Business Linux Operating Systems

Linux

Linux

Unix and Linux are different operating systems with have some common commands. Source code for Linux is freely available to the public and Unix is not available. Linux operating system is a free/open source and Some versions of Unix are proprietary and others are a free/open source. Linux Operating system can be used for desktop systems and for servers. But the Unix is mainly used in servers, mainframes and high-end computers.

AIX is an operating system based on Unix versions from IBM. It is mainly designed for IBM’s workstations and for the server hardware platforms. And HP-UX is the operating system from HP ( Hewlett Packard ) based on Unix versions.  HP-UX and AIX are stable operating system compare with Linux. HP-UX and AIX are platform dependent and they are limited to their own hardware. But in the case of Linux, it is platform independent and can be used with any hardware. Since HP-UX and AIX are platform dependent, they are optimised for the hardware and the performance is better than Linux operating systems.  AIX is outperforming Linux from 5 to 10 percent.

Unix

AT&T Unix, started in the 1970s at the Bell Labs and newer versions of Unix have developed and some of them are listed below. In 1980, AT&T licensed Unix to third-party vendors and leading to the development of different variants. Some of them are;

  • Berkeley Unix, FreeBSD and its variants
  • Solaris from Sun Microsystem
  • HP-UX from Hewlett-Packard
  • AIX from IBM
  • MacOs from Apple
  • Microsoft’s Xenix

Unix installations are costlier since it requires some special hardware. MacOS needs apple computers, AIX needs IBM hardware and HP-UX needs HP hardware etc.

Linux

Linux is a free and open source operating system based on Unix. Linux kernel was first developed by Linus Torvalds in 1991. Linux was originally developed for personal computers but nowadays it is using personal computers as well as in server systems. Since it is very flexible, it can be installed in any hardware systems. Linux operating system is available for mobile phones, tablets, video game consoles, mainframes and supercomputers. Some of the best distros for small business are;

  • Centos
  • ClearOS
  • OpenSUSE
  • IPFire
  • Ubuntu
  • Manjaro
  • Slackware

Linux Vs Unix

Linux Unix
The Source Code of Linux is freely available to its Users. The Source Code of Unix is not available for the general public.
Linux primarily uses Graphical User Interface with an optional Command Line Interface. Unix primarily uses Command Line Interface.
Linux OS is portable and can be executed in different Hard Drives. Unix is not portable.
Linux is very flexible and can be installed on most of the Home Based Pcs. Unix has a rigid requirement of the Hardware. Hence, cannot be installed on every other machine.
Linux is mainly used in Home Based PC, Mobile Phones, Desktops, etc. Unix is mainly used in Server Systems, Mainframes and High-End Computers.
Different Versions of Linux are: Ubuntu, Debian, OpenSuse, Redhat, Solaris, etc. Different Versions of Unix are: AIS, HP-UX, BSD, Iris, etc.
Linux Installation is economical and doesn’t require much specific and high-end hardware. Unix Installation is comparatively costlier as it requires more specific hardware circuitry.
The Filesystems supported by Linux are as follows: xfs, ramfs, nfs, vfat, cramfsm ext3, ext4, ext2, ext1, ufs, autofs, devpts, ntfs The Filesystems supported by Unix are as follows: zfs, js, hfx, gps, xfs, vxfs.
Linux is developed by an active Linux Community worldwide. Unix is developed by AT&T Developers.

Hardware architecture

Most commercial versions of UNIX distributions are coded for specific hardware. Like HP-UX for PA-RISC (Hewlett-Packard) and Itanium machines (Intel) and AIX is for Power processors ( IBM ). Since these distributions are limited, the developers can optimise their code for these architectures to get maximum utilisation of resources.  Since it uses proprietary hardware, Unix distributions are not cost effective.

  • HP-UX needs HP or Intel hardware
  • AIX needs IBM Hardware

Linux operating system is not dependent on the hardware, so it can be installed in any of the server systems which have a processor. Since the developers cannot assume the hardware architecture and they need to prepare the code for some general hardware specifications and that’s why Linux operating system has less performance than the commercial Unix variants.

  • Linux is open to all hardware

Licensing

GNU General Public License (GPL), is a form of copyleft and is used for the Linux kernel and many of the components from the GNU Project. Free software projects, although developed through collaboration, are often produced independently of each other. AIX and HP-UX are using proprietary licenses.

HP-UX

Developer Hewlett-Packard Enterprise
Written in C
OS family Unix (System V)
Initial release 1982; 36 years ago
Kernel type Monolithic with dynamically loadable modules
License Proprietary

 

IBM AIX

Developer IBM
Written in C
OS family Unix
Initial release 1986; 32 years ago
Kernel type Monolithic with dynamically loadable modules
License Proprietary

 

Linux

Developer Community, Linus Torvalds
Written in Primarily C and assembly
OS family Unix-like
Initial release September 17, 1991; 26 years ago
Kernel type Monolithic (Linux kernel)
License GPLv2[7] and other free and open-source licenses (the name “Linux” is a trademark[b])

 

Softwares and Tools

Softwares and tools in Linux are general to all hardware. But in the case of Unix, separate tools and software which leverage to get the maximum performance. So the performance of the systems is higher than the Linux operating system by comparing the hardware configuration. Unix has good performance than Linux systems. While considering the cost estimation, Linux will get more votes.

System Management Interface Tool ( SMIT ) with AIX is the tools used for package management, System Administration Manager (SAM) on HP-UX. Linux operating system uses rpm or dpkg etc. based on the variants.

Software Installation and Patch Management

R H Linux

HP-UX

AIX

Install rpm -i file swinstall –s depot software installp –a [-c] FileSet
Update rpm -U/F file swinstall –s depot software installp –a FileSet
List rpm -q swlist –l product lslpp –L all
Remove rpm -e swremove software installp –u FileSet
Patches rpm -u swinstall installp
List Patches rpm -q -a swlist –l product lslpp –L all
Patch check up2date/yum security_patch_check compare_report

File system

While talking about the file systems, Linux scores more than the other Unix versions. Unix supports two or three file systems locally. But Linux supports almost all the file systems available on any operating system.

 

System Filesystem
AIX jfs, gpfs
HP-UX hfs, vxfs

Kernel

The kernel is the core of the operating system and the source code of the kernel are not freely available for the commercial versions of Unix. For the Linux operating system, the users can check and verify the code and even modify it if required.

Support

The commercial versions of Unix come with a license cost. Since these operating systems are purchased, the vendor will provide technical support to the end users to the smooth running of the operating systems.

In the case of the Linux operating system, we need to use the open source forums and community for getting support from the users and developers around the world or hire some freelancers for fixing the issues.

Related References

Netezza / PureData – List of Views against a table

PureData Powered by Netezza

PureData Powered by Netezza

I have found myself using this simple, but useful SQL time in recent weeks to research different issues and to help with impact analysis.  So, I thought I would post it while I’m thinking about it.  It just gives a list of views using a table, which can be handy to know.  This SQL is simple and could be converted to an equi-join.  I used the like statement mostly because I sometimes want to know if there are other views a similar nature in the same family (by naming convention) of tables.

Select All Fields From The _V_View

This is the simplest form of this SQL to views, which a table.

Select * from _v_view

where DEFINITION like ‘%<<TABLE_NAME>>%’ ;

Select Minimal Fields From The _V_View

This is the version of the SQL, which I normally use, to list the views, which use a table.

Select VIEWNAME, OWNER from _v_view

where DEFINITION like ‘%<<TABLE_NAME>>%’;

Related References

Netezza / Puredata – How to replace or trim CHAR(0) is NULL characters in a field

PureData Powered by Netezza

PureData Powered by Netezza

Occasionally, one runs into the problem of hidden field values breaking join criteria.  I have had to clean up bad archive and conversion data with hidden characters serval times over the last couple of weeks, so, I thought I might as well capture this note for future use.

I tried the Replace command which is prevalent for Netezza answers to this issue on the web, but my client’s version does not support that command.  So, I needed to use the Translate command instead to accomplish it.  It took a couple of searches of the usual bad actors to find the character causing the issue, which on this day was chr(0).  Here is a quick mockup of the command I used to solve this issue.

Example Select Statement

Here is a quick example select SQL to identify problem rows.

SELECT TRANSLATE(F.BLOGTYPE_CODE, CHR(0), ”) AS BLOGTYPE_CODE, BT.BLOG_TYP_ID, LENGTH(BT.BLOG_TYP_ID) AS LNGTH_BT, LENGTH(F.BLOGTYPE_CODE) AS LNGTH_ BLOGTYPE

FROM  BLOGS_TBL F,  BLOG_TYPES BT WHERE TRANSLATE(F.BLOGTYPE_CODE, CHR(0), ”) =  BT.BLOG_TYP_ID AND LENGTH(BT.BLOG_TYP_ID) <>Length(LENGTH(F.BLOGTYPE_CODE) ;

 

Example Update Statement

Here is a quick shell update statement to remove the Char(0) characters from the problem field.

Update <<Your Table Name>> A

Set A.<<Your Field Name>> = TRANSLATE(A.<<Your FieldName>>, CHR(0), ”)

where length(A.<<Your Field Name>>) <> Length(A.<<Your FieldName>>) And << Additional criteria>>;

 

 

 

End Of Support For IBM InfoSphere 9.1.0

IBM Information Server (IIS)

IBM Information Server (IIS)

End of Support for IBM InfoSphere Information Server 9.1.0

IBM InfoSphere Information Server 9.1.0 will reach End of Support on 2018-09-30.  If you are still on the InfoSphere Information Server (IIS) 9.1.0, I hope you have a plan to migrate to an 11-series version soon.  InfoSphere Information Server (IIS) 11.7 would be worth considering if you don’t already own an 11-series license. InfoSphere Information Server (IIS) 11.7 will allow you to take advantage of the evolving thin client tools and other capabilities in the 2018 release pipeline without needing to perform another upgrade.

Related References

IBM Support, End of support notification: InfoSphere Information Server 9.1.0

IBM Support, Software lifecycle, InfoSphere Information Server 9.1.0

IBM Knowledge Center, Home, InfoSphere Information Server 11.7.0, IBM InfoSphere Information Server Version 11.7.0 documentation

Netezza / PureData – How to Substring on a Character

PureData Powered by Netezza

PureData Powered by Netezza

 

I had a reason this week to perform a substring on a character in Netezza this week, something I have not had a need to do before.  The process was not as straightforward as I would have thought, since the command is explained as a static position command, and the IBM documentation, honestly, wasn’t much help.  Knowing full well, that text strings are variable having to provide a static position is not terribly useful in and of itself.  So, we need to use an expression to make the substring command flexible and dynamic.

I did get it work the way I needed, but it took two commands to make it happen:

  • The First was the ’instr’ command to identify the field and character I wanted to substring on: instr(<<FIELD_NAME>>,’~’) as This provides the position number of the tilde (~).
  • The second was the ‘substr’ command in which I embedded the ‘instr’ command: substr(<<FIELD_NAME>>,0,instr(<<FIELD_NAME>>,’~’) )

This worked nicely for what I needed, which was to pick out a file name from the beginning of a string, which was delimited with a tilde (~)

Substring on a Character Command Format

  • This format example starts with position zero (0) as position 1 of substring command and goes to the first tilde (~) as position 2 of the substring command.
Select  <<FIELD_NAME>>

, instr(<>,’~’) as pos2

, substr(<<FIELD_NAME>>,0,instr(<<FIELD_NAME>>,’~’) ) as Results

From <<Table_Name>>

where  <<Where_Clause>>;

 

 

Related references

IBM Knowledge Center, Home, PureData System for Analytics 7.2.1, IBM Netezza database user documentation, Netezza SQL basics, Netezza SQL extensions, Character string functions

IBM Knowledge Center, Home PureData System for Analytics 7.0.3, IBM Netezza Database User’s Guide, Netezza SQL basics, Netezza SQL extensions, Character functions

Essbase Connector Error – Client Commands are Currently Not Being Accepted

DataStage Essbase Connector, Essbase Connector Error, Client Commands are Currently Not Being Accepted

DataStage Essbase Connector

While investigating a recent Infosphere Information Server (IIS), Datastage, Essbase Connect error I found the explanations of the probable causes of the error not to be terribly meaningful.  So, now that I have run our error to ground, I thought it might be nice to jot down a quick note of the potential cause of the ‘Client Commands are Currently Not Being Accepted’ error, which I gleaned from the process.

Error Message Id

  • IIS-CONN-ESSBASE-01010

Error Message

An error occurred while processing the request on the server. The error information is 1051544 (message on contacting or from application:[<<DateTimeStamp>>]Local////3544/Error(1013204) Client Commands are Currently Not Being Accepted.

Possible Causes of The Error

This Error is a problem with access to the Essbase object or accessing the security within the Essbase Object.  This can be a result of multiple issues, such as:

  • Object doesn’t exist – The Essbase object didn’t exist in the location specified,
  • Communications – the location is unavailable or cannot be reached,
  • Path Security – Security gets in the way to access the Essbase object location
  • Essbase Security – Security within the Essbase object does not support the user or filter being submitted. Also, the Essbase object security may be corrupted or incomplete.
  • Essbase Object Structure –  the Essbase object was not properly structured to support the filter or the Essbase filter is malformed for the current structure.

Related References

IBM Knowledge Center, InfoSphere Information Server 11.7.0, Connecting to data sources, Enterprise applications, IBM InfoSphere Information Server Pack for Hyperion Essbase

Printable PDF Version of This Article

 

Oracle TO_CHAR to SQL Server CONVERT Equivalents to change Date to String

Transact SQL (T-SQL)

Transact SQL (T-SQL)

When it comes to SQL I tend to lean on the SQL I have used the most over the years, which is Oracle.  Today was no exception, I found myself trying to use the TO_CHAR command in SQL Server to format a date, which of course does not work. So, after a little thought, here are some examples of how you can the SQL Server Convert Command the achieve the equivalent result.

Example SQL Server Date Conversion SQL

Example SQL Server Date Conversion SQL

Example SQL Server Date Conversion SQL Code

This SQL of examples runs, as is, no from table required.

 

Select

CONVERT(VARCHAR(10), GETDATE(), 20) as
‘YYYY-MM-DD’

,CONVERT(VARCHAR(19), GETDATE(), 20) as ‘YYYY-MM-DD HH24:MI:SS’

,CONVERT(VARCHAR(8), GETDATE(), 112) as YYYYMMDD

,CONVERT(VARCHAR(6), GETDATE(), 112) as YYYYMM

,CONVERT(VARCHAR(12), DATEPART(YEAR, GETDATE()))+ RIGHT(‘0’+CAST(MONTH(GETDATE()) AS VARCHAR(2)),2)
as
YYYYMM_Method_2

,CONVERT(VARCHAR(4), GETDATE(), 12) as YYMM

,CONVERT(VARCHAR(4), GETDATE(), 112) as YYYY

,CONVERT(VARCHAR(4), DATEPART(YEAR, GETDATE())) as YYYY_Method_2

,CONVERT(VARCHAR(4), YEAR(GETDATE())) as YYYY_Method_3

,RIGHT(‘0’+CAST(MONTH(GETDATE()) AS VARCHAR(2)),2) as Two_Digit_Month

,SUBSTRING(ltrim(CONVERT(VARCHAR(4), GETDATE(), 12)),3,2) as Two_Digit_Month_2

,CONVERT(VARCHAR(10), GETDATE(), 111) as ‘YYYY/MM/DD’

,CONVERT(VARCHAR(5), GETDATE(), 8) as ‘HH24:MI’

,CONVERT(VARCHAR(8), GETDATE(), 8) ‘HH24:MI:SS’

Map TO_CHAR formats to SQL Server

You can map an Oracle TO_CHAR formats to SQL Server alternative commands as follows:

TO_CHAR
String

VARCHAR
Length

SQL
Server Convert Style

YYYY-MM-DD

VARCHAR(10)

20,
21, 120, 121, 126 and 127

YYYY-MM-DD
HH24:MI:SS

VARCHAR(19)

20,
21, 120 and 121

YYYYMMDD

VARCHAR(8)

112

YYYYMM

VARCHAR(6)

112

YYMM

VARCHAR(4)

12

YYYY

VARCHAR(4)

112

MM

VARCHAR(2)

12

YYYY/MM/DD

VARCHAR(10)

111

HH24:MI

VARCHAR(5)

8,
108, 14 and 114

HH24:MI:SS

VARCHAR(8)

8,
108, 14 and 114

Translating the formats commands

Here are some example of translating the formats commands.

Format

SQL
Server

YYYY-MM-DD

CONVERT(VARCHAR(10),
GETDATE(), 20)

YYYY-MM-DD
HH24:MI:SS

CONVERT(VARCHAR(19),
GETDATE(), 20)

YYYYMMDD

CONVERT(VARCHAR(8),
GETDATE(), 112)

YYYYMM

CONVERT(VARCHAR(6),
GETDATE(), 112)

YYMM

CONVERT(VARCHAR(4),
GETDATE(), 12)

YYYY

CONVERT(VARCHAR(4),
GETDATE(), 112)

YYYY

CONVERT(VARCHAR(4),
DATEPART(YEAR, GETDATE()))

YYYY

CONVERT(VARCHAR(4),
YEAR(GETDATE()))

MM

RIGHT(‘0’+CAST(MONTH(GETDATE())
AS VARCHAR(2)),2)

MM

SUBSTRING(ltrim(CONVERT(VARCHAR(4),
GETDATE(), 12)),3,2)

YYYY/MM/DD

CONVERT(VARCHAR(10),
GETDATE(), 111)

HH24:MI

CONVERT(VARCHAR(5),
GETDATE(), 8)

HH24:MI:SS

CONVERT(VARCHAR(8),
GETDATE(), 8)

Related Reference

Microsoft Docs, SQL, T-SQL Functions, GETDATE (Transact-SQL)

Microsoft Docs, SQL, T-SQL Functions, Date and Time Data Types and Functions (Transact-SQL)

Microsoft Docs, SQL, T-SQL Functions, DATEPART (Transact-SQL)

 

 

What Are The DataStage / QualityStage Join Stages?

Three Stages Which Join Records

Three Stages Which Join Records

While chasing an error to which only applied to join type stages, I thought it might be nice to identify what the InfoSphere Information Server DataStage / QualityStage are.  There are three of them, as you can see from the picture above, which are the:

  • Join Stage,
  • Lookup Stage,
  • And, Merge Stage.

All three stages that join data based on the values of identified key columns.

Related References

IBM Knowledge Center, InfoSphere Information Server 11.7.0, InfoSphere DataStage and QualityStage, Developing parallel jobs, Processing Data, Lookup Stage

IBM Knowledge Center, InfoSphere Information Server 11.7.0, InfoSphere DataStage and QualityStage, Developing parallel jobs, Processing Data, Join Stage

IBM Knowledge Center, InfoSphere Information Server 11.7.0, InfoSphere DataStage and QualityStage, Developing parallel jobs, Processing Data, Merge Stage

https://www.ibm.com/support/knowledgecenter/SSZJPZ_11.7.0/com.ibm.swg.im.iis.ds.parjob.dev.doc/topics/c_deeref_Merge_Stage.html

Parallel jobs on Windows fail with APT_IOPort::readBlkVirt;error

APT_IOPort::readBlkVirt Error Screenshot

APT_IOPort::readBlkVirt Error Screenshot

This a known error for windows systems and applies to DataStage and DataQuality jobs using the any or all the three join type stages (Join, Merge, and Lookup).

Error Message

  • <<Link name>>,0: APT_IOPort::readBlkVirt: read for block header, partition 0, [fd 4], returned -1 with errno 10,054 (Unknown error)

Message ID

  • IIS-DSEE-TFIO-00223

Applies To

  • Windows systems only
  • Parallel Engine Jobs the three join type stages (Join, Merge, and Lookup). It does not apply to Server Engine jobs.
  • Infosphere Information Server (IIS), Datastage and DataQuality 9.1 and higher

The Fix

  • Add the APT_NO_IOCOMM_OPTIMIZATION in project administrator and set to blank or 0. I left it blank so it would not impact other jobs
  • Add the environment variable to the job producing the error and set to 1

What it APT_NO_IOCOMM_OPTIMIZATION Does

  • Sets the use of shared memory as the transport type, rather than using the default sockets transport type.
  • Note that in most cases sockets transport type is faster, so, you likely will not to set this across the project as the default for all job. It is best to apply it as necessary for problematic jobs.

Related References

InfoSphere DataStage and QualityStage, Version 9.1 Job Compatibility

IBM Support, JR54078: PARALLEL JOBS ON WINDOWS FAIL WITH APT_IOPORT::READBLKVIRT; ERROR

IBM Support, Information Server DataStage job fails with unknown error 10,054.

 

SQL server table Describe (DESC) equivalent

 

Transact SQL (T-SQL)

Transact SQL (T-SQL)

Microsoft SQL Server doesn’t seem have a describe command and usually, folks seem to want to build a stored procedure to get the describe behaviors.  However, this is not always practical based on your permissions. So, the simple SQL below will provide describe like information in a pinch.  You may want to dress it up a bit; but I usually just use it raw, as shown below by adding the table name.

Describe T-SQL Equivalent

Select *

From INFORMATION_SCHEMA.COLUMNS

Where TABLE_NAME = ‘<<TABLENAME>>’;

Related References

Microsoft SQL Server – Useful links

Microsoft SQL Server 2017

Microsoft SQL Server 2017

Here are a few references for the Microsoft SQL Server 2017 database, which may be helpful.

Table Of Useful Microsoft SQL Server Database References

Reference Type

Link

SQL Server 2017 Download Page

https://www.microsoft.com/en-us/sql-server/sql-server-downloads

SQL SERVER version, edition, and update level

https://support.microsoft.com/en-us/help/321185/how-to-determine-the-version–edition-and-update-level-of-sql-server-a

SQL Server 2017 Release Notes

https://docs.microsoft.com/en-us/sql/sql-server/sql-server-2017-release-notes

SQL Server Transact SQL Commands

https://technet.microsoft.com/en-us/library/ms189826(v=sql.90).aspx

Related References

DataStage – How to Pass the Invocation ID from one Sequence to another

DataStage Invocation ID Passing Pattern Overview

DataStage Invocation ID Passing Pattern Overview

When you are controlling a chain of sequences in the job stream and taking advantage of reusable (multiple instances) jobs it is useful to be able to pass the Invocation ID from the master controlling sequence and have it passed down and assigned to the job run.  This can easily be done with needing to manual enter the values in each of the sequences, by leveraging the DSJobInvocationId variable.  For this to work:

  • The job must have ‘Allow Multiple Instance’ enabled
  • The Invocation Id must be provided in the Parent sequence must have the Invocation Name entered
  • The receiving child sequence will have the invocation variable entered
  • At runtime, a DataStage invocation id instance of the multi-instance job will generate with its own logs.

Variable Name

  • DSJobInvocationId

Note

This approach allows for the reuse of job and the assignment of meaningful instance extension names, which are managed for a single point of entry in the object tree.

Related References: 

IBM Knowledge Center > InfoSphere Information Server 11.5.0

InfoSphere DataStage and QualityStage > Designing DataStage and QualityStage jobs > Building sequence jobs > Sequence job activities > Job Activity properties

Why Consilience Is Important?

Tree of knowledge

Tree of knowledge

What is Consilience?

Consilience is the confluence of concepts and/or principles from different disciplines, especially, when forming a comprehensive unifying theory.

Independent Confirmation

Why are some inventions discovered at the same time in different parts of the world? Does this have something to do with the scientific process of “sharing important discoveries?” Generally, scientists believe that they are part of a community of knowledge. Their discoveries do not occur in a vacuum. They must give credit to those who went before and created the foundation for their work. Therefore, when they discover something new, they are required to share it with the entire world. This sharing is part of knowledge evolution. Interestingly enough, it is also key to the World Wide Web. Collaboration is one of the key strengths of the Internet. It is a way to increase overall knowledge of Planet Earth. Science can also increase the strength of their theories through independent confirmation.

Result Conciliation

There are oftentimes prescriptions for the types and numbers of witnesses to accomplish certain legal requirements. Anyone who has completed an experiment understands the importance of result conciliation. A hypothesis is not proven to be true unless it can be repeated by independent sources. This shows that the reality is objective. The word, Consilience was formed by two Latin words – “com” meaning “together” and the suffix “-silence” meaning “jumping.” Therefore, Consilience means “jumping together” or a “convergence of proof from independent sources.” Scientists should use different methods to reach the same conclusion. Business and economics have a similar concept. Just think of the concept of a Recession or Depression. These are officially declared when a variety of indicators are in agreement – stock market, employment, inflation, money supply and so forth.

Knowledge Evolution

Consulting can use the concept of Consilience to teach firms how to follow objective norms. Technology consulting can compare a subjective company’s practices to objective industry norms. The best career development is successful based on objective, independent analysis. The concordance of evidence can help a business create a successful strategy. Consilience is the convergence of evidence from independent sources to prove the validity of a conclusion. Objective corporate success can be achieved by satisfying objective needs of your customers. Business intelligence requires an objective standard, such as Consilience to be useful.

Conclusion

Consilience is important to you because the answer to any given problem may not necessarily come from within your field of expertise and experience. rather, to be truly competitive in an ever in an ever increasing world of knowledge, we need to adopt a broad-scoped renaissance approach to learning and thinking, which folds in other sets of concepts and principles to create the durable solutions for today and tomorrow.

 

Common Information Technology Architectures

Overview Of Common Information Technology Architectures

The world is currently in the Information and Technology era, were as, so many experts are of the opinion that the Silicon Valley days are beginning to come to an end. Information and Technology is basically what the world revolves around today which makes it necessary to consider some technical overview of Information and Technology architecture use. The term Information Technology is often used in place for computer networks, and it also surrounds other information related technologies like television, cell phones and so on, showing the connection between IT and ICT (thou IT and ICT are often used to replace each other but technically are different). When talking about IT architectural, it is the framework or basis that supports an organization or system. Information technology architectural concerning computing involves virtual and physical resources supporting the collection, processing, analysis and storage of data. The architecture, in this case, can be integrated into a data center or in some other instances decentralized into multiple data centers, which can be managed and controlled by the IT department or third-party IT firm, just like cloud provider or colocation facility. IT architectures usually come into play when we consider hardware for computers (Big Iron: mainframe & Supercomputers), software, internet (LAN / WAN Server based), e-commerce, telecom equipment, storage (Cloud) and so on.

Information Technology Industry Overview

Information Technology Industry Overview

We human beings have been able to manipulate, store, and retrieve data since 3000Bc, but the modern sense of information technology first appeared in an article in 1958 published in a Havard Business Review: Harold j.Leavitt and Thomas L.whisler were the authors, and they further commented that the new technology was lacking an established name. It shall be called information technology (IT). Information Technology is used in virtually all sectors and industries, talking about education, agriculture, marketing, health, governance, finance and so on. Whatever you do, it is always appropriate to have a basic overview of the architectural uses of Information Technology. Now we take a look at some standard Information technology architectures use with regards to technology environment patterns such as Big Iron (mainframe & Supercomputers); Cloud; LAN / WAN Server based; storage (Cloud).

Big Iron (Mainframe & Supercomputers)

Big iron is a term used by hackers, and as defined in the hacker’s dictionary the Jargon File refers to it as “large, expensive, ultra-fast computers. It is used for number crunching supercomputers such as Crays, but can include more conventional big commercial mainframes”. Often used concerning IBM mainframes, when discussing their survival after the invention of lower cost Unix computing systems. More recently the term also applies to highly efficient computer servers and ranches, whose steel racks naturally work in the same manner.

Supercomputers are known to be the world’s fastest and largest computers, and they are primarily used for complex scientific calculations. There are similar components in a supercomputer and desktop computer: they both have memory processors and hard-drives. Although similarities exist between supercomputers and desktop computers, the speeds are significantly different. Supercomputers are way faster and more extensive. The supercomputers large disk storage, high memory, and processors increase the speed and the power of the machine. Although desktop computers can perform thousands or millions of floating-point operations per second know as (megaflops), supercomputers speeds perform at billions of operations per second also known as (gigaflops) and even up to trillions of operations per second know as (teraflops).

Mainframe Computers

Mainframe Computers

Evolution Of Mainframe and Supercomputers

Currently, many computers are indeed faster than the very first supercomputer, the Cray-1, which is designed and developed by Cray Research team during the mid-70s. The Cray-1 had the capacity of computing at the rate of 167 megaflops using a rapid form of computing called the Vector Processing,   which is composed of quick execution of instructions in a state of pipelined fashion. In the mid-80s a faster method of supercomputing was originated: which was called Parallel Processing.  Applications that made use of parallel processing were and are still able to solve computational issues by using multiple processors. Example: if you were going to prepare ice cream, sundaes for nine of your friends. You would need ten scoops of ice cream, ten bowls; ten drizzles of chocolate syrup with ten cherries, working alone you would put one scoop of ice-cream in each bowl and drizzle the syrup on each other. Now, this method of preparing sundaes will be categorized as vector processing. To get the job done very quickly, you will need help from some friends to assist you in a parallel processing method. If five people prepare the ice-cream mixture, it would be five times as fast.

Parallel Processing

Parallel Processing

Application Of Mainframe and Supercomputers

Supercomputers are very powerful that they can provide researchers with the insight into sources that are small, too fast, too big, or maybe very slow to observe in laboratories. Astrophysicists make use of supercomputers as time machines to explore the past and the future of the universe. A fascinating supercomputer simulation was created in the year 2000 that was able to depict the collision of two galaxies: The Andromeda and our very own Milky Way, although this collision will not happen in another 3 billion years from now.

This particular simulation allowed scientist to experiment and the view the result now. The simulation was conducted by Blue Horizon, a parallel supercomputer in the Diego, Supercomputer Center. Using 256 of Blue Horizon’s 1,152 processors, the simulation showed what would happen to millions of stars if the galaxies collided. Another example is molecular dynamic (molecular interactions with each other). Simulation events done with supercomputers allow scientists to study their interactions when two molecules are docked down. Researchers can generate an atom-by-atom picture of the molecular geometry by determining the shape of a molecule’s surface. Atomic experimentation at this level is extremely difficult or impossible to perform in a laboratory environment, but supercomputers have paved the way for scientists to stimulate such behaviors with ease.

Supercomputers Of The Future

Various research centers are always diving into new applications such as data mining to explore additional and multiple uses of supercomputing. Data mining allows scientist to find previously unknown relationships among data, just like the Protein Data Bank at San Diego Supercomputer Center is collecting scientific data that provides other scientists all around the world with more significant ways of understanding of biological systems. So this will provide researchers with new and unlimited insights of the effects, causes, and treatments of so many diseases. Capabilities of and applications of supercomputers will continue to grow as institutions all over the world are willing to share their various discoveries making researchers more proficient at parallel processing.

information technology Data Storage

Electronic data storage, which is widely used in modern computers today, has a date that spans from World War II when a delay memory line was developed to remove the interference from radar signals. We also have the William tube, which was the very first random-access digital storage, based on the cathode ray tube which consumed more electrical power. The problem regarding this was that the information stored in the delay line memory was liable to change flexibly and fast, especially very volatile. So it had to be continuously refreshed, and information was lost whenever power was removed. The first form of non-volatile computer storage system was the magnetic drum, which was the magnetic drum, it was invented in 1932 and used in the (Ferranti Mark 1) the very first commercially available electronic that was for general-purpose.

IBM initially introduced the very first hard disk drive in 1956, as an added component to their 305 RAMAC computer system. Most digitalized data today are stored magnetically on a hard disk, or optically such as CD-ROMS. But in 2002 the digital storage capacity exceeded analog for the first time. In the year 2007, almost 94% of data stored in the world was digitally held: 28% optical devices, 52% hard disks, 11% digital magnetic tape. The worldwide capacity for storing information on electronic devices grew from 3 Exabyte (1986) to 295 Exabyte (2007), doubling every three years. 

Cloud Computing

Cloud Computing

Cloud Storage

Cloud storage is a modern data storage system in which the digital data is stored in an array of logical pools, the physical storage system composes of multiple servers and often various locations, and the environment is usually owned by and managed by a hosting company. Cloud storage supplying companies are in charge of for keeping the data available and accessible, individuals; organizations lease or buy storage capacity from the suppliers to store user, application data or organization. Cloud storage refers to a hosted object-storage service, I a long run the term has broadened to include other sources of data storage systems that are available as a service, just like extended storage.  Examples of block storage services are Amazon S3 and Microsoft Azure storage. Then we also have OceanStore and VISION cloud which are storage systems that can be hosted and also deployed with cloud characteristics.

Cloud computing is changing implementation and design of IT infrastructures. Typically, business-owned traditional database centers are mostly private, and capital-intensive resources (Big-Iron: Mainframe and supercomputers), cloud base computing, on the other hand, enables organizations to have access to cloud base service providers with credible data center infrastructure for a mostly avoidable fee. Infrastructure-as-a-service model, cloud computing, allows flexible data storage on demand. Consumers can beseech cloud service provider’s to help store, compute, and offer other IT related services without installing gadgets and other resources locally, saving a lot of space and money while users can quickly adjust cloud base usage depending on required workload.

Servers

On a typical day, people tend to use different IT-based servers or networks. Firstly, the process of checking your email, over a Wi-Fi connection on your PC, in your house, is a typical server.

The process of logging on to your computer at your place of work, to have access to files from the company’s database that is another typical server. When you are out for coffee the Wi-Fi hotspot at the coffee shop, is another type of server-based communications.

All of these typical servers are set up differently. Servers are mainly categorized according to a geographic area of use and the requirements of the server within those geographic areas. Servers can service just about anyone from one man usage within with one device to millions of people and devices anywhere on the planet.

Some Common Servers we will consider Include:

  • WAN (Wide Area Network)
  • LAN (Local Area Network)
  • PAN (Personal Area Network)
  • MAN (Metropolitan Area Network)

Let’s go into some detail on these networks.

Area Net Relative Size Relationship

Area Net Relative Size Relationship

PAN (Personal Area Network)

PAN (personal area network), is a server integrated for a single person within a building or nearby. It could be inside a little office or a home. A PAN could incorporate at least one PC, phones, minor gadgets, computer game consoles and other gadgets. On the off chance that various people utilize a similar system inside a home, the system is some of the time known as a HAN (Home Area Network).

In an exceptionally common setup, a home will have a single, wired Internet connection associated with a modem. This modem at that point gives both wired and remote service for numerous gadgets. The system is regularly managed from a PC yet can be accessed to from other electronic devices.

This kind of server gives incredible adaptability. For instance, it enables you to:

  • Send a report to the printer in the workplace upstairs while you’re perched in another room with your portable workstation
  • Upload the pictures from your mobile phone to storage device (cloud) associated with your desktop PC
  • View movies from an internet streaming platform on your TV

If this sounds well-known to you, you likely have a PAN in your home without you knowing what it’s called.

LAN (Local Area Network)

LAN (Local Area Network) comprises of a PC network at a single location, regularly an individual office building. LAN is useful for sharing assets, for example, information stockpiling and printers. LANs can be worked with generally modest equipment, for example, network connectors, hubs, and Ethernet links.

A small LAN server may just utilize two PCs, while bigger LANs can oblige a higher number of PCs. A LAN depends on wired networking for speed and security optimization; however wireless networks can be associated with a LAN. Fast speed and moderately low cost are the qualifying attributes of LANs.

LANs are regularly utilized for a place where individuals need to share resources and information among themselves yet not with the outside world. Think about an office building where everyone ought to have the capacity to get to records on the server or have the ability to print an archive to at least one printer. Those assignments ought to be simple for everyone working in a similar office, yet you would not want someone strolling into the office and have access.

 

MAN (Metropolitan Area Network)

MAN (metropolitan area network) comprises of a PC organize over a whole city, school grounds or little district. Contingent upon the arrangement, this kind of system can cover a range from 5 to around 50 kilometers over. A MAN is often used to associate a group of LANs together to form a broader system. When this kind of server is mainly intended for a campus, it can be called CAN (Campus Area Network).

WAN (Wide Area Network)

WAN (wide area network), involves a vast region, for example, a whole nation or the entire world. A WAN can contain various littler systems, for example, LANs or MANs. The Internet is the best-known case of an open WAN.

Conclusion

The world is changing rapidly as modern world continues its unstoppable growth. With so much of the changes happening its good education be capable of touching students in various ways. Students today are leaders, teacher’s inventors and businessmen and women of tomorrow. Information technology has a crucial role in students being able to retain their job and go to school. Especially now that most schools offer various online courses, classes that can be accessed on tablets laptops and mobile phones.

Information technology is reshaping many aspects of the world’s economies, governments, and societies.  IT provide more efficient services, catalyze economic growth, and strengthen social networks, with about 95% of the world’s population now living in an area with the presence of a featured use and implementation of IT. IT is diversified, what you are probably using to have access to this article is based on IT architectural features. Technological advancement is a positive force behind growth in economies of nations, citizen engagement, and job creation.

Netezza / PureData – How To Get A List Of When A Store Procedure Was Last Changed Or Created

Netezza / Puredata - SQL (Structured Query Language)

Netezza / Puredata – SQL (Structured Query Language)

In the continuing journey to track down impacted objects and to determine when the code in a database was last changed or added, here is another quick SQL, which can be used in Aginity Workbench for Netezza to retrieve a list of when Store Procedures were last updated or were created.

SQL List of When A Stored Procedure was Last Changed or Created

select t.database — Database
, t.OWNER — Object Owner
, t.PROCEDURE — Procedure Name
, o.objmodified — The Last Modified Datetime
, o.objcreated — Created Datetime

from _V_OBJECT o
, _v_procedure t
where
o.objid = t.objid
and t.DATABASE = ‘<<Database Name>>
order by o.objmodified Desc, o.objcreated Desc;

 

Related References

 

Information Technology (IT) Requirements Management (REQM) For Development

Requirement Management Process

Requirement Management Process

Information Technology Requirements Management

Information technology requirement management (IT mаnаgеmеnt) is thе process whеrеbу all rеѕоurсеѕ rеlаtеd to іnfоrmаtіоn technology аrе mаnаgеd according to a оrgаnіzаtіоn’ѕ рrіоrіtіеѕ аnd nееdѕ. Thіѕ includes tangible rеѕоurсеѕ like nеtwоrkіng hаrdwаrе, соmрutеrѕ аnd реорlе, as wеll as іntаngіblе rеѕоurсеѕ like ѕоftwаrе аnd data. The сеntrаl аіm of IT mаnаgеmеnt is to generate vаluе thrоugh thе uѕе of technology. Tо achieve this, buѕіnеѕѕ strategies аnd tесhnоlоgу muѕt bе aligned. Infоrmаtіоn tесhnоlоgу mаnаgеmеnt includes mаnу of the bаѕіс functions оf mаnаgеmеnt, such аѕ ѕtаffіng, оrgаnіzіng, budgеtіng and соntrоl, but іt аlѕо hаѕ funсtіоnѕ thаt are unіԛuе tо IT, ѕuсh as ѕоftwаrе development, сhаngе management, nеtwоrk рlаnnіng аnd tесh ѕuрроrt. Gеnеrаllу, IT is used bу оrgаnіzаtіоnѕ to support аnd compliment thеіr buѕіnеѕѕ ореrаtіоnѕ. Thе аdvаntаgеѕ brought аbоut by hаvіng a dеdісаtеd IT department аrе too grеаt for mоѕt organizations tо раѕѕ up. Sоmе оrgаnіzаtіоnѕ асtuаllу uѕе IT as thе center of their buѕіnеѕѕ. Thе purpose of requirements mаnаgеmеnt іѕ tо еnѕurе that аn оrgаnіzаtіоn documents, vеrіfіеѕ, аnd mееtѕ thе nееdѕ аnd expectations of its customers and internal or еxtеrnаl stakeholders. Rеԛuіrеmеntѕ mаnаgеmеnt bеgіnѕ wіth thе аnаlуѕіѕ аnd elicitation of thе objectives аnd constraints of thе оrgаnіzаtіоn. Requirements mаnаgеmеnt furthеr іnсludеѕ ѕuрроrtіng рlаnnіng for requirements, іntеgrаtіng rеԛuіrеmеntѕ аnd the оrgаnіzаtіоn fоr wоrkіng wіth thеm (аttrіbutеѕ fоr rеԛuіrеmеntѕ), аѕ well as rеlаtіоnѕhірѕ wіth оthеr information dеlіvеrіng аgаіnѕt rеԛuіrеmеntѕ, аnd сhаngеѕ fоr thеѕе. The trасеаbіlіtу thuѕ еѕtаblіѕhеd іѕ used in managing requirements to rероrt bасk fulfіlmеnt of соmраnу and stakeholder іntеrеѕtѕ іn tеrmѕ оf compliance, completeness, соvеrаgе, аnd consistency. Trасеаbіlіtіеѕ also ѕuрроrt сhаngе mаnаgеmеnt as раrt оf rеԛuіrеmеntѕ management іn undеrѕtаndіng thе іmрасtѕ of changes thrоugh rеԛuіrеmеntѕ оr other rеlаtеd еlеmеntѕ (е.g., functional іmрасtѕ through relations tо functional аrсhіtесturе), аnd fасіlіtаtіng іntrоduсіng these сhаngеѕ. Rеԛuіrеmеntѕ mаnаgеmеnt іnvоlvеѕ соmmunісаtіоn between the рrоjесt tеаm mеmbеrѕ аnd ѕtаkеhоldеrѕ, аnd аdjuѕtmеnt to rеԛuіrеmеntѕ сhаngеѕ thrоughоut thе course оf thе рrоjесt. Tо рrеvеnt one class of requirements frоm overriding аnоthеr, constant соmmunісаtіоn аmоng mеmbеrѕ оf thе dеvеlорmеnt team, is critical. Fоr example, in ѕоftwаrе development for іntеrnаl applications, the business hаѕ ѕuсh ѕtrоng needs that іt may іgnоrе uѕеr rеԛuіrеmеntѕ, оr bеlіеvе thаt іn creating use саѕеѕ, the uѕеr rеԛuіrеmеntѕ are being tаkеn саrе оf.

The major IT Requirement Management Phases

Investigation

  • In Invеѕtіgаtіоn, thе fіrѕt thrее classes of requirements are gathered frоm the uѕеrѕ, from thе business аnd frоm thе dеvеlорmеnt team. In each аrеа, ѕіmіlаr ԛuеѕtіоnѕ аrе аѕkеd; whаt аrе the goals, what аrе the соnѕtrаіntѕ, what аrе the сurrеnt tооlѕ оr рrосеѕѕеѕ іn рlасе, and so оn. Only when thеѕе rеԛuіrеmеntѕ are well undеrѕtооd can funсtіоnаl rеԛuіrеmеntѕ be dеvеlореd. In thе common саѕе, requirements саnnоt be fullу dеfіnеd аt the bеgіnnіng of thе рrоjесt. Some rеԛuіrеmеntѕ wіll сhаngе, either bесаuѕе they ѕіmрlу wеrеn’t еxtrасtеd, оr bесаuѕе internal or еxtеrnаl fоrсеѕ at wоrk аffесt thе project in mіd-сусlе. Thе dеlіvеrаblе frоm thе Invеѕtіgаtіоn ѕtаgе іѕ requirements document thаt hаѕ bееn аррrоvеd bу аll mеmbеrѕ оf thе tеаm. Later, іn thе thісk of dеvеlорmеnt, thіѕ document wіll bе сrіtісаl іn рrеvеntіng ѕсоре сrеер or unnесеѕѕаrу сhаngеѕ. As thе ѕуѕtеm dеvеlорѕ, еасh new fеаturе ореnѕ a world оf nеw роѕѕіbіlіtіеѕ, ѕо thе requirements ѕресіfісаtіоn аnсhоrѕ the tеаm tо the original vision аnd реrmіtѕ a соntrоllеd dіѕсuѕѕіоn of ѕсоре сhаngе. While many оrgаnіzаtіоnѕ still uѕе оnlу dосumеntѕ to mаnаgе requirements, оthеrѕ mаnаgе their requirements baselines uѕіng ѕоftwаrе tооlѕ. Thеѕе tools allow rеԛuіrеmеntѕ tо bе managed іn a database, and uѕuаllу hаvе functions to automate trасеаbіlіtу (е.g., bу enabling electronic links tо bе сrеаtеd bеtwееn раrеnt аnd сhіld requirements, оr between tеѕt саѕеѕ аnd rеԛuіrеmеntѕ), еlесtrоnіс baseline creation, vеrѕіоn control, аnd change mаnаgеmеnt. Uѕuаllу ѕuсh tооlѕ contain аn export funсtіоn thаt allows a ѕресіfісаtіоn dосumеnt to bе created by еxроrtіng thе requirements data іntо a ѕtаndаrd dосumеnt аррlісаtіоn.

 Feasibility

  • In the Feasibility stage, costs of the rеquіrеmеntѕ аrе dеtеrmіnеd. Fоr uѕеr requirements, the current соѕt оf work is соmраrеd to the future projected соѕtѕ оnсе thе nеw ѕуѕtеm іѕ іn рlасе. Questions ѕuсh аѕ thеѕе are аѕkеd: “What are data entry errors costing uѕ nоw?” Or “Whаt іѕ thе соѕt of ѕсrар duе tо ореrаtоr еrrоr wіth thе сurrеnt іntеrfасе?” Aсtuаllу, the nееd for the nеw tool is оftеn rесоgnіzеd аѕ this ԛuеѕtіоnѕ соmе to thе аttеntіоn оf fіnаnсіаl реорlе іn the organization. Business costs wоuld іnсludе, “Whаt department hаѕ the budget fоr this?” “Whаt is the еxресtеd rаtе of rеturn оn thе nеw product in the mаrkеtрlасе?” “Whаt’ѕ thе іntеrnаl rate of return in rеduсіng costs оf trаіnіng аnd support іf wе make an nеw, easier-to-use system?” Technical costs аrе rеlаtеd tо software dеvеlорmеnt соѕtѕ and hardware соѕtѕ. “Dо wе hаvе thе rіght реорlе tо сrеаtе the tool?” “Dо we nееd nеw equipment tо ѕuрроrt еxраndеd ѕоftwаrе rоlеѕ?” Thіѕ lаѕt ԛuеѕtіоn іѕ аn іmроrtаnt tуре. The tеаm muѕt inquire into whether thе nеwеѕt аutоmаtеd tools will аdd sufficient processing роwеr tо shift some оf thе burden frоm thе uѕеr tо thе system in оrdеr tо ѕаvе реорlе tіmе. Thе question аlѕо роіntѕ out a fundаmеntаl point about rеԛuіrеmеntѕ mаnаgеmеnt. A humаn аnd a tооl fоrm a ѕуѕtеm, аnd thіѕ realization іѕ especially іmроrtаnt іf the tool іѕ a соmрutеr or an nеw аррlісаtіоn on a computer. Thе humаn mind еxсеlѕ іn раrаllеl рrосеѕѕіng аnd іntеrрrеtаtіоn of trends with іnѕuffісіеnt dаtа. Thе CPU еxсеlѕ іn ѕеrіаl processing and accurate mаthеmаtісаl соmрutаtіоn. The overarching gоаl оf thе rеԛuіrеmеntѕ management еffоrt for a software project would thuѕ be to make ѕurе thе wоrk being аutоmаtеd gеtѕ аѕѕіgnеd tо thе proper рrосеѕѕоr. Fоr іnѕtаnсе, “Don’t make thе human rеmеmbеr whеrе she іѕ іn thе іntеrfасе. Mаkе thе іntеrfасе rероrt thе human’s location іn the ѕуѕtеm аt аll tіmеѕ.” Or “Dоn’t mаkе thе humаn еntеr thе ѕаmе dаtа in twо ѕсrееnѕ. Mаkе thе system store thе dаtа аnd fіll іn thе second ѕсrееn аѕ needed.” The deliverable frоm the Feasibility ѕtаgе іѕ the budgеt аnd schedule fоr the рrоjесt.

Design

  • Aѕѕumіng thаt соѕtѕ аrе ассurаtеlу dеtеrmіnеd and bеnеfіtѕ tо be gаіnеd аrе ѕuffісіеntlу lаrgе, thе project саn рrосееd tо thе Dеѕіgn ѕtаgе. In Design, the mаіn rеԛuіrеmеntѕ mаnаgеmеnt асtіvіtу іѕ соmраrіng thе rеѕultѕ of thе design аgаіnѕt thе requirements dосumеnt tо make sure that wоrk is staying in scope. Agаіn, flexibility іѕ раrаmоunt tо success. Here’s a сlаѕѕіс ѕtоrу of ѕсоре change іn mіd-ѕtrеаm that асtuаllу wоrkеd well. Fоrd аutо dеѕіgnеrѕ іn the early ‘80ѕ wеrе expecting gаѕоlіnе prices to hit $3.18 реr gаllоn by thе еnd оf thе dесаdе. Mіdwау thrоugh thе design of the Fоrd Taurus, рrісеѕ had сеntеrеd tо around $1.50 a gаllоn. Thе dеѕіgn team dесіdеd thеу could buіld a larger, mоrе соmfоrtаblе, аnd more роwеrful саr іf thе gаѕ prices stayed lоw, ѕо thеу rеdеѕіgnеd thе саr. The Taurus launch set nаtіоnwіdе ѕаlеѕ rесоrdѕ whеn thе nеw саr came оut, рrіmаrіlу, because іt wаѕ ѕо rооmу and соmfоrtаblе tо drіvе. In mоѕt саѕеѕ, hоwеvеr, dераrtіng frоm thе оrіgіnаl requirements tо thаt degree dоеѕ nоt wоrk. Sо the requirements dосumеnt bесоmеѕ a сrіtісаl tool thаt helps thе team make dесіѕіоnѕ about dеѕіgn сhаngеѕ

Construction and test

  • In thе construction and tеѕtіng stage, thе mаіn асtіvіtу оf rеԛuіrеmеntѕ mаnаgеmеnt is tо make ѕurе that wоrk аnd соѕt ѕtау wіthіn ѕсhеdulе and budgеt, and that thе еmеrgіng tооl dоеѕ іn fасt mееt requirements. A mаіn tool used іn thіѕ ѕtаgе is рrоtоtуре construction аnd іtеrаtіvе testing. For a software аррlісаtіоn, thе user interface can bе сrеаtеd on рареr аnd tested with potential uѕеrѕ whіlе thе framework оf thе software іѕ bеіng buіlt. Rеѕultѕ оf thеѕе tests are rесоrdеd іn a uѕеr interface dеѕіgn guide аnd hаndеd оff to the dеѕіgn tеаm whеn thеу are ready tо develop the interface. Thіѕ ѕаvеѕ thеіr tіmе аnd makes their jоbѕ muсh easier.

Requirements change management

  • Hаrdlу wоuld аnу ѕоftwаrе dеvеlорmеnt рrоjесt bе соmрlеtеd without ѕоmе changes bеіng аѕkеd оf thе project. Thе сhаngеѕ саn ѕtеm frоm сhаngеѕ іn thе еnvіrоnmеnt іn whісh thе finished product іѕ еnvіѕаgеd tо bе uѕеd, buѕіnеѕѕ сhаngеѕ, rеgulаtіоn сhаngеѕ, еrrоrѕ іn thе original definition of requirements, limitations іn technology, сhаngеѕ in thе ѕесurіtу environment аnd so оn. Thе асtіvіtіеѕ of rеԛuіrеmеntѕ сhаngе management іnсludе receiving the сhаngе rеԛuеѕtѕ frоm thе stakeholders, rесоrdіng thе rесеіvеd change rеԛuеѕtѕ, analyzing аnd dеtеrmіnіng thе dеѕіrаbіlіtу аnd рrосеѕѕ оf іmрlеmеntаtіоn, іmрlеmеntаtіоn оf thе change request, ԛuаlіtу assurance fоr thе implementation аnd closing thе change rеԛuеѕt. Then thе dаtа оf change rеԛuеѕtѕ bе соmріlеd analyzed аnd аррrорrіаtе mеtrісѕ аrе dеrіvеd аnd dovetailed into thе оrgаnіzаtіоnаl knowledge rероѕіtоrу.

Release

  • Rеԛuіrеmеntѕ management dоеѕ nоt end with рrоduсt rеlеаѕе. Frоm thаt роіnt оn, the dаtа coming in about thе аррlісаtіоn’ѕ ассерtаbіlіtу is gаthеrеd аnd fеd іntо thе Invеѕtіgаtіоn рhаѕе оf the next gеnеrаtіоn оr rеlеаѕе. Thus the рrосеѕѕ bеgіnѕ again.

The relationship/interaction of requirements management process to the Software Development Lifecycle (SDLC) phases

Planning

  • Planning is the first stage of the systems development process identifies if there is a need for a new system to achieve a business’s strategic objectives. Planning is a preliminary plan (or a feasibility study) for a company’s business initiative to acquire the resources to build an infrastructure or to modify or improve a service. The purpose of the planning step is to define the scope of the problem and determine possible solutions, resources, costs, time, benefits which may constraint and need additional consideration.

Systems Analysis and Requirements

  • Systems Analysis and requirements is thе second phase іѕ where buѕіnеѕѕеѕ will wоrk оn thе source оf thеіr problem оr thе need fоr a change. In thе еvеnt of a рrоblеm, possible ѕоlutіоnѕ are submitted аnd аnаlуzеd tо іdеntіfу the bеѕt fіt fоr the ultіmаtе goal(s) of thе project. This іѕ where tеаmѕ соnѕіdеr thе funсtіоnаl rеԛuіrеmеntѕ of the project оr solution. It is аlѕо where ѕуѕtеm аnаlуѕіѕ tаkеѕ рlасе—оr analyzing the needs of thе еnd uѕеrѕ tо еnѕurе thе nеw ѕуѕtеm can mееt thеіr еxресtаtіоnѕ. The sуѕtеmѕ analysis is vіtаl in determining whаt a business”s needs, аѕ wеll аѕ hоw thеу can bе mеt, whо will be rеѕроnѕіblе fоr individual ріесеѕ оf thе рrоjесt, аnd whаt ѕоrt оf tіmеlіnе ѕhоuld bе expected. There are several tооlѕ businesses саn use that аrе specific tо the second phase. Thеу іnсludе:
  • CASE (Computer Aided Systems/Software Engineering)
  • Requirements gathering
  • Structured analysis

Sуѕtеmѕ Dеѕіgn

  • Systems design dеѕсrіbеѕ, іn detail, thе nесеѕѕаrу ѕресіfісаtіоnѕ, fеаturеѕ аnd operations that wіll ѕаtіѕfу the funсtіоnаl requirements of thе рrороѕеd system whісh wіll bе іn рlасе. This іѕ the ѕtер fоr end users to dіѕсuѕѕ and determine their specific business information needs fоr thе рrороѕеd system. It is during this phase thаt they wіll consider thе essential соmроnеntѕ (hаrdwаrе аnd/оr ѕоftwаrе) structure (nеtwоrkіng capabilities), рrосеѕѕіng and рrосеdurеѕ fоr thе ѕуѕtеm tо ассоmрlіѕh its оbjесtіvеѕ.

Development

  • Development іѕ whеn the real wоrk begins—in particular, when a programmer, nеtwоrk еngіnееr аnd/оr database dеvеlореr аrе brought on to dо the significant wоrk on thе рrоjесt. Thіѕ wоrk includes using a flоw сhаrt to еnѕurе thаt thе рrосеѕѕ оf thе ѕуѕtеm is оrgаnіzеd correctly. Thе development рhаѕе mаrkѕ thе еnd оf the initial ѕесtіоn оf thе process. Addіtіоnаllу, thіѕ рhаѕе ѕіgnіfіеѕ the ѕtаrt of рrоduсtіоn. Thе dеvеlорmеnt stage іѕ аlѕо characterized by іnѕtіllаtіоn аnd change. Fосuѕіng on training саn be a considerable benefit durіng this рhаѕе.

Integration and Tеѕtіng

  • Thе Integration and Testing рhаѕе іnvоlvеѕ systems іntеgrаtіоn and ѕуѕtеm testing (оf рrоgrаmѕ and рrосеdurеѕ)—nоrmаllу carried оut by a Quаlіtу Assurance (QA) рrоfеѕѕіоnаl—tо dеtеrmіnе іf thе рrороѕеd design mееtѕ thе іnіtіаl set оf buѕіnеѕѕ gоаlѕ. Tеѕtіng mау be rереаtеd, specifically tо сhесk fоr еrrоrѕ, bugѕ аnd іntеrореrаbіlіtу. Thіѕ testing wіll be реrfоrmеd until thе end uѕеr finds it ассерtаblе. Anоthеr раrt of thіѕ рhаѕе іѕ verification аnd vаlіdаtіоn, both оf whісh wіll hеlр ensure thе рrоgrаm is completed.

Implementation

  • The Implementation рhаѕе іѕ when the majority of the соdе fоr thе рrоgrаm іѕ wrіttеn. Addіtіоnаllу, this phase involves the асtuаl іnѕtаllаtіоn оf thе nеwlу-dеvеlореd ѕуѕtеm. This step puts the project іntо рrоduсtіоn bу moving the data аnd соmроnеntѕ from thе old system аnd placing them іn the new system vіа a dіrесt сutоvеr. Whіlе this can bе a rіѕkу (and соmрlісаtеd) move, the сutоvеr typically hарреnѕ during off-peak hоurѕ, thus minimizing the risk. Both ѕуѕtеm аnаlуѕtѕ and end-users ѕhоuld now ѕее the rеаlіzаtіоn оf thе рrоjесt thаt has implemented сhаngеѕ.

Oреrаtіоnѕ аnd Mаіntеnаnсе

  • Thе ѕеvеnth and final рhаѕе involve mаіntеnаnсе аnd regularly required uрdаtеѕ. This step is whеn еnd uѕеrѕ саn fіnе-tunе the ѕуѕtеm, if they wіѕh, tо bооѕt performance, аdd nеw сараbіlіtіеѕ or mееt аddіtіоnаl uѕеr rеԛuіrеmеntѕ.

Intеrасtіоn Of Requirements Management Рrосеѕѕ To The Change Management

Evеrу IT lаndѕсаре must сhаngе оvеr tіmе. Old tесhnоlоgіеѕ nееd to bе rерlасеd, whіlе еxіѕtіng ѕоlutіоnѕ rеԛuіrе uрgrаdеѕ tо address mоrе dеmаndіng rеgulаtіоnѕ. Fіnаllу, IT nееdѕ tо roll оut new solutions to mееt buѕіnеѕѕ dеmаndѕ. Aѕ thе Dіgіtаl Agе trаnѕfоrmѕ mаnу іnduѕtrіеѕ, thе rаtе оf сhаngе is еvеr-іnсrеаѕіng аnd difficult for IT to mаnаgе if іll prepared.

Rеԛuіrеmеntѕ bаѕеlіnе management

Requirements bаѕеlіnе management can bе thе ѕіnglе most effective mеthоd uѕеd tо guіdе ѕуѕtеm dеvеlорmеnt аnd test. Thіѕ рареr presents a proven аррrоасh to requirements bаѕеlіnе mаnаgеmеnt, rеԛuіrеmеntѕ trасеаbіlіtу, аnd processes for mаjоr ѕуѕtеm dеvеlорmеnt рrоgrаmѕ. Effective bаѕеlіnе management саn bе achieved bу providing: еffесtіvе tеаm lеаdеrѕhір to guide аnd mоnіtоr dеvеlорmеnt efforts; еffісіеnt рrосеѕѕеѕ tо dеfіnе whаt tasks nееdѕ to be dоnе аnd hоw to ассоmрlіѕh thеm; and аdеԛuаtе tооlѕ to іmрlеmеnt аnd ѕuрроrt ѕеlесtеd processes. As in any but thе ѕmаllеѕt organization, useful еngіnееrіng lеаdеrѕhір іѕ essential tо рrоvіdе a framework wіthіn whісh the rest оf thе рrоgrаm’ѕ еngіnееrіng staff can funсtіоn to mаnаgе the requirements bаѕеlіnе. Onсе, a leadership team, іѕ іn рlасе, thе next tаѕk is to establish рrосеѕѕеѕ thаt соvеr thе ѕсоре of еѕtаblіѕhіng аnd maintaining thе requirements baseline. Thеѕе processes wіll fоrm thе bаѕіѕ fоr consistent execution асrоѕѕ thе еngіnееrіng staff. Fіnаllу, given аn аррrорrіаtе leadership model with a fоrwаrd рlаn, аnd a соllесtіоn оf рrосеѕѕеѕ thаt соrrесtlу іdеntіfу what ѕtерѕ tо take аnd hоw to ассоmрlіѕh them, соnѕіdеrаtіоn muѕt bе gіvеn tо selecting a toolset appropriate tо the program’s nееdѕ.

Uѕе Cаѕеѕ Vs. Rеԛuіrеmеntѕ

  • Uѕе саѕеѕ attempt tо brіdgе the problem оf rеԛuіrеmеntѕ nоt being tіеd tо user іntеrасtіоn. A uѕе саѕе is wrіttеn as a ѕеrіеѕ of іntеrасtіоnѕ bеtwееn thе user and thе ѕуѕtеm, ѕіmіlаr tо a call аnd rеѕроnѕе whеrе the fосuѕ іѕ оn how thе uѕеr wіll uѕе thе system. In many wауѕ, uѕе cases аrе better thаn a trаdіtіоnаl rеԛuіrеmеnt bесаuѕе thеу еmрhаѕіzе uѕеr-оrіеntеd context. Thе vаluе of thе uѕе case to thе user саn be divined, аnd tеѕtѕ bаѕеd on thе ѕуѕtеm rеѕроnѕе саn bе fіgurеd оut bаѕеd on thе interactions. Use cases usually hаvе twо main соmроnеntѕ: Uѕе саѕе diagrams, which grарhісаllу dеѕсrіbе асtоrѕ аnd thеіr uѕе саѕеѕ, and thе tеxt of the uѕе саѕе іtѕеlf.
  • Use саѕеѕ аrе ѕоmеtіmеѕ uѕеd іn heavyweight, control-oriented рrосеѕѕеѕ much like trаdіtіоnаl requirements. Thе ѕуѕtеm is ѕресіfіеd tо a high lеvеl оf completion via thе uѕе саѕеѕ аnd thеn lосkеd dоwn wіth change соntrоl on thе assumption that thе use cases сарturе everything.
  • Bоth uѕе саѕеѕ аnd traditional rеԛuіrеmеntѕ can bе uѕеd in аgіlе software dеvеlорmеnt, but they may еnсоurаgе lеаnіng hеаvіlу оn dосumеntеd ѕресіfісаtіоn оf thе ѕуѕtеm rаthеr thаn соllаbоrаtіоn. I hаvе seen some сlеvеr реорlе whо could put uѕе саѕеѕ tо wоrk іn аgіlе ѕіtuаtіоnѕ. Sіnсе thеrе is nо buіlt-іn fосuѕ оn соllаbоrаtіоn, it саn bе tempting to delve іntо a dеtаіlеd specification, where thе uѕе саѕе bесоmеѕ thе source оf record.

Definitions of  types оf requirements

Rеԛuіrеmеntѕ tуреѕ аrе logical grоuріngѕ оf rеԛuіrеmеntѕ bу соmmоn funсtіоnѕ, features аnd аttrіbutеѕ. Thеrе аrе fоur rеԛuіrеmеnt types :

Business Rеԛuіrеmеnt Tуре

  • Thе business requirement іѕ written frоm the Sponsor’s point-of-view. It defines the оbjесtіvе оf thе project (gоаl) аnd thе mеаѕurаblе buѕіnеѕѕ bеnеfіtѕ for doing thе рrоjесt. Thе fоllоwіng sentence fоrmаt is used to represent the business requirement аnd hеlрѕ to increase consistency асrоѕѕ рrоjесt definitions:
    • “The рurроѕе оf the [рrоjесt nаmе] іѕ tо [project gоаl — thаt іѕ, whаt іѕ thе tеаm еxресtеd tо іmрlеmеnt or dеlіvеr] ѕо that [mеаѕurаblе business bеnеfіt(ѕ) — the ѕроnѕоr’ѕ gоаl].”

Rеgrеѕѕіоn Tеѕt rеԛuіrеmеntѕ

  • Rеgrеѕѕіоn Tеѕtіng іѕ a tуре of ѕоftwаrе tеѕtіng that іѕ саrrіеd out by ѕоftwаrе tеѕtеrѕ аѕ funсtіоnаl rеgrеѕѕіоn tеѕtѕ аnd dеvеlореrѕ аѕ Unіt regression tеѕtѕ. Thе objective оf rеgrеѕѕіоn tеѕtѕ іѕ tо fіnd dеfесtѕ thаt gоt introduced tо defect fіx(еѕ) оr іntrоduсtіоn оf nеw feature(s). Regression tеѕtѕ аrе іdеаl саndіdаtеѕ fоr аutоmаtіоn.

Rеuѕаblе rеԛuіrеmеntѕ

  • Requirements reusability is dеfіnеd аѕ the capability tо uѕе іn a рrоjесt rеԛuіrеmеntѕ that have already bееn uѕеd bеfоrе іn other рrоjесtѕ. Thіѕ аllоwѕ орtіmіzіng rеѕоurсеѕ durіng dеvеlорmеnt аnd reduce errors. Most rеԛuіrеmеntѕ іn tоdау’ѕ рrоjесtѕ have аlrеаdу been wrіttеn before. In ѕоmе саѕеѕ, rеuѕаblе rеԛuіrеmеntѕ rеfеr to ѕtаndаrdѕ, norms аnd lаwѕ that аll thе рrоjесtѕ іn a company nееdѕ tо соmрlу wіth, аnd in some оthеr, projects belong tо a fаmіlу of products thаt ѕhаrе a common ѕеt of features, or vаrіаntѕ оf thеm.

Sуѕtеm rеԛuіrеmеntѕ:

  • There are two type of system requirements;

Funсtіоnаl Rеԛuіrеmеnt Tуре

  • Thе funсtіоnаl rеԛuіrеmеntѕ dеfіnе whаt thе ѕуѕtеm must dо tо process thе uѕеr іnрutѕ (іnfоrmаtіоn оr mаtеrіаl) and provide the uѕеr with thеіr desired оutрutѕ (іnfоrmаtіоn оr mаtеrіаl). Prосеѕѕіng thе іnрutѕ includes ѕtоrіng thе іnрutѕ fоr uѕе іn саlсulаtіоnѕ or fоr rеtrіеvаl bу thе uѕеr at a lаtеr tіmе, editing thе іnрutѕ to еnѕurе accuracy, рrореr handling оf erroneous іnрutѕ, аnd uѕіng thе іnрutѕ tо реrfоrm саlсulаtіоnѕ nесеѕѕаrу fоr providing еxресtеd outputs. Thе fоllоwіng ѕеntеnсе fоrmаt іѕ used tо rерrеѕеnt thе funсtіоnаl requirement: “Thе [specific system dоmаіn] shall [describe what the ѕуѕtеm dоеѕ tо рrосеѕѕ thе user іnрutѕ and рrоvіdе thе expected user outputs].” Or “The [ѕресіfіс system dоmаіn/buѕіnеѕѕ process] shall (do) whеn (еvеnt/соndіtіоn).”

Nоnfunсtіоnаl Requirement Tуре

  • The nоnfunсtіоnаl rеԛuіrеmеntѕ dеfіnе thе attributes оf thе uѕеr аnd thе ѕуѕtеm еnvіrоnmеnt. Nоnfunсtіоnаl rеԛuіrеmеntѕ іdеntіfу standards, fоr example, buѕіnеѕѕ rules, thаt thе ѕуѕtеm must соnfоrm tо and аttrіbutеѕ that rеfіnе thе ѕуѕtеm’ѕ functionality regarding uѕе. Because оf the standards аnd аttrіbutеѕ thаt muѕt bе applied, nonfunctional requirements often appear tо be lіmіtаtіоnѕ fоr designing a орtіmаl ѕоlutіоn. Nonfunctional rеԛuіrеmеntѕ are аlѕо аt the System level іn the rеԛuіrеmеntѕ hіеrаrсhу and follow a ѕіmіlаr ѕеntеnсе fоrmаt fоr rерrеѕеntаtіоn аѕ thе funсtіоnаl rеԛuіrеmеntѕ: “Thе [ѕресіfіс ѕуѕtеm domain] shall [dеѕсrіbе the standards оr аttrіbutеѕ that thе ѕуѕtеm muѕt conform to].”

Related References

Netezza / PureData – How To Get a SQL List of When View Was Last Changed or Created

Netezza / PureData SQL (Structured Query Language)

Netezza / PureData SQL (Structured Query Language)

Sometimes it is handy to be able to get a quick list of when a view was changed last.  It could be for any number of reason, but sometimes folks just lose track of when a view was last updated or even need to verify that it hadn’t been changed recently.  So here is a quick SQL, which can be dropped in Aginity Workbench for Netezza to create a list of when a view was created or was update dated last.  Update the Database name in the SQL and run it.

SQL List of When A view was Last Changed or Created

select t.database — Database
, t.OWNER — Object Owner
, t.VIEWNAME — View Name
, o.objmodified — The Last Modified Datetime
, o.objcreated — Created Datetime

from _V_OBJECT o
,_V_VIEW_XDB t
where
o.objid = t.objid
and DATABASE = ‘<<Database Name>>
order by o.objcreated Desc, o.objmodified Desc;

Related References

 

Netezza / PureData – How To Quote a Single Quote in Netezza SQL

How To Quote a Single Quote in Netezza SQL?

The short answer is to use four single quotes (””), which will result in a single quote within the select statement results.

How to Assemble the SQL to Quote a Single Quote in a SQL Select Statement

Knowing how to construct a list to embed in a SQL where clause ‘in’ list or to add to an ETL job can be a serious time saver eliminating the need to manually edit large lists.  In the example below, I used the Select result set to create a rather long list of values, which needed to be included in an ELT where clause.  By:

  • Adding the comma delimiter (‘,’) and a Concatenate (||) on the front
  • Followed by adding a quoted single Quote (entered as four single quotes (””)) and a Concatenate (||)
  • The Field I which to have delaminated and Quoted (S1.ORDER_NUM)
  • And closed with a quoted single Quote (entered as four single quotes (””))

This results in a delimited and quoted list ( ,’116490856′) which needs only to have the parentheses added and the first comma removed, which is much less work than manually editing the 200 item that resulted from this select.

Example SQL:

SELECT Distinct

‘,’||””|| S1.ORDER_NUM||”” as Quoted_Order_Number

FROM Sales S1

 

How to Quote A Single Quote Example SQL

How to Quote A Single Quote Example SQL

Related Reference

DataStage – How to use single quoted parameter list in an Oracle Connector

Data Integration

Data Integration

While working with a client’s 9.1 DataStage version, I ran into a situation where they wanted to parameterize SQL where clause lists in an Oracle Connector stage, which honestly was not very straight forward to figure out.  First, if the APT_OSL_PARAM_ESC_SQUOTE is not set and single quotes are used in the parameter, the job creates unquoted invalid SQL when the parameter is populated.  Second, I found much of the information confusing and/or incomplete in its explanation.   After some research and some trial and error, here is how I resolved the issue.  I’ll endeavor to be concise, but holistic in my explanation.

When this Variable applies

This where I know this process applies, there may be other circumstances to which is this applicable, but I’m listing the ones here with which I have recent experience.

Infosphere Information Server Datastage

  • Versions 91, 11.3, and 11.5

Oracle RDBMS

  • Versions 11g and 12c

Configurations process

Here is a brief explanation of the steps I used to implement the where clause as a parameter.  Please note that in this example, I am using a job parameter to populate on a portion of the where clause, you can certainly pass the entire where clause as a parameter, if it is not too long.

Configure Project Variable in Administrator

  • Add APT_OSL_PARAM_ESC_SQUOTE to project in Administrator
  • Populate the APT_OSL_PARAM_ESC_SQUOTE Variable \
APT_OSL_PARAM_ESC_SQUOTE Project Variable

APT_OSL_PARAM_ESC_SQUOTE Project Variable

Create job parameter

Following your project name convention or standard practice, if you customer and/or project do not have established naming conventions, create the job parameter in the job. See jp_ItemSource parameter in the image below.

Job Parameter In Oracle Connector

Job Parameter In Oracle Connector

Add job parameter to Custom SQL in Select Oracle Connector Stage

On the Job parameter has been created, add the job parameter to the SQL statement of the job.

Job Parameter In SQL

Job Parameter In SQL

Related References

IBM Knowledge Center > InfoSphere Information Server 11.5.0

Connecting to data sources > Databases > Oracle databases > Oracle connector

IBM Support > Limitation of the Parameter APT_OSL_PARAM_ESC_SQUOTE on Plugins on Parallel Canvas

IBM Knowledge Center > InfoSphere Information Server 11.5.0

InfoSphere DataStage and Quality > Stage > Reference > Parallel Job Reference > Environment Variables > Miscellaneous > APT_OSL_PARAM_ESC_SQUOTE

 

Netezza / PureData – How to build a multi table drop command from a select

Database Management

Database Management

How to Quick Drop Multiple Tables

occasionally, there is a need to quickly drop a list of tables and you don’t always want to write or generate each command individually in Aginity.  So, here is a quick example of how you can use a ‘Select’ SQL statement to generate a list of drop commands for you. Now, this approach assumes there is a common naming convention, so, you may need to adapt it to your needs.

An outline of the Drop Multiple Tables Process

Here is a quick summary of the steps to generate the drop statements from _V_Table:

  1. Build required Netezza SQL select; paying particular attention to the where clause criteria to exclude any unnecessary tables.
  2. Execute the SQL statement
  3. Copy from Aginity Results Tab without headers
  4. Past into new Aginity Query window
  5. validate that only the tables are in the list — No extras
  6. Click with the SQL Drop command list and Execute as a single batch

Example generate the drop statements

select  ‘Drop table ‘||tablename||’;’

from _V_TABLE

where tablename like ‘NZCC_TT_%’;

 

Related References

IBM Knowledge Center > PureData System for Analytics 7.2.1

IBM Netezza database user documentation > Netezza SQL command reference > Drop Table