Cluster computing

Friday, September 6, 2013

pivoting pushed to SQL

›
In the previous post, we talked about pivoting logic to be implemented in the .Net logic. If we had sufficient access and if this was a sma...

TFS queries over the web

›
TFS provides web access. Queries can be specified in the following manner.                      http://Server:Port/q.aspx?pname=Project...
Thursday, September 5, 2013

›
I will describe  another way to achieve the task in the previous post. This is assuming that you want to package the logic to meet the obje...

›
Excel and Sharepoint can be used to create reports. Excel can publish items, sheets and workbook to Sharepoint and they can be accessed on ...
Wednesday, September 4, 2013

›
Today I want to make a post aside from the ones I have been lately. Much of this has been learned in an effort to automate a report and I w...

SHA-1 hashing

›
SHA-1 hashes are 160 bits or 20 bytes long. It comprises of hexadecimal numbers 40 digits long. The message digest is similar to the Rivest...
Tuesday, September 3, 2013

›
In this post, I'm going to talk about hash tables. Hash tables are popular because it takes a constant time to lookup a data record. A ...
‹
›
Home
View web version

About Me

My photo
Ravi Rajamani
View my complete profile
Powered by Blogger.