The ultimate tool for SQL developer productivity!

The ultimate tool for SQL developer productivity!

December 28, 2011

The ultimate tool for SQL developer productivity!


SoftTree SQL Assistant 6.0 
for Oracle, SQL Server, DB2, Sybase, MS Access, PostgreSQL, and MySQL
SQL Assistant easily integrates with many widely used database editors and database management and development environments including native tools that come with your database systems. It provides assistance with code typing, automatic word completion and database object and attributes browsing.

It provides functions for quick entry of common SQL constructs and code snippets. It also provides integrated and fully interactive SQL code assistance system for instant help with SQL command syntax and options available in specific database versions, code syntax checker, spell checker and a number of other vital coding tools.

A database application that can be used with both very small and very large database systems.

Here are some key features of "SoftTree SQL Assistant":

· Doubles SQL developer productivity.
· Improves code quality and accuracy.
· Provides advanced SQL code intellisense features, including support for databases, objects, parameters, script variables, syntax elements.
· Provides interactive SQL reference and SQL code assistance systems.
· Provides advanced SQL code formatters and beautifiers; SQL syntax validation, code structure views for fast code navigation.
· Provides integrated real-time code syntax and spell checker
· Supports 8 major database systems: Oracle, SQL Server, DB2, MySQL, PostgreSQL, Sybase ASE, Sybase ASA, MS Access, and their SQL dialects.
· Integrates with many SQL and non-SQL editors .
· Fast and has small disk and memory footprint .
· Can be easily installed without interrupting any existing processes and used immediately.
Requirements:

· Oracle 8i, 9i, 10g, 11g
· Microsoft SQL Server 2000, 2005, 2008
· DB2 UDB 7, 8, 9, 9.5
· DB2 UDB for iSeries
· MySQL 5.x
· Sybase ASE 12.x, 15.x
· Sybase ASA 7, 8, 9, 10
· PostgreSQL 8.x
· Microsoft Access 2003, 2007
· 12.5 MB disk space
· 128 MB RAM
· CPU Pentium or compatible
Limitations:

· 14 days trial But Download From here for Full Ver Download  or Download or Download  
What's New in This Release: [ read full changelog ]

New Features and Major Changes:
· New Schedule feature for scheduling runs of SQL code on single and multiple database systems using sequential and concurrent parallel runs.
· Completely rebuilt and greatly enhanced Database Code Refactoring engine now supporting the following smart-refactoring methods: Rename Table or View; Rename Table or View Column; Rename Procedure or Function; Rename Procedure or Function Parameter; Rename Local Variable; Add Table Column; Drop Table Column; Add Procedure or Function Parameter; Drop Procedure or Function Parameter; Drop Procedure or Function; Drop Table or View; Extract View; Extract Procedure; Qualify Object Names.
· Database refactoring coverage expanded from 3 to 8 different database system types.
· Lots of enhancements in database refactoring methods, including updating Oracle synonyms when renaming based objects; column renaming in 'return table' in table functions in SQL Server, and many others.
· Code formatter and beautifier now support...
Download WaveMaker 6.4 @ VMWARE Product

Download WaveMaker 6.4 @ VMWARE Product

December 27, 2011

WaveMaker is a visual development tool that lets everyone quickly build and deploy great-looking web and cloud applications. With WaveMaker, you can build a complete, 3-tier web application in minutes!
Download WaveMaker for AppleMac (Intel Only)
Download WaveMaker for WindowsWindows
Download WaveMaker for Linux (DEB Package)Linux DEB Package, 32-bit (Debian/Ubuntu)
Download WaveMaker for Linux (Ubuntu)Linux DEB Package, 64-bit (Debian/Ubuntu)
Download WaveMaker for Linux (RPM Package)Linux RPM Package, All (RedHat/CentOS)



All users of the Select editor should check their restrictValues property after upgrade

The Select editor property "restrictValues" determines whether entering a value that does NOT appear in the menu is invalid. If restrictValues is true, then only values from the list are valid. If its false, then the menu is just a list of suggested values, but the user can type in anything. This incorrectly defaulted to false. We've changed the default to true. Please check your projects and verify that the restrictValue settings are correct for your editors.

IE 6 and IE 7 are no longer supported except via Chrome Frame

A new application-level property has been added called "promptChromeFrame" which has three possible values:
  • chromeframe.html: IE 6/7 users will be shown the contents of chromeframe.html which will be in your project/webapproot folder, and which initially contains links to various ways of upgrading to a supported browser. You can edit this file to show anything you want.
  • http://google.com/chromeframe: This immediately shows google's chromeframe download page
  • Allow IE 6 and 7 users: This option will allow users to run the application without requiring a chromeframe plugin or a modern browser. Use this at your own risk.
While WaveMaker applications can be run using IE 6 and 7, there are a number of bugs, and we no longer are working to support these browsers and fix these bugs.

Infrastructure

OSX requires JDK6

OSX installations of Studio now require JDK6. To ensure you are using Java6, use the Java Preferences application to specify the default JDK prior to starting Studio.

New Deployment Dialog

The deployment dialog has been rewritten. Besides being easier to use, it now provides the following new features
  1. Deploy to CloudFoundry's cloud (you must first create an account at cloudfoundry.com)
  2. You can now change your database settings before deploying. When you generate your WAR/EAR file and deploy it to your target server, you can change from using your development database to your production, QA, demo, or other database connection settings.
  3. Save your deployment settings so that once you've deployed with a specific set of settings, redeploying to the same target server and same target databases is a one click operation.

CloudFoundry Notes

Restrictions in support for other domains
The current version of CloudFoundry deployment lets you choose what cloudfoundry environment to deploy to, cloudfoundry.com, or a privately hosted version. Studio does not support switching back and forth between different cloudfoundry environments at this time. Users wishing to change the deployment domain musts clear browser cookies, or user a separate browser for each domain.
The list of currently deployed CloudFoundry apps only lists apps on cloudfoundry.com, and does not at this time show apps deployed elsewhere.

Experimental new print methods

A print() method has been added to 6.4 for all controls. You can call this.layoutBox1.print() or this.dojoGrid1.print() or print on any panel. This is a very experimental feature but is the easiest way to get basic printing working. For more information, reviewhttp://dev.wavemaker.com/wiki/bin/wmdoc_6.4/Printing#HExperimentalnewprintmethods

For more details find the link Here
Hardware Support and Software Pre-Requisites Data protector 6.2

Hardware Support and Software Pre-Requisites Data protector 6.2

November 27, 2011

HP Data Protector software

Introduction

HP Data Protector software simplifies application protection in virtual and physical environments through unified recovery and advanced automation. Global, one-touch backup configuration and a wide range of disk-based recovery options across HP and non-HP arrays, including fully-automated application recovery, help you meet any SLA for up to 70% less total cost of ownership than competitive backup software solutions.

More than 41,000 customers around the world, and nearly half of the Global 500, rely on HP Data Protector software to protect their critical applications and data. Data Protector is a key component of the HP Information Management solution portfolio, which dramatically simplifies the management and governance of information for today's modern enterprise organization.

What's New

Extending the Power of HP - down-to-the-second recovery of application for HP P4000 arrays.

Only HP Data Protector software can recover virtual server applications and data to any point in time - down-to-the-second - from a centralized console without scripting. Data Protector 6.2 extends this functionality to the P4000. Together, Data Protector and P4000 achieve a highly cost-effective enterprise recovery solution ideal for virtual server deployments of applications such as Microsoft SharePoint, Microsoft Exchange and SQL Server.

Data Protector allows backup administrators to select the point in time to which they'd like to recover into the Data Protector console. Data Protector accesses the application transaction log (where all of the application's transactions are recorded before they're processes and/or written to data files) and fills in the data gaps between snapshots. Data Protector then synchronizes the application with the data and restarts the application. This functionality is possible with any Data Protector recovery solution whether from snapshot, disk or tape.

Extending simplified snapshot functionality to non-HP arrays such as EMC CLARiiON and Network Appliance

Data Protector Zero Downtime Backup snapshot support has been extended to non-HP arrays through VSS integration. Global one-touch protection ensures snapshot configurations - as well as all backup methods - are automatically extended to new virtual machines, Microsoft databases, and Oracle databases as they're brought online. One click in the Data Protector console and Data Protector will automatically apply the chosen backup method to new VMs and databases. This level of automation extends to physical environments as well.

Reducing the burden of single item recovery on the backup administrator.

Data Protector Granular Recovery Extension empowers SharePoint and VMware vSphere administrators to recover single items directly from the application administrator's console, without asking for assistance from the backup administrator.

Data Protector allows application administrators to recover single items from Data Protector disk or tape backups - they don't need to know or use Data Protector, nor do they need to contact the backup administrator. For SharePoint environments, GRE allows application administrators to recover single items from ANY 3rd party snapshots.

NEW Data Protector Reporter software - sophisticated operational analysis, SLA compliance reporting across multi-site distributed geographies.

Data Protector software includes robust reporting capabilities, including a notification function which allows customers to forward events to HP or 3rd-party reporting or management tools such as HP Storage Essentials and IBM Tivoli. For customers who require the most advanced reporting capabilities, HP provides Data Protector Reporter software - which delivers enterprise reporting, designed specifically for Data Protector customers. HP Data Protector Reporter software is customer-installable software which delivers centralized, automated reporting to optimize operations and infrastructure - and realize up to 30% savings. It features a powerful reporting engine that drives global, multi-site backup and restore analysis. Data Protector Reporter features 35+ out-of-the-box reports including SLA and performance reporting. The optional current licensed module provides enhanced powerful customized ad-hoc query and analysis flexible reporting. For more information, please download the Data Protector Reporter QuickSpecs on hp.com/go/dataprotector.

Enhanced single-pass disaster recovery functionality - for no additional cost.

Data Protector 6.2 introduces new disaster recovery functionality which is included in the cost of Data Protector. Unlike some backup software solutions that require you to keep a separate image backup from which to initiate recovery, Data Protector provides "single-pass DR" - which enables customers to create a disaster recovery image from any existing full backup. You can restore from physical-to-virtual and virtual-to-physical servers across dissimilar hardware. In addition, once the backup administrator initiates the disaster recovery process, Data Protector automatically re-builds the system and the partitioning. Data Protector 6.2 supports both Linux and Windows operating systems - for specific support please check the compatibility matrix on hp.com/go/dataprotector.

In addition, Data Protector DR functionality is especially useful in remote and branch office environments. Data Protector is fully replication aware, and provides a single management console from which to oversee deduplication-enabled replication between local or geographically distributed sites. When Data Protector performs a backup in the remote office, the backup with the DR image can be replicated to the central data center, In the event of an outage, the DR image can be prepared and delivered to the ROBO site via FTP site or by shipping a USB drive for fast recovery.

IPv6 and NDMP

Data Protector 6.2 is fully IPv6 compliant. Data Protector IPv6 support is backward compatible for IPv4 environments. In addition, Data Protector 6.2 also provides NDMP snapmirror to tape support, which provides efficient backup of large files.

Hardware Support and Software Pre-Requisites



Hardware Support
  • Broad coverage of HP-UX, Windows, Solaris, Tru64, OpenVMS, NetWare, Linux, AIX, and other operating environments
  • HP XP/EVA, and EMC Symmetrix disk array support for ZDB/IR
  • Backup to disk supports any storage that the server's operating system supports
  • HP Tape libraries, StorageTek, ADIC, IBM etc.
  • For detailed information on HP Data Protector support matrices please visit:
    http://www.hp.com/go/dataprotector

Software Pre-Requisites
Cell Manager RequirementsThe Data Protector Session Manager does not support the IDB on a file system that is mounted as NFS type.

On Systems Running
HP-UX (PA-RISC) - 11.11, 11.23, 11.31 and HP-UX (IA64) - 11.23, 11.31
The Cell Manager must meet the following minimum requirements:
  • The Soft File Limit per Process on the Cell Manager should be at least 1024.
  • 256 MB RAM (512 MB recommended)
  • For each parallel backup session 40 MB of RAM are required and 5 - 8 MB per data segment size. For example, if you want to run 60 parallel backup sessions 3 GB of RAM plus 512 MB for data segments are needed.
  • 240 MB of disk space + approximately 2% of planned data to be backed up (for use by the IDB).
  • It is recommended to modify the kernel parameters as follows:
    • Set maxdsiz (Max Data Segment Size) or maxdsiz_64 (for 64-bit systems) to at least 134217728 bytes (128 MB).
    • Set semmnu (Number of Semaphore Undo Structures) to at least 256.
    • After committing these changes, recompile the kernel and reboot the machine.

On Systems Running Solaris 8/9/10The Cell Manager must meet the following minimum requirements:
  • 256 MB of RAM (512 MB recommended)
  • For each parallel backup session 40 MB of RAM are required and 5-8 MB per data segment size. This means that, for example, if you want to run 60 parallel backup sessions 3 GB of RAM plus 512 MB of data segments are needed.
  • 300 - 425 MB of disk space + approximately 2% of planned data to be backed up (for use by the IDB)
  • The following values of kernel parameters are recommended: SEMMNI (maximum number of semaphore sets in the entire system) = 100 and SEMMNS (maximum semaphores on the system) = 256. A system restart is necessary for kernel changes to take effect.
  • The requirements for viewing online Help on the Data Protector Cell Manager are the same as on Data Protector clients.
  • For Java GUI Client, Java Runtime Environment (JRE) 1.5.0_06 or newer (for example, 1.5.0_07) is required.

On Systems Running Windows XPThe Cell Manager must meet the following minimum requirements:
  • 256 MB RAM (512 MB recommended).
  • For each parallel backup session 40 MB of RAM are required. For example, if you want to run 60 parallel backup sessions 3 GB of RAM are needed.
  • Windows 2000, Service Pack 3 or later
  • Windows XP Professional, Service Pack 1 must be installed
  • 190 MB of disk space + approximately 2% of planned data to be backed up (for use by the IDB)
  • 2 + 5MB of disk space needed on system drive
  • For viewing online help on the Data Protector Cell Manager, Microsoft Internet Explorer 6.0 or newer is required.
  • For Java GUI Client, Java Runtime Environment (JRE) 1.5.0. or newer (for example, 1.5.0_07) is required.

On Systems Running Windows Server 2003
(32-bit) and Windows 2003/2008 & 2008-R2 (64-bit x86_64)
The Cell Manager must meet the following minimum requirements:
  • 256 MB RAM (512 MB recommended).
  • Each parallel backup session requires 40 MB of RAM. For example, 60 parallel backup sessions requires 3 GB of RAM.
  • 190 MB of disk space + approximately 2% of planned data to be backed up (for use by the IDB)
  • 2 + 5MB of disk space needed on system drive
  • On Windows Server 2008 systems, the firewall must also be configured to accept "Remote Service Administration" (NP) connections (port 445).
  • On Windows Server 2008 systems, administrative privileges are required to install Data Protector A.06.2.
  • For viewing online Help on the Data Protector Cell Manager, Microsoft Internet Explorer 6.0 or newer version is required.
  • For the Java GUI Client on Windows Server 2003 systems, Java Runtime Environment (JRE) 1.5.0_06 or newer update (for example, 1.5.0_07) is required.
  • For the Java GUI Client on Windows Server 2008 systems, BEAJRockit 5.0 1.5.0_06 or newer update (for example, 1.5.0_07) is required.

On Linux SystemsThe Cell Manager must meet the following minimum requirements:
  • 256 MB RAM (512 MB recommended).
  • For each parallel backup session 40 MB of RAM are required and 5 - 8 MB per data segment size. This means that, for example, if you want to run 60 parallel backup sessions 3 GB of RAM plus 512 MB for data segments are needed.
  • 300 - 425 MB of disk space + approximately 2% of planned data to be backed up (for use by the IDB).
  • If the version of libstdc++ on the system is not 5 (for example libstdc++.so.6 instead of libstdc++.so.5) you need to install the compatibility package compat-2004 or compat-libstdc++.
  • To install the Java GUI Server on Red Hat Enterprise Linux 4.0, the libstdc++-4.0.2-8.fc4.x86_64.rpm package is required. If yours system does not already contain a 64-bit version of libstdc++. so. 5 then you must install it with libstdc++-3.3.3-7.x86_64.rpm.
  • To run the Java GUI Server on SuSE Linux Enterprise Server 9 (64-bit), the package compat-libstdc++-lsb-4 .0.2_20050901-0.4. x86_64 . rpm is required.
  • Requirements for viewing online Help on the Data Protector Cell Manager are the same as on Data Protector clients.
  • For Java GUI Client, Java Runtime Environment (JRE) 1.5.0_06 or newer (for example, 1.5.0_07) is required.

Operating Systems supported by HP AutoPassThe following Windows operating systems are supported by HP AutoPass:
  • Windows 2000
  • Windows XP
  • Windows Server 2003 (32-bit)
  • Windows Vista (32-bit)
  • Windows Server 2008 (32-bit)
The following HP-UX operating systems are supported by HP AutoPass:
  • HP-UX 11.00, HP-UX 11.11 (PA-RISC)
  • HP-UX 11.23, HP-UX 11.31 (PA-RISC, Itanium)
Solaris and Linux operating systems are not supported.
Error 1935.An error occurred during the installation

Error 1935.An error occurred during the installation

November 16, 2011

Error 1935.An error occurred during the installation of assembly 'Microsoft.VC80.ATL,
Windows


If you receive a 1935 error when you try to install software, the Windows file system transaction log has become corrupted. The transaction log is used by the Windows file system to recover when a file error occurs. It can also happen if there is an error with the installation of .netframework.
Step 1: To correct this install error, you need to clear the log.

a. Open an Administrator command prompt: Right-click Start > All Programs > Accessories > Command Prompt and select "Run as Administrator" and click "Allow" for the elevation prompt
b. In the command prompt, type the command below:
fsutil resource setautoreset true C:\
c. This assumes that C: is the drive in which Vista is installed. If it is installed on another drive like D:, please change the drive letter appropriately.
d. Reboot the system.
e. Install the software and check.
Step 2: Check if you are able to install in clean boot.
“How to perform Clean Boot” http://support.microsoft.com/kb/929135

Note: Please ensure that the computer is set to start as usual by following the step 7 from the article.
Step 3: Repair .net framework and check.
Repair the Microsoft .NET Framework installation
To do this, follow these steps:
a. Click Start, click Control Panel, and then click Add or Remove Programs.
b. In the Currently installed programs list, click Microsoft .NET Framework, and then click Change/Remove.
c. Click Repair, and then click Next.
Diana
Microsoft Answers Support Engineer
Visit our Microsoft Answers Feedback Forum and let us know what you think.
Configure IP address on RHEL 5 (GUI & Text mode)

Configure IP address on RHEL 5 (GUI & Text mode)

November 09, 2011

Configure IP address on RHEL 5


 First Method – GUI

Issue the command below to bring up the GUI interface.

#system-config-network

Click on the desire NIC card profile and click on edit button at the top.

 1

Select the "Statically set IP address" and key in your desire IP address.

 2

Click on the "Activate" button

 3

Click on the "Yes" button

4

Click  the "OK" button

5

Once done, issue the command below to for changes to take  immediate effect.

#service network restart

Or

#/etc/init.d/network restart


Second Method – Text Based GUI

Issue the command below to bring up the Text-Based-GUI.

#system-config-network-tui

Choose which NIC card you want to edit and hit the "Enter" key

 62

Key in all the desire details and once you are done, hit the OK button.

 7

Always restart the network service for changes to take immediate effect. Issue the command below to restart the network service.

#service network restart


Third Method – Editing Script File

The location of the script file is at

#/etc/sysconfig/network-script/ifcfg-eth0

Issue the command below to edit the script file.

#vi /etc/sysconfig/network-script/ifcfg-eth0

9

After you had edit the file, issue the command below to save the file

:wq!

Restart the network services for changes to take immediate effect

#service network restart

8

How to add/modify IP Address in Redhat Enterprise Linux

How to add/modify IP Address in Redhat Enterprise Linux

November 09, 2011



Adding the IP Address in Redhat Enterprise Linux can be done by using the netconfig tool or by editing the network-scripts or by using the ifconfig command. While this procedure is tested on Redhat Enterprise Linux, I'm sure it should work on CentOS, Fedora and older Redhat versions.

Set IP Address using Netconfig

Netconfig is a utility in Redhat Enterprise Linux which allows you to add/modify the IP Address the system, the Netmask, default gateways and the Name Servers.

Launch Netconfig,

rhel5# /usr/bin/netconfig

This launches a window as follows:

Redhat Linux Netconfig

For static IP uncheck the "Use Dynamic IP configuration(BOOTP/DHCP)"

Now, enter the IP Address, netmask, Default Gateway & Primary Name Server.

Once done, restart the networking service

rhel5# service network restart

or to just reread the interface config files

rhel5# service network reload

This should set the IP Address.

Manually edit Interface configuration files

You can also manually edit the interface configuration files and add/modify the IP Address.

The Network interface configuration files are found in the directory

/etc/sysconfig/network-scripts/

Let's say there are 2 interfaces eth0 & eth1. The files to edit will be

ifcfg-eth0 – For interface eth0

ifcfg-eth1 – For interface eth1

To add the IP Address for interface eth0, edit ifcfg-eth0

rhel5# cd /etc/sysconfig/network-scripts

rhel5# vi ifcfg-eth0

Enter the following Parameters

DEVICE=eth0
BOOTPROTO=static
BROADCAST=192.168.1.255
HWADDR=00:0F:1F:2F:3F:4F
IPADDR=192.168.1.10
NETMASK=255.255.255.0
NETWORK=192.168.1.0
ONBOOT=yes
TYPE=Ethernet

Where

DEVICE indicates the interface
BOOTPROTO indicates if it is static IP or uses DHCP/BOOTP

The above sets the IP Address, Broadcast address, Network, Netmask etc.

Once done, save the file and restart the network service for the changes to take effect.

rhel5# service network restart

or to just reread the interface config files

rhel5# service network reload

Using ifconfig

This is dynamic and the change take effect instantly.

rhel5# ifconfig eth0 192.168.1.10 netmask 255.255.255.0 gw 192.168.1.1 up

This sets the IP Address, Netmask and the default gateway on the interface


Difference between: Full, Differential, and Incremental Backup

Difference between: Full, Differential, and Incremental Backup

October 10, 2011

Difference between: Full, Differential, and Incremental Backup

TypeDefinitionBenefitsDrawbacks
Full Backup:A complete backup of everything you want to backup.Restoration is fast, since you only need one set of backup data.The backing up process is slow.
High storage requirements.
Differential Backup:The backup software looks at which files have changed since you last did a full backup. Then creates copies of all the files that are different from the ones in the full backup.

If you do a differential backup more than once, it will copy all the files, or parts of files that have changed since the last full backup, even if you already have identical copies of those files in a previous differential backup.

For restoring all the data, you will only need the the last full backup, and the last differential backup.
Faster to create than a full backup.

Restoration is faster than using incremental backup.

Not as much storage needed as in a full backup.
Restoration is slower than using a full backup.

Creating a differential backup is slower than creating an incremental backup.
Incremental Backup:The backup software creates copies of all the files, or parts of files that have changed since previous backups of any type (full, differential or incremental).

For example if you did a full backup on Sunday. An incremental backup made on Monday, would only contain files changed since Sunday, and an incremental backup on Tuesday, would only contain files changed since Monday, and so on.
This method is the fastest when creating a backup.

The least storage space is needed.
Restoring from incremental backups is the slowest because it may require several sets of data to fully restore all the data. For example if you had a full backup and six incremental backups. To restore the data would require you to process the full backup and all six incremental backups.