Our community is talking about the new Dell Technologies. Join the discussion in the Dell EMC Community Network:
By Christine Fronczak
It’s been a great year for our community, with the industry maturing sufficiently to push HPC firmly back into the limelight. We are seeing a large part of the market evolving beyond the traditional stereotype of HPC – that of being solely for the science and super-geeky technology audience. Big data is a prime example of the market that requires high powered computational needs for a wide range of vertical markets – from retail to manufacturing and financial services.
SC15 enabled us to bring some of the industry’s best together so we could learn all the different ways HPC is being used to better our world. From finding a cure for autism and rare childhood diseases to rooting out fraud and plagiarism, to creating clean energy, and helping third world countries develop better food and foster entrepreneurship.
We heard some very moving and intriguing use cases from the likes of General Atomics, The University of Florida, Virginia Tech, TGen, University of Maryland and Johns Hopkins, as well as Oxford University among others. These have been posted for your viewing on our YouTube Channel. We also hosted Intersect360’s Addison Snell and Dell’s own Onur Celebioglu who walked us through trends they see in the market and what to expect in the coming year. Their talks are also accessible on the SC15 YouTube playlist. InsideHPC’s Rich Brueckner joined us to moderate a panel discussion on the convergence of HPC, Big Data and Cloud, followed by a discussion on the NSCI initiative. Created by President Obama in July 2015, the National Strategic Computing Initiative has a mission to ensure the United States continues leading high performance computing over the coming decades. Both of these panels are available on the same playlist as the others, and can also be accessed via the InsideHPC website.
We will continue to follow these stories throughout the year, as well as giving you insight into the people behind the scenes making the “magic” happen. Intersect360’s Addison Snell has said that HPC is “a critical pillar of innovation and advancement, whether you’re talking about general scientific research or throughout different industries.” In 2016 we will watch and explore the trends and foster discussion on the successes and failures of our community in order to propel the industry forward. In the meantime, we leave you with a glimpse and some insights into SC15 and wish you a very Happy New Year!
Highlights from SC15:
For years, analysts have been reporting on the risks of unattended employee workstations. For example, a user who sits down at a co-worker’s PC could access sensitive data, send email from the PC owner’s account or even introduce malware into the network. To make matters worse, such misuse of an unattended workstation is difficult to detect and prove.
Don’t Rely on Employee Policies Alone
The first step in protecting your organization from these risks is to establish clear policies and educate users about them. In particular, make sure users understand:
In addition, if a workstation’s primary function is to process data while unattended, the organization should consider moving it to a physically secure area.
For More Effective Security, Supplement Policies with Technology
However, it’s unrealistic to rely on these policies to deliver the comprehensive security you need. Users forget to lock their PCs, or don’t realize how important it is to do so even for a short break, and they dislike having to log back in when they return.
Therefore, it’s critical to supplement your employee policies with technology that automates many of the tasks involved. In particular, you should:
To learn more about securing your organization’s workstations, register for an on-demand webcast, “12 Security Controls for Workstations,” hosted by Windows security guru and Microsoft MVP Randy Franklin Smith.
About Christopher Garcia
A ten-year Dell veteran, Chris has had experience in various marketing roles within the organization. He is currently a Senior Product Marketing Manager.
View all posts by Christopher Garcia
Disclaimer: Dell does not offer support for Windows Server 2016 at this time. Dell is actively testing and working closely with Microsoft on Windows Server 2016, but since it is still in development, the exact hardware components/configurations that Dell will fully support are still being determined. The information divulged in our online documents prior to Dell launching and shipping Windows Server 2016 may not directly reflect Dell supported product offerings with the final release of Windows Server 2016. We are, however, very interested in your results/feedback/suggestions. Please send them to WinServerBlogs@dell.com
One of the major challenges for customers to move their workloads to the virtualized datacenter or public cloud is the security concern due to their sensitivity of their workloads. To protect the tenant’s workloads from compromised storage, networks, host administrators, and malware, the upcoming Windows Server 2016 introduces the concept of Guarded Fabric to implement a new trust boundary between the tenant and the datacenter administrators or cloud service providers. Running shielded Virtual Machines on a Guarded Fabric provides the tenants security assurance for virtualizing their sensitive workloads such as Active Directory domain controllers.
With Windows Server 2016 Technical Preview, the Guarded Fabric can be deployed by using Active-Directory-based attestation or using hardware-based attestation which requires the Trusted Platform Module (TPM) v2.0. TPM 2.0 is now available on the selected 13th Generation PowerEdge servers such as R730, R730XD, R630, T630, etc., as an orderable configuration option.
Prior to deploy the Guarded Fabric with the HW-based attestation, the following settings are needed in the system BIOS:
Boot Settings: UEFI System Security > TPM Security: ON System Security > TPM Advanced > TPM PPI(Physical Presence Interface) Bypass Clear: EnabledSystem Security > TPM Advanced > TPM PPI Bypass Provision: Enabled System Security > Secure Boot > Secure Boot Enabled
These system settings can be configured remotely via the integrated Dell Remote Access Controller (iDRAC) by using racadm included in the Dell OpenManage DRAC Tools package. Here are the related racadm commands under PowerShell:First, define a variable for iDRAC IP address:$ip = "<iDRAC IP>"
View the current settings on boot settings:racadm -r $ip -u root -p calvin get BIOS.BiosBootSettings.Bootmode
View the current settings on TPM, secure boot:racadm -r $ip -u root -p calvin get BIOS.syssecurity
Change the boot mode into UEFI:racadm -r $ip -u root -p calvin set BIOS.BiosBootSettings.Bootmode Uefi
Enable the TPM Security:racadm -r $ip -u root -p calvin set BIOS.SysSecurity.TpmSecurity On
Disable PPI pop-up for Clear TPM Task during POST:racadm -r $ip -u root -p calvin set Bios.Tpmadvanced.TpmPpiByPassClear Enabled
Enable the secure boot:racadm -r $ip -u root -p calvin set Bios.syssecurity.secureboot Enabled
All the changes are still in the pending state. Apply these changes: racadm -r $ip -u root -p calvin jobqueue create BIOS.Setup.1-1 -r pwrcycle -s TIME_NOW -e TIME_NA
More detailed information is available in the attached document.
A long time ago in a galaxy far, far away, DBAs didn’t need The Force. Today, you’re expected to perform all manner of supernatural feats, channeling your deepest inner powers.
You’re working your light saber off, fighting for good (good database performance) and battling evil (ahem, certain developers, cough). How do we know?
Because we recently asked which Star Wars character best represents you as a DBA – and the response across the Twitter-verse was phenomenal!
But before we share some of the tweets, here’s a recap of your multiple choice options:
You’re loyal, dedicated, skilled − and possibly in need of some alone time with a Mach 15 razor. But it’s not just your year-round preparedness for Movember that makes people think you’re from another planet; when you try to explain your database challenges, they look at you like you’re speaking in Wookiee. #Shyriiwook
You’re constantly on-call to solve every issue, and it feels as if you’re waging a war within your organization. You might as well stay suited up, because you’re always in combat.
You’ve excelled in some of the most epic database battles in your organization. When days are dark, everyone knows you have the unique gift to bring it all to the light.
You’re the necessary evil at your organization, and you have no tolerance for errors. Anyone who stands in the way of executing your plan is simply collateral damage.
So who were the most relatable characters?
The clear winner was DBA Skywalker, proving The Force is strong with today’s DBAs. Next came the Chewies, followed by the Vadars and lastly, the Troopers.
Some fascinating responses – and the questions they raise
With so many responsibilities and so many demands coming from every direction, many of you admit to feeling downright schizophrenic, relating to multiple Star Wars personalities.
Here are some examples of the struggle:
ember_crooks @ember_crooks Nov 30 Retweeted Victor M. Ramirez
I like to think I'm DBA Skywalker. I have been each of these - sometimes all in the same day! @DellBigData #DBAForce
Kenneth Fisher @sqlstudent144 Nov 2
@DellBigData #DBAForce I'd say I'm 1/2 DBA Chewie and 1/2 Skywalker. It's great when they understand me, but that's only about 1/2 the time.
Landon Fowler @landonkfowler Nov 2
@DellBigData I'd say that I'm a DBA Chewie in a DBA Trooper's uniform. #DBAForce
Should DBAs have to take on so many different roles – and all in one day? Do you ever feel like this? A new study hints this is becoming the norm as pressure on DBAs increases.
Heavy breathing from the dark side
One group who held fast to a singular personality was the Darth camp, which wasn’t too surprising given their more, shall we say... “intense” nature.
This hilarious response from Ricardo sums it up:
Ricardo Muñoz @NomadVolk Dec 5
@DellBigData DBA Vader of course there is no mercy for developers!
Then again, we did have one misunderstood hero in Kevin:
Kevin Chant @kevchant Nov 3
@DellSoftware @DellBigData I'm sure some would class me as DBA Vader, [in the] end though [I’m] more like DBA Skywalker #DBAForce
If you relate to Vadar, is it because you’re committed to your villainous ways, or do you feel forced into being the bad guy because you’re not getting the support you need?
The heroes; the warriors; and our hirsute, word-gurgling friends
Of course, we also heard from the rest of the cast in a fun mix of responses, ranked from the most common sentiment to the least:
Zahid Anwar @ZedDBA Nov 3 Zahid Anwar Retweeted Nicole Tamms
@DellBigData #DBAForce I'd say I'm DBA Skywalker ;)
Jiří Kaplan @Jiri_Kaplan Nov 6
Looks like you have got one DBA Chewie :). @DellBigData #DBAForce
.@DellBigData - #DBA trooper - the frontline warrior. #DBAForce #Oracle #SQLServer
Which character are you?
If you didn’t get a chance to share your DBA alter ego yet, Tweet your Star Wars identity @DellBigData with #DBAForce.
We’ve got your back, no matter how hairy it is.
Dell and DBAs go together like Han Solo and Chewie, Obi Wan Kenobi and Anakin Skywalker, Artoo and C3PO – you get the point. Why? Because you like reading about what your fellow DBAs are up to, and we like asking them. That’s right. We’ve got more survey results for you.
New study: The Real World of the Database Administrator
Keep the fun going by checking out a new study we conducted with Unisphere Research. You’ll see how 300 other DBAs feel about emerging database trends, how much time they actually spend on security and plenty of other secrets people reveal when their responses are anonymous.
View the Study >
For Dell Statistica, a great year just got even better. Earlier this morning, Dell was recognized as a technology leader in Advanced and Predictive Analytics for 2015 in the inaugural Dresner Advisory Services Technology Innovation Awards, a new awards program that recognizes the top vendors across the company’s Wisdom of CrowdsÒ series of research covering numerous thematic areas.
If you’re not familiar with Dresner Advisory Services and its chief research officer, Howard Dresner, well, you should be, especially if you’re serious about keeping up with all things business intelligence and analytics. Dresner Advisory Services is one of the premier providers of truly independent, third-party research and analysis. Its findings and commentaries are not driven by research sponsors, but by data and input collected from real-world technology users.
So, it goes without saying (but I’m going to say it anyway) that we’re honored to have Dell recognized as a Technology Leader for 2015 in the area of advanced and predictive analytics by such a trusted and respected authority. The expert label gets thrown around a lot these days, but in the case of Howard Dresner, it’s absolutely warranted, and we’re thrilled to have earned the recognition of his firm.
Now, Statistica has been on the receiving end of more than its fair share of awards and recognition over the years, but if it seems like we’re more excited than usual about this bit of recognition, there’s good reason. As 2015 draws to a close, it’s a great time to reflect back on all that we’ve accomplished since welcoming Statistica into the Dell family. And in doing so, I can’t help but feel as though this recognition today serves as a validation of sorts for all the hard work we’ve completed, and as motivation for all the hard work still to come.
At the time of its acquisition by Dell in the spring of 2014, StatSoft was a company with a 30-year track record of success and loyal user base for its Statistica advanced analytics software numbering in the millions. But we nonetheless had our work cut out for us, as the advanced analytics market and the needs of customers was rapidly evolving, and continues to do so. One of the primary items on our immediate technology to-do list for Statistica was to deliver enriched data visualization, visual discovery, and dashboarding capabilities. We did just that earlier this year with the introduction of the Statistica Interactive Visualization and Dashboard Engine. We also heard loud and clear that our customers wanted more visual appeal and even greater ease-of-use, and we responded by introducing a completely revamped and modernized GUI this year at Dell World as part of the launch of Statistica 13.
But you don’t get to be a technology leader without operating on the leading edge, and we’re doing just that with our focus on what we call Native Distributed Analytics Architecture (NDAA), also introduced in Statistica 13. With NDAA, Statistica users can push predictive algorithms and scoring functionality directly to the source of data, allowing companies to take advantage of the compute power on that system while eliminating the time and expense required to transport data to a central repository. In other words, instead of pushing data to the analytics, we’re enabling customers to push analytics to the data. This concept of “analytics at the edge” is already achieving great traction with customers, and considering the explosive growth of IoT environments happening as we speak, we fully expect NDAA will soon become a must-have capability. And we fully expect Dell Statistica to lead the way in delivering it.
Though we’ve come a long way in a short period of time, we’re really just getting started. In 2016, not only will we continue to enhance and enrich our first-to-market NDAA capabilities, but we’ll continue our emphasis on delivering vertical-specific packages designed for the specific needs of companies in industries such as healthcare, pharmaceuticals, manufacturing, and financials. And in keeping with Dell’s heritage, and with StatSoft’s, we will continue to focus on democratizing and making advanced analytics available to the masses. We’re already seeing a new breed of non-technical analytic users cropping up throughout organizations. These citizen data scientists will play an enormous role in the continued growth of advanced analytics, and we’re committed to helping them drive innovation for their companies.
In other words, as great as 2015 was, and as happy as we are to have ended it on such as great note courtesy of the Dresner Technology Innovation Award, we’re looking forward to even bigger and better things in 2016. And beyond.
When you work more efficiently, you have time to do the things you love. See why 95% of Fortune 500 companies depend on Dell Software.
Gain more time to do the things you love using solutions from Dell Software. #ExpectMore http://software.dell.com/enterprise-software-solutions/
Updated monthly, this publication provides you with new and recently revised information and is organized in the following categories; Documentation, Notifications, Patches, Product Life Cycle, Release, Knowledge Base Articles.
178977 - “La conversion d'un type de données varchar en type de données datetime a créé une valeur hors limites”
An error is received when running reports. “The conversion of a varchar data type datetime data type has created a value out of range”
Created: October 14, 2015
SL4479 - Client fails to install on terminal server or client computer with an Error 1721
Upon upgrade to Desktop Authority 9.x, installation of the Desktop Authority 9.x client fails to install on terminal servers and user computers...
Revised: October 13, 2015
177951 - Desktop Authority Operations Service randomly stopped
The Desktop Authority Operations Service appears to stop randomly. The service then restarts a minute later and functions normally afterwards.
Revised: October 1, 2015
180773 - Slogic.bat and other BAT files do not run at logon
Slogic.bat and other BAT files do not run at logon. There is no screen output, and the sltrace.htm log file is not updated, The Event Viewer log...
Created: November 10, 2015
182483 - ETLFileRepository Troubleshooting
There could be numerous reasons why the ETLFileRepository is not function properly.
Created: November 26, 2015
181594 - Business logic error: The log for database DAConfiguration is not available.
When attempting to launch the Desktop Authority management console, a generic “unexpected error occurred” message may be displayed...
Created: November 19, 2015
156874 - Support for Windows 10 Client
Support for Windows 10 Client
Revised: November 18, 2015
156841 - Minimize to task bar when installing Desktop Authority.
Desktop Authority is minimizing to the task bar during the setup process.
Revised: November 19, 2015
152781 - The Global Address List (GAL) on the Outlook Home toolbar is empty after Cached mode is enabled
The Global Address List (GAL) on the Outlook Home toolbar is empty after Cached mode is enabled. The GAL is still available when creating a new...
Revised: November 9, 2015
SL165 - Subfolders appear in the netlogon share with _NTFRS_ appended to the folder name
When replicating to multiple targets from the Desktop Authority Console with the "Copy subfolders" option enabled, the subfolder being replicated...
Revised: November 12, 2015
SL3923 - How to migrate version 8.x
How to migrate Desktop Authority version 8.x
Revised: November 28, 2015
153877 - How to manually remove the Download role from an Update Service
How to manually remove the Download role from an Update Service
155617 - How to set a Domain Controller as target server
How to set a Domain Controller you have in Service Management as a target server
SL3038 - Problems that could occur when replicating to multiple domain controllers
Problems that could occur when replicating to multiple domain controllers. Multiple folders are being created in the SYSVOL shares of domain...
125455 - How to Setup USB/Port SecurityVID_xxxx and PID_xxxx Device Exceptions
In USB/Port Security, a USB device can be allowed or denied based on its VID and PID.<!--?xml:namespace prefix = o ns = "urn:schemas-microsoft...
Revised: November 24, 2015
SL4232 - How Validation Logic works and tips for configuration of validation logic
132824 - Duplicate Printers
In Devices and Printers there are multiple entries of the same printer.
SL3963 - Unable to upgrade to version 9.X on embedded thin clients
Unable to upgrade to version 9.X on embedded thin clients
107613 - Support for Hosted Exchange or Exchange 2013
Desktop Authority support for Hosted Exchange or Exchange 2013.
158012 - Business logic error: The network path was not found when installing Administrative Service
Desktop Authority shows an error message when trying to install the Desktop Authority Administrative Service on a Server: "Business logic error...
Product Life Cycle
Product Life Cycle – Desktop Authority
Image credit: Pete Markham | Licensed under: CC BY 2.0
It’s tough for me to write the last blog post of the year. Maybe even tougher for you to concentrate on it, since most of us are focused on anything but work and IT right now.
But before you settle completely into holiday-think, devote a few cycles of your remaining work-think to some of the trends in endpoint management and network security that will probably be waiting for you when you get back.
6 Questions We Heard from You in 2015
In conversations with customers like you throughout the year, including at our Dell World User Forum, we’ve discussed with you the nuts and bolts of keeping hundreds of endpoints secure. After a few minutes on deploying patches, fixing vulnerabilities and enforcing security policies, you usually let us know what you would like to work on if only you could come up for air. We heard six prominent questions from you about the world of endpoint management outside your day-to-day, operational tasks:
Stocking Stuffer: “Technology Tunnel Vision” E-book
We always enjoy hearing what our customers are seeing out there. You make us smarter and keep us on our toes.
It’s not quite the same as a holiday bonus, but we have a new e-book for you, Technology Tunnel Vision, Part 1, with more of the perspectives on endpoint management and network security that you’ll need in the new year.
Thanks for following us in 2015. We look forward to hearing more from you in 2016.
About David Manks
David Manks is a Solutions Marketing Director for Dell Software focusing on endpoint management and security products.
View all posts by David Manks |
Don’t just fight this month’s performance and capacity fires, extinguish any remaining hotspots and prevent them from flaring up when you optimize your virtualization management.
Sure, pat yourself on the back that you’ve optimized the unresponsiveness and latency out of your virtual environment. But also keep your eye on the road ahead to manage capacity and plan for the future.
In the previous post of this series, I covered variables like VM sprawl, storage connections and balancing resources. For this next one, I’ll take the long view of growth in your virtual data center.
Managing capacity in vSphere clusters
At the very heart of your VM performance and high availability are vSphere clusters, but to get the most out of them, you need to have a plan and implement them accordingly,
To protect every VM, set aside one host’s worth of resources in reserve. Those resources stand ready to process VMs when the cluster loses a node, but they also represent unused resources. In reality, virtual administrators often build their clusters without the necessary reserve or lose it when the physical resources are needed elsewhere.
If you can’t afford the hardware for universal high availability, then you have to plan your Admission Control Policy to prioritize high-value workloads. Or, if some of your VMs can tolerate downtime in emergency situations, try a percentage policy that lets you balance spare hardware capacity against production needs. However, keep in mind that vSphere’s percentage policy requires extra planning and a regular checkup as you add or modify cluster nodes.
Modeling for the future
Picking up on the theme of art vs. science from my last post, there’s always been, and always will be, an element of gut-feel to IT forecasting, and optimizing virtualization management is without exception.
Consider all the moving parts and variables around optimizing performance in a physical data center. When you’re taking full advantage of virtualization, you have about the same number of moving parts and variables in a single rack, maybe in a single server.
It’s hard to gut-feel all of that, so successful management involves keeping a watchful eye on virtual behaviors and reporting those that are amiss. Capacity planning requires tools for trending, forecasting and alerting that will project time and resource consumption limits based on growth rates. There are plenty of quantifiable factors you can pull in before you have to resort to gut-feel.
Get the guidebook: An Expert's Guide to Optimizing Virtualization Management
Delivering on the promise of virtualization is a matter of determining the right amount of available resources for the workload you and your users impose on your virtualization environment. Many companies we talk to report that they experienced a ROI in the first few months, quarters or even after years of virtualization efforts, until they suddenly realized they weren’t saving as much money anymore.
Our guidebook, An Expert's Guide to Optimizing Virtualization Management, is filled with concepts and strategies for uncovering the hidden ROI in the virtual data center. Have a look at it and see when you might be leaving money on the virtual table.
About John Maxwell
John Maxwell leads the Product Management team for Foglight at Dell Software. Outside of work he likes to hike, bike, and try new restaurants.
View all posts by John Maxwell |
Toad Data Point 3.8 is here, so what’s new?
There have been some added functionality to query development and the editor/grid.
There have also been some updates to automation.
There are some added features and options that are platform specific.
Some other notable changes and new features:
Data Compare files created in previous versions of Toad with the file extension (.dcp) remains the same and are still supported. If you open a Data Compare file created in a previous version of Toad, the file is automatically converted to the new XML format.
Some additional features added to the Toad Data Point Professional edition includes the following...
Toad Intelligence Central:
Note: This feature is available in the Toad Data Point Professional edition only and requires access to a Toad Intelligence Central server.
In both cases the script must be published and executed in Intelligence Central under the same Windows Active Directory account used in the Windows Authentication connection.
This release provides a new streamlined workflow for opening and using the following tools:
When you click the main toolbar button or select Tools, this action opens a new dialog where you can specify parameters for selecting the data to use. This new dialog can help you get started if you are a new user or help streamline your workflow if you are an experienced user.
You can continue to use the previous workflows: sending data directly from a data grid or object, or entering a query. These workflows are retained.
This release includes several enhancements to the Transform and Cleanse tool that was redesigned in release 3.7.
There are some additions to DBMS Support and Connections.
Other general enhancements and changes in the Professional edition:
For a full list and further details about new features, please refer to the Toad Data Point 3.8 Release Notes found in the Support Portal's Technical Documentation.