Home
Videos uploaded by user “TheSkillPedia”
#15 SAP ASE 16 Learning-Overview of Automatic Recovery
 
28:18
SAP ASE 16 Learning Part 15 Overview of Automatic Recovery. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Session 15 Overview of Automatic Recovery Ram N Sangwan Tracking Database Changes SAP ASE uses transactions to keep track of all database changes. A transaction consists of one or more Transact-SQL statements that succeed—or fail—as a unit. Each SQL statement that modifies data is considered a transaction. Users can also define transactions by enclosing a series of statements within a begin transaction...end transaction block. Each database has its own transaction log, the system table syslogs. You cannot turn off transaction logging. Tracking Database Changes Contd Automatic Recovery The checkpoint Command Example Writes all dirty pages in the current database to the database device: checkpoint Setting the Recovery Interval Automatic Checkpoint Procedure To see the checkpoint task, execute sp_who. The checkpoint task usually appears as “CHECKPOINT SLEEP” in the “cmd” column. Truncating the Log After Automatic Checkpoints Fast Recovery SAP ASE Start-up Sequence Bringing Engines Back Online Engines are brought online after system databases are recovered, and before user databases, allowing user databases to be recovered in parallel, and makes the engines available for online activities. Engines are brought online in this fashion only during start-up. In all other circumstances, such as failover, engines are already online on the secondary server. Parallel Recovery Databases are recovered in parallel by multiple recovery tasks during start-up and failover. Database recovery is an I/O-intensive process. The time to recover SAP ASE with parallel recovery depends on the bandwidth of the underlying I/O subsystem. The I/O subsystem should be able to handle SAP ASE concurrent I/O requests. With parallel recovery, multiple tasks recover user databases concurrently. The number of recovery tasks is dependent on the configuration parameter max concurrently recovered db. The default value of 0 indicates that SAP ASE adopts a self-tuning approach. During parallel recovery, the system administrator can force serial recovery by setting max concurrently recovered db to 1 Database Recovery When recovery completes, the original configuration values are restored. Specifying the Recovery Order Specifying the Recovery Order Contd.. sp_dbrecovery_order pubs2, 2, force Changing or Deleting the Recovery Position sp_dbrecovery_order pubs2, -1 sp_dbrecovery_order pubs2, 1, "force" Listing the User-Assigned Recovery Order Parallel Checkpoints Recovery State Tuning for Fast Recovery Thank You
Views: 4232 TheSkillPedia
#1 Android App Development  for Beginners Overview of Android Development
 
15:58
This is android app development tutorial for beginners. Android App Development 1 Overview of Android Development. A Complete Android App Development Series Agenda of the Session: The Android operating system Android Operating System Architecture Android versions Android application Components of Configuration File Configuration via the manifest file Using Android devices for testing Using a real Android device for testing Using the Android emulator and Android Virtual Device To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 369 TheSkillPedia
MySQL DBA Training 1 MySQL Architecture
 
25:15
Session 1: MySQL Architecture. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. www.hometutor.net.in. To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc. http://youtube.com/user/theskillpedia General RDBMS Architecture • It has three main components: • Application Layer • Logical Layer • Physical Layer MySQL Architecture Overview APPLICATION LAYER • Users and clients interacts with the MySQL RDBMS. • Three components: ◦ Administrators ◦ Clients ◦ Query Users • Query users interact with MySQL RDBMS using “mysql”. MySQL Architecture Overview LOGICAL LAYER • The logical layer of MySQL architecture is divided into various subsystems. ◦ Query Processor. ◦ Transaction Management. ◦ Recovery Management. ◦ Storage Management. • These sub systems work together to process the requests issued to the MySQL database server. Physical Layer Physical Layer • Data files, which store the user data in the database • Data dictionary, which stores metadata about the structure of the database Physical Layer  Database directories. Each database corresponds to a single directory.  Table format files (.frm files) that contain a description of table structure.  The InnoDB storage engine has its own tablespace and log files.  The default tablespace file is named ibdata1 and the default log files are named ib_logfile0 and ib_logfile1.  Server log files and status files. Physical Layer  A storage engine has a particular set of operational characteristics.  When you create a table, you can choose what storage engine to use. MySQL’s Logical Architecture ◦ Embedded DML Pre-compiler. ◦ DDL Compiler. ◦ Query Parser. ◦ Query Preprocessor. ◦ Security/Integration Manager. ◦ Query Optimizer. ◦ Execution Engine. • The output of one of the above component becomes the input for another. • Query processor layer is scalable and evolvable. Transaction Management • It facilitates concurrent data access. • Provides locking facility. • Ensures multiple users/sessions access data simultaneously in a consistent way. • Prevents data corruption or data damage. • Lock Manager is the sub component name that handles locking. Recovery Management • Log Manager ◦ Logs every operation executed in the database. ◦ Stores the operations logs as MySQL Commands. • Recovery Manager ◦ Responsible for recovering the database to its last stable state. ◦ Uses the logs created by the log manager. Memory Management • Buffer Manager ◦ It allocated memory resources. • Resource Manager ◦ Accepts the requests from execution engine. ◦ Requests the details from buffer manager. ◦ It actually receives references of data with memory from buffer manager. ◦ Returns this data to the upper layer. MySQL Concepts: InnoDB  It supports row-level locking.  Foreign key referential-integrity constraint can be defined.  Table can extend to any size even beyond 2 GB and power loss recovery is fast.  The InnoDB stores user data in clustered indexes  This reduces I/O for common queries based on primary keys  InnoDB should be used for applications requiring the data integrity.  MyISAM is the improved version of the original storage engine of MySQL, ISAM  After MySQL 3.23, MyISAM replaced ISAM as the default storage engine.  It is also used for data warehousing  The size of MyISAM table depends on the host operating system  The foreign key constraint cannot be defined  MyISAM is the only storage engine that supports Full-text search  It also supports one auto increment column per table  A high-byte-first pattern for saving numeric key values ensures faster indexing  It can be used where fulltext indexing is needed Communication Protocols  A MySQL client program can connect to a server running on the same machine or another machine.  MySQL supports connections between clients and the server using several networking protocols.  Some protocols are applicable for connecting to either local or remote servers. Others can be used only for local servers. Visit www.rnsangwan.com
Views: 29239 TheSkillPedia
SQL Server 2012 – Server Roles
 
08:22
To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Sysadmin • This role can do anything within SQL Server. • This role completely bypasses all security checks. • This role can do everything any other role can do and more. • This is the most powerful role in SQL Server. Limit its access to only those who absolutely need it. ________________________________________ Bulkadmin • This role allows the import of data from external files. • Typically, this role isn't needed by normal users. • Even being a member of this role isn't enough. You also have to have INSERT rights on the table. • Members of the sysadmin role don't need to be a member of this role. Only use it when you have users or logins who need to do BULK INSERT operations who aren't already members of sysadmin. ________________________________________ DBcreator • This role allows creation of databases within SQL Server. • This is another role that should be rarely used. • It is an ideal role for a junior DBA to give him/her some control over SQL Server, but not the level of permission sysadmin grants. • Some applications will need to be a member of this role if they "roll over" databases as part of their operations. ________________________________________ Diskadmin • This role allows management of backup devices, which aren't used very much in SQL Server any more. • I have never seen this role used in practice because backup jobs are typically automated (or should be). ________________________________________ Processadmin • This is a powerful role because it can kill connections to SQL Server. • This is another role that should be rarely used. • Typically if connections are to be killed off, you want a fully trained DBA handling this, who are typically members of the sysadmin role. ________________________________________ SecurityAdmin • This role controls logins for SQL Server. • This role can grant access to databases within SQL Server. • This role, by itself, cannot define any further security within a database. • This is another good role for junior DBAs when sysadmin is too much. • Because it is a security related role, membership in it should be carefully restricted, especially in production. ________________________________________ Serveradmin • This role manages the SQL Server configuration. • Typically you want DBAs who are members of sysadmin handing configuration. • This is possibly a role you would hand to a junior DBA, but I wouldn't, especially on a production system. ________________________________________ Setupadmin • Setup admin basically gives control over linked servers. • Again, this is not a role I've seen used in practice. • I would limit this sort of configuration change to DBAs who understand the impact, meaning they are already members of the sysadmin role (meaning you don't need this role).
Views: 1295 TheSkillPedia
SQL Server 2008 R2 Database Mirroring Implementation
 
25:01
SQL Server 2008 R2-Database Mirroring. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 11038 TheSkillPedia
#1 SAP ASE 16 Learning-Introduction to SAP ASE Sybase ASE
 
31:34
SAP ASE 16 Learning Part 0 Introduction to SAP ASE Sybase ASE. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 12793 TheSkillPedia
MySQL DBA Training Replication-Master Slave Configuration in MySQL 5.6 on RHEL7
 
35:29
MySQL Replication on RHEL 7 Master Slave Configuration Configuring Master Slave in Mysql. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 9017 TheSkillPedia
#11 linux tutorial for beginners-The vi Editor Part-I
 
43:32
RHEL 6 linux tutorial for beginners 11 The vi Editor Part-I. This lecture is a recorded version of my online training class on Vi Editor in Linux Tutorial. The Lecture can also be used a vi editor in unix tutorial.To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. For Corporate Training Requirements Visit My Website www.rnsangwan.com. Slides Contents The vi Editor Ram N Sangwan Overview of vi and vim vi: the “visual editor”, standard Linux and Unix editor vim: the “vi improved” editor, standard Red Hat editor On Red Hat operating systems, the vi command invokes vim. Derived from earlier Unix editors ed  ex  vi  vim Starting vi and vim To start vim: vi filename If the file exists, the file is opened and the contents are displayed. If the file doesn’t exit, vi creates it when the edits are saved for the first time. To use vi instead: unalias vi Starting vi with different options vi -m myfile file is non-modifiable vi –R myfile file is only modifiable by using the exclamation point :w! vi –n myfile do not use a swap file for backup useful for floppies vi –r myfile recover data from a swap file after a crash vim –x myfile encrypt file when saving, decrypt when editing Three modes of vi and vim Command Mode Cursor movement Change, delete, yank, put, search Insert mode Type in new text Return to command mode with ESC ex mode Configuring, exiting, saving Search and replace Cursor Movement h left j down k up l right w word ahead b word back Arrow keys , , etc also work. A word is defined as a series of letters of the alphabet and numbers uninterrupted by white space or punctuation. If the cursor is on a punctuation character, the word is terminated by white space or a letter of the alphabet or number. Entering Insert Mode a append after the cursor. i insert before the cursor. o open a line below. A append to end of line. I insert at beginning of line. O Open a line above.
Views: 12182 TheSkillPedia
Perl Tutorials Session 1 Introduction to perl
 
20:16
Perl Scripting Learning Series. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Scripting language Major scripting languages Perl What is Perl? Why Perl? Why not Perl? Perl Basics Executing Perl scripts Perl Example 1 Running your program
Views: 2986 TheSkillPedia
How to choose a Career | Career guidance | Options after 12th
 
25:00
How to choose a Career | Career guidance | Options after 12th. Career Options 10+2 are so many that you really need to identify which one suites your personality. How to Identify your strengths? Identifying your Personality. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc,
Views: 18723 TheSkillPedia
SAP ASE 16 Sybase ASE Installation and Configuration Part 1
 
39:42
SAP ASE 16 Sybase ASE Installation and Configuration Part 1. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc. Sequence 1 . Prepare the Operating System 1. Disk Space : A full installation needs approx. 1.5 Gb so 4 Gb should give you enough room to handle upgrades too. In this case we install the software in /opt/sap. Database files will be stored /var/sap. Add a group "sybase" and a user "sybase" to the system. Also create the needed directories. useradd -d /opt/sap sybase passwd sybase mkdir -p /var/sap chown sybase:sybase /var/sap 2. Enable the operating system to allow more than the default value for shared memory. Add following line to /etc/sysctl.conf kernel.shmmax=4294967296 Now Issue the Command # sysctl -p 3. Install 32 bit libraries When installing Sybase ASE 64 bit version on Linux, you need to install the 32 bit shared libraries as well. This will prevent problems when running isql or bcp. yum -y install libX11.i686 libXtst.i686 gtk2.i686 glibc.i686 libgcc.i686 webkitgtk.i686 Save the Commands listed in Next Three Steps (4,5 and 6) in /etc/init.d/rc.local 4. Create Raw devices from the Partitions (Create Necessary Partitions before performing this) Sybase recommends to store all database files on raw devices except for temporary databases like tempdb. # raw /dev/raw/raw1 /dev/sdb1 # raw /dev/raw/raw2 /dev/sdb2 # raw /dev/raw/raw3 /dev/sdb3 # raw /dev/raw/raw5 /dev/sdb5 # raw /dev/raw/raw6 /dev/sdb6 5. Change permissions on the raw devices... # chmod 600 /dev/raw/raw1 # chmod 600 /dev/raw/raw2 # chmod 600 /dev/raw/raw3 # chmod 600 /dev/raw/raw5 # chmod 600 /dev/raw/raw6 6. Change ownership on the raw devices to sybase... # chown sybase:sybase /dev/raw/raw1 # chown sybase:sybase /dev/raw/raw2 # chown sybase:sybase /dev/raw/raw3 # chown sybase:sybase /dev/raw/raw5 # chown sybase:sybase /dev/raw/raw6 We shall be using /dev/raw/raw1 master (100 Mb) /dev/raw/raw2 sybsystemprocs (200M) /dev/raw/raw3 sybsystemdb (10M) /dev/raw/raw5 data01 (We shall use 100MB for testing. You can always add more) /dev/raw/raw6 log01(we shall use 25MB for testing. You can always add more). Sequence 2. Installation of the software 1. Switch to the newly created user: su - sybase You should now be in the directory /opt/sap. Make a work directory and put the downloaded Sybase software in it. # mkdir install # cd install # tar -xf ase160_linuxx86-64.tgz # exit 2. Logout from root and login as "sybase" to Start the installation # cd install ./setup.bin If Installation fails to start in GUI, this problem can occur for the following reasons: 1. The file /usr/lib/libstdc++.so.5.0.7 or later is not installed on the system. 2. The $DISPLAY environment variable is not properly set. 3. The necessary X Windows libraries for running the GUI installer are not available. The solutions below relate to the cause above: 1. Install libstdc++.so.5.0.7 or later. 2. See the AppScan Source Edition release notes, which are included in the docs directory of the installation files for information on installing this library. 3. Set your $DISPLAY environment variable to a valid display. Run the installation process with the system's default 64-bit JRE: ./setup.bin LAX_VM /usr/bin/java If after performing the steps above the issue still persist, this may be variation of the issue where the issue is the uninstaller is unable to open the display. To validate that issue is due to lack of access to the display, launch the installer without sudo. If the installer displays as the user this is an access issue to the display. If VNC was used to connect to the server, then the following command will need to be ran: xhost +oracle.example.com If physically present at the server or if ssh was used to connect to the server use the following command: sudo -E ./setup.bin 3. Complete the Installation Use /opt/sap as the destination directory, do a full installation. At the list of possible servers to configure, deselect all options. We will do a manual configuration. When the installation has finished successful you can safely remove the work directory and the installation package. 4. Setup the environment In /opt/sap you will find SYBASE.sh. Run this file: . /opt/sap/SYBASE.sh Check the value of $SYBASE: echo $SYBASE
Views: 23625 TheSkillPedia
SQL Server 2008 R2- Creating a SQL Server Authentication User
 
08:23
The Step by Step process to create a SQL Server Authentication User. The User is Created from the SQL Server Management Studio. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc,
Views: 91920 TheSkillPedia
Linked Server in SQL Server 2012 to Another SQL Server and Excel File
 
18:33
Creating a Linked Server in SQL Server 2012 to Another SQL Server and Excel File. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc. We can Create a Linked Server in SQL Server 2012 to Any other RDBMS provided we have the appropriate driver. In this video I have demonstrated Link Server creation in SQL Server 2012 to Another SQL Server and Link Server to an Excel File. Once Linked Server is created, you can issue queries in the same manner as if you are issuing them on a local table in a database. The Concept is similar to "Link Database" in Oracle.
Views: 31596 TheSkillPedia
MySQL Workbench 6.3 Remote Database Access and Export Import
 
15:22
MySQL Workbench 6 3 Remote Database Access and Export Import. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Topics Discussed : Allowing Remote Access for MysQL Server on WHM Panel. Enabling Remote Access of MySQL through firewall. Adding Remote Hosts to Cpanel for MySQL Server Database Access. Setting up Remote Connection in MySQL Workbench. Access Remote Database from MySQL Workbench Performing Export Import in MySQL WorkBench.
Views: 6022 TheSkillPedia
SQL Server 2008-Create Database-Add File and file Groups and Check Properties
 
14:18
SQL Server 2008-Create Database-Add File and file Groups and Check Properties. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 3360 TheSkillPedia
SAP ASE 16 Sybase ASE Installation and Configuration Part 2
 
47:45
SAP ASE 16 Sybase ASE Installation and Configuration Part 2. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Sequence 3. Create the ASE server We will create ASE1 and a backupserver called SYB_BACKUP. Configuration files and the errorlog are stored in the admin directory, database files are stored in /var/sap 1. Create the directories for these servers: cd ~ mkdir -p admin/ASE1 mkdir -p admin/SYB_BACKUP mkdir /var/sap/ASE1 When you choose to use raw device it's quite handy when you create symbolic links from /var/sap/ASE1 to those devices. : 2. Create Symbolic Links in the Data Directory (/var/sap/ASE1) for Devices Created Earlier ln -s /dev/raw/raw1 /var/sap/ASE1/master.dat ln -s /dev/raw/raw2 /var/sap/ASE1/sybsystemprocs.dat ln -s /dev/raw/raw3 /var/sap/ASE1/sybsystemdb.dat ln -s /dev/raw/raw4 /var/sap/ASE1/log01.dat 3. Go to the "/opt/sap/admin/ASE1" directory. Copy the Sybase supplied resource file, $SYBASE/$SYBASE_ASE/init/sample_resource_files/srvbuild.adaptive_server.rs to ASE1.rs # cd /opt/sap/admin/ASE1 # cp $SYBASE/$SYBASE_ASE/init/sample_resource_files/srvbuild.adaptive_server.rs ASE1.rs # vi ASE1.rs sybinit.release_directory: USE_DEFAULT sybinit.product: sqlsrv sqlsrv.server_name: ASE1 sqlsrv.sa_password: sybase sqlsrv.new_config: yes sqlsrv.do_add_server: yes sqlsrv.network_protocol_list: tcp sqlsrv.network_hostname_list: oracle.example.com sqlsrv.network_port_list: 4000 sqlsrv.application_type: MIXED sqlsrv.server_page_size: 4096 sqlsrv.force_buildmaster: no sqlsrv.master_device_physical_name: /var/sap/ASE1/master.dat sqlsrv.master_device_size: 100 sqlsrv.master_database_size: 60 sqlsrv.errorlog: /opt/sap/admin/ASE1/errorlog sqlsrv.do_upgrade: no sqlsrv.sybsystemprocs_device_physical_name: /var/sap/ASE1/sybsystemprocs.dat sqlsrv.sybsystemprocs_device_size: USE_DEFAULT sqlsrv.sybsystemprocs_database_size: USE_DEFAULT sqlsrv.sybsystemdb_device_physical_name: /var/sap/ASE1/sybsystemdb.dat sqlsrv.sybsystemdb_device_size: USE_DEFAULT sqlsrv.sybsystemdb_database_size: USE_DEFAULT sqlsrv.tempdb_device_physical_name: /var/sap/ASE1/tempdb.dat sqlsrv.tempdb_device_size: 100 sqlsrv.tempdb_database_size: 100 sqlsrv.default_backup_server: SYB_BACKUP #sqlsrv.addl_cmdline_parameters: PUT_ANY_ADDITIONAL_COMMAND_LINE_PARAMETERS_HERE sqlsrv.do_configure_pci: no sqlsrv.sybpcidb_device_physical_name: PUT_THE_PATH_OF_YOUR_SYBPCIDB_DATA_DEVICE_HERE sqlsrv.sybpcidb_device_size: USE_DEFAULT sqlsrv.sybpcidb_database_size: USE_DEFAULT # If sqlsrv.do_optimize_config is set to yes, both sqlsrv.avail_physical_memory and sqlsrv.avail_cpu_num need to be set. sqlsrv.do_optimize_config: yes sqlsrv.avail_physical_memory: 256 sqlsrv.avail_cpu_num: 1 4. Now build the server with the command: # srvbuildres -r ASE1.rs When the srvbuildres command fails with: Task failed Unable to boot server 'ASE1'. Server 'ASE1' was not created. Look at the last lines of the errorlog created by srvbuildres located at /opt/sap/admin/ASE1/errorlog The end of the errorlog file will most likely look something like this: kernel os_create_region: can't allocate 58456064 bytes kernel kbcreate: couldn't create kernel region. kernel kistartup: could not create shared memory When you spot the message "kistartup: could not create shared memory" it means that you did not configure your system to use more that 55 Mb of shared memory. Reconfigure that parameter and try again 5. After a successful creation you can connect to the server using the command line tool isql. The login “sa" has been created, with the password that was specified in ASE.rs file. At the prompt of isql you can type a command or execute a stored procedure. Type exit to exit. isql -Usa -Psybase -SASE1 sp_helpdb go exit
Views: 9639 TheSkillPedia
External Table in ORACLE Creating and Loading data from external tables
 
24:30
External Table in ORACLE Creating and Loading data from external tables. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Creating and Loading an External Table Using ORACLE_LOADER The steps in this demonstration show an example of using the ORACLE_LOADER access driver to create and load an external table. A traditional table named emp_list is defined along with an external table named emp_load. The external data is then loaded into an internal table. Step 1. Log in as oracle user and create a Directory to place the data file /u01/app/datafiles: $ mkdir –p /u01/app/datafiles Step 2 Create a file emp_data.dat file with some sample records in /u01/app/datafiles: 45 october, 25, 1968 Sangwan Ram N 09/01/1993 67 december, 25, 1971 Dahiya Sunil D 01/01/1994 Step 3. Execute the following SQL statements to set up a default directory. Notes about this example: • The employee_number field in the datafile is converted to a character string for the employee_number field in the external table. • The datafile contains an employee_dob field that is not loaded into any field in the table. • The substr function is used on the employee_middle_name column in the external table to generate the value for middle_initial in tableemp. • The character string for employee_hire_date in info.dat is automatically converted into a DATE datatype at external table access time, using the format mask specified in the external table definiition. • Unlike employee_hire_date, the DATE datatype conversion for employee_dob is done at SELECT time and is not part of the external table definition.
Views: 4313 TheSkillPedia
#3 JIRA Tutorial for beginner-jira scrum tutorial | SCRUM Project Part 1
 
17:34
Jira tutorial for beginners. Topics covered in the Session are Deleting a Jira Project, jira scrum tutorial, Creating a scrum project in jira, Creating a User Story and Epic, Creating a Backlog in jira, Creating a sprint in jira, starting a sprint in jira. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc. The Complete JIRA Training Course is Available at http://www.theskillpedia.com/ For the Course Contents Visit http://www.theskillpedia.com/jira-training/
Views: 34332 TheSkillPedia
Oracle 11G Using Flash bask Technology
 
05:19
Working Example of Flash back Technology in Oracle 11G. Remember to enable row movement on all tables for which you feel you may have to use flashback technology. Also before note down the System Change Number (SCN) or Point in Time. To Learn or Teach Oracle visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 1354 TheSkillPedia
Linux Tutaorial for Beginners Session 24 Creating Disk Partitions and Linux Filesystems
 
34:28
Linux Tutaorial for Beginners Session 24 Creating Disk Partitions in Linux and Making Linux Partitions. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 938 TheSkillPedia
#18 SAP ASE 16 Learning-Performing a Backup
 
21:18
SAP ASE 16 Part 18 Performing a Backup. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Session 18 : Performing Backup in Sybase ASE Ram N Sangwan Backup and Recovery Backup & Recovery Strategies dump Database Contd.. Failure conditions when these commands fail Compressed Backups Stripe on and Multiple Stripes Transactional Dumps Dump Tran with truncate only Transactional Dumps Dump tran with no log This option is used in order to clear the transactional log .when we use this option it will clear both inactive and active transaction's. It is not recommended by sybase to use this option multiple no of times because this may lead to corruption of the data . Transactional Dumps Load Database When ever we want to recover a database or we want to load the refresh production data onto the development or the UAT servers  We will use the Load db command  Minimum servers required for a setup Production server Pre-production server Development server UAT Database refresh Taking the latest dumps from production and loading it onto the development / UAT / Pre production is called db refresh . Precautions before loading the db  DUMPS & LOADS A database backup or DUMP is a physical backup of an entire database A transaction log backup or DUMP is a physical backup of a database transaction log Backup is needed Adaptive server automatic recovery procedures protect you from power outages and computer failures Other issues to be considered Media failures Machine Failures Site Failures Corrupted Data Application Error ** Automatic recovery fails due to corruption or internal inconsistency Additional recovery methods Database backup: both a database and its transaction log are backed up Transaction log backup: Transaction log is backed up without truncation even if the disk containing the data is inaccessible Backup Servers Dumps do not have backward compatibility
Views: 2097 TheSkillPedia
Perl Tutorials Session 7 Input Operations and File IO
 
25:58
Session 7 Input Operations and File IO. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. I/O Overview Opening and Closing Files Reading From Files Writing To Files Example File test operators. Operations with files. seek and tell functions. seek and tell examples. Reading Characters. Directory functions. File Attribute functions. File-Permission Functions
Views: 3359 TheSkillPedia
Installing Jira 7.8 on RHEL | Setting up JIRA on CentOS
 
17:30
Installing Jira on Linux Production Server. A Complete step by step procedure for Installing JIRA 7.8 on CentOS. The demo includes a setting up jira on centos. Jira on RHEL setup requires Java 1.8 and MySQL JDBC Connector. Therefore, I first downloaded mysql jdbc connector and then configured jira on linux. I was was not fully well while delivering this lecture. so I apologize for bad nose. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 1451 TheSkillPedia
Perl Tutorial Session 2- Variables in Perl
 
21:38
Variables in Perl. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Variables in Perl Scalars Scalars: Declaration Scalars: Numbers Usage of scalars List : one-dimensional array Data Types Numbers and Strings User Input Special Variables
Views: 1603 TheSkillPedia
RHEL 7 Apache Install | FTP Server Install on rhel 7 | install apache on rhel
 
33:13
Learn how to configure httpd or apache server and ftp or vsftp server on rhel 7. rhel 7 apache install install apache on rhel To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc,
Views: 1448 TheSkillPedia
Oracle 11G- Using Data Dictionary Views to Get Information on Database Objects
 
13:09
We can use Various Data Dictionary Views such as V$TABLESPACE, V$DATAFILE, DBA_ROLES, DBA_USERS DBA_PROFILES, DBA_DATA_FILES, DBA_TABLES, DBA_TABLESPACES etc to get the Information about Various Data Objects. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 3014 TheSkillPedia
MySQL DBA Training 7 Locking in MySQL
 
04:12
MySQL DBA Training Session 7 Locking in MySQL. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 1014 TheSkillPedia
#2 linux tutorial for beginners-Unix System Startup Process-I
 
41:40
linux tutorial for beginners 2 Unix System Startup Process-I. System Boot Sequence, Extracting Contents of Master Boot Record, Kernel, system Directories and Other Linux Concepts. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. For Corporate Training Requirements Visit My Website www.rnsangwan.com Slides Contents bootman GRUB LILO NTLDR XOSL BootX loadlin Gujin Boot Camp Syslinux GAG A program itself /vmlinuz or /boot/vmlinuz Two-stage loading process initrd (init RAM disk) A transient root filesystem in RAM before a real root filesystem is available Eg. It is used to install file system modules into the kernel The real root filesystem Device detection and configuration You tell the kernel what to expect The kernel probes the H/W itself Kernel threads creation Eg. init (a user process), kjournald, kswapd A manual mode after kernel initialization and before running startup scripts “single” is passed to init, sulogin is run instead Most system processes are not running Users can’t log in, except root / is mounted read-only $ mount -o rw,remount / Check/repair the disk if there are disk problems $ fsck -y /dev/sda1 Run ‘exit’ to exit single-user mode Booting is a bootstrapping process that starts operating systems when the user turns on a computer system A boot sequence is the set of operations the computer performs when it is switched on that load an operating system OS is booted from a hard disk, where the Master Boot Record (MBR) contains the primary boot loader The MBR is a 512-byte sector, located in the first sector on the disk (sector 1 of cylinder 0, head 0) After the MBR is loaded into RAM, the BIOS yields control to it.
Views: 3778 TheSkillPedia
Python Tutorial for Beginners 1 Overview of Python
 
27:36
Python Tutorial for Beginners Session 1 Python Overview. CBSE Syllabus Class XI Computer Science. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Class XI Python Session 1 – Python Overview Introduction to Python Python was conceived in the late 1980s and its implementation was started in 1989 by Guido van Rossum. Named After "Monty Python's Flying Circus", a British sketch comedy Series. Is a high-level, interpreted, interactive and object-oriented scripting language. Python was designed to be highly readable which uses English keywords frequently where as other languages use punctuation and it has fewer syntactical constructions than other languages. Highlights of Python Python is Interpreted: it is processed at runtime by the interpreter and you do not need to compile your program before executing it. Python is Interactive: you can actually sit at a Python prompt and interact with the interpreter directly to write your programs. Python is Object-Oriented: Python supports Object-Oriented style or technique of programming that encapsulates code within objects. Python is Beginner's Language: Python is a great language for the beginner programmers and supports the development of a wide range of applications from simple text processing to WWW browsers to games. History of Python Python was developed at the National Research Institute for Mathematics and Computer Science in the Netherlands. Python is derived from many other languages, including ABC, Modula-3, C, C++, Algol-68, SmallTalk, and Unix shell and other scripting languages. Python is copyrighted. Like Perl, Python source code is now available under the GNU General Public License (GPL). Python is now maintained by a core development team at the institute, although Guido van Rossum still holds a vital role in directing its progress Python Features Easy-to-learn: Python has relatively few keywords, simple structure, and a clearly defined syntax. This allows the student to pick up the language in a relatively short period of time. Easy-to-read: Python code is much more clearly defined and visible to the eyes. Easy-to-maintain: Python's success is that its source code is fairly easy-to-maintain. A broad standard library: One of Python's greatest strengths is the bulk of the library is very portable and cross-platform compatible on UNIX, Windows and Macintosh. Interactive Mode: Support for an interactive mode in which you can enter results from a terminal right to the language, allowing interactive testing and debugging of snippets of code. Python Features - Continued Portable: Python can run on a wide variety of hardware platforms and has the same interface on all platforms. Extendable: You can add low-level modules to the Python interpreter. These modules enable programmers to add to or customize their tools to be more efficient. Databases: Python provides interfaces to all major commercial databases. GUI Programming: Python supports GUI applications that can be created and ported to many system calls, libraries and windows systems, such as Windows MFC, Macintosh and the X Window system of Unix. Scalable: Python provides a better structure and support for large programs than shell scripting. Python - Advanced Features Support for functional and structured programming methods as well as OOP. It can be used as a scripting language or can be compiled to byte-code for building large applications. Very high-level dynamic data types and supports dynamic type checking. Supports automatic garbage collection. It can be easily integrated with C, C++, COM, ActiveX, CORBA and Java. Than You For More Tutorials Subscribe to this Channel For Free Online Learning Visit www.hometutor.net.in For Corporate Training Requirements anywhere in the world, Mail me at [email protected] or Call me at +91 9312406920
Views: 4728 TheSkillPedia
#15 Business Analyst Training for Beginners-BRD – Business Requirement Document
 
33:19
Business Analyst Training for Beginners Understanding requirements analysis The Business Requirements Document The BRD vs. the functional requirements specification BRD components The purpose of packaging requirements To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 6385 TheSkillPedia
#14 Business Analyst Training for Beginners-Use Case and Use Case Narratives
 
29:23
Business Analyst Training for Beginners What are Use Case and Use Case Narratives? Relationship between Use Cases How to write Use Cases? Use Case Narrative Flows Primary Flow Alternative Flow Exceptional Flow To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 1753 TheSkillPedia
Perl Tutorials Session 8 Regular Expressions in perl
 
19:39
Session 8 Regular Expressions in perl. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Regular Expression RE special characters RE examples Square brackets More examples More special characters Quoting special characters Alternatives and parentheses Case-insensitive substitutions Regular Expressions Example
Views: 3450 TheSkillPedia
SQL Server 2012 Replication  Snapshot Replication Configuration
 
47:53
Concepts of Replication in SQL Server 2012 and Configuration of Snapshot replication in SQL Server 2012. Features of SQL Server 2012 Replication Updatable subscriptions with transactional publications are discontinued. Four new stored procedures provide replication support for AlwaysOn. sp_get_redirected_publisher sp_redirect_publisher sp_validate_replica_hosts_as_publishers sp_validate_redirected_publisher Replication supports the following features on Availability groups: A publication database can be part of an availability group. The publisher instances must share a common distributor. In an AlwaysOn Availability Group, an AlwaysOn secondary cannot be a publisher. Republishing is not supported when replication is combined with AlwaysOn. Heterogeneous replication to non-SQL Server subscribers is deprecated. To move data, create solutions using change data capture and SSIS. Oracle Publishing is deprecated. SQL Server replication is based on the concept of “Publish and Subscribe”. Publisher It is a source database where replication starts. It makes data available for replication. Publishers define what they publish through a publication. Article Articles are the actual database objects like tables, views, indexes, etc. An article can be filtered when sent to the subscriber. Publication A group of articles is called publication. An article can’t be distributed individually. Hence publication is required. Distributor It is intermediary between publisher and subscriber. It receives published transactions or snapshots and then stores and forwards these publications to the subscriber. It has 6 system databases including distribution. Subscriber It is the destination database where replication ends. It can subscribe to multiple publications from multiple publishers. It can send data back to publisher or publish data to other subscribers. Subscription It is a request by a subscriber to receive a publication. We have two types of subscriptions - push and pull. Push Subscriptions With this subscription, the publisher is responsible for updating all the changes to the subscriber without the subscriber asking those changes. Push subscriptions are created at the Publisher server Pull Subscriptions - With this subscription the subscriber initiates the replication instead of the publisher. The subscriptions are created at the Subscriber server. Replication process works in the background with the help of jobs. These jobs are also called as agents. These jobs internally uses respective .exe files present in  \110\COM folder. All the agents information is present in Distribution db in the following tables. dbo.MSxxx_agents dbo.MSxxx_history Snapshot Agent It is an executable file that prepares snapshot files containing schema and data of published tables and db objects. It stores the files in the snapshot folder, and records synchronization jobs in the distribution database. Distribution Agent It is used with snapshot and transactional replication. It applies the initial snapshot to the Subscriber and moves transactions held in the Distribution db to Subscribers. It runs at either the Distributor for push subscriptions or at the Subscriber for pull subscriptions. Log Reader Agent It is used with transactional replication, which moves transactions marked for replication from the transaction log on the publisher to the distribution db. Each db has its own Log Reader Agent that runs on the Distributor and connects to the Publisher. Merge Agent Snapshot Replication Transactional Replication Merge Replication The snapshot process is commonly used to provide the initial set of data and database objects for transactional and merge publications. It copies and distributes data and database objects exactly as they appear at the current moment of time. Snapshot replication is used to provide the initial data set for transactional and merge replication. It can also be used when complete refreshes of data are appropriate. Scenarios When the data is not changing frequently. If we want to replicate small amount of data. To replicate Look-up tables which are not changing frequently. It is acceptable to have copies of data that are out of date with respect to the publisher for a period of time For example, if a sales organization maintains a product price list and the prices are all updated at the same time once or twice each year, replicating the entire snapshot of data after it has changed is recommended To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 11376 TheSkillPedia
#13 linux tutorial for beginners-Unix Shell Scripting-Introduction Part-I
 
01:01:47
Linux Shell Programming Tutorial for Beginners. Unix Shell Part 1. Programming tutorail is recorded lecture from my online class RHEL 6 Session 9 Bash Shell Scripting Part 1 Introduction to Shell Scripting. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. For Corporate Training Requirements Visit My Website www.rnsangwan.com Slides Contents Bash Shell Scripting R N Sangwan Scripting Basics Shell scripts are text files that contains a series of commands or statements to be executed. Shell scripts are useful for: Automating commonly used commands. Performing system administration and troubleshooting Creating simple applications Manipulations of text or files. Application prototyping Creating Shell Scripts Step 1: Use a text editor such as vi to create a text file containing commnds. First line contains the magic “shbang” sequence : #! #!/bin/bash Comment your scripts Comments start with a # Create shell script which is self documenting. If you enter this by pressing \ key followed by the Enter key on the most keyboards. This will enable you to enter one command that spans multiple lines. Creating Shell Scripts cont. Step 2: Make the script executable $ chmod a+x myscript.sh To execute the new script: Place the script file in a directory in the executable path –OR- Specify the absolute path or relative path to the script on the command line. Generating Output Use echo to generate simple output $ echo ‘Welcome to Redhat Linux paradise!’ $ echo –n “please enter the file name: “ Use printf to generate formatted output. $ printf “the result is %0.2f\n” $RESULT Syntax similar to C printf function Does not automatically put a newline at the end of the output. Handling Input Use read to assign an input value to a shell variable: echo –n “Enter the filename: “ read FILENAME read reads from standard input and assigns one word to each variable. Any leftover words are assigned to the last variable. A word is defined as a character string surrounding with white space such as spaces and tabs. Can be changed by IFS. IFS=‘:’ If there are more words than variables, the last variable is assigned all the remaining words. bash scripts example #!/bin/bash echo –n ‘Enter name First Last:’ read FIRST LAST printf “Your First name is %s and your last name is %s \n” \ $FIRST $LAST The -p option is used to display a prompt string. Place quotes around the string if you need to prompt the user with a multiple-word command #!/bin/bash read –p “Enter Several Values:” value1 value2 value3 echo “value 1 is $value1” echo “value 2 is $value2” echo “value 3 is $value3” Exit Status Commands exit with an exit status 0 for success, 1 to 255 for failure Exit status of most recently executed command is kept in the $? Variable just like return values form shell functions. Shell scripts may set an exit status with the exit command. exit 1 # indicated an error To know about me visit my profile at www.rnsangwan.com. I deliver online training on Business Analysis, Linux, Unix, MySQL, Sybase, SQL Server, Perl, Python, R Data Analysis, Scala etc.
Views: 38383 TheSkillPedia
#19 linux tutorial for beginners-Static IP Address and Networking in RHEL 7
 
13:24
linux tutorial for beginners 19 Static IP Address and Networking in RHEL 7. RHEL 7 ConfiguringStatic IP Address and Networking. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. For Corporate Training Requirements Visit My Website www.rnsangwan.com
Views: 11887 TheSkillPedia
Cluster Configuration in RHEL 6.5 Part 2 using GUI Tool Conga
 
44:55
Introduction to concepts of Cluster with Live Demo. Preparing for Cluster. Firewall Configuration. Network Configuration and Installation of Pre-requisite Packages
Views: 4371 TheSkillPedia
RDBMS Concepts Session 2 Normalization   A Practical Approach
 
23:04
RDBMS Concepts Session 2 Normalization A Practical Approach. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. RDBMS Concepts:Session 2 - Normalization A Practical Approach –By Ram N Sangwan Normalization Normalization -Contd.. Introduction In this exercise we are looking at the optimisation of data structure. The example system we are going to use as a model is a database to keep track of employees of an organisation working on different projects. Objectives By the end of the exercise you should be able to: Show understanding of why we normalize data Give formal definitions of 1NF, 2NF & 3NF Apply the process of normalization to your own project The Scenario Why Normalization? Why Normalization? Contd.. Why Normalization? Contd.. Why Normalization? Contd.. Normalization Process Normalization Process Contd.. Normalization Process Contd.. Normalization Process Contd.. Normalization Process Contd.. Normalization Process Contd.. Normalization Process Contd.. Normalization Process Contd.. Normalization Process Contd.. Normalization Process Contd.. 1st Normal Form 2nd Normal Form 2nd Normal Form-Contd.. 3rd Normal Form 3rd Normal Form Contd.. Thank You Visit www.theskillpedia.com to teach or learn a skill For Any corporate Training Need, Call me at +91-9312406920
Views: 3227 TheSkillPedia
Python Tutorial for Beginners 6 Decision Making
 
20:37
Python Tutorial for Beginners Session 6 Decision Making in Python. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Class XI Python Session 6 – Decision Making in Python Decision Making Structures We can take a decision if we have some condition as input with one or more alternative. For example I shall go for a walk if the weather is good. Decision making structures require that the programmer specify one or more conditions to be evaluated or tested by the program, along with a statement or statements to be executed if the condition is determined to be true/ Optionally, other statements to be executed if the condition is determined to be false. Decision Making Structure General form of a typical decision making structure is: Decision Making Structures - Conditions Python assumes any non-zero and non-null values as true, and if it is either zero or null, then it is assumed as false value. Python provides following decision making statements. if statements The if statement contains a logical expression using which data is compared and a decision is made based on the result of the comparison. If the boolean expression evaluates to true, then the block of statement(s) inside the if statement will be executed. If boolean expression evaluates to false, then the first set of code after the end of the if statement(s) will be executed. if statements Flow Diagram if statements Example if...else statements An else statement can be combined with an if statement. An else statement contains the block of code that executes if the conditional expression resolves to 0 or a false value. The else statement is an optional statement and there could be at most only one else statement following if. if...else statements Flow Diagram if...else statements Example The elif Statement The elif statement allows you to check multiple expressions for truth value and execute a block of code as soon as one of the conditions evaluates to true. The elif statement is optional. There can be an arbitrary number of elif statements following an if. The syntax of the if...elif statement is: The elif Statement Core Python does not provide switch or case statements as in other languages, but we can use if..elif...statements to simulate switch case. The elif Statement Example Python nested IF statements In a nested if construct, you can have an if...elif...else construct inside another if...elif...else construct. Syntax: Python nested IF statements Example Single Statement Suites If the suite of an if clause consists only of a single line, it may go on the same line as the header statement. For Example : For More Tutorials Subscribe to this Channel For Free Online Learning Visit www.hometutor.net.in For Corporate Training Requirements anywhere in the world, Mail me at [email protected] or Call me at +91 9312406920
Views: 1997 TheSkillPedia
#10 linux tutorial for beginners-Job Scheduling using at and cron
 
31:54
RHEL 6 linux tutorial for beginners 10 Job Scheduling using at and cron. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. For Corporate Training Requirements Visit My Website www.rnsangwan.com Slides Contents Scheduling a Process to Execute Later Syntax: $ at time commands $ atq user $ atrm user|atJobID Commands will be executed at the time indicated Non-redirected output is mailed to the user. $ at 8:00pm December 7 $ at 7 am Thursday $ at now + 5 minutes Scheduling Periodic Processes The cron mechanism allows processes to be invoked periodically User need not to be logged on Cron jobs are listed in a crontab file The cron mechanism is controlled by a daemon called crond. This daemon wakes up every minute or so and determines if any entry user’s cron tables need to be executed. If the time passed for an entry to be started, it is started. A cron job can be scheduled as often as once a minute or as infrequently as once a year. Thank You Visit www.hometutor.net.in
Views: 13810 TheSkillPedia
SQL Server 2008 R2- Creating a Windows Authentication User
 
10:57
A Step by Step Process to Create a user to use Windows Authentication for SQL Server 2008. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 13893 TheSkillPedia
MySQL DBA Training 3 Installation and Basic Hardening on RHEL
 
26:09
MySQL Tutorial for Beginners Installation and Basic Hardening on RHEL 6.3 and RHEL 7. To Learn or Teach Linux or any skill, visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 7573 TheSkillPedia
Perl Tutorials Session 3 Arrays and Hashes in perl
 
30:32
Arrays and Hashes in Perl. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 1401 TheSkillPedia
Sybase ASE 16.0 Custom Installation Step By Step
 
36:37
SAP ASE 16 Custome Installation. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Lab 1 : Installation of SAP ASE Sequence 1 . Prepare the Operating System 1. Add a group "sybase" and a user "sybase" to the system. Also create the needed directories. useradd -d /opt/sap sybase passwd sybase mkdir -p /var/sap chown sybase:sybase /var/sap 2. Enable the operating system to allow more than the default value for shared memory. Add following line to /etc/sysctl.conf kernel.shmmax=4294967296 Now Issue the Command # sysctl -p 3. Install 32 bit libraries yum -y install libX11.i686 libXtst.i686 gtk2.i686 glibc.i686 libgcc.i686 webkitgtk.i686 Save the Commands listed in Next Three Steps (4,5 and 6) in /etc/init.d/rc.local 4. Create Raw devices from the Partitions (Create Necessary Partitions before performing this) Sybase recommends to store all database files on raw devices except for temporary databases like tempdb. # raw /dev/raw/raw1 /dev/sdb1 5. Change permissions on the raw devices... # chmod 600 /dev/raw/raw1 6. Change ownership on the raw devices to sybase... # chown sybase:sybase /dev/raw/raw1 Sequence 2. Installation of the software 1. Switch to the newly created user: su - sybase You should now be in the directory /opt/sap. Make a work directory and put the downloaded Sybase software in it. # mkdir install # cd install # tar -xf ase160_linuxx86-64.tgz # exit 2. Logout from root and login as "sybase" to Start the installation # cd install ./setup.bin 3. Complete the Installation 4. Setup the environment In /opt/sap you will find SYBASE.sh. Run this file: . /opt/sap/SYBASE.sh Check the value of $SYBASE: echo $SYBASE Sequence 3. Create the ASE server We will create ASE1 and a backupserver called SYB_BACKUP. Configuration files and the errorlog are stored in the admin directory, database files are stored in /var/sap 1. Create the directories for these servers: cd ~ mkdir -p admin/ASE1 mkdir -p admin/SYB_BACKUP mkdir /var/sap/ASE1 When you choose to use raw device it's quite handy when you create symbolic links from /var/sap/ASE1 to those devices. : 2. Create Symbolic Links in the Data Directory (/var/sap/ASE1) for Devices Created Earlier ln -s /dev/raw/raw1 /var/sap/ASE1/master.dat 3. Go to the "/opt/sap/admin/ASE1" directory. Copy the Sybase supplied resource file, $SYBASE/$SYBASE_ASE/init/sample_resource_files/srvbuild.adaptive_server.rs to ASE1.rs # cd /opt/sap/admin/ASE1 # cp $SYBASE/$SYBASE_ASE/init/sample_resource_files/srvbuild.adaptive_server.rs ASE1.rs # vi ASE1.rs sybinit.release_directory: USE_DEFAULT sybinit.product: sqlsrv sqlsrv.server_name: ASE1 sqlsrv.sa_password: sybase sqlsrv.new_config: yes sqlsrv.do_add_server: yes sqlsrv.network_protocol_list: tcp sqlsrv.network_hostname_list: oracle.example.com sqlsrv.network_port_list: 4000 sqlsrv.application_type: MIXED sqlsrv.server_page_size: 4096 sqlsrv.force_buildmaster: no sqlsrv.master_device_physical_name: /var/sap/ASE1/master.dat sqlsrv.master_device_size: 100 sqlsrv.master_database_size: 60 sqlsrv.errorlog: /opt/sap/admin/ASE1/errorlog sqlsrv.do_upgrade: no sqlsrv.sybsystemprocs_device_physical_name: /var/sap/ASE1/sybsystemprocs.dat sqlsrv.sybsystemprocs_device_size: USE_DEFAULT sqlsrv.sybsystemprocs_database_size: USE_DEFAULT sqlsrv.sybsystemdb_device_physical_name: /var/sap/ASE1/sybsystemdb.dat sqlsrv.sybsystemdb_device_size: USE_DEFAULT sqlsrv.sybsystemdb_database_size: USE_DEFAULT sqlsrv.tempdb_device_physical_name: /var/sap/ASE1/tempdb.dat sqlsrv.tempdb_device_size: 100 sqlsrv.tempdb_database_size: 100 sqlsrv.default_backup_server: SYB_BACKUP #sqlsrv.addl_cmdline_parameters: PUT_ANY_ADDITIONAL_COMMAND_LINE_PARAMETERS_HERE sqlsrv.do_configure_pci: no sqlsrv.sybpcidb_device_physical_name: PUT_THE_PATH_OF_YOUR_SYBPCIDB_DATA_DEVICE_HERE sqlsrv.sybpcidb_device_size: USE_DEFAULT sqlsrv.sybpcidb_database_size: USE_DEFAULT # If sqlsrv.do_optimize_config is set to yes, both sqlsrv.avail_physical_memory and sqlsrv.avail_cpu_num need to be set. sqlsrv.do_optimize_config: yes sqlsrv.avail_physical_memory: 256 sqlsrv.avail_cpu_num: 1
Views: 4831 TheSkillPedia
SuSE Linux Server Configuration Part 1 Configuring NFS Server
 
08:15
SuSE Linux Server Configuration Part 1 Configuring NFS Server. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers.
Views: 1143 TheSkillPedia
MySQL DBA Training 2 New Features in MySQL 5.6 and 5.7 Part-I
 
30:13
MySQL DBA Training Session 2 New Features in MySQL 5 6 and 5 7. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Agenda of this lecture is: GTID Replication Multi threated slave Crash- safe slave configuration Delay replication Multi source replication No-SQL with MYSQL
Views: 2661 TheSkillPedia
Perl Tutorials Session 4 Quoting and Interpolation in Perl
 
11:01
Quoting and Interpolation in Perl. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Strings Variable Interpolation Character Interpolation Single Quoted Strings Double Quoted Strings. q and qq Example
Views: 549 TheSkillPedia
Jira Tutorial-2 Jira Introduction, Jira Installation on Windows | Jira Installation on Linux
 
23:42
The Atlassian JIRA Tutorial Part 2 is Introduction to Jira Software. I will demonstrate Installation of Agile Jira on Windows and CentOS 7. By the End of this session you should be able to understand What is JIRA, Jira features, JIRA Components, Download Jira, Install Jira on Windows, Install Jira on Linux, Install Jira on CentOS 7, Jira Scrum Projects, Jira Themes, Jira Initiatives, Jira Epics Jira Issues, Jira Workflow. For the Full Training on JIRA Software Please Visit www.theskillpedia.com. If you are an Instructor, You can teach online and earn 85 % of the your Course Fee.
Views: 556 TheSkillPedia
#14 linux tutorial for beginners-Unix Shell Scripting-Conditional Logic Part-II
 
39:33
Linux Shell Programming Tutorial for Beginners. Unix Shell Programming tutorail is recorded lecture from my online class Part 2. Linux tutorial for beginners 14 Unix Shell Scripting-Conditional Logic Part-II . To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. For Corporate Training Requirements Visit My Website www.rnsangwan.com More on File Tests -d FILE True if file is a directory -e FILE True if file exists. -f FILE True if file exits and is a regular file -h FILE True if file is a symbolic link. -L FILE True if file is a symbolic link. -r FILE True if the file is readable by you. -s FILE True if file exists and is not empty. -w FILE True if the file is writable to you. -x FILE True if the file is executable by you. -O FILE True if the file is effectively owned by you. -G FILE True if the file is effectively owned by your group. Type ‘help test’ at the shell to see a complete list. String Tests Strings may be tested as well -z returns true if the string is empty -n returns true if the string is not empty. Operators such as =, !=, and may be used to compare strings as well. if id –u =“0”; then echo “You are logged in as root” fi More on String Tests -z STRING True if string is empty. -n STRING True if string is not empty. STRING1=STRING2 True if the strings are equal. STRING1!=STRING2 True if the strings are not equal. STRING1STRING2 True if STRING1 sorts before STRING2 lexicographically. STRING1STRING2 True if STRING1 sorts after STRING2 lexicographically. -o OPTION True if the shell option OPTIOIN is enabled. ! EXPR True if EXPR is false. EXPR1 –a EXPR2 True if both EXPR1 AND EXPR2 is true. EXPR1 –o EXPR2 True if either EXPR1 OR EXPR2 is true. ARG1 OP ARG2 Arithmetic tests. OP is one of the –eq, -ne, -lt, -le, -gt, or –ge. Selection Structures: Using if/else Statements if/else selection structures execute the body of the if structure only if the condition tested is true, otherwise the else is executed. if condition ; then Do something else Do something else fi Selection Structures: Using the case Statement The case statement provides an alternative method for performing selections that may be cleaner than multiple if/elif/else tests. case variable in pattern1 do something ;; pattern2 do another thing ;; esac
Views: 3641 TheSkillPedia
Jira Tutorial 1   Introduction to Agile Scrum for Atlassian JIRA
 
20:21
The Atlassian JIRA Tutorial Part 1 is an Introduction the Agile SCRUM Software Development Methodology. By the End of this session you should be able to understand Agile SCRUM, Principles Of Scrum, SCRUM Rules, The Ceremonies of scrum, Sprint Planning, Daily Scrum meetings, SPRINT Retrospective and Review, The Scrum Board, SCRUM Team, SCRUM, SPRINT Cycle, The SPRINT Backlog contents, Impediment log, The SPRINT Burn Down and Benefits of SCRUM. For the Full Training on JIRA Software Please Visit www.theskillpedia.com. If you are an Instructor, You can teach online and earn 85 % of the your Course Fee.
Views: 2579 TheSkillPedia
MySQL DBA Training 5 Storage Engines in MySQL
 
39:05
MySQL DBA training Session 5 Storage Engines in MySQL. To Learn or Teach Linux visit www.theskillpedia.com, A Marketplace for Learners and Trainers. Session 5 : Storage Engines Ram N Sangwan www.hometutor.net.in http://youtube.com/user/theskillpedia MySQL Storage Engines A storage engine can be though of as a File System in an Operating System. Storage engines differ in the way that they use locking to manage query contention, or whether the tables that they provide are transactional or non-transactional. These engine properties have implications for query processing performance, concurrency, and deadlock prevention. When you create a table, you can choose what storage engine to use. Specify a storage engine.. Explicitly in a CREATE TABLE statement, use an ENGINE option: Without using an ENGINE option, the default engine given by storage_engine system variable will be used. To determine which storage engine is used for a given table, you can use the SHOW CREATE TABLE or the SHOW TABLE STATUS statement: In most respects the way that you use the table after creating it, is engine independent. Storage Engine Pre-requisits • It must be compiled into the server and enabled. Each storage engine is a software module that is compiled into the server. • The use of this modular approach allows storage engines to be easily selected for inclusion in the server at configuration time. • Some storage engines are always available, such as InnoDB, MyISAM, MERGE, and MEMORY. • Support for optional engines typically can be selected when MySQL is configured and built. • To reduce memory use, don't configure unneeded storage engines into the server. • To see what storage engines: SHOW ENGINES\G MyISAM Storage Engine • MyISAM is the improved version of the original storage engine of MySQL, ISAM • After MySQL 3.23, MyISAM replaced ISAM as the default storage engine. MyISAM Storage Engine Contd.. • MyISAM table allows table level locking only. • There are no limitations on data file transfer and the data files can be ported from system to system • The foreign key constraint cannot be defined • MyISAM is the only storage engine that supports Full-text search • It also supports one auto increment column per table • A high-byte-first pattern for saving numeric key values ensures faster indexing • It can be used where fulltext indexing is needed • On disk, MySQL represents each MyISAM table using three files: a format file that stores the definition of the table structure, a data file that stores the contents of table rows, and an index file that stores any indexes on the table. Files for a table named mytable are called mytable.frm, mytable.MYD, and mytable.MYI. • MyISAM tables can be used to set up MERGE tables. • MyISAM tables can be converted into fast, compressed, read-only tables to save space. • Query performance is very fast for retrievals. • Multiple queries can read the same table simultaneously. • You can influence the scheduling mechanism for queries that use MyISAM tables by using LOW_PRIORITY/HIGH_PRIORITY Query Modifier. The MERGE Engine The MERGE storage engine manages tables that have the following characteristics: A MERGE table is a collection of identically structured MyISAM tables. Each MERGE table is represented on disk by an .frm format file and an .MRG file that lists the names of the constituent MyISAM files. Logically, a query on a MERGE table acts as a query on all the MyISAM tables of which it consists. A MERGE table creates a logical entity that can exceed the maximum MyISAM table size. MySQL manages contention between queries for MERGE table access using table-level locking. Other Storage Engines The BDB storage engine provides transactional tables. Each BDB table is represented on disk by an .frm format file and a .db file that stores data and index information. BDB supports transactions with full ACID compliance. The BDB engine provides auto-recovery after a crash of the MySQL server or the host where the server runs. BDB uses page-level locking. It's possible for deadlock to occur. The ARCHIVE storage engine provides an efficient way to store large amounts of data when you don't need indexes and need to minimize the amount of disk space used. This engine supports only SELECT and INSERT operations. SELECT scans the entire table, and INSERT performs compressed inserts. Each ARCHIVE table is represented on disk by an .frm format file, an .ARZ data file, and an .ARM metadata file. The CSV storage engine stores records as text in the well-known comma-separated values format. It does not support indexing. Each CSV table is represented on disk by an .frm format file and a .CSV plain text file that contains data rows. The BLACKHOLE storage engine creates tables that act as "black holes." That is, what goes in does not come out. Thank You
Views: 7986 TheSkillPedia