TeraData Online Training

About TeraData

Teradata is a fully scalable relational database management system produced by Teradata Corp. It is widely used to manage large data warehousing operations. Teradata is basically a database, that is designed to handle analytical queries.

About Instructor

TeraData Online Training is provided by a real time consultant. The experience acquired by our trainer on TeraData, is promisingly helpful to the corporate trainee’s. Our instructors are experts in the implementation and support projects.  ASTS always works on real time scenarios. It is extremely useful for the professionals to handle the projects easily in the IT industry.

Prerequisites

  • Graduates/Post Graduates are eligible.
  • Everyone must have knowledge on SQL and PL/SQL.
  • Basic Knowledge on UNIX Shell Scripting.

Terms And Conditions

  • We will Provide Supporting to resolve Student practical Issues.
  • We will provide server Access and 100% Lab Facility.
  • Resume Preparation.
  • Interview Questions & Answers.
  • We will conduct mock interviews. Student also gets 100% supporting before and after getting job.

Course Content

Overview And New Feature

  • Architecture overview
  • Topology and terminology
  • Teradata Basic Concepts
  • Topology and terminology – Express
  • Main themes, product packaging and development tools
  • Overview of new features

Websphere Installation And Migration Installation And Migration

  • Installation overview
  • Profiles – details
  • V6 Install – Network deployment and express
  • Web server plug-in installation
  • Web sphere Application Server V6 migration

Websphere System Management

  • System management architecture
  • Resource scoping
  • Configuration repository
  • File synchronization
  • Administrative clients overview
  • Browser-based administrative console
  • Start/stop/monitor processes
  • Other commands
  • Build cell – add / remove nodes
  • Cell, deployment manager, node and node agent
  • Export and import configuration archives
  • Manage generic servers
  • Manage node groups
  • Application management overview
  • Application management install and uninstall
  • Application management Lab – install application
  • Managed application resources – enhanced EARs
  • Lab – enhanced EAR files
  • Fine -grained application update
  • Lab – application update
  • JDBC management
  • Manage Web server nodes
  • WRD Overview
  • WRD deployment automation
  • Administrative security

Websphere Security
Security

  • Overview and architecture
  • J2EE security for applications
  • Data Dictionary Objects
  • Java 2 security for applications
  • CSIv2 security
  • JACC
  • Security for system administrator
  • Authentication mechanism and user registries
  • Adding security fir J2C/JDBC resources
  • Adding security for JMS resources

Websphere Service Integration Technologies
Service Integration Technologies

  • Arc Overview
  • Architecture
  • Configuration service integration bus resources
  • Configuring JMS resources for service integration bus
  • Workload management(WLM) and high availability (HA)
  • Mediation

Websphere Workload Management And HighAvailability Workload Management And High Availability

  • Administrative details
  • Data replication services(DRS)
  • High Availability Overview
  • High Availability Details
  • Websphere Runtime Functions

Classloader And JNDI

  • lass loader Overview
  • Details
  • Examples
  • lass loader Overview
  • Problem determination and best practice
  • Dynamic application reload
  • JNDI Overview
  • JNDI Basics
  • JNDI Advanced
  • JNDI Examples
  • JNDI Problem determination
  • Transport channel service

Websphere Performance
Performance And Demonstrations

  • Application server performance overview
  • Web sphere Application Server dynamic cache
  • Performance advisor and Tivoli Performance Viewer(TPV)
  • Request metrics

Websphere Problem Determination
Problem Determination

  • Overview – where to start
  • Log files overview
  • Loading and tracing
  • Log and trace analyzer
  • Hung thread detection
  • Generating an IBM heap dump
  • Connection leak diagnostics

 

share this
Top ↑