(Sateesh Kumar) Up to now, I have seen so many applications that will show system usage in terms of memory, processor…But, A user don’t want this all details. He May expect to know how much time, he is spending on each application like browser, Winamp by the end of day…This application will help
Author: SSWUG Research
Oracle Applications 11i and PCI Compliance
The recent OAUG "Automating Compliance Survey" (OAUG login required) showed 7% of the organizations surveyed responded as being compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), while 19% were in the process of planning or implementing and 71% were either not planning or n
Show 52: Best practices from the user point of view, best data practices, 60 second tip and more.
Pro-Center Video Programming for IT Professionals
XForms tip: Enabling cross-domain loading and sending in Firefox
(Tyler Anderson) XForms with Firefox has a built-in security feature that inhibits users from “cross-domain” loading and sending of instance data. Just like pop-ups, you don’t want this to happen by default unless you trust the Web site. You shouldn’t have to worry about it since this security featu
How To Compare Two Files using HMACSHA1 with VB.NET or VB2005
(Mike McIntyre) This article is similar to the article How To Compare Two Files with VB.NET and VB2005.
CHECKDB (Part 7): How long will CHECKDB take to run?
(Paul Randal) This is a question I see every so often and it cropped up again this morning so I’ll use it as the subject for this week’s blog post.
Use Ajax with PHP and DB2 9 – Xajax
(Deepak Vohra) PHP is a scripting language commonly used in developing Web applications. Asynchronous JavaScript and XML (Ajax) is a Web technique that combines JavaScript, Document Object Model (DOM), and XMLHttpRequest technologies to provide dynamic interactions between a client and a server. Var
URL Decoding in pure T-SQL
(orinoco77) This is a short article on how to perform URLDecoding in T-SQL. It’s something I recently had to do and I struggled to find an adequate solution in the public domain, so I decided to write my own. The way it is done is somewhat unusual in that the hexadecimal numbers that denote encoded
Windows Communication Foundation – Part 2
(Thiru Thangarathinam) In Part 1 of this article series, you have seen the use of data contracts and service contracts and the steps involved in leveraging IIS to host WCF services. In this installment, you will be provided with the detailed understanding of implementing message and fault contracts
Regular Expression Classes in .Net
(Peter Aitken) Regular expressions are a powerful tool for matching, validating, and manipulating text. In the first article of this series, we looked at the elements and syntax of regular expressions and saw how you can use regular expressions to define templates to match any imaginable text elemen
