This document provides an overview of SQL Server Distributed Replay, a feature that allows replaying SQL Server workloads against test environments. It discusses the components of Distributed Replay, including the administration tool, controller, clients, and target server. The document outlines the basic steps to set up Distributed Replay and replay a workload, including capturing a trace, preprocessing it, deciding replay options, and replaying the trace. Resources for learning more about Distributed Replay are also provided.
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
The nightmare of locking, blocking and isolation levelsBoris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a nightmare! I also know that you struggle to find some time to go a bit deeper and learn what the various isolation levels can do for you. In this one-hour session, you will be able to see and understand why locking happens, how the locking manager actually works and how can we resolve various locking problems with different techniques ranging from query hints to changing the isolation levels.
Welcome to the nightmare of locking, blocking and isolation levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
The topic of SQL Server concurrency is one that many people want to understand really well, but at the same time is one that doesn't get the needed attention for some reason. In addition, isolation levels can play a huge role in both the performance and the scalability of every application and so the proper choice of isolation level is crucial. In this session we are going to go deep into the world of SQL Server isolation levels and see what is the behaviour of each one of them. We will discuss how we should approach the final decision on which level we should go with and how we can actually effectively troubleshoot concurrency issues. Last, but not at least, we will take a look at what is going on behind the scenes when our applications work and what differentiates one isolation level from the other. The session is suitable for both application developers and DBAs who want to advance their knowledge in the unending world of SQL Server concurrency.
Replay your workload as it is your actual one! Boris Hristov
Have you ever wanted to replay your application workload be that because you upgraded to a new hardware, added new indexes or something else? Now there's a feature for that! It's called Distributed Replay and in this session you will learn how this new feature in SQL Server 2012 can help you resolve that problem!
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
This document provides an overview of locking, blocking, and transaction isolation levels in SQL Server. It begins with an introduction to locking and how SQL Server uses locks for concurrency control. It then discusses the different lock types, lock compatibility, and the lock hierarchy. The document demonstrates how to view locking information and troubleshoot locking problems. It also covers lock escalation, deadlocks, and resolving blocking issues. Finally, it concludes with an explanation of the various transaction isolation levels supported by SQL Server and how they differ in terms of concurrency and consistency.
Replay your workload as it is your actual one! Boris Hristov
Have you ever wanted to replay your application workload be that because you upgraded to a new hardware, added new indexes or something else? Now there's a feature for that! It's called Distributed Replay and in this session you will learn how this new feature in SQL Server 2012 can help you resolve that problem!
Replay your workload as it's your actual oneBoris Hristov
This document discusses Distributed Replay, a SQL Server 2012 feature that allows replaying workload traces against SQL Server instances to test for application compatibility, performance, and load. It provides an overview of the Distributed Replay components and demostrates how to set up a Distributed Replay environment. Key steps include capturing a trace, preprocessing it, deciding the replay mode, and replaying the preprocessed trace. Resources for learning more about Distributed Replay are also listed.
This document discusses multithreading in Java. It defines multithreading as the ability for a program to execute multiple tasks concurrently using threads. Threads allow for multitasking within a single program. The document provides examples of threads, such as a spell checker, and explains how to create and start threads in Java by extending the Thread class or implementing the Runnable interface. It also covers the lifecycle of a thread and methods like sleep(). Finally, it discusses action listeners and how they can be used to handle events from user interactions.
Gatling is Open Source Stress testing tool.
Why Gatling:
- High Performance.
- Multi Threading vs (Akka) Actor Model.
- Synchronous Blocking IOs vs asynchronous Non-blocking IOs Netty.
The document provides instructions for installing Network Simulator 2 (NS2) on Linux. It discusses extracting the NS2 file, running the install command, and setting the PATH and LD_LIBRARY_PATH variables. It also notes potential issues like package dependencies or distribution incompatibilities that could cause installation to fail and provides resources to troubleshoot those problems.
This document discusses kernel synchronization in Linux. It begins by outlining kernel control paths and when synchronization is necessary, such as to prevent race conditions when kernel control paths are interleaved. It then describes various synchronization primitives like spin locks, semaphores, and RCU. Examples are given of how these primitives can be used to synchronize access to kernel data structures. Interrupt-aware versions of synchronization primitives are also outlined. The document concludes with examples of how race conditions are prevented for specific data structures and operations in the kernel.
Introduction to concurrent programming with Akka actorsShashank L
This document provides an introduction to concurrent programming with Akka Actors. It discusses concurrency and parallelism, how the end of Moore's Law necessitated a shift to concurrent programming, and introduces key concepts of actors including message passing concurrency, actor systems, actor operations like create and send, routing, supervision, configuration and testing. Remote actors are also discussed. Examples are provided in Scala.
This document discusses using virtualization technology (VT-x) to hide Windows x64 user mode memory addresses. It reviews memory paging mechanisms and previous research limitations. Using Intel's Extended Page Table (EPT) for virtual memory virtualization, the presenter describes their new approach of directly setting host physical pages as not present, invalidating the EPT-TLB, and providing an EPT violation handler to redirect guest physical addresses to pre-allocated machine physical addresses. They discuss handling user mode memory that is pageable and uses copy-on-write techniques. The presenter provides code examples and explains how the technique fakes checksum algorithms by always returning the original expected memory values.
Operating Systems 1 (8/12) - ConcurrencyPeter Tröger
This document provides an introduction to concurrency and parallel programming concepts using POSIX threads. It defines key concurrency terms like race conditions, deadlocks, livelocks and starvation. It discusses how to protect critical sections and shared resources using semaphores and mutexes. Examples like the dining philosophers problem illustrate how deadlocks can occur. The document also outlines POSIX thread functions for thread management, synchronization with mutexes and condition variables, and reading/writing locks and barriers.
This document discusses multithreading in Java. It defines threads as pieces of code that run concurrently with other threads. It describes the life cycle of a thread as starting, running, and stopping. It also discusses how to create multithreaded programs in Java by either extending the Thread class or implementing the Runnable interface.
Threads are lightweight processes that improve application performance through parallelism. Each thread has its own program counter and stack but shares other resources like memory with other threads in a process. Using threads provides advantages like lower overhead context switching compared to processes and allows parallel execution on multi-core systems. There are two types of threads - user level threads managed by libraries and kernel level threads supported by the OS kernel. Threads have a life cycle that includes states like new, ready, running, blocked, and terminated.
Watch Re-runs on your SQL Server with RML Utilitiesdpcobb
RML Utilities provide command line tools and interactive reports enabling you to:
Take SQL trace files (captured with SQL Profiler, sp_trace or extended events in SQL 2012+),
Process them into replayable RML files (using readtrace.exe),
Play them back in a different SQL environment (using ostress.exe),
And compare the performance at a granular level (using reporter.exe or custom queries).
The technical level of this document is 300.
This article requires knowledge about Microsoft Performance Monitor, Lync Monitoring, Hardware SPEC’s and Consulting.
Building the Test User Scenario, requires full understand of each Lync feature and how user will utilize those feature. Please also carefully understand the Lync PSTN Gateway Simulator. The Simulator must be provide with correct Dial-Plans, Voice Policy and Voice Routes.
You also need to understand the Lync User Provisioning Tool and how to design the Stress Test Scenarios.
Note:
This document is neither a sizing nor a configuration guide. You should use this document only for your environment planning’s purposes and security considerations. In lager environments you should spend some time to evaluate the optimal path of your Lync deployment.
Table of Content:
Introduction 4
The Calculation Process (I can recommend to you): 6
Build the Stress Test Lab 7
The Stress Test Process: 9
The Validation Process: 11
User Provisioning Tool 12
Setup User Provisioning Tool 13
User Creation 13
Contacts Creation 14
Distribution List Creation 15
Location Info Service Config 16
Run Configuration Scripts 18
Stress Test Simulations 20
User Profile Generator 20
Common Configuration 21
General Scenario 23
Voice Scenario 34
Reach Scenario 49
Mobility Scenario 52
Summary (Important User Load definition) 54
Table of Figures 58
Author: Thomas Poett MVP, Managing Consultant Microsoft Unified Communication
UKOUG version of a presentation trying to establish the sensible limits of parallelism on a couple of hardware configurations. Detailed white paper is at http://oracledoug.com/px_slaves.pdf
The document introduces DSP/BIOS and its components. It discusses how DSP/BIOS provides a real-time operating system for tasks like scheduling, interrupts, communication between threads. It describes the different DSP/BIOS thread types like HWI, SWI, TSK and how they are prioritized and triggered. It also provides an example laboratory exercise to create a timer interrupt, software interrupt and task using DSP/BIOS components.
OSMC 2010 | NSClient++ - what's new? And what's coming! by Michael MedinNETWAYS
A simple yet powerful and secure monitoring daemon for Windows operating systems, this is what a NSClient++ aims to be. It is built for Nagios, but nothing in the daemon is actually Nagios specific and with little or no change NSClient++ could be also integrated into any monitoring software that supports running user tools for polling. In this presentation we are going to look at the new features of NSClient++ 0.3.x. But perhaps more importantly looking at what’s coming in the 0.4.x version!
The SQL Server Distributed Replay feature helps assess the impact of SQL Server upgrades, hardware upgrades, and tuning by replaying workload traces from multiple computers. It provides a more scalable solution than SQL Server Profiler for simulating intensive, high-concurrency workloads. Distributed Replay uses a controller computer to orchestrate replay by client computers against a target SQL Server instance.
This document provides an overview of tips and tricks for using Toad, an Oracle database administration and development tool. It covers basics for new users, advanced features for PL/SQL developers, and advanced features for database administrators (DBAs). Some highlights include customizing Toad's interface, using the schema browser to configure object views, debugging and profiling PL/SQL code, testing code, and automating tasks with the application designer. The document aims to help analysts, developers and DBAs get the most out of Toad.
Webinar: From Frustration to Fascination: Dissecting ReplicationHoward Greenberg
This is a recording of the TLCC and webinar for Admins on Domino Replication. Even if you are an experienced Domino Administrator you will learn something new about replication from our two expert speakers, Kim Greene and Ben Menesi, both of whom have presented at many user conferences and Connect. This webinar was presented on Thursday April 24th, 2014.
From frustration to fascination: dissecting ReplicationBenedek Menesi
1.) The presenters will discuss replication in Domino/Notes, including the replicator server task, connection documents, and cluster replication.
2.) Connection documents control replication between servers by specifying which databases and documents are replicated. They also define replication settings like type and schedule.
3.) Cluster replication uses in-memory replication to synchronize databases across cluster members in real-time. It disregards selective replication formulas. Traditional replication is still needed as a backup.
The document provides information about the person's role as a Linux System Engineer including responsibilities like installing hardware, networking, building servers, patching systems, and troubleshooting issues for developers, DBAs and other teams. It also answers questions about supporting different environments, recent challenges, scripting experience, and Linux fundamentals.
Experiences from debugging ZFS in production in Illumos and Linux from Delphix. Introduction of the SDB debugger and how it can be used to debug ZFS on Linux.
Ben Prusinski is presenting on Oracle R12 E-Business Suite performance tuning. He will cover methodology, best practices, and techniques from basic to advanced. The presentation includes tuning at the infrastructure, application, and database levels with a focus on a holistic approach. Specific areas that will be discussed are concurrent manager tuning including queue size, sleep cycle, cache size, and number of processes.
This presentation talks about Real Time Operating Systems (RTOS). Starting with fundamental concepts of OS, this presentation deep dives into Embedded, Real Time and related aspects of an OS. Appropriate examples are referred with Linux as a case-study. Ideal for a beginner to build understanding about RTOS.
RENCI User Group Meeting 2017 - I Upgraded iRODS and I still have all my hairJohn Constable
The document summarizes the experience of upgrading a large iRODS installation from version 3.3.1 to 4.1.8 over the course of a year. Key aspects included developing unit tests using BATS, working closely with RENCI on bug fixes, and dealing with issues around large file uploads and full resources during the multi-stage upgrade process. Lessons learned included the importance of testing, configuration management, and working with users and the iRODS community.
Migraine Drupal - syncing your staging and live sitesdrupalindia
The document discusses using the Migraine tool to migrate changes between development, staging, and production environments for a Drupal website. It outlines the development methodology, requirements for Migraine, and the workflow it uses to synchronize databases and file systems between environments with minimal downtime. Key aspects include categorizing database tables, taking backups, comparing schemas, and commands to dump, migrate, and restore databases.
Sql server performance tuning and optimizationManish Rawat
Sql server performance tuning and optimization
SQL Server Concepts/Structure
Performance Measuring & Troubleshooting Tools
Locking
Performance Problem : CPU
Performance Problem : Memory
Performance Problem : I/O
Performance Problem : Blocking
Query Tuning
Indexing
Mike Gangler presented on how Secure-24 leverages RPMs to automatically install Oracle agents to EM12c using Puppet. He discussed how the RPM is created on the OMS host and copied to target systems. Puppet then installs the RPM, modifies the agent configuration file, and connects the agent to the OMS. While Puppet automates the process, targets still need to be promoted manually. Lessons learned include only running Puppet on production Linux servers and ensuring accurate host names to avoid issues.
Using RPM's to Automagically to install Oracle Agents to EM12CSecure-24
Puppet is used to automate the installation of Oracle Management Agents on Linux servers at Secure-24. Puppet checks that prerequisites are met, such as available disk space and open ports. It then copies and runs the Oracle Agent RPM, modifies the agent configuration file, and starts the agent process to connect to the Oracle Management Server. While Puppet automates much of the process, targets still need to be manually promoted and hosts may require fully qualified domain names. Puppet installation overwrites any manual agent configuration changes and can only support one OMS version at a time.
With tens of thousands of Java servers running in production in enterprise, Java has become a language of choice for building production systems. If our machines are to exhibit acceptable performance, they require regular tuning.This talk takes a detailed look at techniques for tuning a Java Server.
Similar to Replay your workload as it is your actual one! (20)
Have you recently been in a boring presentation? I bet you were. I am also almost sure that one of the reason why you got bored is because of the speaker's slide deck. That is true because 99% of the presenters out there use their presentation software(be that PowerPoint, Prezi or Keynote) in a wrong way. This, of course, leads to missed opportunities for future business, disappointed audiences and probably miscommunicated important information. As presenters we want the opposite!
This document provides an overview of business intelligence. It defines business intelligence as transforming data into knowledge. It discusses data warehouses as single points of truth that store large amounts of differently designed data. It demonstrates extracting information from data warehouses using T-SQL and visualizing data in Excel models and Power BI reports to provide ready analytics to managers in a beautiful way.
The 5 Hidden Performance Gems of SQL Server 2014Boris Hristov
SQL Server 2014 comes with dozens of improvements in various areas. In this presentation we will discuss and see how the new release can make the life of each and every developer easier and what are the top 5 T-SQL enhancements that we can use in our day-to-day work.
Do you think that your data is not secured in the cloud? Is that one of the reasons for you to not migrate at least some workloads there? Things changed in the last few months in terms of Azure security. In this session we will take a closer look at what the features Row Level Security(RLS) and Dynamic Data Masking can do for your business and how they can help you secure your databases.
How to Deliver Technical Presentations: The Right Way!Boris Hristov
Have you been to a bad presentation or is it actually you that want to gain and improve your presentation skills? In this session you will learn what makes of a great presentation and what are the mistakes that sometimes even advanced speakers do! You will see and be presented with the most important concepts and techniques that will help you go to the next level and deliver far better presentations for your audience! We will take a look at both the fundamentals and the specifics of a technical presentation and what makes one great!
Do you think that your data is not secured in the cloud? Is that one of the reasons for you to not migrate at least some workloads there? Things changed in the last few months in terms of Azure security. In this session we will take a closer look at what the features Row Level Security(RLS) and Dynamic Data Masking can do for your business and how they can help you secure your databases.
Top 5 T-SQL Improvements in SQL Server 2014Boris Hristov
SQL Server 2014 comes with dozens of improvements in various areas. In this presentation we will discuss and see how the new release can make the life of each and every developer easier and what are the top 5 T-SQL enhancements that we can use in our day-to-day work.
Have you been to a bad presentation or is it actually you that want to gain and improve your presentation skills? In this session you will learn what makes of a great presentation and what are the mistakes that sometimes even advanced speakers do! You will see and be presented with the most important concepts and techniques that will help you go to the next level and deliver far better presentations for your audience! We will take a look at both the fundamentals and the specifics of a technical presentation and what makes one great!
Have you recently been in a boring presentation? I bet you were. I am also almost sure that one of the reason why you got bored is because of the speaker's slide deck. That is true because 99% of the presenters out there use their presentation software(be that PowerPoint, Prezi or Keynote) in a wrong way. This, of course, leads to missed opportunities for future business, disappointed audiences and probably miscommunicated important information. As presenters we want the opposite! In the slide deck you will find 10 of the fundamental rules of great presentation design which we all need to follow in order to join that 1% of people who make a difference and indeed achieve the goals of their presentations.
Top 5 T-SQL Improvements in SQL Server 2014Boris Hristov
SQL Server 2014 comes with dozens of improvements in various areas. In this presentation we will discuss and see how the new release can make the life of each and every developer easier and what are the top 5 T-SQL enhancements that we can use in our day-to-day work.
Database Transactions and SQL Server ConcurrencyBoris Hristov
The document discusses database transactions and transaction management. It begins with an overview of transactions, their properties (atomicity, consistency, isolation, durability known as ACID), and how they are implemented using locks in SQL Server. It then covers transaction isolation levels, locking concepts like lock types and escalation, and how to troubleshoot locking problems including deadlocks. The document provides examples of transactions in SQL Server and demonstrations of managing transactions and concurrency.
This document discusses database performance factors for developers. It covers topics like query execution plans, table indexes, table partitioning, and performance troubleshooting. The goal is to help developers understand how to optimize database performance. It provides examples and recommends analyzing execution plans, properly indexing tables, partitioning large tables, and using a structured approach to troubleshooting performance issues.
You want rules? You need Policy-Based Management!Boris Hristov
Have you ever wanted to check, audit or even enforce a specific option or configuration in your environment? What if I tell you that you can accomplish all of these and even report on the results with just a few clicks? Interested? In this session you will learn about the "hidden power" of Policy-Based Management, Centralised Management Server and EPM Framework and how they can help you keep your environment healthy and under control!
The Nightmare of Locking, Blocking and Isolation LevelsBoris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
This document provides an introduction to Microsoft SQL Server. It discusses why data is important for businesses, how SQL Server helps manage data, and an upcoming hands-on session to learn SQL Server 2014. The document outlines the history and components of SQL Server, editions available, how to install and connect to SQL Server instances, and introduces SQL Server Management Studio as the GUI tool. It concludes with a planned Q&A session.
Top 5 TSQL Improvements in SQL Server 2014Boris Hristov
SQL Server 2014 comes with dozens of improvements in various areas. In this presentation we will discuss and see how the new release can make the life of each and every developer easier and what are the top 5 T-SQL enhancements that we can use in our day-to-day work.
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Zilliz
Enterprises have traditionally prioritized data quantity, assuming more is better for AI performance. However, a new reality is setting in: high-quality data, not just volume, is the key. This shift exposes a critical gap – many organizations struggle to understand their existing data and lack effective curation strategies and tools. This talk dives into these data challenges and explores the methods of automating data curation.
"Making .NET Application Even Faster", Sergey Teplyakov.pptxFwdays
In this talk we're going to explore performance improvement lifecycle, starting with setting the performance goals, using profilers to figure out the bottle necks, making a fix and validating that the fix works by benchmarking it. The talk will be useful for novice and seasoned .NET developers and architects interested in making their application fast and understanding how things work under the hood.
Generative AI technology is a fascinating field that focuses on creating comp...Nohoax Kanont
Generative AI technology is a fascinating field that focuses on creating computer models capable of generating new, original content. It leverages the power of large language models, neural networks, and machine learning to produce content that can mimic human creativity. This technology has seen a surge in innovation and adoption since the introduction of ChatGPT in 2022, leading to significant productivity benefits across various industries. With its ability to generate text, images, video, and audio, generative AI is transforming how we interact with technology and the types of tasks that can be automated.
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc
In a landmark year marked by significant AI advancements, it’s vital to prioritize transparency, accountability, and respect for privacy rights with your AI innovation.
Learn how to navigate the shifting AI landscape with our innovative solution TRUSTe Responsible AI Certification, the first AI certification designed for data protection and privacy. Crafted by a team with 10,000+ privacy certifications issued, this framework integrated industry standards and laws for responsible AI governance.
This webinar will review:
- How compliance can play a role in the development and deployment of AI systems
- How to model trust and transparency across products and services
- How to save time and work smarter in understanding regulatory obligations, including AI
- How to operationalize and deploy AI governance best practices in your organization
Finetuning GenAI For Hacking and DefendingPriyanka Aash
Generative AI, particularly through the lens of large language models (LLMs), represents a transformative leap in artificial intelligence. With advancements that have fundamentally altered our approach to AI, understanding and leveraging these technologies is crucial for innovators and practitioners alike. This comprehensive exploration delves into the intricacies of GenAI, from its foundational principles and historical evolution to its practical applications in security and beyond.
"Hands-on development experience using wasm Blazor", Furdak Vladyslav.pptxFwdays
I will share my personal experience of full-time development on wasm Blazor
What difficulties our team faced: life hacks with Blazor app routing, whether it is necessary to write JavaScript, which technology stack and architectural patterns we chose
What conclusions we made and what mistakes we committed
Cracking AI Black Box - Strategies for Customer-centric Enterprise ExcellenceQuentin Reul
The democratization of Generative AI is ushering in a new era of innovation for enterprises. Discover how you can harness this powerful technology to deliver unparalleled customer value and securing a formidable competitive advantage in today's competitive market. In this session, you will learn how to:
- Identify high-impact customer needs with precision
- Harness the power of large language models to address specific customer needs effectively
- Implement AI responsibly to build trust and foster strong customer relationships
Whether you're at the early stages of your AI journey or looking to optimize existing initiatives, this session will provide you with actionable insights and strategies needed to leverage AI as a powerful catalyst for customer-driven enterprise success.
Demystifying Neural Networks And Building Cybersecurity ApplicationsPriyanka Aash
In today's rapidly evolving technological landscape, Artificial Neural Networks (ANNs) have emerged as a cornerstone of artificial intelligence, revolutionizing various fields including cybersecurity. Inspired by the intricacies of the human brain, ANNs have a rich history and a complex structure that enables them to learn and make decisions. This blog aims to unravel the mysteries of neural networks, explore their mathematical foundations, and demonstrate their practical applications, particularly in building robust malware detection systems using Convolutional Neural Networks (CNNs).
Choosing the Best Outlook OST to PST Converter: Key Features and Considerationswebbyacad software
When looking for a good software utility to convert Outlook OST files to PST format, it is important to find one that is easy to use and has useful features. WebbyAcad OST to PST Converter Tool is a great choice because it is simple to use for anyone, whether you are tech-savvy or not. It can smoothly change your files to PST while keeping all your data safe and secure. Plus, it can handle large amounts of data and convert multiple files at once, which can save you a lot of time. It even comes with 24*7 technical support assistance and a free trial, so you can try it out before making a decision. Whether you need to recover, move, or back up your data, Webbyacad OST to PST Converter is a reliable option that gives you all the support you need to manage your Outlook data effectively.
11. So what’s Distributed Replay?
SQL Server 2012 feature
Available in all editions (kind of…)
Works with 2005 and higher (kind of…)
12. Distributed Replay Components
1. Administration tool – the cmd tool to manage the replay
2. DReplay Controller – the brain behind the replay
3. DReplay Client – machines(up to 16) that replay the workload
4. Target Server – The SQL Server instance you replay against
15. Installation requirements and gotchas
1. Services must run under domain user accounts
2. Firewalls must allow the traffic of DR Components
3. DCOM permissions must be configured
4. SQL Server logins for the clients need to be created
22. Replay your workload. The steps.
1. Capture the workload with Profiler (TSQL-Replay)
2. Preprocess the trace with “dreplay preprocess”
3. Decide on a mode – synchronization or stress
4. Replay the workload with “dreplay replay”
5. Analyze the results
24. At the end
1. The Tool for replaying mission critical workloads
2. Don’t be afraid of not having a GUI
3. Capture -> Preprocess -> Replay
4. Document, blog, share it with the community!
25. Resources
My blog – FAQ and RunAs Radio Podcast
Channel 9 - Joe Sack(SQLSkills) Intro and Demo
Jonathan Kehayias(SQLSkills) Intro and Demo
Microsoft Peace of Mind Video
MSDN Documentation
Distributed Replay GUI (in beta)
… you and me now