ETL (Extract Transform Load) is the most resource consuming part of data warehouse development and maintenance. An ETL tool, particularly one that is GUI-based, can leverage the productivity and quality of ETL development and maintenance.
WebSphere DataStage from IBM is an ETL tool. In DataStage you build and execute ETL jobs visually on its GUI clients. This article by Djoni Darmawikarta shows how to build and execute an ETL job with DataStage. Specifically, we’ll build a job that loads a Customer Dimension table from an input sequential file (implementing an SCD1, Slowly Changing Dimension Type1; a well-known technique from Dimensional Data Warehouse methodology).Read Visual ETL Development With IBM DataStage in full
If you were tasked with finding the letter that when spoken out loud repeatedly was more awkward than any other, you would come up with the W. Every other letter in the English alphabet is pronounced with a single syllable, yet the W is unique in requiring an impressive three syllables to utter.
This campaign is to encourage people to forget that WWW ever existed. Don’t type it, don’t speak it, and complain to every website that still requires it.Read Making the World Wide Web an Easier Place to Talk About in full
Report Services, Analysis Services, and Integration Services are the three pillars of Business Intelligence in Microsoft's vision that continues to evolve. Reporting is a basic activity, albeit one of the most important activities of an organization because it provides a specialized and customized view of the data of various forms (relational, text, xml etc) that live in data stores. The report is useful in making business decisions, scheduling business campaigns, or assessing the competition. The report itself may be required in hard copy in several document formats such as DOC, HTML, PDF, etc. Many times it is also required to be retrieved in an interactive form from the data store and viewed on a suitable interface, including a web browser. The Microsoft SQL Server 2005 Reporting Services, popularly known by its acronym SSRS, provides all that is necessary to create and manage reports and deploy them on a report server with output available in several document formats. The reader will greatly benefit from reading the several articles detailed in the author's Hodentek Blog. The content for the articles were developed using VS 2003, VS 2005, SQL 2000 and SQL 2005.Read Creating a Simple Report with Visual Studio 2008 in full
Anyone who has tried downloading a popular software or Linux distribution on or just after release day, knows of the pain of the phrase "connection timed out". Getting the software can be quite a struggle, despite all the mirrors and BitTorrent Samaritans. Anthony Bryan's Metalink is an open standard that makes downloading easier, faster, and more reliable by helping users extract the last drop of juice out of their connection.
I emailed a set of questions to Bryan to understand what separates Metalink from other run-of-the-mill download accelerators and listen in awe as he explains how Metalink combines traditional HTTP and FTP methods of downloading files along with BitTorrent.
Read more about this in Mayank's interview with Anthony Bryan.Read Downloading evolved with Metalink in full
This article by Jayaram Krishnaswamy shows how to migrate a database from SQL Server 2005 (should work for 2000 as well) to SQL Server 2008 using the Copy Database tool in SQL Server 2008. In an earlier article we saw how this can be done manually by detaching the database from the SQL 2005 and then attaching it to the SQL 2008 server using the SQL Server Management Studio.Read Copying a Database from SQL Server 2005 to SQL Server 2008 using the Copy Database Wizard in full
Many of you as (Java) programmers generate business purpose code, like "confirming an order" or "find available products". At times, you may also want to connect to external systems and services, since your application in isolation alone will not provide you the required functionality. When the number of such connections increases, you would be generating more and more of "integration code", mixed along with your business code.
In this short article, Binildas A. Christudas introduces the Java Business Integration (JBI) specification and discusses how it is covered in his new book, Service Oriented Java Business IntegrationRead Service Oriented Java Business Integration - What's & Why's in full
You have a Drupal website and an online store; your product catalog is online and you have set up customer and staff users on the site; the only complaint so far is how the website looks. You like the default design, but do not think it is appropriate for your site or your store; you want something more tailored to your business.
In this article by Michael Peacock we will learn how to customize the default theme in Drupal.Read Customizing the Default Theme in Drupal in full
This article by Jayaram Krishnaswamy describes how you may connect to SQL Server 2008 and display the retrieved data in a GridView Control on a web page. Trying to establish a connection to the SQL Server 2008 is not possible in Visual Studio 2008 as you will see soon in the tutorial. One way to get around this, as shown in this tutorial, is to create an ODBC connection to the SQL Server and then using the ODBC connection to retrieve the data.
Visual Studio 2008 Version: 9.0.21022.8 RTM, Microsoft Windows XP Professional Media Center Edition, and SQL Server 'Katmai' were used for this tutorial.Read Creating a Web Page for Displaying Data from SQL Server 2008 in full
MySQL Query Browser, one of the open source MySQL GUI tools from MySQL AB, is used for building MySQL database queries visually. In MySQL Query Browser, you build database queries using just your mouse—click, drag and drop!
MySQL Query Browser has plenty of visual query building functions and features. This article Djoni Darmawikarta shows two examples, building Join and Master-detail queries. These examples will demonstrate some of these functions and features.Read Building Queries Visually in MySQL Query Browser in full
When talking about tunneling, different definitions come to people's minds. Basically, tunneling is transmitting data that is encapsulated into a pipe, over a public network (for example, the Internet). However, there are different methods to tunnel data over a public network for different approaches. For example, when security is a concern, tunnel protocols with cryptography are more favorable. But when performance has higher priority, protocols with lower packet overheads will be chosen. FreeBSD 7 has a built-in support for a number of important tunneling protocols, although there are also many third-party applications in FreeBSD packages that support more tunneling protocols.
This article by Babak Farrokhi, introduces the manipulation of tunnel interfaces in the FreeBSD 7 operating system. Let's have a look into the following:
In this article by Marc Delisle, we will learn how to perform some operations that influence tables or databases as a whole. We will cover table attributes and how to modify them, and also discuss multi-table operations.Read Table and Database Operations in PHP in full
XHTML Mobile Profile (XHTML MP) is the standard language for mobile web development. XHTML MP is an XHTML variant. It offers richer presentation and is very similar to HTML. XHTML MP is built on top of XHTML Basic. In this article by Nirav Mehta, we will have a look at the fundamentals of XHTML MP and the grammar which must be followed for development in it.Read Fundamentals of XHTML MP in Mobile Web Development in full
In this article by David Mercer, we will look at an entirely different aspect of running a Drupal website. Once we have added the functionality to the site, we now have to give some thoughts about how this functionality is to be accessed, or by whom. As the site grows, you will most likely feel the need to delegate certain responsibilities to various people. Alternatively, you might organize a team of people to work on specific aspects of the site. Whatever is required, at some stage you will have to make decisions about who can do what, and Drupal makes sure that it is possible to do precisely this.
Having Drupal simplify the implementation of your access control policies does not mean that the task is a trivial one. There is still much thought that needs to go on behind the scenes in order to create a sophisticated, and above all, effective policy for controlling access to the site. Because of this, we will spend a bit of time exploring the ramifications of the various choices available, instead of simply listing them. Taking a holistic approach to implementing an access control policy will ensure you don't end up with any nasty surprises down the line.
Specifically, this article will look at Planning an access policy, Roles, Users, and Access rules.Read User Access Control in Drupal 6 in full
Ever been to a night club on a Monday morning? There's you, there are chairs, and the potential to host a party on the weekend. There are lots of buttons, lots of potential, but no one there except you. Unlike a night club, you don't have to wait for the weekend to host your friends on Elgg. Invite them as soon as you're done setting up the software. Elgg is designed to make it easier for you to invite people. If you've ever setup a blog or rolled out your own website, how long did it take before you could invite your friends over? You had to put up all sorts of content to indulge them, and also fiddle around decorating the portal so that it doesn't look dull.
That's where a social network is different from a regular website. Websites follow a two-way, one-to-many style of interaction, where the owner of the website, or blog, talks to all his visitors who respond with their comments, either on the website, or via e-mail. In this article by Mayank Sharma, we discuss about social networking software that follows a many-to-many style of interaction. Members interact with each other, and create their own content, which is then shared with all. This is then discussed and commented on by everyone. The owner of the site is like the perfect host. They mingle, discuss with everyone, but don't stamp their authority, unless you're naughty. They're like every other member, except for the fact that they own the place. Sounds familiar? So, you don't have to worry about content before inviting your friends. Your friends bring their own content.Read Users, Profiles, and Connections in Elgg in full