In a dimensional model, you have a fact table and multiple dimension tables related to the fact table. Slowly Changing Dimension (SCD) is the technique to maintain the history of data in dimension tables.
The basic SCD has three types, called Type 1, 2, and 3. SCD Type 6 combines the three basic techniques. After introducing these three basic types, this article by Djoni Darmawikarta, shows by example what SCD Type 6 is and how it works.Read Slowly Changing Dimension (SCD) Type 6 in full
This article by Mauricio Salatino and Esteban Aliverti, authors of jBPM5 Developer Guide, covers some of the common uses of business rules and business processes together. In order to understand how these two worlds are merged inside the Drools & jBPM5 platform, we need to appreciate how a rule engine works. This article covers:
Good old integration patterns between processes and rules
A quick introduction to the Drools Rule Engine
How to leverage the power of the rule engine in our business processes
Common usage patterns
Read Smart Processes Using Rules in full
This article by João Sávio Ceregatti Longo and Felipe Fedel Pinto, authors of the book Instant Apache Wicket 6, aims to introduce the reader to the world of Apache Wicket 6. This beginner-level guide takes the reader through the basic workflow of Apache Wicket in a practical and friendly style.Read So, what is Apache Wicket? in full
In this article written by Mauro Rocco, authors of Instant Django 1.5 Application Development Starter , you will find out what Django actually is, what you can do with it, and why it's so great.Read So, what is Django? in full
This article by Fabio Biondi , author of Instant EaselJS Starter helps you to learn what EaselJS actually is, what you can do with it, and why it's so great. It will also help you on how to create your first HTML5 canvas application "Hello World".Read So, what is EaselJS? in full
- Component model
- Plugin free charting
- CSS theming
Google Drive is a place where you can safely store your files online and access them from anywhere. When you use Google Drive, your files are stored remotely on the Web instead of your computer's hard drive. This is the main idea behind "cloud computing".
Once your files are online and "in the cloud", you can access and edit them from wherever you are using any standard web browser. You can even use your smartphone or tablet computer to access your files on the go. You can also share your files with people that you choose, making it easier than ever to collaborate with others and get stuff done.
Google Drive also includes an optional free sync program that runs on your computer and keeps files synchronized between a folder on your hard drive and Google Drive on the Web. That way, whenever you create or make changes to a file, either on the Web or on your hard drive, it will automatically be kept in sync between your computer and the cloud.
In this article by Mike Procopio, author of Instant Google Drive Starter, you will learn the basics of Google Drive and how to use Google Drive on your phone or tablet computer.Read So, what is Google Drive? in full
In this article by Andrey Kovalenko, the author of the book, Instant KineticJS Starter, we will learn about the basics of KineticJS.
This article by Karthik Ranganath, the author of Instant Metasploit Starter, outlines the need for a framework such as Metasploit in a penetration tester's arsenal. But before we dive into the framework, let's understand how the framework has evolved. The following are some basic concepts that will be frequently used in this article:
- Vulnerability: In simple terms, vulnerability is a loophole in the system. It acts as a channel for an attacker to penetrate the system, which in other words is called exploitation.
- Exploit: I would recursively define this term as any working piece of code that is used to exploit a vulnerable system.
- Payload: An attacker exploits a system with a purpose. So, after a successful exploit whatever he/she intends to do with the system stands for payload. In other words,the payload is any working piece of code bundled with an exploit to aid the attacker in the post-exploitation phase.
I have defined these terms right at the beginning because these terms will be used very often throughout this article.Read So, what is Metasploit? in full
Welcome to the world of virtualization. In this article, by Vicente Rodriguez Eguibar, the author of Instant Hyper-V Server Virtualization Starter, we will explain in simple terms what virtualization is, where it comes from, and why this technology is amazing. So let's start.Read So, what is Microsoft © Hyper-V server 2008 R2? in full
This article by Amol Nayak the author of Instant MongoDB, describes the need of MongoDB and its advantages over relational databases. MongoDB is a Documented Oriented Database. By the end of this article, you will be aware of the features of MongoDB.Read So, what is MongoDB? in full
Play is a full-stack web framework created to make web application development on the JVM easier and more productive. It provides APIs for Java and Scala.
A full-stack web framework provides solutions for a wide range of time-consuming web development tasks. With Play, developers are focusing on implementing functionality instead of thinking about design and architecture, and re-inventing the wheel. Only a few lines are necessary to write a fully functional web application.
Traditional web frameworks running on the JVM tend to create an abstraction layer over another abstraction layer. These heavy-weight lasagne architectures introduce an additional technical boilerplate and configuration, distracting developers from reaching their goal. Play in turn reduces complexity and simplifies web development by aligning its architecture with the that of the web, instead of abstracting it away.
Users of the Play Framework are web developers. Developers care about code readability and maintainability, fast development cycles, and easy error recovery. Play was designed by web developers to meet these goals.
Play consists of well-known parts. The basic architecture of a Play application follows the model-view-controller pattern, having an HTTP interface at its heart. Cohesive controllers and composable views share the same model.
Code changes are made visible by a simple reload of the web page in the browser. Play takes care of compiling changes in the background, independent of the development environment. This makes the development turnaround fast and easy.
Play also takes care of errors. Developers don't have to read long JVM stack traces to locate an error. Instead, Play shows the significant information directly in the browser, leading the developer right to the origin of the error. It is a big advantage that Play is a JVM framework; almost all parts of a Play application are type-safe.
This is why it is fun to develop Play applications.
In this article by Daniel Dietrich author of Instant Play Framework Starter, we will see how easy it is to create new Play applicationRead So, what is Play? in full
In this article, by Brenton J.W. Blawat, the author of "Instant Windows PowerShell 3.0 Windows Management Instrumentation Starter, we learn how PowerShell 3.0 utilizes Windows Management Instrumentation (WMI).Read So, what is PowerShell 3.0 WMI? in full
This article, by Anthony Dahanne author of Instant Spring for Android Starter provides a brief overview of how Spring for Android has an extension of the Spring Framework that helps to simplify the development of native Android applications.
Its current Version 1.0.0.RELEASE features a REST client, RestTemplate and OAuth, an authorization protocol (Spring Social) to help you build your apps.
In this article, we will go through the main aspects of Spring for Android: RestTemplate, Auth, and what Spring for Android is not.Read So, what is Spring for Android? in full
In this article, by Aamir Lakhani, the author of Instant XenMobile MDM discusses about XenMobile in brief. Reports from the Internet estimate that there will be an explosion of mobile devices in corporate businesses. Mobile devices are quickly becoming the computing device of choice. Unlike traditional computing devices, mobile devices are designed for consumers before businesses, and therefore organizations are having a difficult time securing and managing these devices. They have turned to mobile device management solutions to help them manage both corporate and BYOD devices in a secure manner within their organization.Read So, what is XenMobile? in full