Search Results

Search found 21433 results on 858 pages for 'query execution plans'.

Page 357/858 | < Previous Page | 353 354 355 356 357 358 359 360 361 362 363 364  | Next Page >

  • Organizing single page code well with Notepad++

    - by Hudson
    I've a c# file that will contain, most likely 10,000+ lines of code. I'd like to break this file into tabbed segments, so I can organize each method into a certain tab and label the tab something like : initial setup, helper functions,execution logic,list structures,global variables, etc. If I were using PHP I would have separate files and use include(); to include the separate files. What can be done, following the same style, with c#?

    Read the article

  • Improved Maven Embedded GlassFish - deploy multiple apps

    - by alexismp
    Bhavani has some new over at java.net about the Maven Plugin for GlassFish and how it now supports the ability to deploy multiple applications. He also has a Tips, Tricks and Troubleshooting entry. Multiple deployments are done during the Maven pre-integration-test phase but with a goal-specific configuration for app, contextRoot, etc... The :run (all-in-one) execution also now supports admin and deploy goals. Note that these improvements will require a recent work-in-progress 4.0 version of GlassFish.

    Read the article

  • Spring AOP advice order

    - by Chetter Hummin
    In Spring AOP, I can add an aspect at the following locations before a method executes (using MethodBeforeAdvice) after a method executes (using AfterReturningAdvice) around a method (both before and after a method executes) (using MethodInterceptor) If I have all three types of advice, is the order of execution always as follows? Around (before part) Before Method itself After Around (after part)

    Read the article

  • Téléchargez gratuitement la suite LEONARDI V8.2, l'environnement open-source pour les applications métier

    Téléchargez gratuitement la suite LEONARDI V8.2 L'environnement open-source pour les applications métier LEONARDI est une suite logicielle complète, composée d'un atelier de conception graphique et d'un moteur d'exécution. Elle permet de créer rapidement et d'exécuter des applications sur mesure, qu'elles soient autonomes ou déployées sur le web. [IMG]http://demo.lyria.com/freeversion/images/leonardi.gif[/IMG] LEONARDI permet aux développeurs de se concentrer sur le fonctionnel métier plutôt que sur la technologie, en procédant d'abord par modélisation et par configuration, puis par programmation Java ciblée quand cela s'avère nécessaire. Le nom...

    Read the article

  • Organization &amp; Architecture UNISA Studies &ndash; Chap 13

    - by MarkPearl
    Learning Outcomes Explain the advantages of using a large number of registers Discuss the way in which compilers optimize register usage Discuss the evolution of CISC machines Describe the characteristics of RISC architecture Discuss the RISC vs. CISC controversy Describe the way in which RISC and CISC design principles can be combined Instruction Execution Characteristics To understand the the line of reasoning of RISC advocates, we need a brief overview of instruction execution characteristics. These include… Operations Operands Procedure Calls These three sections can be studied in depth in the textbook at pages 503 - 505 A number of groups have come up with the conclusion that the attempt to make the instruction set architecture closer to HLLs (High Level Languages) is not the most effective design strategy. Rather HLL’s can be best supported by optimizing performance of the most time-consuming features of typical HLL programs. Generally 3 main characteristics came up to improve performance… Use a large number of registers or use a compiler to optimize register usage Careful attention needs to be paid to the design of instruction pipelines A simplified (reduced) instruction set is indicated The use of a large register optimization One of the most important design principles of RISC machines is the use of a large number of registers. The concept of register windows and the use of a large register file versus the use of cache memory are discussed. On the face of it, the use of a large set of registers should decrease the need to access memory. The design task is to organize the registers in such a fashion that this goal is realized. Read page 507 – 510 for a detailed explanation. Compiler-based register optimization   Reduced Instructions Set Architecture There are two advantages to smaller programs… Because the program takes up less memory, there is a savings in that resource (this was more compelling when memory was more expensive) Smaller programs should improve performance, and this will happen in two ways – fewer instructions means fewer instruction bytes to be fetched and in a paging environment smaller programs occupy fewer pages, reducing page faults. Certain characteristics are common to RISC processors… One instruction per cycle Register-to-register operations Simple addressing modes Simple instruction formats RISC vs. CISC After initial enthusiasm for RISC machines, there has been a growing realization that RISC designs may benefit from the inclusion of some CISC features CISC designs may benefit from the inclusion of some RISC features

    Read the article

  • SQL Performance Analyzer

    Any activity that may impact a statement's execution plan is a candidate for using SPA to investigate the possible consequences - both good and bad. Steve Callan discusses the workflow and provides a working example.

    Read the article

  • Windows Media Player Vulnerability, PCAnywhere Warning

    Windows Media Player Vulnerability Targeted by Drive-by-download Attack Security firm Trend Micro recently released details on malware that has been targeting the MIDI Remote Code Execution Vulnerability found in Microsoft's Windows Media Player. A post on Trend Micro's Malware Blog offered further insight into the malware that has been exploiting the CVE-2012-0003 vulnerability. The malware's authors have been successful in exploiting the vulnerability by tricking unsuspecting victims into opening a specially engineered MIDI file in Windows Media Player. This Web-based drive-by-download ...

    Read the article

  • Traits of a DBA - Part One – The Technical Side

    What does it take to become a database administrator, or what kinds of traits should I be looking for when I am hiring a DBA. Those traits can be summarized it two categories: Technical and Personal. In this article, Greg Larsen discusses the technical traits a DBA should have. Free eBook - Performance Tuning with DMVsThis free eBook provides you with the core techniques and scripts to monitor your query execution, index usage, session and transaction activity, disk IO, and more. Download the free eBook.

    Read the article

  • Struggling with errors on POS_SUPPLIER_SEARCH_INDEX.sql when applying a Procurement Patch?

    - by LindaJ-Oracle
    Check out this new note (Doc ID 1677737.1)  - How to troubleshoot issues on script POS_SUPPLIER_SEARCH_INDEX.sql which helps you troubleshoot and resolve this common error on patch application: ORA-20000: possearchindex.sql(500): ORA-20000: Exception atPOS_SUPPLIER_SEARCH_INDEX_PKG.create_index(1800): ORA-20000: Exception atPOS_SUPPLIER_SEARCH_INDEX_PKG.create_index(1800): ORA-29855: error occurred inthe execution of ODCIINDEXCREATE routineORA-20000: Oracle Text error:DRG-10502: index POS_SUPPLIER_SEARCH_INDEX does not existDRG-11135: feature not generally available

    Read the article

  • Unittest test case only touches the file name

    - by Chen OT
    I was told that unittest is fast and the tests which touches DB, across network, and touches FileSystem are not unittest. In one of my testcases, its input are the file names (amount about 300~400) under a specific folder. Although these input are part of file system, the execution time of this test is very fast. Should I moved this test, which is fast but touches file system, to higher level test?

    Read the article

  • Resolving "Error accessing a table..." Error

    Are you encountering an error message during DB2 database startup? Or during the execution of Alter Tablespace SQL command? If ';yes';, then the three possible reasons for the error message are, contai... [Author: Mark Willium - Computers and Internet - May 13, 2010]

    Read the article

  • iptables change destination address base on result from mysql

    - by user1812225
    I need to change destination address of tcp/ip packets based on result of execution mysql query... SELECT `score` FROM `reputation` WHERE `ip` = packet.source_ip if (score < a) then packet.destination_ip = ... else packet.destination_ip = ... What ways of solving this problem do you see? Thanks. P.S. this is important that destination host knows REAL ip address where packet came from, not IP address of firewall.

    Read the article

  • Microsoft met fin à l'AutoRun des périphériques USB sur les anciennes versions de Windows, mais le maintient pour les CD/DVD

    Microsoft met fin à l'AutoRun des périphériques USB Sur les anciennes versions de Windows, mais le maintient pour les CD/DVD Une mise à jour spéciale de Windows vient d'être délivrée dans le cadre du « Patch Tuesday » de ce mois de février. Elle concerne le comportement de l'AutoRun (exécution automatique) sur les versions de Windows antérieures à Windows 7 et Windows Server 2008 R2. Après l'application de ce match (KB971029), l'apparition automatique du menu d'options à exécuter sur le périph...

    Read the article

  • Microsoft Patches Internet Explorer 9, Launches YourBrowserMatter

    Due to the critical status of the Internet Explorer 9 fix, any users with the recommended Windows Update setting of install updates automatically enabled should receive it by default. Microsoft urges users with automatic updates disabled to install the fix manually via Windows Update. IT administrators in charge of handling organizations are urged to do the same using their go-to software for managing patches in-house. Of the eight vulnerabilities targeted by the IE9 update, the most crucial make it possible for remote code execution to occur on PCs where users have visited certain affecte...

    Read the article

  • Is the test, which touches the filenames under directory, a kind of unittest? [on hold]

    - by Chen OT
    I was told that unittest is fast and the tests which touches DB, across network, and touches FileSystem are not unittest. In one of my testcases, its input are the file names (amount about 300~400) under a specific folder. Although these input are part of file system, the execution time of this test is very fast. Should I moved this test, which is fast but touches file system, to higher level test?

    Read the article

  • Windows 8 : Microsoft dépose un nouveau brevet, qui rends encore plus plausible l'existence d'un mode "Direct Experience"

    Windows 8 : Microsoft dépose un nouveau brevet, qui rends encore plus plausible l'existence d'un mode "Direct Experience" Mise à jour du 06.02.2011 par Katleen En août 2010, nous vous parlions de l'hypothétique mode "Direct Experience", qui pourrait être disponible dans la prochaine version de Windows (voir news précédentes) et dont la but serait d'accélérer l'exécution de contenus multimédias. En gros, il permettrait à l'OS de démarrer sous différents modes suivant les besoins spécifiques détectés (par exemple, si un DVD est inséré dans...

    Read the article

  • Le W3C valide le standard CSS Media Queries, pour l'affichage dynamique des pages Web en fonction des tailles d'écran

    Le W3C valide le standard CSS Media Queries permettant d'adapter dynamiquement des pages Web en fonction des tailles d'écran Avec la prolifération des terminaux de différentes tailles d'écran (tablettes, téléphones mobiles, etc.), les développeurs Web faisaient face à un problème d'adaptation de l'affichage de leur site en fonction de la taille de l'écran du dispositif d'exécution. Les CSS Medias Queries introduits par CSS 3, ont permis de résoudre ce problème en définissant des techniques pour l'application de feuilles de styles en fonction des périphériques de consultation utilisés. Cette fonctionnalité offre aux développeurs des moyens permettant de définir des règles d'afficha...

    Read the article

  • Multiple vulnerabilities in Ghostscript

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2009-4270 Denial of Service (DoS) vulnerability 9.3 Ghostscript Solaris 10 SPARC: 122259-05 X86: 122260-05 CVE-2010-1628 Memory Corruption vulnerability 9.3 CVE-2010-1869 Buffer Overflow vulnerability 9.3 CVE-2010-2055 Arbitrary Code Execution vulnerability 7.2 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Le web devrait-il se débarrasser des plugins pour offrir une meilleure sécurité aux internautes ? Firefox 26 bloque par défaut les plugins

    Le web devrait-il se débarrasser des plugins pour offrir une meilleure sécurité aux internautes ? Firefox 26 bloque par défaut ceux-ciLa sécurité des utilisateurs de Firefox représente un point important pour la fondation Mozilla. Dans la prochaine version de son navigateur, Firefox 26, qui est actuellement téléchargeable en version bêta, l'organisme a bloqué l'exécution par défaut des plugins.« Les plugins périmés sont une grande source de failles de sécurité. Ils devront être exécutés désormais...

    Read the article

  • SQL Server 2012 Integration Services - Project Deployment

    SQL Server 2012 Integration Services parameters introduce a new way of dealing with package development, deployment, and execution. In order to truly appreciate their relevance, it is necessary to take a look at the new Project Deployment Model. Get smart with SQL Backup ProGet faster, smaller backups with integrated verification.Quickly and easily DBCC CHECKDB your backups. Learn more.

    Read the article

  • Nuget Commands

    - by kasi
    .Net Packages can be installed/uinstalled through the "Package Manager console" or through the VS 2010 option  "Tools" > "Library Package Manager" > "Add Library package reference" : CodePlex under getting started section http://nuget.codeplex.com/documentation?title=Package%20Manager%20Console%20Command%20Reference lists all the commands that are available for execution in package manager console.

    Read the article

  • Avoiding Parameter Sniffing in SQL Server

    Parameter sniffing is when SQL Server compiles a stored procedure’s execution plan with the first parameter that has been used and then uses this plan for subsequent executions regardless of the parameters. Get your SQL Server database under version control now!Version control is standard for applications, but databases haven’t caught up. So how can you bring database development up to speed? Why should you start? Find out…

    Read the article

  • Multiple vulnerabilities in Webmin

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2981 Improper Input Validation vulnerability 6.0 Webmin Solaris 10 SPARC: 145006-04 X86: 145007-04 CVE-2012-2982 Arbitrary code execution vulnerability 6.5 CVE-2012-2983 Improper Authentication vulnerability 5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

< Previous Page | 353 354 355 356 357 358 359 360 361 362 363 364  | Next Page >