If you have experience with SQL Server, you may have heard the terms MDF, NDF and LDF already. Those are the commonly used file name extensions in SQL Server for specify the Primary Data files, Secondary data files and Log files respectively.In SQL Server, data and log information are never stored in the same file. Furthermore, those individual files (primary ...
Microsoft Visual Studio LightSwitch 2011 is a flexible business application development tool that can be used with Visual Studio 2010 IDE. It gives you a simplified development environment which give the capability to create CRUD based business applications within few minutes. Typical business application manage data through user interfaces, provide search facilities and provide data validations. Usually, if you want ...
Recently I was working with some database restoring and configuring stuff. And I was getting errors due to the conflicts on database users, server logins and their permissions. In the ideal scenario, there should be a 'login' in the database server, and a corresponding 'user' for the database. Sometimes people get confused with the difference of these two. But they ...
Are you worried about where you keep your money? – Answer is obviously “Yes”. In the modern information society, data is equally or more important when compared with money. Not to mention that data is referred here to the information gathered at the computers. But how many of you know about where your data is stored. We know about data ...
Since ‘Elk Cloner’, the first computer virus was written in 1981; Computers are always been subject to various threats. Not necessarily the viruses, but malware, trojans, worms, rootkits, spyware and hacking attacks always threatening the computer users. That’s where antivirus programs come to the help. Antivirus software is used to prevent, detect, and remove computer viruses, worms, and trojan horses. ...
“DDoS attacks” (Distributed Denial of Service attacks) may not be an alien term for you by now. Of course it became one of the popular search keywords in the previous weeks; because a group of hackers called “Anonymous” launched an attack targeting some major banking web sites. ‘Anonymous’ claiming their “Operation Payback”, commenced several DDoS attacks supporting WikiLeaks. On 8th ...
Microsoft Student Champs with the purpose of empowering students with latest technical knowledge and assuming their community responsibilities for helping fellow students, reached University of Colombo School of computing for a single day workshop. Workshop was held at UCSC on 29th of September 2010 with the participation of more than 200 students. The event proceeded with two main goals. That ...
Debugging is the process of finding and fixing the bugs/defects of a software program. And it’s a essential and a critical part of the software development life cycle. Sometime it may take more time than writing the code. So how to debug? Well, literally you have to go through the code and find where, and what went wrong. Then you ...
Like any other computer program, a program written in C# should have a default entry point. his entry point is where your code start executing. Similar to many high level programming languages C# entry point is the “Main” method. (Libraries and services do not require a Main method as an entry point.) Main is also a member of a C# ...
While working with your computer, no doubt that you wish you could schedule running some application or make the computer do a specific job without you have to stay at computer for hours. For me, I want to shut down the computer automatically at a scheduled time, so that I can sleep without waiting till the computer finish the job. ...
Recently I was working with some database restoring and configuring stuff. And I was getting errors due to the conflicts on database users, server logins and their permissions. In the ideal scenario, there should be a 'login' in the database server, and a corresponding 'user' for the database. Sometimes people get confused with the difference of these two. But they ...
If you have experience with SQL Server, you may have heard the terms MDF, NDF and LDF already. Those are the commonly used file name extensions in SQL Server for specify the Primary Data files, Secondary data files and Log files respectively. In SQL Server, data and log information are never stored in the same file. Furthermore, those individual ...
It has been a long time since my last post. I was busy with exams, projects and ofcourse with my first job! Few months back, we were supposed to do a project (topic selection was in our interest) which was essential for academic curriculum. So me and my friends were into virtual tour using available web resources and finally to ...
Are you worried about where you keep your money? – Answer is obviously “Yes”. In the modern information society, data is equally or more important when compared with money. Not to mention that data is referred here to the information gathered at the computers. But how many of you know about where your data is stored. We know about data ...
It’s the cricket world cup season! So, all the fans are getting anxious, and the game is getting hot. Cricket is a game where win or loss defined by a thing margin. Recently, a lot of money involved in the game and lot of spectators waiting to see a favorable result for their team. Therefore not to mention the responsibility ...
Since ‘Elk Cloner’, the first computer virus was written in 1981; Computers are always been subject to various threats. Not necessarily the viruses, but malware, trojans, worms, rootkits, spyware and hacking attacks always threatening the computer users. That’s where antivirus programs come to the help. Antivirus software is used to prevent, detect, and remove computer viruses, worms, and trojan horses. ...
“DDoS attacks” (Distributed Denial of Service attacks) may not be an alien term for you by now. Of course it became one of the popular search keywords in the previous weeks; because a group of hackers called “Anonymous” launched an attack targeting some major banking web sites. ‘Anonymous’ claiming their “Operation Payback”, commenced several DDoS attacks supporting WikiLeaks. On 8th ...
Do you know what happens when you publish a post in your blog? How search engines got to know of your blog post? And what happens before finally it appears to your readers? We only just type our idea in to words and publish it but plenty of things happen out there. Do you like to know about it? That’s ...
Are you a university student who is interested in IT or already following your degree in IT/Computer Science? Are you passionate about the technology, latest trends in the industry? I have a news for you. Microsoft, the pioneer in the software industry has its students program “Microsoft Student Champs” a one-of-a-kind program that recognizes ...
Microsoft Student Champs with the purpose of empowering students with latest technical knowledge and assuming their community responsibilities for helping fellow students, reached University of Colombo School of computing for a single day workshop. Workshop was held at UCSC on 29th of September 2010 with the participation of more than 200 students. The event ...