Best Design for a booking system

I am trying to create a booking database...but the design I keep coming up with makes me a bit uneasy. I don't really like it (because of massive joins involved in determining what time slots are available) but I don't see any other way to do this. So this is my design.
--This table stores incidences of booked time slots
TABLE:Booking_Incidence
BookingID
BookingStartDate (DateTime)
BookingEndDate (DateTime)
FK_UserID
--This Table stores the generally available booking times for each week.  Eg.  If users can book from 9:00am to 5:00pm monday to friday then there would be an entry with
slotstarttime = 9:00, slotendtime=17:00,sun=false,mon=true,tue=true, wed=true, thur=true, fri=true, sat=false
TABLE:General_Avail_Booking
SlotStartTime (Time)
SlotEndTime (Time)
Sun (boolean)
Mon (boolean)
Tue (boolean)
Wed (boolean)
Thur (boolean)
Fri (boolean)
Sat (boolean)
--This table stores any possible exceptions that might occur outside of the general booking times (eg a holiday).  bAvailable determines if the exception allows for a new booking, or cancels an existing one.
Table: Booking_Exceptions
SlotStartDate (DateTime)
SlotEndDate (DateTime)
bAvailable (boolean)
I use General_Avail_Booking and Booking_Exceptions to determine the possible times when users can actually book a time slot, and then store what time slots users book in Booking_Incidence.

You're thinking about the problem visually and so you have something that looks like a wall planner turned into SQL. Way too linear. A booked room is really an intersection between three dimensions - the room, the time it's booked for and the booking itself (who booked it, purpose, etc). If you track the bookings you can infer the times when the room is free.
The following code is very much an "it's almost Easter" spike and not guaranteed not to have its own problems.
SQL> CREATE TABLE booking
  2   (id number not null
  3     , booked_by varchar2(20) not null
  4     , booked_on date not null
  5     , CONSTRAINT book_pk PRIMARY KEY (id))
  6  /
Table created.
SQL> CREATE TABLE room
  2       (id number not null
  3        , location varchar2(10)
  4        , CONSTRAINT room_pk PRIMARY KEY (id))
  5  /
Table created.
SQL> CREATE TABLE slot
  2       (id number not null
  3        , slot_time varchar2(10)
  4        , CONSTRAINT slot_pk PRIMARY KEY (id))
  5  /
Table created.
SQL> CREATE TABLE booked_slot
  2   (room_id number not null
  3    , booked_date date not null
  4    , slot_id number not null
  5    , booking_id number not null
  6    , CONSTRAINT bslot_pk PRIMARY KEY (room_id, booked_date, slot_id)
  7    , CONSTRAINT bslot_book_fk FOREIGN KEY (booking_id)
  8       REFERENCES booking(id))
  9  /
Table created.
SQL> CREATE OR REPLACE TRIGGER bslot_bir BEFORE INSERT ON booked_slot
  2  FOR EACH ROW
  3  BEGIN
  4      :NEW.booked_date := trunc(:NEW.booked_date);
  5  END;
  6  /
Trigger created.
SQL>What I'm going to do here is have a little business rule that says you can't book a room for less than half an hour.
SQL> INSERT INTO slot VALUES (1000, '10:00')
  2  /
1 row created.
SQL> INSERT INTO slot VALUES (1030, '10:30')
  2  /
1 row created.
SQL> INSERT INTO slot VALUES (1100, '11:00')
  2  /
1 row created.
SQL> INSERT INTO slot VALUES (1130, '11:30')
  2  /
1 row created.
SQL> INSERT INTO slot VALUES (1200, '12:00')
  2  /
1 row created.
SQL> INSERT INTO slot VALUES (1230, '12:30')
  2  /
1 row created.
SQL> INSERT INTO slot VALUES (1300, '13:00')
  2  /
1 row created.
SQL> INSERT INTO slot VALUES (1330, '13:30')
  2  /
1 row created.
SQL> INSERT INTO room VALUES (1, '3/A')
  2  /
1 row created.
SQL> INSERT INTO room VALUES (2, '3/B')
  2  /
1 row created.
SQL> INSERT INTO room VALUES (3, 'Rm 8')
  2  /
1 row created.
SQL>Set done, let's book room 3/B for an hour and a half....
SQL> INSERT INTO booking VALUES (1, 'APC', sysdate)
2 /
1 row created.
SQL> INSERT INTO booked_slot VALUES (2, sysdate + 3, 1130, 1)
2 /
1 row created.
SQL> INSERT INTO booked_slot VALUES (2, sysdate + 3, 1200, 1)
2 /
1 row created.
SQL> INSERT INTO booked_slot VALUES (2, sysdate + 3, 1230, 1)
2 /
1 row created.
SQL>
But now the Easter Rabbit needs to book a room for two hours on Sunday. Which rooms are free?
SQL> SELECT room.location
  2  FROM   room
  3  WHERE  NOT EXISTS
  4         ( SELECT null
  5           FROM   booked_slot
  6           WHERE  room_id = room.id
  7           AND    booked_date = to_date('16-APR-2006')
  8           AND    slot_id BETWEEN 1000 AND 1200 )
  9  /
LOCATION
3/A
Rm 8
SQL>You'll notice the value of making the slot keys the same as the time they represent.
Of course, producing a map of availability is not that easy, but it should not that hard either.
Cheers, APC

Similar Messages

  • Best Practices for FSCM Multiple systems scenario

    Hi guys,
    We have a scenario to implement FSCM credit, collections and dispute management solution for our landscape comprising the following:
    a 4.6c system
    a 4.7 system
    an ECC 5 system
    2 ECC6 systems
    I have documented my design, but would like to double check and rob minds with colleagues regarding the following areas/questions.
    Business partner replication and synchronization: what is the best practice for the initial replication of customers in each of the different systems to business partners in the FSCM system? (a) for the initial creation, and (b) for on-going synchronization of new customers and changes to existing customers?
    Credit Management: what is the best practice for update of exposures from SD and FI-AR from each of the different systems? Should this be real-time for each transaction from SD and AR  (synchronous) or periodic, say once a day? (assuming we can control this in the BADI)
    Is there any particular point to note in dispute management?
    Any other general note regarding this scenario?
    Thanks in advance. Comments appreciated.

    Hi,
    I guess when you've the informations that the SAP can read and take some action, has to be asynchronous (from non-SAP to FSCM);
    But when the credit analysis is done by non-SAP and like an 'Experian', SAP send the informations with invoices paid and not paid and this non-SAP group give a rate for this customer. All banks and big companies in the world does the same. And for this, you've the synchronous interface. This interface will updated the FSCM-CR (Credit), blocking or not the vendor, decreasing or increasing them limit amount to buy.
    So, for these 1.000 sales orders, you'll have to think with PI in how to create an interface for this volume? What parameters SAP does has to check? There's an time interval to receive and send back? Will be a synchronous or asynchronous?
    Contact your PI to help think in this information exchange.
    Am I clear in your question?
    JPA

  • Is this the best design for asynchronous notifications (such as email)? Current design uses Web Site, Azure Service Bus Queue, Table Storage and Cloud Service Worker Role.

    I am asking for feedback on this design. Here is an example user story:
    As a group admin on the website I want to be notified when a user in my group uploads a file to the group.
    Easiest solution would be that in the code handling the upload, we just directly create an email message in there and send it. However, this seems like it isn't really the appropriate level of separation of concerns, so instead we are thinking to have a separate
    worker process which does nothing but send notifications. So, the website in the upload code handles receiving the file, extracting some metadata from it (like filename) and writing this to the database. As soon as it is done handling the file upload it then
    does two things: Writes the details of the notification to be sent (such as subject, filename, etc...) to a dedicated "notification" table and also creates a message in a queue which the notification sending worker process monitors. The entire sequence
    is shown in the diagram below.
    My questions are: Do you see any drawbacks in this design? Is there a better design? The team wants to use Azure Worker Roles, Queues and Table storage. Is it the right call to use these components or is this design unnecessarily complex? Quality attribute
    requirements are that it is easy to code, easy to maintain, easy to debug at runtime, auditable (history is available of when notifications were sent, etc...), monitor-able. Any other quality attributes you think we should be designing for?
    More info:
    We are creating a cloud application (in Azure) in which there are at least 2 components. The first is the "source" component (for example a UI / website) in which some action happens or some condition is met that triggers a second component or "worker"
    to perform some job. These jobs have details or metadata associated with them which we plan to store in Azure Table Storage. Here is the pattern we are considering:
    Steps:
    Condition for job met.
    Source writes job details to table.
    Source puts job in queue.
    Asynchronously:
    Worker accepts job from queue.
    Worker Records DateTimeStarted in table.
    Queue marks job marked as "in progress".
    Worker performs job.
    Worker updates table with details (including DateTimeCompleted).
    Worker reports completion to queue.
    Job deleted from queue.
    Please comment and let me know if I have this right, or if there is some better pattern. For example sake, consider the work to be "sending a notification" such as an email whose template fields are filled from the "details" mentioned in
    the pattern.

    Hi,
    Thanks for your posting.
    This development mode can exclude some errors, such as the file upload complete at the same time... from my experience, this is a good choice to achieve the goal.
    Best Regards,
    Jambor  
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Best Design : for a SOAP -XI - BAPI ( Multiple )

    Hi all,
    Need your suggestion on best design to implement a SOAP -XI - BAPI ( Multiple calls ) scenario.
    NON SAP Application will make a SOAP service call to XI. This service need to call 2 BAPI's ( 1st call to get some reqd params for second BAPI call ). Also secon call need a commit.
    Whats the best design :
    1. ABAP server proxy
    2. BPM ( to handle multiple calls )
    Thanks and cheers,
    Anisha.

    <b>>>>>>( 1st call to get some reqd params for second BAPI call ). Also secon call need a commit.</b>
    <i><u>1. ABAP server proxy</u></i>
    Here u can have explicit coding and have better control over the process interms u will call the first bapi and the result of it will be passed to exporting parameter of the second bapi as required.
    <u><i>2. BPM ( to handle multiple calls )</i></u>
    performance hinders as pointed out.

  • Best software for mac book pro

    I am a new mac user and having trouble finding the best software for mac.  Windows for mac and parallels desktop have been recommended to me.  There is such a significant price difference between the two, is there a difference in what they offer? Are there any other software options for mac that I should be looking into?

    new2mac0312 wrote:
    I am a new mac user and having trouble finding the best software for mac.
    http://bestmacsoftware.org/
    http://www.macupdate.com/
    Windows for mac and parallels desktop have been recommended to me. 
    There is such a significant price difference between the two, is there a difference in what they offer?
    Windows is a operating system from Microsoft, that costs more money.
    OS X is the operating system on your Mac, it came free with the Mac you bought.
    Parallels and VMFusion are paid virtual machine software that can run other operating systems like a programs inside other operating systems, there is a performance penalty, but it's easier for new users and those who don't need the full power of the hardware.
    There is also VirtualBox, it's free virtual machine software with less features, but doesn't suffer from forcing you to upgrade for more money like the commercial versions do.
    Virtual Machine software has the ability to run other operating systems and a large portion of their software, which makes it attractive.
    There is Apple's BootCamp, it's also free, which allows one to section their boot drive space (called a partition) and install Windows 7 (only) there, this way one can directly boot a Mac into Windows 7 for better performance for 3D games and other heavy CPU uses. Although it's easy, it can be a lot more problematic if there is a problem.
    So you have those choices to run plenty of software, from Windows based programs, to Mac ones to Linux ones too.
    Windows in BootCamp or Virtual Machine?

  • Database design for the Project System!

    Hi
    I need the database design schema for the Project System .
    For example with the transaction code CJ20N at the left side all the Project Hierarchy is tabulated.
    I want to  know the relations between tables ?
    Would you please help me ?

    look logical database PSJ with tcode SE36
    grx. A.

  • Best design for HA Fileshare on existing Hyper-V Cluster?

    Have a three node 2012 R2 Hyper-V Cluster. The storage is a HP MSA 2000 G3 SAS Block Storage with CSV's. 
    We have a fileserver for all users running as VM on the cluster. Fileserver availability is important and it's difficult to take this fileserver down for the monthly patching. So we want to make these file services HA. Nearly all clients are Windows 8.1,
    so SMB 3 can be used. 
    What is the best way to make these file services HA?
    1. The easiest way would probably be to migrate these fileserver ressources to a dedicated LUN on the MSA 2000, and to add a "general fileserver role" to the existing hyper-V cluster. But is it supported and a good solution to provide Hyper-V VM's
    and HA file services on the same cluster (even when the performance requirements for file services are not high)? Or does this configuration affect the Hyper-V VM performance too much?
    2. Is it better to create a two node guest cluster with "Shared VHDX" for the file services? I'm not sure if this would even work. Because we had "Persistent Reservation" warnings when creating the Hyper-V cluster with the MSA 2000. According "http://blogs.msdn.com/b/clustering/archive/2013/05/24/10421247.aspx",
    these warnings are normal with block storage and can be ignored when we never want to create Windows storage pools or storage spaces. But the Hyper-V MMC shows that "shared VHDX" work with "persistent reservations". 
    3. Are there other possibilities to provide HA file services with this configuration without buying new HW? (Remark: DFSR with two independet Fileservers is probably not a good solution, we have a lot of data that change frequently).
    Thank you in advance for any advice and recommedations!
    Franz

    Hi Franz,
    If you are not going to be using Storage Spaces in the Cluster, this is a warning that you can safely ignore. 
    It passes the normal SCSI3 Persistent Reservation tests, so you are good with those. Additional, when we use the cluster we can install the cluster CAU it will automatically install the cluster updates.
    The related KB:
    Requirements and Best Practices for Cluster-Aware Updating
    https://technet.microsoft.com/en-us/library/jj134234.aspx
    Cluster-Aware Updating: Frequently Asked Questions
    https://technet.microsoft.com/en-us/library/hh831367.aspx
    I’m glad to be of help to you!
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • What is the best utility for mac book pro 10.10.2

    What is the best utility/ antivirus program for a mac book pro running 10.10.2.

    Drewski66 wrote:
    What is the best utility/ antivirus program for a mac book pro running 10.10.2.
    Nothing that is not already incorporated in OS X 10.10.2.
    There will always be threats to your information security associated with using any Internet - connected communications tool:
    You can mitigate those threats by following commonsense practices
    Delegating that responsibility to software is an ineffective defense
    Assuming that any product will protect you from those threats is a hazardous attitude that is likely to result in neglecting point #1 above.
    OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "clean up", "speed up",  "optimize", "boost" or "accelerate" your Mac; to "wash" it, "tune" it, or to make it "shiny". Those claims are absurd.Such products are very aggressively marketed. They are all scams.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources.
    Illegally obtained software is almost certain to contain malware.
    "Questionable sources" include but are not limited to spontaneously appearing web pages or popups, download hosting sites such as C net dot com, Softonic dot com, Soft pedia dot com, Download dot com, Mac Update dot com, or any other site whose revenue is primarily derived from junk product advertisements.
    If you need to install software that isn't available from the Mac App Store, obtain it only from legitimate sources authorized by the software's developer.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iCloud, iTunes, or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose:Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Java can be disabled in System Preferences.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    The same precaution applies to Adobe Flash Player. Newly discovered Flash vulnerabilities appear almost weekly.
    Beware spontaneous popups: Safari menu > Preferences > Security > check "Block popup windows".
    Popup windows are useful and required for some websites, but unsolicited popups are commonly used to deceive people into installing unwanted software they would never intentionally install.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever receive a popup window indicating that your Mac is infected with some ick or that you won some prize, it is 100% fraudulent. Ignore it.
    The same goes for a spontaneously appearing dialog insisting that you upgrade your video player right this instant. Such popups are frequently associated with sites that promise to deliver "free" movies or other copyrighted content that is not normally "free".
    The more insistent it is that you upgrade or install something, the more likely it is to be a scam. Close the window or tab and forget it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. Most of these attempts are pathetic and are easily recognized, but that hasn't stopped prominent public figures from recently succumbing to this age-old scam.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • Implementation/Configuration/Best Practises for the Solman System.

    Hello Guys,
    In our landscape, we tried to configure the Solman system for Service Desk Functionality.
    But the system does not work as expected, I am sure there has been a lot of misconfiguration and setups.
    e.g.
    1. When we directly try to create a message to SAP from the Support Message it goes to the webpage but does not detect the system in SMSY (  shows the error that system is not maintained in SMSY though they are maintained there ).
    2. The S user Id is not detected.
    3. How should we connect and synchronize the Solman of our system with that of other external Solman system so that we can directly see the issues/support messages in the landscape of that Solman system.
    Similarly there are various questions related to the Solman.
    This is a learning project for us but soon we are to implement this in actual business scenarios.
    Can you please suggest any Best Practice kind of guide/document/paper for the purpose?
    PL guide guys,
    Thanks and Regards,
    Yuvi.

    Hi Fabricius,
    Thanks for providing that link.
    It lists a lot of information but not what we are looking for.
    e.g. If you see the Service Desk under Incident Management, in the prerequisites itself it says that "The Service Desk is configured for the Solution Manager according to the configuration guide."
    And this is exactly we are trying to do - Configure the SolMan system.
    Now which is this "Configuration Guide" mentioned in this prerequisite?
    In the "http://service.sap.com/instguides" ,or on SAPNET itself for that matter, I could not find it!
    Any idea?
    Pl help.
    Regards,
    Yuvi.

  • Best Design for Home Network Between PC and Mac

    Good day, all!
    Forgive me if this has been covered before - I could not find a thread addressing this very issue.
    I have an iMac, and my wife refuses to give up her PC.  She is also not that great at routinely backing up her PC laptop, leaving it to me to do it periodically.  To address this, I purchased an Airport Extreme and hooked up an external hard drive, hoping that she would use it (she doesn't).  I partitioned the hard drive such that half is formatted for TimeMachine (I periodically hook up my iMac physically to the hard drive to perform back ups) and the other half is formatted such that both the PC and Mac can access it, though neither can automatically back up to it.
    (If you've made it this far: thank you, thank you, thank you.)
    I would like to set up the network in a more efficient manner.  I realize that doing so will likely preclude me from taking advantage of the TimeMachine function, but I would like to design this home network such that my wife's computer will automatically back up to the hard drive (she has tons of pictures and does not routintely back them up) and allow all computers to easily access and "sync" with the external hard drive.  In other words, I would like to create a way in which the local hard drive of each computer (or a folder within) mirrors the contents of the network (Airport Extreme) hard drive.
    I understand that Dropbox sort of does this by having a folder on each machine that syncs with each other and with an off-site server, but I prefer to keep it local (and not pay a monthly fee).
    Is this possible?  Or should I simply maintain separate hard drives for each computer?
    I appreciate any and all help.
    James

    Ok, first be aware that Apple does NOT support Time Machine backups to an AirPort Disk (an external USB HDD connected to an 802.11n AirPort Extreme Base Station (AEBSn)). These may appear to work for a while, but it's only a matter of time before them become corrupted ... and I highly recommend that if your data is critical to stop using this method.
    At best, the AirPort Disk can be used for file storage. It may also be possible to use it with a Windows-based backup solution, but not Time Machine. One example product for Windows is Genie9's Genie Timeline Home which is similar to Time Machine in operation.
    With that said, the best backup performance (for either OS) would be to either use a dedicated external HDD attached to each device or to use a dedicated NAS device ... preferably connected by Ethernet. Some NAS devices also provide Time Machine support. One of them is the Drobo FS.

  • Hi please need suggestion for best design for jdbc-rfc-file

    Hi Gurus,
    actually our scenario is jdbc->XI( <-RFC->)->File
    Here our payload is around 5000 records
    can it be advisable to use rfc synchronous communication.
    The scenario will be exected only in night times.so can we schedule the adapter as we are using sp9.
    If not what must be the good design approach.
    And also after scheduling to a perticular period ,if there is any down time of XI server,will the process start immediately after the sever up or it will again watch for that perticular time.

    Hi,
    >>>can it be advisable to use rfc synchronous communication.
    - No, if there is no business requirement for realtime response.
    >>>can we schedule the adapter as we are using sp9
    - Not necessary.
    >>>Here our payload is around 5000 records
    - Is it requirement to send all 5000 records at once?? if not then distribute load whole day if possible.
    If you provide more information then maybe we can assist you.
    Regards,
    Gourav
    <i>Reward points if it helps you</i>

  • Best Design for Master data

    hi,
      I would like to get your suggestions on the data modelling:
      I have material, mat_plant and mat_sales.I need to create reports on these master data. But when i created a infoset on those 3 master data, one of my key figure "amount" is becoming 10 times like 1 line for material 10 lines for mat_plant and as a result the report is showing the key figure values 10 times of original value.
    Please advise what would be the best way to go...
    Thanks in advance...

    Adi,
       You will get 10 lines only. I guess you have 10 plants for that perticular Plants or sales.
    It should come reporting requirements. Please let us know what do you want to report?
    relation between 3 master data objects is... 1:N:N (0Material:0MAT_PLANT:0mat_sales).
    You can't avoid it... restrict by plant....
    Nagesh Ganisetti.

  • Best practices for ZFS file systems when using live upgrade?

    I would like feedback on how to layout the ZFS file system to deal with files that are constantly changing during the Live Upgrade process. For the rest of this post, lets assume I am building a very active FreeRadius server with log files that are constantly updating and must be preserved in any boot environment during the LU process.
    Here is the ZFS layout I have come up with (swap, home, etc omitted):
    NAME                                USED  AVAIL  REFER  MOUNTPOINT
    rpool                              11.0G  52.0G    94K  /rpool
    rpool/ROOT                         4.80G  52.0G    18K  legacy
    rpool/ROOT/boot1                   4.80G  52.0G  4.28G  /
    rpool/ROOT/boot1/zones-root         534M  52.0G    20K  /zones-root
    rpool/ROOT/boot1/zones-root/zone1   534M  52.0G   534M  /zones-root/zone1
    rpool/zone-data                      37K  52.0G    19K  /zones-data
    rpool/zone-data/zone1-runtime        18K  52.0G    18K  /zones-data/zone1-runtimeThere are 2 key components here:
    1) The ROOT file system - This stores the / file systems of the local and global zones.
    2) The zone-data file system - This stores the data that will be changing within the local zones.
    Here is the configuration for the zone itself:
    <zone name="zone1" zonepath="/zones-root/zone1" autoboot="true" bootargs="-m verbose">
      <inherited-pkg-dir directory="/lib"/>
      <inherited-pkg-dir directory="/platform"/>
      <inherited-pkg-dir directory="/sbin"/>
      <inherited-pkg-dir directory="/usr"/>
      <filesystem special="/zones-data/zone1-runtime" directory="/runtime" type="lofs"/>
      <network address="192.168.0.1" physical="e1000g0"/>
    </zone>The key components here are:
    1) The local zone / is shared in the same file system as global zone /
    2) The /runtime file system in the local zone is stored outside of the global rpool/ROOT file system in order to maintain data that changes across the live upgrade boot environments.
    The system (local and global zone) will operate like this:
    The global zone is used to manage zones only.
    Application software that has constantly changing data will be installed in the /runtime directory within the local zone. For example, FreeRadius will be installed in: /runtime/freeradius
    During a live upgrade the / file system in both the local and global zones will get updated, while /runtime is mounted untouched in whatever boot environment that is loaded.
    Does this make sense? Is there a better way to accomplish what I am looking for? This this setup going to cause any problems?
    What I would really like is to not have to worry about any of this and just install the application software where ever the software supplier sets it defaults to. It would be great if this system somehow magically knows to leave my changing data alone across boot environments.
    Thanks in advance for your feedback!
    --Jason                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           

    Hello "jemurray".
    Have you read this document? (page 198)
    http://docs.sun.com/app/docs/doc/820-7013?l=en
    Then the solution is:
    01.- Create an alternate boot enviroment
    a.- In a new rpool
    b.- In the same rpool
    02.- Upgrade this new enviroment
    03.- Then I've seen that you have the "radious-zone" in a sparse zone (it's that right??) so, when you update the alternate boot enviroment you will (at the same time) upgrading the "radious-zone".
    This maybe sound easy but you should be carefull, please try this in a development enviroment
    Good luck

  • Best design for historical data

    I'm searching a way to design some historical data.
    Here my case:
    I have millions of rows defining a population, each on 20-30 different tables.
    Those rows are related to one master subject area, let say it is a person.
    The details table are defining status in a period of time (marital status, address, gender (yes that may change in some cases!, program, phase, status, support, healthcare, etc). They have all two attributes that define the time period (dateFrom, dateTo), and one or many attributes that define the status of the person (the measure).
    I know we need a weekly situation for this population since 1998 to yet.
    Problems are those:
    1) the population we will analyze will count some 20 different criteria's (measures), may be we will divide those in some different datamarts to avoid to much complexity
    2) we will drill down from year to week, and will accomplish comparison like year to year, year to previous year, year to date, etc at each level of time hierarchy (year, quarter, month, week).
    The question is :
    1) do we need to transform our data at a week level for each person to determine the status at this level (the data may be updated and will cause this transformation to be refreshed) ?
    1) do we need to aggregate for each level because mixed situation exists due to fact that more than one status may exists for same person at a given time period (more than one status may exists in march by example, how to interpret it ?), that will cause to some logic to be applied, isn't ?
    We will be glad to hear some recommendation/idea about this !
    Thank You

    I would try to get some exact user requirements, with the dataset you have described there are millions of combinations of answers that can be defined and it will be difficult for you to fulfill them all in one place, especially if there are slowly changing dimensions involved.
    The user requirements will determine what levels you transform the data at.

  • Best solution for bringing new systems up to date with software updates

    I have read that I can create a non-deployed software update group that contains previous months patches and use that for reporting purposes to find out which systems do not have all the updates, but that is where my understanding falls short. 
    For some reason I am not getting how I can update new systems with all the updates before its existence in a domain, wrapped around my brain. 
    Can someone help me get this through my noggin please?
    Thank you 

    I understand how to deploy SUGs to a dynamic collection. 
    This is my dilemma:
    I currently piloting SCCM 2012 and bringing new systems into SCCM 2012 every 2 weeks to a month
    I have a monthly Patch Tuesday ADR configured that creates the SUG, but does not enable deployment, so I can ensure everything is in order before I enable it
    I then enable the deploy and target a collection that includes all of my pilot collections that consist of computers from remote sites so I do not have to deploy a SUG to each collection\
    Now this works great for me, BUT many of these systems that I bring into SCCM 2012 every 2 weeks to a month do not have the patches installed on them, so I am trying to understand how I am supposed to get all of those previous patches deployed to them. 
    Can you tell me if this solution would work:
    Put previous month's patches in a non-deployed compliance SUG and name it something like "2014 - Compliance Reporting" and use that for reporting purposes.
    Create another SUG and name it something like "2014 - Compliance Deployment". Then deploy the "2014 - Compliance Deployment" SUG to a collection containing systems that do not have the updates installed on them from the "2014
    - SUM Compliance Deployment" SUG. 
    OR
    Do I just simply deploy the "2014 - SUM Compliance Deployment" SUG without running any report and let the clients figure out what to install?
    OR
    Do I tell the remote site admins to manually update the system by going to the Windows Update site and after that, allow SCCM to take over after the systems have all been updated that way?

Maybe you are looking for

  • Rescuing a G4 and need help!

    Original hard drive in G4 started making bad noises and wouldn't boot. Was able to SuperDuper! it to my MacBook Pro (OSX 10.6) using an external enclosure and now have a .dmg file. The original drive then died -- less than two minutes after completio

  • Using Auto Suggest To Set The Value Of Multipe Form Fields

    I would like to use the Spry 1.5 Preview Auto Suggest widget to provide the value for multiple form fields based on the row the user selects in the auto suggestion data set. I've placed an example of what I want to do here: http://www.brucephillips.n

  • Headless Mac Mini feed CDs

    Can I somehow use disc sharing on my MBP to feed CD's to iTunes on a headless Mac Mini? And better yet, can I do it over the internet? I've set my Uncle up with a Mac Mini running his music via iTunes, using an iPad and "Remote" to control it. It's o

  • Creating Compound Primary Key in EJB

    Hi there, I'm creating a CMP EJB and am trying to use the Compund Primary Key option but I get the following error trace: [EXCEPTION] com.sap.engine.services.ejb.exceptions.BaseTransactionRolledbackLocalException: Exception in method com.nexeninc.sei

  • Where can i get a boot disc for a macbook?

    I had to replace a bad hard drive in a macbook, where to i get a boot disc to reload the os