programming4us
programming4us
DATABASE
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >  |  Displaying page 1 of 16, items 1 to 40 of 625.
Oracle SOA Suite 11g R1 : Unit-testing the Composite Application - Automated unit testing (part 5) - Testing the application
After the test has completed, the Test Runs tab opens. Select Search if your test run is not showing. You see that the overall status is marked as Failed
Oracle SOA Suite 11g R1 : Unit-testing the Composite Application - Automated unit testing (part 4) - Setting the assertion for failure
For Assert Value enter 9999. Normally you set the assert value to what you expect the value to be but this example is to show you what happens when your test fails. You know this assertion will fail because the initial payload that you supply has customer ID as 1111.
Oracle SOA Suite 11g R1 : Unit-testing the Composite Application - Automated unit testing (part 3) - Setting the simulated message, Setting the assertion for success
Click on Generate Sample to have a sample response created automatically for you and edit the XML fragment to change the response value to VALID to simulate what the web service would return in response when the credit card number is valid.
Oracle SOA Suite 11g R1 : Unit-testing the Composite Application - Automated unit testing (part 2) - Setting the inbound message
In the Initiate Messages dialog that appears, insert the following payload (copy from the c:\po\input\po-unittest.txt file).
Oracle SOA Suite 11g R1 : Unit-testing the Composite Application - Automated unit testing (part 1) - Creating the unit test
Notice that the composite view changes slightly to show you are in Unit Test creation mode now. The swim lanes on the left and right are yellow. You can return to the normal composite editor by selecting the Return to SOA composite diagram button at the top of the window.
SQL Server 2012 : Using SQLdiag Configuration Manager (part 4) - Adding Your Own Custom Collectors,Saving and Using a SQLdiag Configuration
Now that you know how to configure the SQLdiag collection based on the data you need to collect, this section describes how to save the configuration package, as this tool was released to work with SQL Server 2008 R2, 2008, and 2005 versions.
SQL Server 2012 : Using SQLdiag Configuration Manager (part 3) - Feature-Specific Custom Diagnostics, Capturing Extended Events
The Diag Manager also provides you with some feature-specific custom collectors that can be very helpful when you are troubleshooting a particular SQL Server scenario or feature.
SQL Server 2012 : Using SQLdiag Configuration Manager (part 2) - Backing Up Diagnostic Data Already Available, Analysis Services Custom Collectors
Normally, Profiler trace filters are added to a SQL Server data collection to reduce the amount of diagnostic data that is collected by SQLdiag.
SQL Server 2012 : Using SQLdiag Configuration Manager (part 1) - Configuring SQLdiag Data Collection Using Diag Manager
If you forget to select the platform or the SQL Server version and need to make a change later or post the customizations made, you will lose any changes made and the options will default to the template selected.
SQL Server 2012 : Native File Streaming - Storing and Retrieving FILESTREAM Data
To start, you’ll use plain T-SQL to cast simple string data into and out of the varbinary(max) data type of the Photo column.
SQL Server 2012 : Native File Streaming - Creating a FILESTREAM-Enabled Database
Behind the scenes, SQL Server will store all your pictures as files in the Photos subdirectory, and will transparently associate those files and the relational tables that they logically belong to in columns defined as varbinary(max) FILESTREAM.
SQL Server 2012 : Native File Streaming - Enabling FILESTREAM
Like many other features, FILESTREAM is disabled by default in SQL Server 2012, and you must first enable it before the feature can be used. Enabling FILESTREAM is slightly more involved than enabling other SQL Server features because it requires two distinct steps.
SQL Server 2012 : Native File Streaming - Traditional BLOB Strategies, Introducing FILESTREAM
Prior to SQL Server 2008, there were two traditional solutions for combining structured table data with unstructured BLOB data: either keep BLOBs in the database (with all your structured table data), or store them outside the database (in the file system).
SQL Server 2012 : Consolidating Data Capture with SQLdiag - Getting Friendly with SQLdiag (part 2) - Using SQLdiag as a Service
The third way you can collect data using SQLdiag is with a Windows service. You can use the /R parameter to register the utility as a service, and /U to unregister the tool as a service.
SQL Server 2012 : Consolidating Data Capture with SQLdiag - Getting Friendly with SQLdiag (part 1) - Using SQLdiag as a Command-line Application
Before looking at the basics of running a SQLdiag data collection, you should first understand the anatomy of the SQLdiag configuration file in order to appropriately configure the various data collectors for capturing diagnostic data.
SQL Server 2012 : Consolidating Data Capture with SQLdiag - The Data Collection Dilemma, An Approach to Data Collection
One of the biggest issues a SQL Server professional faces when troubleshooting a complex SQL Server problem is the data collection task.
SQL Server 2012 : Troubleshooting Methodology and Practices - Data Analysis, Validating and Implementing Resolution
After data collection, data analysis is the second iterative activity required to identify the problem’s root cause. It may be necessary to perform data analysis multiple times for a single problem, including data from multiple sources and formats.
SQL Server 2012 : Troubleshooting Methodology and Practices - Data Collection
When the problem is defined and well understood, and the success criteria have been agreed upon, the next step is to gather data. What data you should gather depends on the problem and what (if any) work has already been completed.
SQL Server 2012 : Troubleshooting Methodology and Practices - Defining the Problem
Investing time to understand the problem and application environment often leads to a higher-quality and faster problem resolution. While it is tempting to focus on immediately resolving the problem, complex problems are rarely resolved until causes are fully understood.
SQL Server 2012 : Troubleshooting Methodology and Practices - Approaching Problems
Developing a professional methodology to managing problems will lead to a less stressful time at work, help make work more rewarding, and differentiate you from others.
Two Is Better Than One - WD My Cloud Mirror
As we have noted in our May issue, cloud storage is getting more popular. To capitalize on this and to offer users an alternative to services like Google Drive and Dropbox, Western Digital has its My Cloud series of personal cloud storage devices. And the latest to join this series of storage devices is the My Cloud Mirror.
Data In A Pinch - Kingston Mobile Lite Wireless G2
The Kingston Mobile Lite Wireless G2 is described as a ‘wireless media reader’—it says so right on the box, but that’s selling it short. It’s actually a ‘wireless media reader that is also a portable Wi-Fi/LAN/3G router and a backup battery charger all-in-one’, but I guess that won’t fi t.
SQL Server 2012 : Policy Based Management - Evaluating Policies
Of course, policies would be purely academic if they never actually executed and evaluated any objects. Policies may be set for On Schedule, On Demand, On Change, or Log Only. Policies must be enabled using their context menu. On demand policies may not be enabled.
SQL Server 2012 : Defining Policies (part 3) - Creating Policies
If the facet property is the fact and the condition the brain, the policy is the muscle. Policies define how and where the condition is applied and enforced.
SQL Server 2012 : Defining Policies (part 2) - Conditions
Conditions are the second step in the chain and provide the logical connection between facet properties and policies. Most of the key policy design decisions are made while creating conditions.
SQL Server 2012 : Defining Policies (part 1) - Management Facets
A brilliant-cut diamond has 58 facets. PBM has 84 management facets.. The easiest way to see all the facets is to open the Facets node under Management → Policy Management
SQL Server 2012 : Validating Server Configuration (part 2) - Evaluate the Policy, Using the Central Management Server
Having created a policy, you should evaluate it to see whether your server is in compliance. If you select Evaluate from the context menu of the Server Security Policy policy, you will launch the Evaluate Policies dialog box, shown in Figure 3.
SQL Server 2012 : Validating Server Configuration (part 1) - The Need for a Policy, Create Policy on a Local Server
Chances are if you work for a company that has gone through a compliance certification, you realize that it takes a lot of time and effort. Once you are considered compliant, staying in compliance is important.
SQL Server 2012 : Encryption (part 2) - Certificate-Based Encryption, Transparent Data Encryption
In the previous section, you encrypted data and protected the symmetric key by using a password. Although this is a perfectly acceptable way of protecting the key, the problem is that whenever you want to access the encrypted data, you will have to specify a password.
SQL Server 2012 : Encryption (part 1) - Encryption Primer, Password-Based Encryption
Encryption is the process of obscuring information to make it unreadable to those who do not possess some special knowledge. The history of encryption dates far back to the days of Julius Caesar where he used a special algorithm called the Caesar shift cipher to protect military messages.
SQL Server 2012 : Auditing in SQL Server (part 3) - Database Audit Specification Object, User-Defined Audit Event
If you want to audit events that occur within a database, you will need to define a database audit specification. To create one, you can select New Database Audit Specification from the Database Audit Specification node of the Security node of a specific database in SSMS.
SQL Server 2012 : Auditing in SQL Server (part 2) - Server Audit Specification Object
Now that you have created a server audit object, you can start writing auditing events to it. In this example, let’s audit all failed logins. Since logins affect more than one database, you need to create a server audit specification.
SQL Server 2012 : Auditing in SQL Server (part 1) - Auditing Objects, Server Audit Object
When you want to perform an audit, you have the option to write audit data to one of three places. First, you can write audit data to the Windows Application log. Next, you can write data to the Windows Security log. Finally, you can write audit data to the file system.
SQL Server 2012 : Reordering Nodes within the Hierarchy - The GetReparentedValue Method,Transplanting Subtrees
Reorganizing the nodes within the tree structure is a common maintenance task when working with hierarchies. You might need to alter the tree structure by adjusting the parent-child relationships within the hierarchy.
SQL Server 2012 : Querying Hierarchical Tables - The IsDescendantOf Method
With a hierarchical table populated and indexed, you’re ready to start writing efficient queries against it using some more methods available on the hierarchyid type.
Protecting SQL Server Data : Obfuscation Methods (part 4) - Truncation,Encoding, Aggregation
An advantage of this approach is that the data that is provided to the user is only that which they need for their reporting and analysis requirements, so the potential for the leakage of sensitive data is greatly reduced.
Protecting SQL Server Data : Obfuscation Methods (part 3) - Numeric Variance,Nulling
Numeric variance is a process in which the numeric values that are stored within a development database can be changed, within a defined range, so as not to reflect their actual values within the production database.
Protecting SQL Server Data : Obfuscation Methods (part 2) - Repeating Character Masking
Over recent years the information that is presented on a credit card receipt has changed. In the past, it was not uncommon to find the entire primary account number printed upon the receipt.
Protecting SQL Server Data : Obfuscation Methods (part 1) - Character Scrambling
Character scrambling is a process by which the characters contained within a given statement are re-ordered in such a way that its original value is obfuscated. For example, the name "Jane Smith" might be scrambled into "nSem Jatih".
SQL Server 2012 : Managing Resources - Limiting Resource Use, Leveraging Data Compression
Another way to control performance is to just prevent the processes from using as much of the CPU, memory, or disk space as possible. If any one process can’t access very much memory, more memory is available to all the other resources.
 
Soccer Highlights
- VIDEO Marseille 2 – 2 PSG (Ligue 1) Highlights
- VIDEO Real Madrid 3 – 0 Eibar (La Liga) Highlights
- VIDEO Udinese 2 – 6 Juventus (Serie A) Highlights
- VIDEO Tottenham Hotspur 4 – 1 Liverpool (Premier League) Highlights
- VIDEO Celta 0 – 1 Atletico Madrid (La Liga) Highlights
- VIDEO Everton 2 – 5 Arsenal (Premier League) Highlights
- VIDEO Torino 0 – 1 Roma (Serie A) Highlights
- VIDEO Benevento 0 – 3 Fiorentina (Serie A) Highlights
- VIDEO AC Milan 0 – 0 Genoa (Serie A) Highlights
- VIDEO Troyes 0 – 5 Lyon (Ligue 1) Highlights
- VIDEO Nice 1 – 2 Strasbourg (Ligue 1) Highlights
- VIDEO Atalanta 1 – 0 Bologna (Serie A) Highlights
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
programming4us
 
 
programming4us