StackMine Performance Debugging in the Large via Mining Millions of Stack Traces

Size: px
Start display at page:

Download "StackMine Performance Debugging in the Large via Mining Millions of Stack Traces"

Transcription

1 StackMine Performance Debugging in the Large via Mining Millions of Stack Traces Shi Han 1, Yingnong Dang 1, Song Ge 1, Dongmei Zhang 1, and Tao Xie 2 Software Analytics Group, Microsoft Research Asia 1 North Carolina State University 2 June 6 th, 2012

2 Performance Issues in the Real World One of top user complaints Impacting large number of users every day High impact on usability and productivity High Disk I/O High CPU consumption Given limited time and resource before software release, development-site testing and debugging become insufficient to ensure satisfactory software performance. 2

3 Performance Debugging in the Large Pattern Matching Bug update Network Trace collection Problematic Pattern Repository How many issues are still unknown? Trace Storage Which trace file should I investigate first? Bug Database Bug filing Key to issue discovery Bottleneck of scalability Trace analysis 3

4 Problem Definition Input: Runtime traces collected from millions of users Output: Program execution patterns causing the most impactful performance problems inspected by performance analysts 4

5 Goal Conduct systematic discovery & analysis of program execution patterns Efficient handling of large-scale trace sets Automatic discovery of new patterns Effective prioritization of investigation 5

6 Challenges Internet Large-scale trace data TBs of trace files and increasing Millions of events in single trace stream Highly complex analysis Numerous program runtime combinations triggering performance problems Multi-layer runtime components from application to kernel being intertwined Combination of expertise Generic machine learning tools without domain knowledge guidance do not work well 6

7 Wait callstack ntdll!userthreadstart Browser! Main Browser!OnBrowserCreatedAsyncCallback BrowserUtil!ProxyMaster::GetOrCreateSlave BrowserUtil!ProxyMaster::ConnectToObject Intuition Wait callstack ntdll!userthreadstart Browser! Main What happens behind a typical ntdll!ldrloaddll UI-delay? An example of delayed rpc!proxysendreceive browser wow64!runcpusimulation tab creation - wow64cpu!waitformultipleobjects32 wow64cpu!cpupsyscallstub nt!accessfault nt!pagefault Time ReadyThread callstack nt!kiretiredpclist nt!executealldpcs nt!iopfcompleterequest nt!setevent UI thread CPU Wait Ready CPU Wait Ready CPU Worker thread Ready Unexpected long execution CPU Underlying Disk I/O CPU CPU sampled CPU sampled sampled callstack callstack callstack ntdll!userthreadstart ntdll!userthreadstart ntdll!userthreadstart Ntdll!WorkerThread ntdll!workerthread ole!cocreateinstance ole!outserializer::unmarshalatindex ole!counmarshalinterface ReadyThread callstack ntdll!userthreadstart rpc!lrpciocomplete user32!postmessage win32k!setwakebit nt!setevent Wait Callstacks ReadyThread Callstacks CPU Sampled Callstacks 7

8 Approach Formulated as a callstack mining and clustering problem Caused by Mainly represented by Performance Issues Problematic program execution patterns Callstack patterns Discovered by mining & clustering costly patterns 8

9 Approach Workflow Pattern clusters 709 Trace streams 1 23 ntdll!openfile Ranked cluster Cluster Hits Total Wait time (ms) 1 94, , , , ,536 3,051, nt!pageread Ranking 1392 AOI Pattern AOI Extraction Clustering 412 nt!accessfault AOI Extraction Sequence Pattern Ranking Mining Pattern Clustering Callstacks Sequence Pattern Mining 709 ntdll!openfile ntdll!userthreadstart - - ntdll!userthreadstart - - ntdll!userthreadstart - - user32!internalcallwinproc user32!internalcallwinproc - - user32!internalcallwinproc kernel32!loadlibrary - - ntdll!openfile - kernel32!loadlibrary nt!pageread nt!trap - nt!accessfault - nt!pageread Callstack patterns nt!accessfault 412 9

10 Approach AOI Extraction Trace streams 1 23 AOI Ranked cluster Cluster Hits Total Wait time (ms) 1 94, , , , ,536 3,051,307 AOI Extraction Callstacks - ntdll!userthreadstart - - ntdll!userthreadstart - - ntdll!userthreadstart - - user32!internalcallwinproc user32!internalcallwinproc - - user32!internalcallwinproc kernel32!loadlibrary - - ntdll!openfile - kernel32!loadlibrary nt!pageread nt!trap - nt!accessfault - Ranking Pattern clusters ntdll!openfile 259 nt!accessfault nt!pageread Pattern Clustering Sequence Pattern Mining 709 ntdll!openfile 259 nt!pageread Callstack patterns nt!accessfault

11 Approach AOI Extraction Motivation Runtime traces capture both Relevant executions for performance issue E.g., executions relevant to browser-tab creation Irrelevant executions for performance issues E.g., executions of concurrently executed IM Noisy data for mining Huge investigation scope induced 11

12 Approach AOI Extraction Critical Path Scenario start Time Scenario finish UI thread CPU Wait Ready CPU Wait Ready CPU Worker thread 1 Ready CPU Wait Ready CPU Disk I/O Worker thread 2 Ready CPU Critical path CPU(UI) CPU(WT1) CPU(WT2) CPU(WT1) CPU(UI) Disk I/O Ready CPU 12

13 Approach AOI Extraction Wait Graph Scenario start Time Scenario finish UI thread Wait Graph Worker thread 1 CPU Wait Ready CPU Ready CPU Wait Ready CPU Wait Ready CPU Disk I/O Worker thread 2 Execution irrelevant to Worker thread 1 s waits CPU Critical path 13

14 Approach Callstack Pattern Mining Trace streams 1 23 AOI Ranked cluster Cluster Hits Total Wait time (ms) 1 94, , , , ,536 3,051,307 AOI Extraction Callstacks - ntdll!userthreadstart - - ntdll!userthreadstart - - ntdll!userthreadstart - - user32!internalcallwinproc user32!internalcallwinproc - - user32!internalcallwinproc kernel32!loadlibrary - - ntdll!openfile - kernel32!loadlibrary nt!pageread nt!trap - nt!accessfault - Ranking Pattern clusters ntdll!openfile 259 nt!accessfault nt!pageread Pattern Clustering Sequence Pattern Mining 709 ntdll!openfile 259 nt!pageread Callstack patterns nt!accessfault

15 Approach Callstack Pattern Mining Frequent Costly Sequence Pattern Example Sequence Occurrence Wait time A B 4 ms A B C D F 1 ms A B C E F 3 ms Frequency Cost threshold threshold T T A B G F 2 ms 5 5 ms (or (or 50% 50% of of total) Frequent Costly sequence pattern miner All Patterns Support A, B, AB 10 F, AF, BF, ABF 6 Closed Patterns Support A, B, AB 10 F, AF, BF, ABF 6 Maximal Patterns Support A, B, AB 10 F, AF, BF, ABF 6 Non-consecutive frequent costly sub-sequence as callstack as pattern Frequent Costly maximal patterns are are compact

16 Approach Callstack Pattern Clustering Trace streams 1 23 AOI Ranked cluster Cluster Hits Total Wait time (ms) 1 94, , , , ,536 3,051,307 AOI Extraction Callstacks - ntdll!userthreadstart - - ntdll!userthreadstart - - ntdll!userthreadstart - - user32!internalcallwinproc user32!internalcallwinproc - - user32!internalcallwinproc kernel32!loadlibrary - - ntdll!openfile - kernel32!loadlibrary nt!pageread nt!trap - nt!accessfault - Ranking Pattern clusters ntdll!openfile 259 nt!accessfault nt!pageread Pattern Clustering Sequence Pattern Mining 709 ntdll!openfile 259 nt!pageread Callstack patterns nt!accessfault

17 Approach Callstack Pattern Clustering Motivation Same issue often reflected by variant patterns Defect often hidden in invariant parts of variant patterns Goal Precise measurement of issue impact for better prioritization Comprehensive issue representation with pattern variations for quick and precise fixing 17

18 0. Alignment based on edit distance model App_main InitComponents GetHashCode GetShortPathName SwapKernelStack MmAccessFault MiIssueHardFault IoPageRead Approach Callstack Pattern Clustering Similarity Model Match Insertion/ Deletion Substitution Match App_main InitComponents GetHashCode GetShortPathName wow64service wow64system wow64queryattr ExpandKernelStack MmAccessFault MiIssueHardFault IoPageRead 1. Common-purpose function: weight Uni() is small 2. Special-purpose function: weight Uni() is large 3. Variant part representing nonessential factors 4. Similar names implying relevant functionalities 5. Constant call path: weight FBi() + BBi() is small 18

19 Technical Highlights Machine learning for system domain Formulate the discovery of problematic execution patterns as callstack mining & clustering Systematic mechanism to incorporate domain knowledge Interactive performance analysis system Parallel mining infrastructure based on HPC + MPI Visualization aided interactive exploration 19

20 Evaluation Windows 7 Study Task: since Dec 2010, a continued effort to improve Windows performance Analysts from one performance analysis team for Microsoft Windows Hunt for hidden performance bugs that caused common impact on Windows Explorer UI response Based on over 6,000 trace streams Data 921 qualified out of 1,000 randomly sampled trace streams 181 million callstacks in total 140 million wait callstacks 41 million CPU sampled callstacks 20

21 Evaluation Windows 7 Study Research Questions RQ1. How much does StackMine improve practices of performance debugging in the large? RQ2. How well do the derived performance signatures capture performance bottlenecks? RQ3. How much does StackMine outperform alternative techniques? 21

22 Evaluation Windows 7 Study RQ1. Overall Improvement of Practices Traditional approach would take 20~60 days Using StackMine 18 hours 10 hours of automatic computation 140 million callstacks 12 highly impactful bugs AOI Extraction 689 thousand callstacks Feature team confirmation Callstack Pattern Mining 93 performance signatures 2,239 costly patterns Human analyst confirmation Pattern Clustering 1,251 pattern clusters Pattern Ranking Top 400 pattern clusters 8 hours of one human analyst s review 22

23 Evaluation Windows 7 Study RQ2. Performance Bottleneck Coverage Performance Bottleneck Coverage (PBC) of a set of performance signatures PBC = Total time of performance signatures Total time of collected trace streams The higher PBC achieved, the lower possibility that high-impact performance bugs remain not captured 58.26% PBC achieved by the 93 signatures 23

24 Number of required trace streams to investigate Evaluation Windows 7 Study RQ3. Comparison with Alternative Techniques StackMine requires only 7.2%, 5.8%, and 6.3% of trace streams required by the other three techniques Baseline-Random Greedy-Total Greedy-Max StackMine % 30% 40% 50% 60% Performance bottleneck coverage (%) 24

25 Impact We believe that the MSRA tool is highly valuable and much more efficient for mass trace (100+ traces) analysis. For 1000 traces, we believe the tool saves us 4-6 weeks of time to create new signatures, which is quite a significant productivity boost. Highly effective new issue discovery on Windows mini-hang - from Development Manager in Windows Continuous impact on future Windows versions 25

26 Conclusion The first formulation and real-world deployment of performance debugging in the large as a data mining problem on callstacks A mining-clustering mechanism for reducing costlypattern mining results based on domain-specific characteristics of callstacks Industrial impact on using StackMine in performance debugging in the large for Microsoft Windows 26

27 Acknowledgment Our partners in Microsoft product teams The researchers from Microsoft Research 27

28 Q&A Thank you! 28

PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments

PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments Chung Hwan Kim, Junghwan Rhee *, Kyu Hyung Lee +, Xiangyu Zhang, Dongyan Xu * + Performance Problems Performance

More information

Improving Bug Management using Correlations in Crash Reports

Improving Bug Management using Correlations in Crash Reports Noname manuscript No. (will be inserted by the editor) Improving Bug Management using Correlations in Crash Reports Shaohua Wang Foutse Khomh Ying Zou Received: date / Accepted: date Abstract Nowadays,

More information

BECOME A LOAD TESTING ROCK STAR

BECOME A LOAD TESTING ROCK STAR 3 EASY STEPS TO BECOME A LOAD TESTING ROCK STAR Replicate real life conditions to improve application quality Telerik An Introduction Software load testing is generally understood to consist of exercising

More information

Appendix to The Health of Software Engineering Research

Appendix to The Health of Software Engineering Research Appendix to The Health of Software Engineering Research David Lo School of Information Systems Singapore Management University Singapore davidlo@smu.edu.sg Nachiappan Nagappan and Thomas Zimmermann Research

More information

Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda

Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda 1 Observe novel applicability of DL techniques in Big Data Analytics. Applications of DL techniques for common Big Data Analytics problems. Semantic indexing

More information

CA Test Data Manager Key Scenarios

CA Test Data Manager Key Scenarios WHITE PAPER APRIL 2016 CA Test Data Manager Key Scenarios Generate and secure all the data needed for rigorous testing, and provision it to highly distributed teams on demand. Muhammad Arif Application

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Question Bank. 4) It is the source of information later delivered to data marts.

Question Bank. 4) It is the source of information later delivered to data marts. Question Bank Year: 2016-2017 Subject Dept: CS Semester: First Subject Name: Data Mining. Q1) What is data warehouse? ANS. A data warehouse is a subject-oriented, integrated, time-variant, and nonvolatile

More information

MODEL BASED TEST DESIGN AT UNITY

MODEL BASED TEST DESIGN AT UNITY Sophia Antipolis, French Riviera 20-22 October 2015 MODEL BASED TEST DESIGN AT UNITY Marek Turski, Ilya Turshatov, Tomasz Paszek Unity Technologies All rights reserved Unity Technologies Provider of an

More information

Accelerate your Software Delivery Lifecycle with IBM Development and Test Environment Services

Accelerate your Software Delivery Lifecycle with IBM Development and Test Environment Services Accelerate your Software Delivery Lifecycle with IBM Development and Test Environment Services DevOps Best Practices for High-Performing Enterprises Enterprise capability for continuous software delivery

More information

Finding a needle in Haystack: Facebook's photo storage

Finding a needle in Haystack: Facebook's photo storage Finding a needle in Haystack: Facebook's photo storage The paper is written at facebook and describes a object storage system called Haystack. Since facebook processes a lot of photos (20 petabytes total,

More information

webmethods Task Engine 9.9 on Red Hat Operating System

webmethods Task Engine 9.9 on Red Hat Operating System webmethods Task Engine 9.9 on Red Hat Operating System Performance Technical Report 1 2015 Software AG. All rights reserved. Table of Contents INTRODUCTION 3 1.0 Benchmark Goals 4 2.0 Hardware and Software

More information

Web Usage Mining: A Research Area in Web Mining

Web Usage Mining: A Research Area in Web Mining Web Usage Mining: A Research Area in Web Mining Rajni Pamnani, Pramila Chawan Department of computer technology, VJTI University, Mumbai Abstract Web usage mining is a main research area in Web mining

More information

Viewpoint Review & Analytics

Viewpoint Review & Analytics The Viewpoint all-in-one e-discovery platform enables law firms, corporations and service providers to manage every phase of the e-discovery lifecycle with the power of a single product. The Viewpoint

More information

MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap

MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap Steve Tuck Senior Director, Product Strategy Todd Blackmon Senior Director, Sales Consulting David Gengenbach Sales Consultant

More information

Remote Health Monitoring for an Embedded System

Remote Health Monitoring for an Embedded System July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction

More information

Solving Review Case Challenges with Analytics

Solving Review Case Challenges with Analytics Solving Review Case Challenges with Analytics September 14, 2018 Version 9.5.411.4 For the most recent version of this document, visit our documentation website. Table of Contents 1 Solving review case

More information

Developing, Debugging, and Optimizing GPU Codes for High Performance Computing with Allinea Forge

Developing, Debugging, and Optimizing GPU Codes for High Performance Computing with Allinea Forge Developing, Debugging, and Optimizing GPU Codes for High Performance Computing with Allinea Forge Ryan Hulguin Applications Engineer ryan.hulguin@arm.com Agenda Introduction Overview of Allinea Products

More information

HANA Performance. Efficient Speed and Scale-out for Real-time BI

HANA Performance. Efficient Speed and Scale-out for Real-time BI HANA Performance Efficient Speed and Scale-out for Real-time BI 1 HANA Performance: Efficient Speed and Scale-out for Real-time BI Introduction SAP HANA enables organizations to optimize their business

More information

Hybrid Implementation of 3D Kirchhoff Migration

Hybrid Implementation of 3D Kirchhoff Migration Hybrid Implementation of 3D Kirchhoff Migration Max Grossman, Mauricio Araya-Polo, Gladys Gonzalez GTC, San Jose March 19, 2013 Agenda 1. Motivation 2. The Problem at Hand 3. Solution Strategy 4. GPU Implementation

More information

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges

More information

Optimizing SQL Transactions

Optimizing SQL Transactions High Performance Oracle Optimizing SQL Transactions Dave Pearson Quest Software Copyright 2006 Quest Software Quest Solutions for Enterprise IT Quest Software develops innovative products that help customers

More information

Optimize Your Databases Using Foglight for Oracle s Performance Investigator

Optimize Your Databases Using Foglight for Oracle s Performance Investigator Optimize Your Databases Using Foglight for Oracle s Performance Investigator Solve performance issues faster with deep SQL workload visibility and lock analytics Abstract Get all the information you need

More information

The Vectra App for Splunk. Table of Contents. Overview... 2 Getting started Setup... 4 Using the Vectra App for Splunk... 4

The Vectra App for Splunk. Table of Contents. Overview... 2 Getting started Setup... 4 Using the Vectra App for Splunk... 4 Table of Contents Overview... 2 Getting started... 3 Installation... 3 Setup... 4 Using the Vectra App for Splunk... 4 The Vectra Dashboard... 5 Hosts... 7 Detections... 8 Correlations... 9 Technical support...

More information

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd.

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd. IronSync FILE SYNC SERVER User Manual Version 2.6 May 2014 www.ironsync.com info@flexense.com 1 1 Product Overview...3 2 Product Installation Procedure...4 3 Using IronSync Client GUI Application...5 3.1

More information

System Specification

System Specification NetBrain Integrated Edition 7.0 System Specification Version 7.0b1 Last Updated 2017-11-07 Copyright 2004-2017 NetBrain Technologies, Inc. All rights reserved. Introduction NetBrain Integrated Edition

More information

Comprehensive Lustre I/O Tracing with Vampir

Comprehensive Lustre I/O Tracing with Vampir Comprehensive Lustre I/O Tracing with Vampir Lustre User Group 2010 Zellescher Weg 12 WIL A 208 Tel. +49 351-463 34217 ( michael.kluge@tu-dresden.de ) Michael Kluge Content! Vampir Introduction! VampirTrace

More information

Leveraging Flash in HPC Systems

Leveraging Flash in HPC Systems Leveraging Flash in HPC Systems IEEE MSST June 3, 2015 This work was performed under the auspices of the U.S. Department of Energy by under Contract DE-AC52-07NA27344. Lawrence Livermore National Security,

More information

CERT C++ COMPLIANCE ENFORCEMENT

CERT C++ COMPLIANCE ENFORCEMENT CERT C++ COMPLIANCE ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO MAINTAIN COMPLIANCE SIMPLIFY AND STREAMLINE CERT C++ COMPLIANCE The CERT C++ compliance module reports on dataflow problems, software defects,

More information

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3

More information

SOLUTION BRIEF CA TEST DATA MANAGER FOR HPE ALM. CA Test Data Manager for HPE ALM

SOLUTION BRIEF CA TEST DATA MANAGER FOR HPE ALM. CA Test Data Manager for HPE ALM SOLUTION BRIEF CA TEST DATA MANAGER FOR HPE ALM CA Test Data Manager for HPE ALM Generate all the data needed to deliver fully tested software, and export it directly into Hewlett Packard Enterprise Application

More information

Debugging in the (Very) Large: Ten Years of Implementation and Experience

Debugging in the (Very) Large: Ten Years of Implementation and Experience Debugging in the (Very) Large: Ten Years of Implementation and Experience Kirk Glerum, Kinshuman Kinshumann, Steve Greenberg, Gabriel Aul, Vince Orgovan, Greg Nichols, David Grant, Gretchen Loihle, and

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Spring 2012 A second course in data mining!! http://www.it.uu.se/edu/course/homepage/infoutv2/vt12 Kjell Orsborn! Uppsala Database Laboratory! Department of Information Technology,

More information

Interactive Campaign Planning for Marketing Analysts

Interactive Campaign Planning for Marketing Analysts Interactive Campaign Planning for Marketing Analysts Fan Du University of Maryland College Park, MD, USA fan@cs.umd.edu Sana Malik Adobe Research San Jose, CA, USA sana.malik@adobe.com Eunyee Koh Adobe

More information

DATA SHEET RSA NETWITNESS PLATFORM PERVASIVE VISIBILITY. ACTIONABLE INSIGHTS.

DATA SHEET RSA NETWITNESS PLATFORM PERVASIVE VISIBILITY. ACTIONABLE INSIGHTS. DATA SHEET RSA NETWITNESS PLATFORM PERVASIVE VISIBILITY. ACTIONABLE INSIGHTS. KEY ANALYSTS BENEFITS: Gain complete visibility across your network Alleviate pressures from security staff shortages with

More information

IBM Tivoli Monitoring (ITM) And AIX. Andre Metelo IBM SWG Competitive Project Office

IBM Tivoli Monitoring (ITM) And AIX. Andre Metelo IBM SWG Competitive Project Office IBM Tivoli Monitoring (ITM) And AIX Andre Metelo metelo@us.ibm.com IBM SWG Competitive Project Office Have You Seen A DataCenter Like This? Complexity drives error rates Reduces responsiveness Increases

More information

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

Cognito Detect is the most powerful way to find and stop cyberattackers in real time Overview Cognito Detect is the most powerful way to find and stop cyberattackers in real time HIGHLIGHTS Always-learning behavioral models use AI to find hidden and unknown attackers, enable quick, decisive

More information

Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not.

Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. i About the Tutorial Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. Testing is executing a system in order

More information

Visual Design Flows for Faster Debug and Time to Market FlowTracer White Paper

Visual Design Flows for Faster Debug and Time to Market FlowTracer White Paper Visual Design Flows for Faster Debug and Time to Market FlowTracer White Paper 2560 Mission College Blvd., Suite 130 Santa Clara, CA 95054 (408) 492-0940 Introduction As System-on-Chip (SoC) designs have

More information

IBM. PDF file of IBM Knowledge Center topics. IBM Operations Analytics for z Systems. Version 2 Release 2

IBM. PDF file of IBM Knowledge Center topics. IBM Operations Analytics for z Systems. Version 2 Release 2 IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release 2 IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release

More information

Oracle Developer Studio 12.6

Oracle Developer Studio 12.6 Oracle Developer Studio 12.6 Oracle Developer Studio is the #1 development environment for building C, C++, Fortran and Java applications for Oracle Solaris and Linux operating systems running on premises

More information

Integrated Functional and Non -Functional Testing for Agile

Integrated Functional and Non -Functional Testing for Agile Integrated Functional and Non-Functional Testing for Agile P a g e 1 Integrated Functional and Non -Functional Testing for Agile STC 2013 Arush Gupta Umesh Kanade Harbinger Systems Pvt. Ltd 139, "Siddhant",

More information

User guide for GEM-TREND

User guide for GEM-TREND User guide for GEM-TREND 1. Requirements for Using GEM-TREND GEM-TREND is implemented as a java applet which can be run in most common browsers and has been test with Internet Explorer 7.0, Internet Explorer

More information

SDLC Maturity Models

SDLC Maturity Models www.pwc.com SDLC Maturity Models SecAppDev 2017 Bart De Win Bart De Win? 20 years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific publications

More information

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE KEY CUSTOMER BENEFITS: Gain complete visibility across enterprise networks Continuously monitor all traffic Faster analysis reduces risk exposure

More information

TEAM. Test Execution and Test Management for Numerical Control Software. Best Practice Action IST Deliverable D-3.1

TEAM. Test Execution and Test Management for Numerical Control Software. Best Practice Action IST Deliverable D-3.1 TEAM Test Execution and Test Management for Numerical Control Software Best Practice Action IST-1999-20333 Author(s): Joachim Mayer, Andreas Grosse, Thomas Bürger Type: Deliverable Activity: WP 4.1; Set

More information

GPU Debugging Made Easy. David Lecomber CTO, Allinea Software

GPU Debugging Made Easy. David Lecomber CTO, Allinea Software GPU Debugging Made Easy David Lecomber CTO, Allinea Software david@allinea.com Allinea Software HPC development tools company Leading in HPC software tools market Wide customer base Blue-chip engineering,

More information

MICROSOFT VISUAL STUDIO 2010 Overview

MICROSOFT VISUAL STUDIO 2010 Overview MICROSOFT VISUAL STUDIO 2010 Overview Visual studio 2010 delivers the following key ADVANCES: Enabling emerging trends Every year the industry develops new technologies and new trends. With Visual Studio

More information

Definitions English Version Axway Global. English Version. Definitions. Version 1.0 of Thursday, February 09, 2017 Status: final

Definitions English Version Axway Global. English Version. Definitions. Version 1.0 of Thursday, February 09, 2017 Status: final Definitions Version 1.0 of Thursday, February 09, 2017 Status: final Axway, 2017 / Version February 2017 Analytics Event Appcelerator Dashboard Application Arrow Admin seat Arrow Developper seat Arrow

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

davidklee.net gplus.to/kleegeek linked.com/a/davidaklee

davidklee.net gplus.to/kleegeek linked.com/a/davidaklee @kleegeek davidklee.net gplus.to/kleegeek linked.com/a/davidaklee Specialties / Focus Areas / Passions: Performance Tuning & Troubleshooting Virtualization Cloud Enablement Infrastructure Architecture

More information

Performance and Load Testing R12 With Oracle Applications Test Suite

Performance and Load Testing R12 With Oracle Applications Test Suite Performance and Load Testing R12 With Oracle Applications Test Suite Deep Ram Technical Director Oracle Corporation Daniel Gonzalez Practice Manager Oracle Corporation Safe Harbor

More information

The Cognito automated threat detection and response platform

The Cognito automated threat detection and response platform Overview The Cognito automated threat detection and response platform HIGHLIGHTS Finds active cyberattackers inside cloud, data center and enterprise environments Automates security investigations with

More information

NVIDIA DGX SYSTEMS PURPOSE-BUILT FOR AI

NVIDIA DGX SYSTEMS PURPOSE-BUILT FOR AI NVIDIA DGX SYSTEMS PURPOSE-BUILT FOR AI Overview Unparalleled Value Product Portfolio Software Platform From Desk to Data Center to Cloud Summary AI researchers depend on computing performance to gain

More information

Digitalization of Manufacturing

Digitalization of Manufacturing Digitalization of Manufacturing Leveraging the Internet of Things for Smart Manufacturing & Operational Excellence Dennis McRae Vice President of Solutions Dave McKnight Director Optimized Factory May

More information

Surveillance Dell EMC Storage with Synectics Digital Recording System

Surveillance Dell EMC Storage with Synectics Digital Recording System Surveillance Dell EMC Storage with Synectics Digital Recording System Configuration Guide H15108 REV 1.1 Copyright 2016-2017 Dell Inc. or its subsidiaries. All rights reserved. Published June 2016 Dell

More information

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges

More information

IDE for medical device software development. Hyun-Do Lee, Field Application Engineer

IDE for medical device software development. Hyun-Do Lee, Field Application Engineer IDE for medical device software development Hyun-Do Lee, Field Application Engineer Agenda SW Validation Functional safety certified tool IAR Embedded Workbench Code Analysis tools SW Validation Certifications

More information

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies. RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS Award-winning visual e-discovery software delivers faster insights and superior case strategies. Key reasons Ringtail should be the choice. The latest technology

More information

SIEM Solutions from McAfee

SIEM Solutions from McAfee SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an

More information

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE Vectra Cognito HIGHLIGHTS Finds active attackers inside your network Automates security investigations with conclusive

More information

Improve Your Manufacturing With Insights From IoT Analytics

Improve Your Manufacturing With Insights From IoT Analytics Improve Your Manufacturing With Insights From IoT Analytics Accelerated Time to Value With a Prebuilt, Future-Proof Solution Dr. Zack Pu Offering Manager, Industrial IoT Hitachi Vantara Dr. Wei Yuan Senior

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Spring 2016 A second course in data mining http://www.it.uu.se/edu/course/homepage/infoutv2/vt16 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

On BigFix Performance: Disk is King. How to get your infrastructure right the first time! Case Study: IBM Cloud Development - WW IT Services

On BigFix Performance: Disk is King. How to get your infrastructure right the first time! Case Study: IBM Cloud Development - WW IT Services On BigFix Performance: Disk is King How to get your infrastructure right the first time! Case Study: IBM Cloud Development - WW IT Services Authors: Shaun T. Kelley, Mark Leitch Abstract: Rolling out large

More information

white paper 4 Steps to Better Keyword Grouping Strategies for More Effective & Profitable Keyword Segmentation

white paper 4 Steps to Better Keyword Grouping Strategies for More Effective & Profitable Keyword Segmentation white paper 4 Steps to Better Keyword Grouping Strategies for More Effective & Profitable Keyword Segmentation 2009, WordStream, Inc. All rights reserved. WordStream technologies are protected by pending

More information

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Exadata Overview Oracle Exadata Database Machine Extreme ROI Platform Fast Predictable Performance Monitor

More information

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used

More information

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment This document is provided as-is. Information and views expressed in this document, including

More information

SkyLIGHT Director TM

SkyLIGHT Director TM Management System for Accedian Performance Elements and Performance Modules SkyLIGHT Director TM Network Performance Management Platform Product Benefits Point-and-click web browser based user interface

More information

Increasing Performance for PowerCenter Sessions that Use Partitions

Increasing Performance for PowerCenter Sessions that Use Partitions Increasing Performance for PowerCenter Sessions that Use Partitions 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

White Paper(Draft) Continuous Integration/Delivery/Deployment in Next Generation Data Integration

White Paper(Draft) Continuous Integration/Delivery/Deployment in Next Generation Data Integration Continuous Integration/Delivery/Deployment in Next Generation Data Integration 1 Contents Introduction...3 Challenges...3 Continuous Methodology Steps...3 Continuous Integration... 4 Code Build... 4 Code

More information

PALLADION Feature Set

PALLADION Feature Set PALLADION Feature Set FEATURE SET Introduction: PALLADION makes the job of running SIP based network infrastructure much more straightforward, resulting in much more reliable and predictable SIP based

More information

Dynamics Kaizala Connector

Dynamics Kaizala Connector Dynamics 365 - Kaizala Connector Pragmasys Consulting LLP Page 1 Table of Contents 1.1 Kaizala... 3 1.1.1 Introduction... 3 1.1.2 How It work... 3 1.1.3 Management Portal... 3 1.2 Installation of Kaizala...

More information

Automate Transform Analyze

Automate Transform Analyze Competitive Intelligence 2.0 Turning the Web s Big Data into Big Insights Automate Transform Analyze Introduction Today, the web continues to grow at a dizzying pace. There are more than 1 billion websites

More information

CSE 124: Networked Services Fall 2009 Lecture-19

CSE 124: Networked Services Fall 2009 Lecture-19 CSE 124: Networked Services Fall 2009 Lecture-19 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa09/cse124 Some of these slides are adapted from various sources/individuals including but

More information

Vectra Cognito. Brochure HIGHLIGHTS. Security analyst in software

Vectra Cognito. Brochure HIGHLIGHTS. Security analyst in software Brochure Vectra Cognito HIGHLIGHTS Finds active attackers inside your network Automates security investigations with conclusive answers Persistently tracks threats across all phases of attack Monitors

More information

Next Generation Authentication

Next Generation Authentication Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%

More information

Surveillance Dell EMC Storage with LENSEC Perspective VMS

Surveillance Dell EMC Storage with LENSEC Perspective VMS Surveillance Dell EMC Storage with LENSEC Perspective VMS Configuration Guide H14767 REV 1.1 Copyright 2016-2017 Dell Inc. or its subsidiaries. All rights reserved. Published March 2016 Dell believes the

More information

Transactum Business Process Manager with High-Performance Elastic Scaling. November 2011 Ivan Klianev

Transactum Business Process Manager with High-Performance Elastic Scaling. November 2011 Ivan Klianev Transactum Business Process Manager with High-Performance Elastic Scaling November 2011 Ivan Klianev Transactum BPM serves three primary objectives: To make it possible for developers unfamiliar with distributed

More information

CHRONO::HPC DISTRIBUTED MEMORY FLUID-SOLID INTERACTION SIMULATIONS. Felipe Gutierrez, Arman Pazouki, and Dan Negrut University of Wisconsin Madison

CHRONO::HPC DISTRIBUTED MEMORY FLUID-SOLID INTERACTION SIMULATIONS. Felipe Gutierrez, Arman Pazouki, and Dan Negrut University of Wisconsin Madison CHRONO::HPC DISTRIBUTED MEMORY FLUID-SOLID INTERACTION SIMULATIONS Felipe Gutierrez, Arman Pazouki, and Dan Negrut University of Wisconsin Madison Support: Rapid Innovation Fund, U.S. Army TARDEC ASME

More information

Quality Assurance: Test Development & Execution. Ian S. King Test Development Lead Windows CE Base OS Team Microsoft Corporation

Quality Assurance: Test Development & Execution. Ian S. King Test Development Lead Windows CE Base OS Team Microsoft Corporation Quality Assurance: Test Development & Execution Ian S. King Test Development Lead Windows CE Base OS Team Microsoft Corporation Introduction: Ian King Manager of Test Development for Windows CE Base OS

More information

Automated Testing of Tableau Dashboards

Automated Testing of Tableau Dashboards Kinesis Technical Whitepapers April 2018 Kinesis CI Automated Testing of Tableau Dashboards Abstract Companies make business critical decisions every day, based on data from their business intelligence

More information

Democratized Performance Test Platform. Open source, enterprise ready modular platform, that is tool chain friendly.

Democratized Performance Test Platform. Open source, enterprise ready modular platform, that is tool chain friendly. Democratized Performance Test Platform Open source, enterprise ready modular platform, that is tool chain friendly. Democratized Performance Test Platform Open source, enterprise ready modular platform,

More information

Enterprise Architect. User Guide Series. Profiling

Enterprise Architect. User Guide Series. Profiling Enterprise Architect User Guide Series Profiling Investigating application performance? The Sparx Systems Enterprise Architect Profiler finds the actions and their functions that are consuming the application,

More information

Enterprise Architect. User Guide Series. Profiling. Author: Sparx Systems. Date: 10/05/2018. Version: 1.0 CREATED WITH

Enterprise Architect. User Guide Series. Profiling. Author: Sparx Systems. Date: 10/05/2018. Version: 1.0 CREATED WITH Enterprise Architect User Guide Series Profiling Author: Sparx Systems Date: 10/05/2018 Version: 1.0 CREATED WITH Table of Contents Profiling 3 System Requirements 8 Getting Started 9 Call Graph 11 Stack

More information

CrashLocator: Locating Crashing Faults Based on Crash Stacks

CrashLocator: Locating Crashing Faults Based on Crash Stacks CrashLocator: Locating Crashing Faults Based on Crash Stacks Rongxin Wu, Hongyu Zhang, Shing-Chi Cheung, and Sunghun Kim Department of Computer Science and Engineering The Hong Kong University of Science

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Addressing the Increasing Challenges of Debugging on Accelerated HPC Systems. Ed Hinkel Senior Sales Engineer

Addressing the Increasing Challenges of Debugging on Accelerated HPC Systems. Ed Hinkel Senior Sales Engineer Addressing the Increasing Challenges of Debugging on Accelerated HPC Systems Ed Hinkel Senior Sales Engineer Agenda Overview - Rogue Wave & TotalView GPU Debugging with TotalView Nvdia CUDA Intel Phi 2

More information

TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1

TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 ABSTRACT This introductory white paper provides a technical overview of the new and improved enterprise grade features introduced

More information

CouchDB-based system for data management in a Grid environment Implementation and Experience

CouchDB-based system for data management in a Grid environment Implementation and Experience CouchDB-based system for data management in a Grid environment Implementation and Experience Hassen Riahi IT/SDC, CERN Outline Context Problematic and strategy System architecture Integration and deployment

More information

Assuring Certainty through Effective Regression Testing. Vishvesh Arumugam

Assuring Certainty through Effective Regression Testing. Vishvesh Arumugam Assuring Certainty through Effective Regression Testing Vishvesh Arumugam Agenda Introduction The Problem Magnitude Management Regression Test Efficiency Solution and Approach Test Suite Maintenance Determining

More information

Detection of Distinct URL and Removing DUST Using Multiple Alignments of Sequences

Detection of Distinct URL and Removing DUST Using Multiple Alignments of Sequences Detection of Distinct URL and Removing DUST Using Multiple Alignments of Sequences Prof. Sandhya Shinde 1, Ms. Rutuja Bidkar 2,Ms. Nisha Deore 3, Ms. Nikita Salunke 4, Ms. Neelay Shivsharan 5 1 Professor,

More information

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 11/10/2015

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 11/10/2015 Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm Rao Casturi 11/10/2015 http://cs.gsu.edu/~ncasturi1 Class announcements Final Exam date - Dec 1 st. Final Presentations Dec 3 rd. And

More information

ni.com Best Practices for Architecting Embedded Applications in LabVIEW

ni.com Best Practices for Architecting Embedded Applications in LabVIEW Best Practices for Architecting Embedded Applications in LabVIEW Overview of NI RIO Architecture PC Real Time Controller FPGA 2 Where to Start? 3 Requirements Before you start to design your system, you

More information

The former pager tasks have been replaced in 7.9 by the special savepoint tasks.

The former pager tasks have been replaced in 7.9 by the special savepoint tasks. 1 2 3 4 With version 7.7 the I/O interface to the operating system has been reimplemented. As of version 7.7 different parameters than in version 7.6 are used. The improved I/O system has the following

More information

Bringing OpenStack to the Enterprise. An enterprise-class solution ensures you get the required performance, reliability, and security

Bringing OpenStack to the Enterprise. An enterprise-class solution ensures you get the required performance, reliability, and security Bringing OpenStack to the Enterprise An enterprise-class solution ensures you get the required performance, reliability, and security INTRODUCTION Organizations today frequently need to quickly get systems

More information

Debugging CUDA Applications with Allinea DDT. Ian Lumb Sr. Systems Engineer, Allinea Software Inc.

Debugging CUDA Applications with Allinea DDT. Ian Lumb Sr. Systems Engineer, Allinea Software Inc. Debugging CUDA Applications with Allinea DDT Ian Lumb Sr. Systems Engineer, Allinea Software Inc. ilumb@allinea.com GTC 2013, San Jose, March 20, 2013 Embracing GPUs GPUs a rival to traditional processors

More information

Embedded Technosolutions

Embedded Technosolutions Hadoop Big Data An Important technology in IT Sector Hadoop - Big Data Oerie 90% of the worlds data was generated in the last few years. Due to the advent of new technologies, devices, and communication

More information

Surveillance Dell EMC Storage with FLIR Latitude

Surveillance Dell EMC Storage with FLIR Latitude Surveillance Dell EMC Storage with FLIR Latitude Configuration Guide H15106 REV 1.1 Copyright 2016-2017 Dell Inc. or its subsidiaries. All rights reserved. Published June 2016 Dell believes the information

More information

Capriccio: Scalable Threads for Internet Services

Capriccio: Scalable Threads for Internet Services Capriccio: Scalable Threads for Internet Services Rob von Behren, Jeremy Condit, Feng Zhou, Geroge Necula and Eric Brewer University of California at Berkeley Presenter: Cong Lin Outline Part I Motivation

More information