Cluster computing
Friday, September 6, 2013
pivoting pushed to SQL
›
In the previous post, we talked about pivoting logic to be implemented in the .Net logic. If we had sufficient access and if this was a sma...
TFS queries over the web
›
TFS provides web access. Queries can be specified in the following manner. http://Server:Port/q.aspx?pname=Project...
Thursday, September 5, 2013
›
I will describe another way to achieve the task in the previous post. This is assuming that you want to package the logic to meet the obje...
›
Excel and Sharepoint can be used to create reports. Excel can publish items, sheets and workbook to Sharepoint and they can be accessed on ...
Wednesday, September 4, 2013
›
Today I want to make a post aside from the ones I have been lately. Much of this has been learned in an effort to automate a report and I w...
SHA-1 hashing
›
SHA-1 hashes are 160 bits or 20 bytes long. It comprises of hexadecimal numbers 40 digits long. The message digest is similar to the Rivest...
Tuesday, September 3, 2013
›
In this post, I'm going to talk about hash tables. Hash tables are popular because it takes a constant time to lookup a data record. A ...
‹
›
Home
View web version