(Justin Swanhart) A list is simply a list of things. The list has no structure, except in some cases, the length of the list may be known. The list may contain duplicate items. In the following example the number 1 is included twice.
Other News
DB2 Merge Backup: When some deltas make a full
(Henrik Loeser) I sometimes teach Data Management at university and one topic is backup strategies. We then discuss what is needed for a point-in-time recovery and what can be done to minimize the time needed for the recovery process.
Using jQuery’s Deferred Functionality For Asynchronous Configuration
(Ben Nadel) Yesterday, I started looking into a JavaScript pub/sub (publish and subscribe) library that provided asynchronous utility methods. These methods provided UUIDs (universally unique identifiers) and normalized timestamps in order to simplify the development of realtime applications across
Analyzing Performance Data in PowerPivot
(KayUnkroth) PowerPivot is an absolutely fantastic performance analysis tool. You might say that I’m biased, but wait until you see firsthand how easy it is to analyze large amounts of performance data from any number of computers.
Migrating InfoSphere Streams SPADE applications to SPL, Part 3: Migrate SPADE user-defined function applications
(Kevin Erickson and Richard P. King) The most significant new feature of Version 2.0 of the IBM InfoSphere® Streams product is the programming language model transformation from Stream Processing Application Declarative Engine (SPADE) to Stream Processing Language (SPL).
No More Injection
No More Injection Really! It’s time to move on to other topics. So today I want to close out on our discussion of application injection with some final reader’s comments. Next time we will be moving on to another topic of interest. One thing I would encourage you to look into if you haven’t heard the term before is Blind […]
Injection Prevention Tips and Techniques
SelecTViews With Stephen Wynkoop Find out about business intelligence trend surveys, MySQL in the cloud…the latest news and your SQL Server BI tip for the day. [Watch the Show] Injection Prevention Tips and Techniques In the last couple of newsletters I have provided some code examples of how to prevent SQL Injection. The short answer was to use strongly typed […]
Change default Port of the ASP.NET Development Server
In this programming tutorial we will learn how to change default Port of the ASP.NET Development Server. Today one of my friend got alert message when he tried to view page in browser.
Giving RDF Datasets more Affordance
(Leigh Dodds) I’m a big fan of SPARQL, I constantly use it in my own development tasks, have built a number of production systems in which the query language is a core component, and wrote (I think!) one of the first SPARQL tutorials back in 2005 when it was still in Last Call.
Using the Entity Framework and the ObjectDataSource: Custom Paging
(Phil Fresle) Readers maybe familiar with the Entity Framework (EF) tutorials on the asp.net web site (http://www.asp.net/entity-framework/tutorials). The latest addition to the series “Continuing with the Entity Framework” is an excellent tutorial on using version 4 of the Entity Framework in a web
