Optimizing the performance of database servers and databases

  • Memory: Pages/sec counter is used to detect whether or not the memory bottleneck is caused by I/O overhead.
  • Disk I/O bottleneck can be monitored by Physical Disk: % Disk Time and Physical Disk: Avg Disk Queue Length counters.
  • The System Monitor tool is used to know the cause of slow authentication.
  • The SQLServer: Buffer Manager performance object is used to check the amount of RAM used by a computer.
  • The Physical Disk: %Disk Time counter measures the pressure on a physical hard disk array.
  • Add more RAM if the reading of Memory: Pages/sec counter is high.
  • Reduce the Maximum Worker Thread configuration settings if the value of System: Processor Queue Length counter is high.
  • Continue reading

Developing applications that use system types and collections

  • Use the CausesValidation property of the ImageButton class to set a value to indicate whether validation is performed on a Web server control when an ImageButton control is clicked.
  • Installation packages are created for deploying a Web application by using a Web Setup project. A merge module project is used for components to be added to the application.
  • Use the Web Setup project and Deployment project to create installation packages for the deployment of Web-based applications such as XML Web services, Web applications etc., to a Web server.
  • Use a RequiredFieldValidator control to check whether or not an input control contains a value.
  • Use a RegularExpressionValidator control to check whether or not the value entered into a form field matches the pattern specified by a regular expression.
  • Continue reading

uCertify (Nov 21, 2008). uCertify, a leading provider of exam preparation software for IT certification exams, today announced huge discount of 37.23% on the entire range of its practice tests. This discount offer is valid only until Sunday, November 30th, 2008. uCertify also offers unconditional 100% money back guarantee, on all its products. You will pass or we will return your money.

“You can now purchase uCertify practice tests for MCSE, MCITP, MCTS, SCJP, A+, CIW, OCP and other certifications and save 37.23% on the regular price. This is the lowest price of the year and you are advised to take advantage of this limited period opportunity now,”said Mark Smith, Director, Product Management, uCertify. Continue reading

Creating User Services

  • The SessionID property of the HttpSessionState class identifies an active ASP.NET session by using a unique session ID.
  • The @ Import directive is used to explicitly import a namespace into an ASP.NET application.
  • The @ Implements directive is used to implement a specified .Net Framework interface in a Web page.
  • The CodeBehind attribute of the @ Page directive specifies the name of the compiled file that contains the class associated with the page.
  • The ErrorPage attribute of the @ Page directive is used to set the URL if an unhandled exception occurs. Sam can set this target to the home page.
  • The Language attribute of the @ Page directive specifies the language used while compiling the inline rendering and code declaration blocks.
  • The Inherits attribute of the @ Page directive specifies a code-behind class for the page to inherit. It can be any class that is derived from the Page class.
  • Public variables and objects can be accessed from all other procedures and functions in all the modules in the same project.
  • The public class Manager : HeadOfDept declaration will create a class named Manager, which implements the HeadOfDept interface.
  • Continue reading

Configuring Recovery Manager

  • The control file, target database catalog, and Recovery catalog is used to store the RMAN’s persistent settings.
  • The alert log file is used to find out the values of the changed parameters at the time of instance startup.
  • The NLS_LANG parameter must be set to specify the language, territory, and character set used in an application.
  • CONFIGURE RETENTION POLICY CLEAR is a command that will configure the retention policy to the default of REDUNDANCY 1.
  • CONFIGURE is an RMAN command that configures an RMAN environment.
  • The rman target/ command is used to maintain backup copies by connecting to the target database and returns the RMAN prompt to issue further backup commands.
  • The redo files are opened after executing the ALTER DATABASE OPEN command on a database when it is in MOUNT mode.

Understanding Globalization Support
Continue reading

Brij is an Expert in .Net Application and a graduate in computer science. At present, he is working as a project lead for Genisys Software


Brij is working on Framework 2.0/ 3.5 ASP.NET, WebServices, WCF, C#VB.NET, MVC Framework, ASP.NET Ajax, LINQ, SQL Server Reporting Services, SQL Server Integration Services, Crystal Reports .NET, Database Replication and Backup, etc.

Brij is a technology freak. He is always keen to learn more and more about new technologies. He also loves writing about various prominent IT certifications. His articles can be read on http://www.dotnetglobe.com/

After reviewing the Ucertify PrepKit, Brij said “This is one of the best Preparation Kit for exam 70-528 I found in the market, equipped with all the tools which a candidate needs. I strongly recommend uCertify, for those who is aspirant for Microsoft .NET certifications” Read his full review on uCertify Practice test here
 

Continue reading

Planning and Design of Flash Applications

  • The Properties panel/Property inspector enables a user to access various attributes of whatever is currently selected on the stage or in the Timeline.
  • The DynamicHeapSize capability specifies the amount of dynamic memory that is allocated to Flash Lite.
  • The Align panel controls the space between the objects and the size of the objects in respect of each other.
  • The Distribute area of the Align panel spaces the objects according to a common reference point of top, middle or bottom.
  • Motion guide layers are special layers that enable a user to draw paths along which the objects can be animated.
  • Continue reading

General Security Concepts

  • Kerberos is an industry standard authentication protocol used to verify user or host identity.
  • Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization.
  • Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
  • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Password Authentication Protocol (PAP) transmits user credentials as plaintext.
  • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.
  • Continue reading

Retrieving data using the SQL SELECT statement and using single row functions to customize the output

  • /*…*/ and — are used to put comments in an Oracle program.
  • The CREATE TABLE does not end immediately with a semicolon, and a column name cannot start with a numeric value. However, a numeric value can be used in between a column name.
  • Name of a table cannot start with @ special character.
  • Knowing about the GROUP BY clause.

Using sub queries and set operators to solve queries, as well as DDL statements to create and manage tables

  • + (unary), – (unary), *, /, ||, =, !=, <, >, <=, >=, IS NULL, LIKE, BETWEEN, IN, NOT, AND, OR is the correct order of operators precedence.
  • Continue reading

muhanad-younis
muhanad-younis

Muhanad is a Microsoft.NET purist and an MCP,MCAD,MCSD and he is working as a Senior Developer and Technical Leader at TurkSat Turkey.In the Past Muhanad has worked as a Senior Developer at Sentim.He had also worked as an Export Expert at Motali. In addition to this He had been associated with REEM Network and worked there as a CEO of the company.

He has specialized in E-Government and Entreprise projects,specialized in framework development and projects infrastructure preparation to give developers more stable and consistent platform.

Out of his interest and curiosity in learning more and more about latest technologies, Muhanad writes about various new technologies and certifications. His articles can be read on http://weblogs.asp.net/muhanadyounis/

After reviwing the uCertify PrepKit 70-553, Muhanad said “I did not think that studying for IT exams could come that much easy, but after I saw the uCertify package, I believed that there is no way to FAIL!”

Continue reading