SlideShare a Scribd company logo
1 of 14
Download to read offline
tm




   SafePeak: Reducing Latency and Bottlenecks
         to Micro Second Response Time

                        Vladi Vexler
                        Founder & COO
                        vladi@dcftech.com
DCF Technologies Ltd.                            January 5, 2010
Corporate Profile
    Company
    DCF Technologies Ltd. Founded in 2007

    Management Team
       Aki Ratner, Chairman - (President, Precise Software; CEO, Attunity)
       David Leichner, CEO - (CMO, BluePhoenix; VP, Unipier; VP, Magic Software)
       Vladi Vexler, Founder & COO - (R&D Manager, Scepia; MS Architecture Speaker)
       Uri Margalit, Co-founder & CTO - (R&D Manager, Precise)
       Alon Lubin, VP R&D - (R&D Manager, Precise; Exanet; Tabula)




2
What We Provide
Plug & Play Software: No changes to database or app
 Immediate resolution of data bottlenecks and latency
 Significantly improved performance and throughput
100% data credibility and continuous high availability




    Unexpected Demand Does Not Have To Mean
3
             Unexpected Downtime
Top Web Retailers: “88% of Transactions Suffer
                              Availability Problems”
Study by UK NCC Group : March ‘09


       Effect Of Download Page Delay From 5 Seconds To 6

       Sales             7%          Page        11%           Customer        16%
    Conversions                      Views                    Satisfaction
    Aberdeen: Dec. ‘08



    Large Enterprises: “Suffer an Average of 61 Hours of
    Annual Downtime, Costs Exceeding $1 million per Hour”
     Enterprise Management Associates Analyst and Consulting Firm: March ‘09
4
Achieving Micro Second Response Time

      Real-Time                                                Background
Result Caching in                                           Metadata Analysis
High Speed RAM
    (binary)                                                 Traffic Queries
                                                            Caching Patterns
      Response
                                                             Identification of
     Returned in        Real-time Data Caching & Eviction
                                                            Repetitive Queries
    Micro Seconds        Dashboard for Analytics & Tuning
                                                             and Bottlenecks
                     SafePeak
Eviction of Cache
                                                             Performance &
upon DML / DDL
                                                             Analytics Stats
                                                            Measurements for
    Failover & H/A         MS SQL     MS SQL     MS SQL       Optimization
                           SERVER     SERVER     SERVER
5
Flow Process – Query In Cache


                        (C1) Query is found to exist;
                        result set is retrieved from
                        the Cache Manager
                        (C2) Result is returned to the
                        querying application




6
Flow Process – Query Not In Cache & Not Update


                                 (Q1) Query is processed on
                                 target database
                                 (Q2) Result set is returned
                                 (Q3) If repetitive query,
                                 result set is saved in RAM
                                 memory of the Cache
                                 Manager to be accessed
                                 upon the next instance of
                                 the identical query




7
Write Request (update, insert, delete)

                              (U1) Request is parsed and all
                              results stored in Cache that
                              have any connection to the
                              affected database tables are
                              evicted
                              (U2) Request is sent to target
                              SQL Server database and
                              executed
                              (U3) Result set is sent back to
                              the querying application




8
Background Processes




9
Ensuring High Availability
                                                  (A1) Query is routed to Active SafePeak
Query        Active                               server, using MS NLB (VIP) technology
              (A1)                         (A4)
                        Network Proxy             (SafePeak Enterprise version), and then
                                                  thru Network-Proxy SW to SafePeak (A2).

                               (A2)               (A3, A4) In the rare event of software
                                                  failure, processing is automatically
                                           (A2)   redirected to 2nd SafePeak (A3 - optional)
                          SafePeak                or directly to the database (A4).
Cluster
              (P1)         (A3) optional          (P1) If a HW error occurs due to a
Virtual IP                                        malfunctioning server, processing is
             Passive                              automatically shifted into passive
                                           (P3)   SafePeak, ensuring that the loss of the
                        Network Proxy             server will not impact continuous
                                                  processing.
                               (P2)               (P2) Query is then routed to 2nd SafePeak.

                                           (P2)   (P3) If error occurs, processing is
                          SafePeak                redirected to the SQL Server database


  10
Let’s See SafePeak Live


11
SafePeak Implementation
Configuration              Day 1           Day 2           Day 7
2 Servers (2 for HA)    Installation and Cache Pattern   Performance
   2-4 CPU Cores       Routing of Traffic Activation        Report
     4-8G RAM             via SafePeak
                                              &
 2 Network Cards
                       Automatic Meta
   Disks 150G X 2                           Tuning
                         Data Analysis
Windows 2008 64B
 Remote Desktop        Automatic Traffic
                           Analysis
                       Caching Pattern
                         Definition

12
Sample of Results: Large Financial Portal
             Increase in Throughput: 378% at Peak; 110% on Average
     Improved Response Time: 371% at Peak; 126% for Read-only; 85% Overall!




     Queries            One Week Snapshot Taken at 5 Minute Intervals
13             SafePeak Executions                         Database Only
tm



           Next Steps
      Give Us 72 Hours,
     We’ll Give You 100%!
           info@dcftech.com
14

More Related Content

What's hot

Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...StorageCraft Benelux
 
Towards a real-time reconfiguration service for distributed Java
Towards a real-time reconfiguration service for distributed JavaTowards a real-time reconfiguration service for distributed Java
Towards a real-time reconfiguration service for distributed JavaUniversidad Carlos III de Madrid
 
Cloudian dynamic consistency
Cloudian dynamic consistencyCloudian dynamic consistency
Cloudian dynamic consistencyCLOUDIAN KK
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesJosef Adersberger
 
Oracle cloud environment architecture orientation
Oracle cloud environment  architecture orientationOracle cloud environment  architecture orientation
Oracle cloud environment architecture orientationOsama Abdullah
 
Scalar DL Technical Overview
Scalar DL Technical OverviewScalar DL Technical Overview
Scalar DL Technical OverviewScalar, Inc.
 
Pivotal HAWQ - High Availability (2014)
Pivotal HAWQ - High Availability (2014)Pivotal HAWQ - High Availability (2014)
Pivotal HAWQ - High Availability (2014)saravana krishnamurthy
 
Transaction Management on Cassandra
Transaction Management on CassandraTransaction Management on Cassandra
Transaction Management on CassandraScalar, Inc.
 
Scalar DL Technical Overview
Scalar DL Technical OverviewScalar DL Technical Overview
Scalar DL Technical OverviewScalar, Inc.
 
Reactive data analysis with vert.x
Reactive data analysis with vert.xReactive data analysis with vert.x
Reactive data analysis with vert.xGerald Muecke
 
spChains: A Declarative Framework for Data Stream Processing in Pervasive App...
spChains: A Declarative Framework for Data Stream Processing in Pervasive App...spChains: A Declarative Framework for Data Stream Processing in Pervasive App...
spChains: A Declarative Framework for Data Stream Processing in Pervasive App...Fulvio Corno
 
CV_Kelvin_2016
CV_Kelvin_2016CV_Kelvin_2016
CV_Kelvin_2016Kelvin Tan
 
Building IT with Precision - SUSE Linux Enterprise Real Time
Building IT with Precision - SUSE Linux Enterprise Real TimeBuilding IT with Precision - SUSE Linux Enterprise Real Time
Building IT with Precision - SUSE Linux Enterprise Real TimeJeff Reser
 
Scalar DB: A library that makes non-ACID databases ACID-compliant
Scalar DB: A library that makes non-ACID databases ACID-compliantScalar DB: A library that makes non-ACID databases ACID-compliant
Scalar DB: A library that makes non-ACID databases ACID-compliantScalar, Inc.
 

What's hot (18)

Horizon View 7
Horizon View 7Horizon View 7
Horizon View 7
 
Poc Exadata X7-2 OVM
Poc Exadata X7-2 OVMPoc Exadata X7-2 OVM
Poc Exadata X7-2 OVM
 
IM B10
IM B10IM B10
IM B10
 
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
 
Towards a real-time reconfiguration service for distributed Java
Towards a real-time reconfiguration service for distributed JavaTowards a real-time reconfiguration service for distributed Java
Towards a real-time reconfiguration service for distributed Java
 
Cloudian dynamic consistency
Cloudian dynamic consistencyCloudian dynamic consistency
Cloudian dynamic consistency
 
Postgre sql best_practices
Postgre sql best_practicesPostgre sql best_practices
Postgre sql best_practices
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to Kubernetes
 
Oracle cloud environment architecture orientation
Oracle cloud environment  architecture orientationOracle cloud environment  architecture orientation
Oracle cloud environment architecture orientation
 
Scalar DL Technical Overview
Scalar DL Technical OverviewScalar DL Technical Overview
Scalar DL Technical Overview
 
Pivotal HAWQ - High Availability (2014)
Pivotal HAWQ - High Availability (2014)Pivotal HAWQ - High Availability (2014)
Pivotal HAWQ - High Availability (2014)
 
Transaction Management on Cassandra
Transaction Management on CassandraTransaction Management on Cassandra
Transaction Management on Cassandra
 
Scalar DL Technical Overview
Scalar DL Technical OverviewScalar DL Technical Overview
Scalar DL Technical Overview
 
Reactive data analysis with vert.x
Reactive data analysis with vert.xReactive data analysis with vert.x
Reactive data analysis with vert.x
 
spChains: A Declarative Framework for Data Stream Processing in Pervasive App...
spChains: A Declarative Framework for Data Stream Processing in Pervasive App...spChains: A Declarative Framework for Data Stream Processing in Pervasive App...
spChains: A Declarative Framework for Data Stream Processing in Pervasive App...
 
CV_Kelvin_2016
CV_Kelvin_2016CV_Kelvin_2016
CV_Kelvin_2016
 
Building IT with Precision - SUSE Linux Enterprise Real Time
Building IT with Precision - SUSE Linux Enterprise Real TimeBuilding IT with Precision - SUSE Linux Enterprise Real Time
Building IT with Precision - SUSE Linux Enterprise Real Time
 
Scalar DB: A library that makes non-ACID databases ACID-compliant
Scalar DB: A library that makes non-ACID databases ACID-compliantScalar DB: A library that makes non-ACID databases ACID-compliant
Scalar DB: A library that makes non-ACID databases ACID-compliant
 

Viewers also liked (8)

Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
2. learning process 1.0
2. learning process 1.02. learning process 1.0
2. learning process 1.0
 
Unit 2 e commerce applications
Unit 2 e commerce applicationsUnit 2 e commerce applications
Unit 2 e commerce applications
 
Ch10
Ch10Ch10
Ch10
 
4 Aa1 1793 Enw
4 Aa1 1793 Enw4 Aa1 1793 Enw
4 Aa1 1793 Enw
 
I Pv6 Nd
I Pv6 NdI Pv6 Nd
I Pv6 Nd
 
Elements of a Successful Computer System ver 1.0
Elements of a Successful Computer System ver 1.0Elements of a Successful Computer System ver 1.0
Elements of a Successful Computer System ver 1.0
 
ERP Making it happen
ERP Making it happenERP Making it happen
ERP Making it happen
 

Similar to Safe Peak Technical Ppt W Product Publish

SafePeak whitepaper
SafePeak whitepaperSafePeak whitepaper
SafePeak whitepaperVladi Vexler
 
SafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic CachingSafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic CachingVladi Vexler
 
Java ee7 with apache spark for the world's largest credit card core systems, ...
Java ee7 with apache spark for the world's largest credit card core systems, ...Java ee7 with apache spark for the world's largest credit card core systems, ...
Java ee7 with apache spark for the world's largest credit card core systems, ...Rakuten Group, Inc.
 
Spark Streaming Early Warning Use Case
Spark Streaming Early Warning Use CaseSpark Streaming Early Warning Use Case
Spark Streaming Early Warning Use Caserandom_chance
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUJoshua Patterson
 
iThome Cloud Summit: The next generation of data center: Machine Intelligent ...
iThome Cloud Summit: The next generation of data center: Machine Intelligent ...iThome Cloud Summit: The next generation of data center: Machine Intelligent ...
iThome Cloud Summit: The next generation of data center: Machine Intelligent ...Evan Lin
 
When Web Services Go Bad
When Web Services Go BadWhen Web Services Go Bad
When Web Services Go BadSteve Loughran
 
Data Pipelines and Telephony Fraud Detection Using Machine Learning
Data Pipelines and Telephony Fraud Detection Using Machine Learning Data Pipelines and Telephony Fraud Detection Using Machine Learning
Data Pipelines and Telephony Fraud Detection Using Machine Learning Eugene
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Symantec
 
Splunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAPSplunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAPSplunk
 
Nonfunctional Testing: Examine the Other Side of the Coin
Nonfunctional Testing: Examine the Other Side of the CoinNonfunctional Testing: Examine the Other Side of the Coin
Nonfunctional Testing: Examine the Other Side of the CoinTechWell
 
SafePeak datasheet 2010
SafePeak datasheet 2010SafePeak datasheet 2010
SafePeak datasheet 2010Vladi Vexler
 
Slim Baltagi – Flink vs. Spark
Slim Baltagi – Flink vs. SparkSlim Baltagi – Flink vs. Spark
Slim Baltagi – Flink vs. SparkFlink Forward
 
Stream Analytics
Stream Analytics Stream Analytics
Stream Analytics Franco Ucci
 
GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...
GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...
GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...James Anderson
 
Webinar: Cutting Time, Complexity and Cost from Data Science to Production
Webinar: Cutting Time, Complexity and Cost from Data Science to ProductionWebinar: Cutting Time, Complexity and Cost from Data Science to Production
Webinar: Cutting Time, Complexity and Cost from Data Science to Productioniguazio
 
Fast data in times of crisis with GPU accelerated database QikkDB | Business ...
Fast data in times of crisis with GPU accelerated database QikkDB | Business ...Fast data in times of crisis with GPU accelerated database QikkDB | Business ...
Fast data in times of crisis with GPU accelerated database QikkDB | Business ...Matej Misik
 

Similar to Safe Peak Technical Ppt W Product Publish (20)

SafePeak whitepaper
SafePeak whitepaperSafePeak whitepaper
SafePeak whitepaper
 
SafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic CachingSafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic Caching
 
Java ee7 with apache spark for the world's largest credit card core systems, ...
Java ee7 with apache spark for the world's largest credit card core systems, ...Java ee7 with apache spark for the world's largest credit card core systems, ...
Java ee7 with apache spark for the world's largest credit card core systems, ...
 
Spark Streaming Early Warning Use Case
Spark Streaming Early Warning Use CaseSpark Streaming Early Warning Use Case
Spark Streaming Early Warning Use Case
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPU
 
iThome Cloud Summit: The next generation of data center: Machine Intelligent ...
iThome Cloud Summit: The next generation of data center: Machine Intelligent ...iThome Cloud Summit: The next generation of data center: Machine Intelligent ...
iThome Cloud Summit: The next generation of data center: Machine Intelligent ...
 
Mysql Latency
Mysql LatencyMysql Latency
Mysql Latency
 
When Web Services Go Bad
When Web Services Go BadWhen Web Services Go Bad
When Web Services Go Bad
 
Data Pipelines and Telephony Fraud Detection Using Machine Learning
Data Pipelines and Telephony Fraud Detection Using Machine Learning Data Pipelines and Telephony Fraud Detection Using Machine Learning
Data Pipelines and Telephony Fraud Detection Using Machine Learning
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
 
Alejandro Zuno Data Backup English
Alejandro Zuno Data Backup EnglishAlejandro Zuno Data Backup English
Alejandro Zuno Data Backup English
 
Splunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAPSplunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAP
 
Nonfunctional Testing: Examine the Other Side of the Coin
Nonfunctional Testing: Examine the Other Side of the CoinNonfunctional Testing: Examine the Other Side of the Coin
Nonfunctional Testing: Examine the Other Side of the Coin
 
SafePeak datasheet 2010
SafePeak datasheet 2010SafePeak datasheet 2010
SafePeak datasheet 2010
 
Slim Baltagi – Flink vs. Spark
Slim Baltagi – Flink vs. SparkSlim Baltagi – Flink vs. Spark
Slim Baltagi – Flink vs. Spark
 
Flink vs. Spark
Flink vs. SparkFlink vs. Spark
Flink vs. Spark
 
Stream Analytics
Stream Analytics Stream Analytics
Stream Analytics
 
GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...
GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...
GDG Cloud Southlake #16: Priyanka Vergadia: Scalable Data Analytics in Google...
 
Webinar: Cutting Time, Complexity and Cost from Data Science to Production
Webinar: Cutting Time, Complexity and Cost from Data Science to ProductionWebinar: Cutting Time, Complexity and Cost from Data Science to Production
Webinar: Cutting Time, Complexity and Cost from Data Science to Production
 
Fast data in times of crisis with GPU accelerated database QikkDB | Business ...
Fast data in times of crisis with GPU accelerated database QikkDB | Business ...Fast data in times of crisis with GPU accelerated database QikkDB | Business ...
Fast data in times of crisis with GPU accelerated database QikkDB | Business ...
 

More from sqlserver.co.il

Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013sqlserver.co.il
 
Things you can find in the plan cache
Things you can find in the plan cacheThings you can find in the plan cache
Things you can find in the plan cachesqlserver.co.il
 
Sql server user group news january 2013
Sql server user group news   january 2013Sql server user group news   january 2013
Sql server user group news january 2013sqlserver.co.il
 
Query handlingbytheserver
Query handlingbytheserverQuery handlingbytheserver
Query handlingbytheserversqlserver.co.il
 
Adi Sapir ISUG 123 11/10/2012
Adi Sapir ISUG 123 11/10/2012Adi Sapir ISUG 123 11/10/2012
Adi Sapir ISUG 123 11/10/2012sqlserver.co.il
 
Products.intro.forum version
Products.intro.forum versionProducts.intro.forum version
Products.intro.forum versionsqlserver.co.il
 
SQL Explore 2012: P&T Part 3
SQL Explore 2012: P&T Part 3SQL Explore 2012: P&T Part 3
SQL Explore 2012: P&T Part 3sqlserver.co.il
 
SQL Explore 2012: P&T Part 2
SQL Explore 2012: P&T Part 2SQL Explore 2012: P&T Part 2
SQL Explore 2012: P&T Part 2sqlserver.co.il
 
SQL Explore 2012: P&T Part 1
SQL Explore 2012: P&T Part 1SQL Explore 2012: P&T Part 1
SQL Explore 2012: P&T Part 1sqlserver.co.il
 
SQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended Events
SQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended EventsSQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended Events
SQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended Eventssqlserver.co.il
 
SQL Explore 2012 - Michael Zilberstein: ColumnStore
SQL Explore 2012 - Michael Zilberstein: ColumnStoreSQL Explore 2012 - Michael Zilberstein: ColumnStore
SQL Explore 2012 - Michael Zilberstein: ColumnStoresqlserver.co.il
 
SQL Explore 2012 - Meir Dudai: DAC
SQL Explore 2012 - Meir Dudai: DACSQL Explore 2012 - Meir Dudai: DAC
SQL Explore 2012 - Meir Dudai: DACsqlserver.co.il
 
SQL Explore 2012 - Aviad Deri: Spatial
SQL Explore 2012 - Aviad Deri: SpatialSQL Explore 2012 - Aviad Deri: Spatial
SQL Explore 2012 - Aviad Deri: Spatialsqlserver.co.il
 
Bi303 data warehousing with fast track and pdw - Assaf Fraenkel
Bi303 data warehousing with fast track and pdw - Assaf FraenkelBi303 data warehousing with fast track and pdw - Assaf Fraenkel
Bi303 data warehousing with fast track and pdw - Assaf Fraenkelsqlserver.co.il
 

More from sqlserver.co.il (20)

Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013
 
Things you can find in the plan cache
Things you can find in the plan cacheThings you can find in the plan cache
Things you can find in the plan cache
 
Sql server user group news january 2013
Sql server user group news   january 2013Sql server user group news   january 2013
Sql server user group news january 2013
 
DAC 2012
DAC 2012DAC 2012
DAC 2012
 
Query handlingbytheserver
Query handlingbytheserverQuery handlingbytheserver
Query handlingbytheserver
 
Adi Sapir ISUG 123 11/10/2012
Adi Sapir ISUG 123 11/10/2012Adi Sapir ISUG 123 11/10/2012
Adi Sapir ISUG 123 11/10/2012
 
Products.intro.forum version
Products.intro.forum versionProducts.intro.forum version
Products.intro.forum version
 
SQL Explore 2012: P&T Part 3
SQL Explore 2012: P&T Part 3SQL Explore 2012: P&T Part 3
SQL Explore 2012: P&T Part 3
 
SQL Explore 2012: P&T Part 2
SQL Explore 2012: P&T Part 2SQL Explore 2012: P&T Part 2
SQL Explore 2012: P&T Part 2
 
SQL Explore 2012: P&T Part 1
SQL Explore 2012: P&T Part 1SQL Explore 2012: P&T Part 1
SQL Explore 2012: P&T Part 1
 
SQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended Events
SQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended EventsSQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended Events
SQL Explore 2012 - Tzahi Hakikat and Keren Bartal: Extended Events
 
SQL Explore 2012 - Michael Zilberstein: ColumnStore
SQL Explore 2012 - Michael Zilberstein: ColumnStoreSQL Explore 2012 - Michael Zilberstein: ColumnStore
SQL Explore 2012 - Michael Zilberstein: ColumnStore
 
SQL Explore 2012 - Meir Dudai: DAC
SQL Explore 2012 - Meir Dudai: DACSQL Explore 2012 - Meir Dudai: DAC
SQL Explore 2012 - Meir Dudai: DAC
 
SQL Explore 2012 - Aviad Deri: Spatial
SQL Explore 2012 - Aviad Deri: SpatialSQL Explore 2012 - Aviad Deri: Spatial
SQL Explore 2012 - Aviad Deri: Spatial
 
מיכאל
מיכאלמיכאל
מיכאל
 
נועם
נועםנועם
נועם
 
עדי
עדיעדי
עדי
 
מיכאל
מיכאלמיכאל
מיכאל
 
Bi303 data warehousing with fast track and pdw - Assaf Fraenkel
Bi303 data warehousing with fast track and pdw - Assaf FraenkelBi303 data warehousing with fast track and pdw - Assaf Fraenkel
Bi303 data warehousing with fast track and pdw - Assaf Fraenkel
 
DBCC - Dubi Lebel
DBCC - Dubi LebelDBCC - Dubi Lebel
DBCC - Dubi Lebel
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Safe Peak Technical Ppt W Product Publish

  • 1. tm SafePeak: Reducing Latency and Bottlenecks to Micro Second Response Time Vladi Vexler Founder & COO vladi@dcftech.com DCF Technologies Ltd. January 5, 2010
  • 2. Corporate Profile Company DCF Technologies Ltd. Founded in 2007 Management Team  Aki Ratner, Chairman - (President, Precise Software; CEO, Attunity)  David Leichner, CEO - (CMO, BluePhoenix; VP, Unipier; VP, Magic Software)  Vladi Vexler, Founder & COO - (R&D Manager, Scepia; MS Architecture Speaker)  Uri Margalit, Co-founder & CTO - (R&D Manager, Precise)  Alon Lubin, VP R&D - (R&D Manager, Precise; Exanet; Tabula) 2
  • 3. What We Provide Plug & Play Software: No changes to database or app  Immediate resolution of data bottlenecks and latency  Significantly improved performance and throughput 100% data credibility and continuous high availability Unexpected Demand Does Not Have To Mean 3 Unexpected Downtime
  • 4. Top Web Retailers: “88% of Transactions Suffer Availability Problems” Study by UK NCC Group : March ‘09 Effect Of Download Page Delay From 5 Seconds To 6 Sales 7% Page 11% Customer 16% Conversions Views Satisfaction Aberdeen: Dec. ‘08 Large Enterprises: “Suffer an Average of 61 Hours of Annual Downtime, Costs Exceeding $1 million per Hour” Enterprise Management Associates Analyst and Consulting Firm: March ‘09 4
  • 5. Achieving Micro Second Response Time Real-Time Background Result Caching in Metadata Analysis High Speed RAM (binary) Traffic Queries Caching Patterns Response Identification of Returned in Real-time Data Caching & Eviction Repetitive Queries Micro Seconds Dashboard for Analytics & Tuning and Bottlenecks SafePeak Eviction of Cache Performance & upon DML / DDL Analytics Stats Measurements for Failover & H/A MS SQL MS SQL MS SQL Optimization SERVER SERVER SERVER 5
  • 6. Flow Process – Query In Cache (C1) Query is found to exist; result set is retrieved from the Cache Manager (C2) Result is returned to the querying application 6
  • 7. Flow Process – Query Not In Cache & Not Update (Q1) Query is processed on target database (Q2) Result set is returned (Q3) If repetitive query, result set is saved in RAM memory of the Cache Manager to be accessed upon the next instance of the identical query 7
  • 8. Write Request (update, insert, delete) (U1) Request is parsed and all results stored in Cache that have any connection to the affected database tables are evicted (U2) Request is sent to target SQL Server database and executed (U3) Result set is sent back to the querying application 8
  • 10. Ensuring High Availability (A1) Query is routed to Active SafePeak Query Active server, using MS NLB (VIP) technology (A1) (A4) Network Proxy (SafePeak Enterprise version), and then thru Network-Proxy SW to SafePeak (A2). (A2) (A3, A4) In the rare event of software failure, processing is automatically (A2) redirected to 2nd SafePeak (A3 - optional) SafePeak or directly to the database (A4). Cluster (P1) (A3) optional (P1) If a HW error occurs due to a Virtual IP malfunctioning server, processing is Passive automatically shifted into passive (P3) SafePeak, ensuring that the loss of the Network Proxy server will not impact continuous processing. (P2) (P2) Query is then routed to 2nd SafePeak. (P2) (P3) If error occurs, processing is SafePeak redirected to the SQL Server database 10
  • 12. SafePeak Implementation Configuration Day 1 Day 2 Day 7 2 Servers (2 for HA) Installation and Cache Pattern Performance 2-4 CPU Cores Routing of Traffic Activation Report 4-8G RAM via SafePeak & 2 Network Cards Automatic Meta Disks 150G X 2 Tuning Data Analysis Windows 2008 64B Remote Desktop Automatic Traffic Analysis Caching Pattern Definition 12
  • 13. Sample of Results: Large Financial Portal Increase in Throughput: 378% at Peak; 110% on Average Improved Response Time: 371% at Peak; 126% for Read-only; 85% Overall! Queries One Week Snapshot Taken at 5 Minute Intervals 13 SafePeak Executions Database Only
  • 14. tm Next Steps Give Us 72 Hours, We’ll Give You 100%! info@dcftech.com 14