Search Results

Search found 24931 results on 998 pages for 'information visualization'.

Page 254/998 | < Previous Page | 250 251 252 253 254 255 256 257 258 259 260 261  | Next Page >

  • Sql Table Refactoring Challenge

    Ive been working a bit on cleaning up a large table to make it more efficient.  I pretty much know what I need to do at this point, but I figured Id offer up a challenge for my readers, to see if they can catch everything I have as well as to see if Ive missed anything.  So to that end, I give you my table: CREATE TABLE [dbo].[lq_ActivityLog]( [ID] [bigint] IDENTITY(1,1) NOT NULL, [PlacementID] [int] NOT NULL, [CreativeID] [int] NOT NULL, [PublisherID] [int] NOT NULL, [CountryCode] [nvarchar](10) NOT NULL, [RequestedZoneID] [int] NOT NULL, [AboveFold] [int] NOT NULL, [Period] [datetime] NOT NULL, [Clicks] [int] NOT NULL, [Impressions] [int] NOT NULL, CONSTRAINT [PK_lq_ActivityLog2] PRIMARY KEY CLUSTERED ( [Period] ASC, [PlacementID] ASC, [CreativeID] ASC, [PublisherID] ASC, [RequestedZoneID] ASC, [AboveFold] ASC, [CountryCode] ASC)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]) ON [PRIMARY] And now some assumptions and additional information: The table has 200,000,000 rows currently PlacementID ranges from 1 to 5000 and should support at least 50,000 CreativeID ranges from 1 to 5000 and should support at least 50,000 PublisherID ranges from 1 to 500 and should support at least 50,000 CountryCode is a 2-character ISO standard (e.g. US) and there is a country table with an integer ID already.  There are < 300 rows. RequestedZoneID ranges from 1 to 100 and should support at least 50,000 AboveFold has values of 1, 0, or 1 only. Period is a date (no time). Clicks range from 0 to 5000. Impressions range from 0 to 5000000. The table is currently write-mostly.  Its primary purpose is to log advertising activity as quickly as possible.  Nothing in the rest of the system reads from it except for batch jobs that pull the data into summary tables. Heres the current information on the database tables size: Design Goals This table has been in use for about 5 years and has performed very well during that time.  The only complaints we have are that it is quite large and also there are occasionally timeouts for queries that reference it, particularly when batch jobs are pulling data from it.  Any changes should be made with an eye toward keeping write performance optimal  while trying to reduce space and improve read performance / eliminate timeouts during read operations. Refactor There are, I suggest to you, some glaringly obvious optimizations that can be made to this table.  And Im sure there are some ninja tweaks known to SQL gurus that would be a big help as well.  Ill post my own suggested changes in a follow-up post for now feel free to comment with your suggestions. Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Les jeunes se désintéressent de l'industrie de la cybersécurité, un secteur où bien souvent l'offre est supérieure à la demande

    Les jeunes se désintéressent de l'industrie de la cybersécurité, un secteur où bien souvent l'offre est supérieure à la demande La cybersécurité est un secteur en bonne santé et en plein essor. Aux Etats-Unis par exemple, l'agence des statistiques du travail estime que les emplois relatifs systèmes de réseau ou à la sécurité de l'information devraient croître de 53% d'ici 2018. Pourtant les jeunes ne s'intéressent pas à cette branche.Un emploi souvent lucratif qui n'est le choix potentiel...

    Read the article

  • CVE-2011-4619 Denial of Service (DoS) vulnerability in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-4619 Denial of Service (DoS) vulnerability 5.0 OpenSSL Solaris 10 SPARC: 147707-03 X86: 146672-04 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Windows 8 : Vupen refuse de donner ses failles 0-days à des « multi-milliardaires » comme Microsoft, le français préfère les vendre

    Vupen content que des chercheurs de failles ne les livrent pas à des éditeurs « multi-milliardaires » Et vend les 0-days de Windows 8 à ses clients sans les communiquer à Microsoft Fin octobre, Vupen avait affirmé par la voix de son PDG - Chaouki BEKRAR - avoir découvert plusieurs failles dans Internet Explorer 10 qui permettaient de corrompre Windows 8. Et ce malgré les avancés du système de sécurité du nouvel OS. La société basée à Montpellier n'a donné depuis aucune information sur son exploit (au sens informatique du terme). Elle a, en revanche, immédiatement

    Read the article

  • Custom Business Application Development in PHP - Features & Benefits

    A revolution is taking place within the business application arena today. Just a few years back most custom business applications such as CRM, ERP, data mining and other business data information systems were inflexible and expensive applications. The database ran on a server within the company's compounds and each desktop machine was running a client application.

    Read the article

  • The Important Relationship Between SEO and Google - Google Dominates

    Let's face it when it comes to SEO, Google (commonly known as the Big G) has its final say. After all, when it comes to searching some information online people would always go for Google. All they do is key-in the keyword on the search box and click the search button. Few seconds after, results will be given. Google is a big company and has been the subject of a lot of experiments when it comes to SEO.

    Read the article

  • The Importance of Backing Up Your Website Or Blog

    Backing up a site or blog consists of storing files and data in another location. That way, if something should happen to your site or blog, you'll still have a copy of all the data. Backing up the information isn't all that difficult, and you can save a lot of time and effort in doing so.

    Read the article

  • Getting know a hardware of your Linux box

    <b>Linuxconfig:</b> "Here is a list of commands which should help you to troubleshoot your hardware and find some information about it. This is not a ultimate troubleshooting guide but certainly will serve as a good starting point."

    Read the article

  • Legitimate SEO Services

    SEO is symbol of search engine optimization which is the key to success in the business. No website has meaning if it is not properly promoted. Whenever any internet surfer is in search of any specific product, services or information he uses the simplest way of searching through search engine and this is habit of many people to only look in to five or six top websites for their purpose. No one has time to look in to 100 pages of search engine as there is no need when he finds in top pages.

    Read the article

  • Bing's Latest Assault and the Consequences For Search Marketing

    I think it's about time for a Bing update. It's now a year since Microsoft's 'decision engine' was launched, and the last few months have seen a huge marketing push. The chances are you've seen one of the TV ads, which focus on reducing the information overload users can experience at the hands of other search engines.

    Read the article

  • CVE-2011-3102 Numeric Errors vulnerability in libxml2

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3102 Numeric Errors vulnerability 10.0 libxml2 Solaris 11 11/11 SRU 10.5 Solaris 10 SPARC : 125731-08 , x86 : 125732-08 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Un player en Silverlight à reconnaissance vocale retranscrit et tague automatiquement le contenu d'u

    Un lecteur en Silverlight à reconnaissance vocale Retranscrit et tague automatiquement le contenu d'une vidéo La nouvelle n'a pas fait grand bruit et pourtant, techniquement, elle est importante. Au moment où Google introduit la publicité dans les vidéos de Youtbe ? une démarche dont la pertinence, notamment technique, pose question ? Microsoft vient de sortir, en collaboration avec le Lab de France 24, la chaine d'information francophone internationale, un lecteur d'un nouveau type. ...

    Read the article

  • Want to Do SEO? Get Proper SEO Training

    Today's interconnected world, he who holds the power of information technology, rules the world. For your business, though old school marketing techniques may still prove viable, it is important to learn the value of Internet marketing as well. To learn SEO, means to get the proper SEO training as well.

    Read the article

  • Make Your Site Come Alive With PHP Programming

    Are you looking out to learn more about hypertext preprocessor programming which is nothing other than what is known as PHP? Then this article can offer you plenty of knowledgeable information on the same. PHP has literally become the talk of the town nowadays.

    Read the article

  • Technical Aspects of SEO

    Nowadays when you search for any or group of words or terms in any of the search engines, you see so many search results for them. But as a user, you search for the required content only in the first few pages. If you do not get the required results, you change your keywords and search for the information in different way.

    Read the article

  • Strategies of Increasing Online Passive Income Earnings

    People build websites to earn traffic and eventually revenue. Many website owners have tried to find ways to maximize their earnings with different tactics and strategies. Their websites provide information and also with each visitor that comes to their page, they earn passive income.

    Read the article

  • Identity and Access Management Market Forecast to 2012

    With steady increase in the number of organizations across the world and incorporation of Information Technology into their businesses, the importance/need for proper security measures have become an... [Author: RNCOS E-Services Pvt. Ltd. - Computers and Internet - June 17, 2010]

    Read the article

  • Multiple vulnerabilities in PostgreSQL

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-3488 Permissions, Privileges, and Access Controls vulnerability 5.8 PostgreSQL Solaris 10 SPARC : 138822-11 , 138824-11 , 138826-11 x86 : 138823-11 , 138825-11 , 138827-11 CVE-2012-3489 Improper Input Validation vulnerability 5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Oracle Database's ADRCI: the extended commands

    Oracle's ADRCI extended commands provide valuable scripting and file viewing options, with about two dozen commands that you can use to look at and manage diagnostic information.. ADR is the future of Oracle diagnostics and it's essential that database administrators understand it.

    Read the article

  • Encryption Primer for SQL Server Data

    As a database developer or DBA there is not a lot you can do about a legitimate user sharing confidential data. However, you can minimize the risks of someone breaking into our database and browsing around to find confidential information. This article explores how you can use SQL Server features to encrypt your confidential data.

    Read the article

< Previous Page | 250 251 252 253 254 255 256 257 258 259 260 261  | Next Page >