin Schroeder Technology Evangelist Zend Technologies. Copyright 2007, Zend Technologies Inc.
PHP PERFORMANCE Principles and Tools By Kevin Schroeder Technology Evangelist Zend Technologies Copyright 2007, Zend Technologies Inc. About me Kevin Schroeder Technology Evangelist for Zend Programmer
More informationExpert Guidance on Migrating from Magento 1 to Magento 2
Expert Guidance on Migrating from Magento 1 to Magento 2 Gordon Knoppe Business Solutions Architect, ECG James Cowie Technical Architect, ECG Expert Consulting Group ECG Charter: To provide expert insight,
More informationHi hi! My. work NATHAN ROSS. User Experience
Hi hi! My NATHAN ROSS work User Experience 415.819.7530 nathantross@gmail.com nathantross.com Welcome to my portfolio Hi hi! My work I m a UX Designer with 10+ years experience building and creating products.
More informationCommon Optimization Mistakes
Common Optimization Mistakes Dutch PHP Conference 2010 Ilia Alshanetsky http://ilia.ws 1 Premature Optimization = Solve the business case, before optimizing the solution 2 Don t Over Engineer Understand
More informationMODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM
MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM Published by the Office of the Ombudsman 18 Lower Leeson Street Dublin 2 Telephone: 01 639 5600 Lo-call:
More informationFAST, FLEXIBLE, RELIABLE SEAMLESSLY ROUTING AND SECURING BILLIONS OF REQUESTS PER MONTH
We help Big Brands, Scale WordPress. WORDPRESS HOSTING MANAGED BY PROFESSIONALS PAGELY, INC pagely.com THE PAGELY ARES APPLICATION GATEWAY FAST, FLEXIBLE, RELIABLE SEAMLESSLY ROUTING AND SECURING BILLIONS
More informationEgypt s Bavarian Auto Group Deploys SAP On SQL Server 2005 to Support Rapid Growth
Microsoft SQL Server Customer Solution Case Study Egypt s Bavarian Auto Group Deploys SAP On SQL Server 2005 to Support Rapid Growth Overview Country or Region: Egypt Industry: Manufacturing Automotive
More informationDatacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score
Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract
More informationTraffic is coming! OMG moments
CASE STUDY Traffic is coming! OMG moments How Distinct helped evomag.ro handle Blackfriday 2013 traffic spike Summary: 1. Who 2. The Challenge 3. The Work 4. Aftermath 1. Who :: Bogdan Belu - Distinct
More informationD6.1. Project website and internal IT communication infrastructure HINT. 36 months FP7/
D6.1 Project website and internal IT communication infrastructure Project number: 317930 Project acronym: Project title: HINT Start date of the project: 1 st October, 2012 Duration: Programme: Holistic
More informationWhite Paper. How the Meltdown and Spectre bugs work and what you can do to prevent a performance plummet. Contents
White Paper How the Meltdown and Spectre bugs work and what you can do to prevent a performance plummet Programs that do a lot of I/O are likely to be the worst hit by the patches designed to fix the Meltdown
More informationCS 378 (Spring 2003) Linux Kernel Programming. Yongguang Zhang. Copyright 2003, Yongguang Zhang
Department of Computer Sciences THE UNIVERSITY OF TEXAS AT AUSTIN CS 378 (Spring 2003) Linux Kernel Programming Yongguang Zhang (ygz@cs.utexas.edu) Copyright 2003, Yongguang Zhang Read Me First Everything
More informationEmission Profile Master
Emission Profile Master Welcome to this guide that will help you understand and maximize your experience using the EPM (Emission Profile Master). The Iray render engine has support for what is known as
More informationIBM i Modernization with PHP
IBM i Modernization with PHP Mike Pavlak Solution Consultant mike.p@zend.com Alison Butterill Application Development Offering Manager, IBM Power Systems Software Insert->Header 1 & Footer Agenda IBM Application
More informationCLIENT SERVER ARCHITECTURE:
CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located
More informationApplication Security through a Hacker s Eyes James Walden Northern Kentucky University
Application Security through a Hacker s Eyes James Walden Northern Kentucky University waldenj@nku.edu Why Do Hackers Target Web Apps? Attack Surface A system s attack surface consists of all of the ways
More informationWeb Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery
Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers
More informationIndex. Note: Boldface numbers indicate code and illustrations; an italic t indicates a table.
Index Note: Boldface numbers indicate code and illustrations; an italic t indicates a table. A absolute positioning, in HTML, 184 187, 184 187 abstract classes, 6, 6 Accept header, 260 265, 261 265 access
More informationBest practices in IT security co-management
Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3
More informationUp and Running Software The Development Process
Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationBuilding a New Rational Web Site with Rational Suite
Building a New Rational Web Site with Rational Suite by Christina Howe Director of Internet Services Rational Software In April of last year, Rational Software determined that its Web site no longer measured
More informationUser Survey Analysis: Next Steps for Server Virtualization in the Midmarket
User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of
More informationPrinciples of ICT Systems and Data Security
Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing
More informationCode review guide. Notice: Read about the language that you will test its code, if you don t have an idea about the language this will be difficult.
Code review guide Author: Jameel Nabbo Website: www.jameelnabbo.com Table of contents Introduction Code review Checklist Steps to perform on code review task Tips for code review Starting the Code review
More informationDynamics 365. for Finance and Operations, Enterprise edition (onpremises) system requirements
Dynamics 365 ignite for Finance and Operations, Enterprise edition (onpremises) system requirements This document describes the various system requirements for Microsoft Dynamics 365 for Finance and Operations,
More informationUsing WireShark to support the Application June 16, 2011
Using WireShark to support the Application June 16, 2011 Tim Poth Senior Priority Response Analyst Bentley Systems, Inc. tim.poth@bentley.com SHARKFEST 11 Stanford University June 13-16, 2011 Agenda Quick
More informationCopyright All rights reserved worldwide.
Copyright All rights reserved worldwide. YOUR RIGHTS: This book is restricted to your personal use only. It does not come with any other rights. LEGAL DISCLAIMER: This book is protected by international
More informationLog Data: A Source of Value. Nagios Enterprises LLC Nagios Enterprises 2017 Logs: A Source of Value // 1
Log Data: A Source of Value Nagios Enterprises LLC 2017 Nagios Enterprises 2017 Logs: A Source of Value // 1 Log Data: A Source of Value Nagios Enterprises LLC 2017 Introduction Part 1 : What s in a Log?
More informationLeaving the State: Sessionless (Stateless) Authentication in D8 with Whole Foods Market. BADCamp 2017
Leaving the State: Sessionless (Stateless) Authentication in D8 with Whole Foods Market BADCamp 2017 These Guys Dr J Daverth Technical Lead, Whole Foods Market D.O.: dr-jay BitBucket: drjdaverth LinkedIn:
More informationBackground. $VENDOR wasn t sure either, but they were pretty sure it wasn t their code.
Background Patient A got in touch because they were having performance pain with $VENDOR s applications. Patient A wasn t sure if the problem was hardware, their configuration, or something in $VENDOR
More informationA Simple Course Management Website
A Simple Course Management Website A Senior Project Presented to The Faculty of the Computer Engineering Department California Polytechnic State University, San Luis Obispo In Partial Fulfillment Of the
More informationCassandra Database Security
Cassandra Database Security Author: Mohit Bagria NoSQL Database A NoSQL database (sometimes called as Not Only SQL) is a database that provides a mechanism to store and retrieve data other than the tabular
More informationThe White Papers. Employing Knowledge Management for Oracle, DB2 and SQL Server. By Steve Hilker & Daniel Norwood
The White Papers Employing Knowledge Management for Oracle, DB2 and SQL Server By Steve Hilker & Daniel Norwood Contents Employing Knowledge Management... 3 Introduction... 3 Overview... 3 The Challenges...
More informationBECOME A LOAD TESTING ROCK STAR
3 EASY STEPS TO BECOME A LOAD TESTING ROCK STAR Replicate real life conditions to improve application quality Telerik An Introduction Software load testing is generally understood to consist of exercising
More informationPenetration testing.
Penetration testing Penetration testing is a globally recognized security measure that can help provide assurances that a company s critical business infrastructure is protected from internal or external
More informationEtanova Enterprise Solutions
Etanova Enterprise Solutions Networking» 2018-02-24 http://www.etanova.com/technologies/networking Contents HTTP Web Servers... 6 Apache HTTPD Web Server... 6 Internet Information Services (IIS)... 6 Nginx
More information68% 63% 50% 25% 24% 20% 17% Credit Theft. DDoS. Web Fraud. Cross-site Scripting. SQL Injection. Clickjack. Cross-site Request Forgery.
PRESENTED BY: Credit Theft 68% DDoS 63% Web Fraud 50% Cross-site Scripting SQL Injection Clickjack Cross-site Request Forgery 25% 24% 20% 17% Other 2% F5 Ponemon Survey -Me East-West Traffic Flows App
More informationMD-HQ Utilizes Atlantic.Net s Private Cloud Solutions to Realize Tremendous Growth
Success Story: MD-HQ Utilizes Atlantic.Net s Private Cloud Solutions to Realize Tremendous Growth Atlantic.Net specializes in providing security and compliance hosting solutions, most specifically in the
More informationReal Life Web Development. Joseph Paul Cohen
Real Life Web Development Joseph Paul Cohen joecohen@cs.umb.edu Index 201 - The code 404 - How to run it? 500 - Your code is broken? 200 - Someone broke into your server? 400 - How are people using your
More informationArcGIS Enterprise: Performance and Scalability Best Practices. Darren Baird, PE, Esri
ArcGIS Enterprise: Performance and Scalability Best Practices Darren Baird, PE, Esri dbaird@esri.com What is ArcGIS Enterprise What s Included with ArcGIS Enterprise ArcGIS Server the core web services
More informationWhy the end-to-end principle matters for privacy
Why the end-to-end principle matters for privacy Richard L. Barnes, BBN Technologies Cullen Jennings, Cisco Systems Introduction It is a basic challenge in the design of location-based services to balance
More informationDescriptions for CIS Classes (Fall 2017)
Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationIdentifying Workloads for the Cloud
Identifying Workloads for the Cloud 1 This brief is based on a webinar in RightScale s I m in the Cloud Now What? series. Browse our entire library for webinars on cloud computing management. Meet our
More informationDenial of Service, Traceback and Anonymity
Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More information