“C:\Program Files\KDiff3\kdiff3.exe” %base %mine %theirs -o %merged –L1 Base –L2 Mine –L3 Theirs
C:\Program Files (x86)\Meld\Meld.exe -n
just for fun
“C:\Program Files\KDiff3\kdiff3.exe” %base %mine %theirs -o %merged –L1 Base –L2 Mine –L3 Theirs
C:\Program Files (x86)\Meld\Meld.exe -n
Tik Tik Tik bunyi hujan di atas genteng,
Airnya turun tidak terkira
Cobalah tengok, dahan dan ranting,
Pohon dan kebun basah semua.
While recently answering a post on the MSDN forum, I realized that the Robert Gold(Vice President of Business Intelligence in Bostwick Laboratories, Inc) was facing the same problem that I was facing couple of years back when I was working as a Team Leader in one of the BPO’s. The MIS Department was reporting to me and one of the main jobs was to create “Trackers” for various departments. My team used to take hours to design a particular tracker only to realize after few days that the users were spoiling the format of the tracker by copying and pasting. Completely protecting it with a password was not the option. Nor did we find any option in Excel which forced selective pasting. It was then we devised this macro which allowed the user to paste but behind the scenes, converted that paste into paste special – values.
The only drawback of this method is that if the macros are disabled then this won’t work. But thanks to the IT Department, they ensured that the macros was enabled on each and every pc. After that we never faced a problem with users messing up the format of the sheet.
So how does this code work? What is the logic behind it? I would explain this in 3 sections.
Briefly,
selectMethod=cursor
selectMethod=direct
selectMethod=direct
selectMethod=cursor
direct
it has already paid the cost of retrieving data it will essentially throw away; with cursor
the waste is limited to at most batch-size – 1 rows — the early termination condition should probably be recoded in SQL anyway e.g. as SELECT TOP
or window functions)In summary,
selectMethod=cursor
lower application performance? — either method can lower performance, for different reasons. Past a certain resultset size, cursor
may still be preferable. See below for when to use one or the otherselectMethod=
an application-transparent setting on a JDBC connection? — it is transparent, but it can still break their app if memory usage grows significantly enough to hog their client system (and, correspondingly, your server) or crash the client altogetherSource: JDBC connection to very busy SQL 2000: selectMethod=cursor vs selectMethod=direct? – Stack Overflow
When a sequence is incremented twice when running SELECT NEXT VALUE FOR MYSEQ; and you are using the Microsoft JDBC driver with the selectMethod=cursor, remove the selectMethod=cursor option from the JDBC URL. The sequences will then be incremented correctly.
Spring is a widely used framework today, bringing many powerfull features and extensions to the Java core stack. However most of people tend to use these features without understanding their underlying mechanism.
Since there is no “magic” in real life, we are going to dig into some Spring features related to Transaction and Database in this serie of articles.
This first article is dealing with the famous @Transactional annotation, saving the developers the burden of managing low level transaction code.
Continue reading “Spring @Transactional explained | DuyHai’s Java Blog”
We’ve asked What The Heck Are You Actually Using NoSQL For?. We’ve asked 101 Questions To Ask When Considering A NoSQL Database. We’ve even had a webinar What Should I Do? Choosing SQL, NoSQL or Both for Scalable Web Applications.
Now we get to the point of considering use cases and which systems might be appropriate for those use cases. Continue reading “35+ Use Cases for Choosing Your Next NoSQL Database – High Scalability –”
By convention, type parameter names are single, uppercase letters. This stands in sharp contrast to the variable naming conventions that you already know about, and with good reason: Without this convention, it would be difficult to tell the difference between a type variable and an ordinary class or interface name.
The most commonly used type parameter names are:
You’ll see these names used throughout the Java SE API and the rest of this lesson.
Source: Generic Types (The Java
For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
Design patterns are formalized best practices that the programmer can use to solve common problems when designing an application or system. Design patterns can speed up the development process by providing tested, proven development paradigms. Reusing design patterns helps to prevent subtle issues that can cause major problems, and it also improves code readability for coders and architects who are familiar with the patterns.
Source: iluwatar/java-design-patterns: Design patterns implemented in Java