Home
Search results “Oracle fields terminated by”
How to use Oracle SQL Loader sqlldr to load data into table from text file
 
11:37
How to use Oracle SQL Loader sqlldr to load data into table from text file create table emp(empno number(10),ename varchar(30)); insert into emp values(10,'asif'); set echo off newpage 0 space 0 pagesize 0 feed off head off trimspool on spool d:\oradata\sqlloader\data.txt select empno || ',' || ename from emp; spool off delete emp; update file named data.txt create a file named control.txt load data infile 'd:\oradata\sqlloader\data.txt' into table emp fields terminated by "," optionally enclosed by '"' ( empno, ename ) sqlldr asif/asif control=d:\oradata\sqlloader\control.txt
Views: 45735 Abbasi Asif
How to load data from non oracle file to oracle file using Sql Loader. /* Step By Step /*
 
14:48
In this video i am showing you How We can transfer data from non oracle file to oracle Table. use Oracle Sql Loader export import datapump utility. I have data in test file with comma ( , ) separated column. so we can move this data to oracle useing sql loader. example: ename, sal, deptno Joy, 10000, 10 Scott, 2000, 20 Roy, 4000, 30 using this utility must have to create controlfile ( em.ctl load data infile append into table scott.test fields terminated by ',' optionally enclosed by '"' (ename,sal,deptno) Create table test with 3 column (ename,sal,deptno) rum sqlldr command sqlldr control=/u01/app/parag/em.ctl data=/u01/app/parag/em.txt log=/u01/app/parag/em.log Login to scott schema and check table It is very easy to implement.
Views: 796 Parag Mahalle
How to access data from file - External Table - Oracle - Query Data from flat files
 
11:48
In this video we can see what is the external table, how can we use it.... How to access table from a flat file? We can access data from any type of format loaded by SQL*Loader. Code: create or replace directory External_Dir as 'D:\External'; create table External_Table ( v_num number(5), v_name varchar2(20) ) ORGANIZATION EXTERNAL ( TYPE ORACLE_LOADER DEFAULT DIRECTORY External_Dir Access parameters ( RECORDS DELIMITED BY NEWLINE FIELDS TERMINATED BY ',' ) LOCATION('Sample_File.txt') );
Oracle SQL Loader - Control File Example - Tutorial -2
 
15:36
This is the second video on Oracle SQL*Loader tutorials. Here we talk about the heart of the Oracle SQL Loader i.e Control File with an example, the structure of the control file and how to write one. We discuss all this by looking at an SQL Loader example. We talk about the format of the data files and the advantages of using delimited data format against fixed width data format. What you will learn in this video 1. What is Control File in SQL Loader? 2. You will get an understanding on the various clauses of Control File like LOAD DATA, INFILE, INTO TABLE, FIELDS TERMINATED BY etc. 3. Example of Control File. If you would like to check the other tutorial videos on SQL Loader: First video visit https://youtu.be/fSV51bljrwY Third video visit https://youtu.be/yD_CL_cf8tQ If you would like to understand the advantages of delete over a truncate then visit the following video : Delete VS Truncate: https://youtu.be/u76wMm2byXo Check out our blog at: http://oracleplsqlblog.com/ #KishanMashru #Oracle #SqlLoader #ControlFile #Example #SqlLoaderConcept #SqlLoaderIntroduction #SQLandPLSQL #OracleSqlLoader #ETL #database
Views: 159 Kishan Mashru
Carga masiva con archivos de control .ctl Sql Loader Oracle
 
07:33
Universidad de San Carlos de Guatemala Facultad de Ingeniera Christian Fabián 201314041 - Ejemplo archivo .ctl: OPTIONS (SKIP=1) LOAD DATA INFILE 'FileDataCSV/VISITAS.csv' INTO TABLE TEMP_VISITAS TRUNCATE FIELDS TERMINATED BY "," TRAILING NULLCOLS( c1 BOUNDFILLER POSITION(1:4), c2 BOUNDFILLER POSITION(6:10), CARNE ":c1 || :c2", FECHA_SOL "TO_DATE (:FECHA_SOL,'DD-MM-YYYY','NLS_DATE_LANGUAGE=ENGLISH')", DIRECCION "TRIM(:DIRECCION)", FECHA_VISI "TO_DATE (:FECHA_VISI,'DD-MM-YYYY','NLS_DATE_LANGUAGE=ENGLISH')" ) La OPTION SKIP sirve para saltarse líneas que esten en el archivo de texto, por ejemplo donde esten los encabezados de cada columna. - Comando para ejecutar .ctl desde la terminal : sqlldr userid= usuario/contraseña control=archivo.ctl - CSV utilizado: CARNE,FECHA_SOL,DIRECCION,FECHA_VISI 2001-00001,21-11-2000,SAN ANDRÉS XECUL,17-12-2000 2001-00003,29-11-2000,zona 6 Guatemala Ciudad,04-01-2001
Views: 2310 Christian Fabián
mysql equivalent of oracles sql loader
 
04:17
Code and details: MySQL Equivalent of Oracle's SQL loader https://blog.softhints.com/mysql-equivalent-of-oracles-sql-loader-2/ In this video: * MySQL SQL loader equivalent - LOAD DATA INFILE * MySQL SQL load csv file * MySQL load by tools - HeidiSQL * More info and examples Code: Text file: LOAD DATA LOCAL INFILE 'C:\\Users\\user\\Desktop\\file.txt' INTO TABLE mytable FIELDS TERMINATED BY '|'; CSV file LOAD DATA LOCAL INFILE "/home/Desktop/a.csv" INTO TABLE aboys FIELDS TERMINATED BY ',' ENCLOSED BY '"' LINES TERMINATED BY '\n' IGNORE 1 ROWS --------------------------------------------------------------------------------------------------------------------------------------------------------------- If you really find this channel useful and enjoy the content, you're welcome to support me and this channel with a small donation via PayPal and Bitcoin. PayPal donation https://www.paypal.me/fantasyan Bitcoin: 1DBZu6N9JTpRDdc9QChLZnX3v2iVRaQ4ym
Views: 4 Softhints
How to Use an OLE Object for Excel : Microsoft Excel Tips
 
02:53
Subscribe Now: http://www.youtube.com/subscription_center?add_user=ehowtech Watch More: http://www.youtube.com/ehowtech Excel OLE objects are designed to link pieces of information together, among other tasks. Use an OLE object for Excel with help from an expert with more than a decade of experience working with Microsoft Office and Adobe Creative Suite in a professional capacity in this free video clip. Expert: Justin Conway Filmmaker: Nick Laden Series Description: The Microsoft Office suite of programs, including Excel and Word, are some of the most widely used productivity tools in the world. Get tips on Microsoft Excel with help from an expert with more than a decade of experience working with Microsoft Office and Adobe Creative Suite in a professional capacity in this free video series.
Views: 21294 eHowTech
CARGA MASIVA DE DATOS BASE DE DATOS ORACLE
 
14:20
Nombre: Marco Alexander Mateo Carnet: 200917702 Enlaces: http://silexcorp.org/ Archivo de cotrol: OPTIONS (SKIP=1) LOAD DATA INFILE 'FileData/entrevista_con_prueba_psicometrica.csv' INTO TABLE TEMP_ENTREVISTA FIELDS TERMINATED BY "," ( carne "substr(:carne, 1, 4) || substr(:carne, 6, 10)", fecha "TO_DATE(:fecha,'DD/MM/YYYY','NLS_DATE_LANGUAGE=ENGLISH')", carrera1 , unidad1 , califica1 , carrera2 , unidad2 , califica2 , sede , departamento , municipio , nombresede , direccion , telefono1 , telefono2 , telefax , fax1 , fax2 , fax3 ) Script: sqlldr userid=practica2/practica2 control=entrevista.ctl sqlldr userid=practica2/practica2 control=estudiantes.ctl https://www.mediafire.com/?9gond0dcdcaufr6
Views: 917 Alexander Mateo
5 Minutes with Primavera Unifier - Creating Query Tabs in a Referenced Business Process
 
06:44
This video covers the configuration of an Action Items query tab in the Meeting Minutes business process in uDesigner and discusses its use at runtime. The video is part of the 5 Minutes with Primavera Unifier series, developed by the Oracle Primavera Curriculum Team to demonstrate, explain, and enhance your experience with the application. Click the CC icon to display subtitles; click the Settings icon to change subtitle language. Useful links: Send feedback, comments, questions: [email protected] View more Oracle Learning Library videos: https://www.youtube.com/user/OracleLearning/playlists View additional Oracle Primavera training content: http://www.oracle.com/oll/primavera ================================= For more information, see http://www.oracle.com/goto/oll Copyright © 2015 Oracle and/or its affiliates. Oracle is a registered trademark of Oracle and/or its affiliates. All rights reserved. Other names may be registered trademarks of their respective owners. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the “Materials”). The Materials are provided “as is” without any warranty of any kind, either express or implied, including without limitation warranties or merchantability, fitness for a particular purpose, and non-infringement.
2013 Day2P30 LoB: UPX Packing Example
 
17:04
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news @OpenSecTraining. The playlist for this class is here: http://bit.ly/1cdrfel The full quality video can be downloaded at http://archive.org/details/opensecuritytraining Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: *Scanning and tokenizing source code. *Parsing a grammar and outputting assembly code. *Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). *Linking object files together to create a well-formed binary. *Detailed description of the Windows PE binary format. *How Windows loads a binary into memory and links it on the fly before executing it. *Detailed description of the Unix/Linux/BSD ELF binary format. Along the way we will discuss the relevance of security at different stages of a binary's life, from how viruses *really* work, to the way which malware "packers" duplicate OS process execution functionality, to the benefit of a security-enhanced OS loader which implements address space layout randomization (ASLR). Lab work will include: *Using the new "Binary Scavenger Hunt" tool which creates randomized PE binaries and asks randomized questions about the material you just learned! *Manipulating compiler options to change the type of assembly which is output *Manipulating linker options to change the structure of binary formats *Reading and understanding PE files with PEView *Using WinDbg to watch the loader resolve imports in an executable *Using Thread Local Storage (TLS) to obfuscate control flow and serve as a basic anti-debug mechanism *Creating a simple example virus for PE *Analyze the changes made to the binary format when a file is packed with UPX *Using the rootkit technique of Import Address Table (IAT) hooking to subvert the integrity of a program's calls to external libraries, allowing processes to be hidden. The prerequisites for this class are a basic understanding of C programming and compilation. This class is recommended for a later class on Rootkits (playlist: http://bit.ly/HLkPVG) as we talk about IAT Hooking, and required for a later class on malware analysis.
Views: 1227 Open SecurityTraining
How to disconnect all connections on sql server database |kill all connections |disconnect all users
 
03:06
use master ALTER DATABASE YourDatabase SET SINGLE_USER WITH ROLLBACK IMMEDIATE --do you stuff here ALTER DATABASE YourDatabase SET MULTI_USER This video is about killing or disconnect all connections to a database. The easiest way is bringing the database to single user mode and set it back to multiuser mode. This will disconnect all connections form all the users other than current one who is logged to the database. One important aspect here is, do not close the screen once you set the database to single user mode. Because when a database is in single user mode it will allow only a single connection to the database. If you allow dropping your connection and if any other connects to the database you will not be able to connect the database again. So you may have to Stop the SQL server and start again to connect the database. It is also possible to do this using SQL management studio. Right click on the database, go to properties, go to options and move to restrict access option. There you can select the single user mode or multiple user mode. Now The question is why do you need to do this. I mean when, do you want to kill all connections. It is mainly, when you want to have exclusive access to the database. For example a database is not allowing you to restore a backup on this because you cannot grant the exclusive access, then you can bring the database to single user mode; killing all connections; perform your activates and after that set it to the multi user mode. This way you can maintain the exclusive access while you are completing the work.
Views: 8424 Rohan Mehtha
Carga masiva de datos con archivos de control oracle/sql loader
 
09:36
- Comando para ejecutar .ctl desde la terminal : sqlldr userid= usuario/contraseña control=archivo.ctl -Archivo ctl OPTIONS (SKIP=1) LOAD DATA CHARACTERSET WE8ISO8859P1 INFILE '/home/pau/Escritorio/ARCHIVOS/practica/Practica1_201314745/MIAPRACTICA1-V2.csv' INTO TABLE DATOSTOTALES TRUNCATE FIELDS TERMINATED BY "," OPTIONALLY ENCLOSED BY '"' TRAILING NULLCOLS( GUID, NOMBRE, APELLIDO, CORREO, TELEFONO, COMPANIA, JNOMBRE , JAPELLIDO, PAISORIGEN, CIUDADORIGEN, DIRECCION, TARJETA1, NOMBRETIPO1, VENCIMIENTO1 DATE 'DD/MM/YYYY' nullif VENCIMIENTO1 = 'NULL' , SALDO1, TARJETA2, NOMBRETIPO2, SALDO2, VENCIMIENTO2 DATE 'DD/MM/YYYY' terminated by whitespace nullif vencIMIENTO2 = 'NULL' )
Views: 25 Pau Vasquez
Import CSV data into MySQL table using query
 
03:31
This video demonstrates how we can write a query in mysql to import CSV data into a database table. Following query is used in the example shown in this video. load data infile 'D:/sql/data/mysqldata/employees.csv' into table employees fields terminated by ',' lines terminated by '\n' (name,city,salary);
Views: 8263 Gautam Mokal
Crystal Surgery Basics Using Heart-Shaped Stones
 
03:47
Vivien demonstrates several basic skills of Crystal Surgery using the gorgeous and uplifting heart-shaped stones. Heart-Shaped stones lend themselves perfectly to being used as chakra stones. Vivien also shows how their shape makes them ideal for infusing energy into the physical body and how to use “the active point” to grid the energy field.
Oracle Fusion HCM Cloud Extract Definitions
 
35:07
This video explains to you How to manage Oracle HCM Cloud Extract Definitions, the HCM Extract terminologies, Extract Parameters, Extract Data Elements, etc., Also, visit us at : http://apps2fusion.com/ Contact us at: [email protected] or +44-207-193-5456 | +1-650-318-5241 Follow Us On: Facebook: https://www.facebook.com/apps2fusion Twitter: https://twitter.com/apps2fusion LinkedIn: https://www.linkedin.com/company/apps... Youtube: https://www.youtube.com/c/apps2fusion
Views: 291 apps2fusion
Leveraging Oracle's Clinical Development (CDA) Analytics
 
57:02
Learn how Oracle's Clinical Development Analytics (CDA) can be leveraged to answer specific critical business questions by bringing together information from both data management and clinical operations. -- Oracle's Clinical Development Analytics (CDA) is a comprehensive analytics solution that provides life sciences sponsors and CROs operational insight into their clinical studies, projects, and programs. Join BioPharm Systems' Michael Grossman, vice president of clinical data warehousing and analytics, for this one-hour session on CDA to learn how it can be leveraged to answer specific critical business questions by bringing together information from both data management and clinical operations. You will learn how CDA can: -Provide insight where and when you need it -Increase productivity and reduce costs -Improve clinical operations and data management effectiveness To view this webinar in its entirety, please visit: http://www.biopharm.com or https://cc.readytalk.com/r/o00dmtuqp4tl. Twitter: http://www.twitter.com/BioPharmSystems Facebook: http://www.facebook.com/BioPharmSystems LinkedIn: http://www.linkedin.com/companies/biopharm-systems-inc
Views: 400 BioPharmSystems
Study Design/Setup in Oracle Clinical and Remote Data Capture (RDC)
 
54:50
Learn about the flexible study design features in Oracle Clinical and Remote Data Capture (RDC). -- Oracle Clinical (OC) / Remote Data Capture (RDC) 4.6 provides the ability to conduct global clinical trials more efficiently and effectively. The newest release features significant enhancements that enable and support complex study design scenarios. Increasing the efficiency of clinical trials, the application enables sponsors and CROs to dynamically drive patient visits and assessment schedules based on subject data and clinical outcomes, boosting the productivity and the effectiveness of a clinical trial. Join BioPharm Systems' chief application expert, Steve Rifkin, for this free one-hour webinar to examine the new flexible study design features in the latest version of OC/RDC. This webinar will include both a discussion and demonstration of OC/RDC product features. To view this webinar in its entirety, please visit: http://www.biopharm.com or https://cc.readytalk.com/r/snmsyp0sil8n. Twitter: http://www.twitter.com/BioPharmSystems Facebook: http://www.facebook.com/BioPharmSystems LinkedIn: http://www.linkedin.com/companies/biopharm-systems-inc
Views: 10311 BioPharmSystems
Big Data & Hadoop - Concept of External Tables - DIY#8 of 50
 
11:42
CREATE EXTERNAL TABLE EXTCSV ( Country STRING, ClaimId STRING, Year STRING, ClaimItem STRING, ClaimAmt INT, PaidAmt INT ) ROW FORMAT DELIMITED FIELDS TERMINATED BY ',' STORED AS TEXTFILE LOCATION '/user/bdcs/'; Google Drive link for the files used in the videos: https://drive.google.com/open?id=0B1BHXHiSfdg_VmpZb2NzM1hXbEk Big Data & Hadoop - Concept of External Tables - DIY#8 of 50 Big Data & Hadoop - HIVE SQL -to- MapReduce- DIY#7 of 50 Big Data & Hadoop - Concept HIVE Warehouse - DIY#6 of 50 Big Data & Hadoop - Create Tables & Load Data - DIY#5 of 50 Big Data & Hadoop - HIVE Command Line & Hue - DIY#4 of 50 Big Data & Hadoop - Architecture & Ecosystem Explained - DIY#3 of 50 Big Data & Hadoop - Setting up Cloudera VM - DIY#2 of 50 Big Data & Hadoop - Fundamentals - Set 1 of 50 Big Data Architecture and Ecosystem explained. Horton works, Cloudera, Spark, Hive, PIG, Impala, Scala Do It Yourself - DIY Bharati DW Consultancy cell: +1-562-646-6746 email: [email protected] website: http://www.bharaticonsultancy.in http://bharatidwconsultancy.blogspot.com Twitter: @BharatDWCons Youtube: BharatiDWConsultancy Whatsapp: +1-562-646-6746 (+1-56-COGNOS-46) Big Data tutorial for beginners. Hadoop tutorial for beginners, HIVE tutorial for beginners. Free Big Data Tutorial for beginners.
Big Data & Hadoop - Create Tables & Load Data  - DIY#5 of 50
 
14:00
Google Drive link for the files used in the videos: https://drive.google.com/open?id=0B1BHXHiSfdg_VmpZb2NzM1hXbEk Commands: show databases; use bdcs; CREATE TABLE LOADCSV ( Country STRING, ClaimId STRING, Year STRING, ClaimItem STRING, ClaimAmt INT, PaidAmt INT ) ROW FORMAT DELIMITED FIELDS TERMINATED BY ',' STORED AS TEXTFILE; show tables; load data inpath '/user/bdcs/BigDataClaimsSubset.csv' into table loadcsv; Big Data & Hadoop - Create Tables & Load Data - DIY#5 of 50 Big Data & Hadoop - HIVE Command Line & Hue - DIY#4 of 50 Big Data & Hadoop - Architecture & Ecosystem Explained - DIY#3 of 50 Big Data & Hadoop - Setting up Cloudera VM - DIY#2 of 50 Big Data & Hadoop - Fundamentals - Set 1 of 50 Big Data Architecture and Ecosystem explained. Horton works, Cloudera, Spark, Hive, PIG, Impala, Scala Do It Yourself - DIY Bharati DW Consultancy cell: +1-562-646-6746 email: [email protected] website: http://www.bharaticonsultancy.in http://bharatidwconsultancy.blogspot.com Twitter: @BharatDWCons Youtube: BharatiDWConsultancy Whatsapp: +1-562-646-6746 (+1-56-COGNOS-46) Big Data tutorial for beginners. Hadoop tutorial for beginners, HIVE tutorial for beginners. Free Big Data Tutorial for beginners.
Views: 3082 BharatiDWConsultancy
2013 Day1P10 Life of Binaries: PE File Header Pop Quiz
 
03:33
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news @OpenSecTraining. The playlist for this class is here: http://bit.ly/1cdrfel The full quality video can be downloaded at http://archive.org/details/opensecuritytraining Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: *Scanning and tokenizing source code. *Parsing a grammar and outputting assembly code. *Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). *Linking object files together to create a well-formed binary. *Detailed description of the Windows PE binary format. *How Windows loads a binary into memory and links it on the fly before executing it. *Detailed description of the Unix/Linux/BSD ELF binary format. Along the way we will discuss the relevance of security at different stages of a binary's life, from how viruses *really* work, to the way which malware "packers" duplicate OS process execution functionality, to the benefit of a security-enhanced OS loader which implements address space layout randomization (ASLR). Lab work will include: *Using the new "Binary Scavenger Hunt" tool which creates randomized PE binaries and asks randomized questions about the material you just learned! *Manipulating compiler options to change the type of assembly which is output *Manipulating linker options to change the structure of binary formats *Reading and understanding PE files with PEView *Using WinDbg to watch the loader resolve imports in an executable *Using Thread Local Storage (TLS) to obfuscate control flow and serve as a basic anti-debug mechanism *Creating a simple example virus for PE *Analyze the changes made to the binary format when a file is packed with UPX *Using the rootkit technique of Import Address Table (IAT) hooking to subvert the integrity of a program's calls to external libraries, allowing processes to be hidden. The prerequisites for this class are a basic understanding of C programming and compilation. This class is recommended for a later class on Rootkits (playlist: http://bit.ly/HLkPVG) as we talk about IAT Hooking, and required for a later class on malware analysis.
Views: 1720 Open SecurityTraining
Cross-Product Features | Migrating Customizations from Test to Production
 
02:08
This video tutorial applies to Rel 11-13. It shows you how to copy customization's created in the test environment to the production environment
How to normalize a relation table | DBMS | part-16
 
09:03
This video contains the basic concepts of how to decompose or normalize a relational table in desired normal form and will help you in various competitive exams like GATE , NET, PSU'S etc Following are the important topics of dbms ER‐model - entity–relationship model, strong entity set, weak entity set, single valued attribute, multivalued attribute, stored attribute, derived attribute, simple attribute composite attribute, weak relationship, strong relationship, mapping, cardinality ratios, discriminator attribute, fan trap, chasm trap Relational model – relational table, column, domain, row, tuple, relational algebra – selection, projection, union, intersection, set difference, Cartesian product, natural join, left outer join, right outer join, complete outer join, theta join, division operator, nested query, safe query tuple calculus – tuple relational calculus, domain relational calculus, SQL – select, from, where, order by, group by, max, min, avg, count, sum, having, Integrity constraints – super key, candidate key, primary key, foreign key, alternate key, secondary key, surrogate key normal forms – first normal form, second normal form, third normal form, bcnf, 4nf, 5nf, functional dependency, minimal cover, canonical collection, multivalued functional dependency, dependency preserving, lossy and lossless decomposition. File organization – indexing, B, B+ trees, key attribute, anchor attribute, primary indexing, secondary indexing, clustered indexing, multilevel indexing, block pointer, tree pointer, record pointer, top down search, sequential search, range query, index file, ordering, non-ordering Transactions and concurrency control- transaction, acid properties, atomicity, consistency, isolation, durability, life cycle of a transaction, active state, partially committed state, committed state, abort, rollback, terminated, phantom read, dirty read, unrepeatable read, lost update problem, conflict serializability, view serializability, irrecoverable schedule, cascading rollback, recoverable schedule, cascadless schedule. Lock based protocol, two phase locking, exclusive lock, shared lock, growing phase, shrinking phase, conservative two-phase locking, rigorous two phase locking, strict two phase locking, time stamping, time stamp, read, write, deadlock, granularity, tree based protocol,
Views: 103293 KNOWLEDGE GATE
SQL Server - INSERT RECORDS INTO TABLE VIA STORED PROCEDURE AND DEFAULT VALUES
 
06:43
https://www.udemy.com/sql-server-fast-track-intro-to-queries/learn/v4/overview How to use a stored procedure to insert records to a database table. This tutorial also goes over how to set up the stored procedure with parameters that have default values and then the different methods of calling or executing the stored procedure.
Views: 33821 Dave Merton
The Matrix Meeting Morpheus Scene HD
 
04:48
The meeting Morpheus scene from The Matrix.
Views: 1275018 TheMatrixFan314
2. how to create table in SQL Server and Insert data or value into the table
 
15:29
The CREATE TABLE statement is used to create a table in a database. Tables are organized into rows and columns; and each table must have a name. SQL CREATE TABLE Syntax create table Student ( ID int, FirstName varchar(50), LastName varchar(50), Coursr varchar(50), Email varchar(50), Address varchar(50) ); The SQL INSERT INTO Statement The INSERT INTO statement is used to insert new records in a table. SQL INSERT INTO Syntax insert into Student(Id,FirstName,Lastname,Coursr,Email,Address) values('101','ABC','XYZ','SQL Server','[email protected]','150 us 15/3')
Views: 546 Shashikant JAVA SQL
MariaDB (like MySQL) - 10 Linux on POWER Killer Apps for AIX People
 
16:29
OK so you know AIX but want to give Linux on POWER a try. MariaDB is one of my top ten and it is very easy to Install - here from the RHEL 7.0 BE install media, Initialise a RDBMS, Start MariaDB, create tables and bulk load tables data. Below is my notes: 1) Very useful information - http://www.if-not-true-then-false.com/2013/install-mariadb-on-fedora-centos-rhel/ 2) yum install mariadb mariadb-server 3) Start now and on reboot systemctl start mariadb.service systemctl enable mariadb.service 4) /usr/bin/mysql_secure_installation It asks for the "root user" password but means the database super user (not Linux root). 5) Access MariaDB: mysql -u root -p 6) Useful to know: show databases ; connect test ; show tables ; source filename-of-SQL-commands ; 7) wget www.tpc.org/tpch/spec/tpch_2_16_1.zip Create teables & big SQL example files dbgen/dss.ddl & dbgen/[1-20].sql 8) Create DB, connect (use) it and add tables: CREATE DATABASE tpch; USE tpch; source /root/tpch_2_16_1/dbgen/dss.ddl ; show tables; 9) Bulk load data from ref_data/1/customer.tbl.1 which is pipe char ended column data LOAD DATA LOCAL INFILE 'customer.tbl.1' INTO TABLE CUSTOMER FIELDS TERMINATED BY '|'; 10) Do the other tables & create indexes then run SQL select * from CUSTOMER; Note uppercase select C_NAME,C_PHONE from CUSTOMER where C_CUSTKEY = '2' ; SELECT * FROM ORDERS,CUSTOMER where CUSTOMER.C_CUSTKEY = ORDERS.O_CUSTKEY; Good luck!
Views: 1733 Nigel Griffiths
mysql -  load data into table from excel csv format || Reset auto increment column
 
10:59
select * from customers delete from customers ALTER TABLE customers AUTO_INCREMENT = 1; -- syntax alter table (table_name) auto_increment= (number); CREATE TABLE `customers` ( `customer_id` INT NOT NULL AUTO_INCREMENT, `first_name` VARCHAR(50), `last_name` VARCHAR(50), `phone` BIGINT, PRIMARY KEY (`customer_id`) ); Import excel data into mysql db File should be in CSV format In the excel, we dont need to have customer_id as it is set to auto_increment Also, we dont need to include headers in the excel Fields terminated by , Deselect the Customer_id Delete the data and load it once again Customer_id is staring from 16 not from 1 though we have deleted the data we need to reset the auto_increment Delete data and load once again
Views: 23 nechali
How To Recover MySQL Database From Data Files
 
04:12
In this tutorial, I show how to recover your MySQL databases from MySQL data files in Ubuntu 11.04 and create a mysql dump of them using phpmyadmin.
Views: 54880 MyOwnHomeServer
Part 69   Merge in SQL Server
 
07:14
Text version of the video http://csharp-video-tutorials.blogspot.com/2014/09/part-69-merge-in-sql-server.html Slides http://csharp-video-tutorials.blogspot.com/2014/09/part-69-merge-in-sql-server_30.html All SQL Server Text Articles http://csharp-video-tutorials.blogspot.com/p/free-sql-server-video-tutorials-for.html All SQL Server Slides http://csharp-video-tutorials.blogspot.com/p/sql-server.html All Dot Net and SQL Server Tutorials in English https://www.youtube.com/user/kudvenkat/playlists?view=1&sort=dd All Dot Net and SQL Server Tutorials in Arabic https://www.youtube.com/c/KudvenkatArabic/playlists What is the use of MERGE statement in SQL Server Merge statement introduced in SQL Server 2008 allows us to perform Inserts, Updates and Deletes in one statement. This means we no longer have to use multiple statements for performing Insert, Update and Delete. With merge statement we require 2 tables 1. Source Table - Contains the changes that needs to be applied to the target table 2. Target Table - The table that require changes (Inserts, Updates and Deletes) The merge statement joins the target table to the source table by using a common column in both the tables. Based on how the rows match up as a result of the join, we can then perform insert, update, and delete on the target table. Merge statement syntax MERGE [TARGET] AS T USING [SOURCE] AS S ON [JOIN_CONDITIONS] WHEN MATCHED THEN [UPDATE STATEMENT] WHEN NOT MATCHED BY TARGET THEN [INSERT STATEMENT] WHEN NOT MATCHED BY SOURCE THEN [DELETE STATEMENT] Example 1 : In the example below, INSERT, UPDATE and DELETE are all performed in one statement 1. When matching rows are found, StudentTarget table is UPDATED (i.e WHEN MATCHED) 2. When the rows are present in StudentSource table but not in StudentTarget table those rows are INSERTED into StudentTarget table (i.e WHEN NOT MATCHED BY TARGET) 3. When the rows are present in StudentTarget table but not in StudentSource table those rows are DELETED from StudentTarget table (i.e WHEN NOT MATCHED BY SOURCE) Create table StudentSource ( ID int primary key, Name nvarchar(20) ) GO Insert into StudentSource values (1, 'Mike') Insert into StudentSource values (2, 'Sara') GO Create table StudentTarget ( ID int primary key, Name nvarchar(20) ) GO Insert into StudentTarget values (1, 'Mike M') Insert into StudentTarget values (3, 'John') GO MERGE INTO StudentTarget AS T USING StudentSource AS S ON T.ID = S.ID WHEN MATCHED THEN UPDATE SET T.NAME = S.NAME WHEN NOT MATCHED BY TARGET THEN INSERT (ID, NAME) VALUES(S.ID, S.NAME) WHEN NOT MATCHED BY SOURCE THEN DELETE; Please Note : Merge statement should end with a semicolon, otherwise you would get an error stating - A MERGE statement must be terminated by a semi-colon (;) In real time we mostly perform INSERTS and UPDATES. The rows that are present in target table but not in source table are usually not deleted from the target table. Example 2 : In the example below, only INSERT and UPDATE is performed. We are not deleting the rows that are present in the target table but not in the source table. Truncate table StudentSource Truncate table StudentTarget GO Insert into StudentSource values (1, 'Mike') Insert into StudentSource values (2, 'Sara') GO Insert into StudentTarget values (1, 'Mike M') Insert into StudentTarget values (3, 'John') GO MERGE INTO StudentTarget AS T USING StudentSource AS S ON T.ID = S.ID WHEN MATCHED THEN UPDATE SET T.NAME = S.NAME WHEN NOT MATCHED BY TARGET THEN INSERT (ID, NAME) VALUES(S.ID, S.NAME);
Views: 91709 kudvenkat
Oracle Fusion HCM Checklists
 
03:41
This video explains the functionality of checklists used in Oracle HCM Cloud
Siebel Clinical Best Practices: Post Implementation
 
57:58
Learn about various best practices that sponsors and CRO's should consider once they have implemented a clinical trial management system (CTMS), such as Siebel Clinical. -- Has your organization recently implemented Oracle's Siebel Clinical as their CTMS? Or are you preparing to do so, or perhaps beginning to consider it? Regardless of your stage in the process, organizations that follow a set of best practices with Siebel Clinical enable users and administrators to operate efficiently and effectively. Best practices maximize the system's functionality, maintain consistent business processes, and ensure clean records. In short, they save you time and money. Join BioPharm Systems' Alice Crawford, senior consultant, clinical trial management solutions, for this one-hour session that will examine various best practices that life sciences organizations should consider once they have implemented a CTMS. This webinar covers best practices in the following areas: -SOPs -User responsibilities and positions -Record format conventions -Record entry and deletion -Template creation and use -Site visits and monitoring reports -Protocol amendments -Investigator payments -Change control tools -Querying and ad hoc reports -And much more! To view this webinar in its entirety, please visit: http://www.biopharm.com or https://cc.readytalk.com/r/hpv49yucxu9u. Twitter: http://www.twitter.com/BioPharmSystems Facebook: http://www.facebook.com/BioPharmSystems LinkedIn: http://www.linkedin.com/companies/biopharm-systems-inc
Views: 252 BioPharmSystems
Be a command line expert with aws cli - TOP 30 commands
 
07:08
Please like my video and subscribe for more MSI Download : - http://docs.aws.amazon.com/cli/latest/userguide/installing.html#install-msi-on-windows Commands aws s3 mb s3://bucket-name aws s3 rb s3://bucket-name aws s3 ls aws s3 cp C:\Users\test\Desktop\test.png s3://areik - S3 bucket copy file aws ec2 describe-instances --filters "Name=instance-type,Values=t2.micro" aws ec2 create-key-pair --key-name mykeypair aws ec2 terminate-instances --instance-ids i-5203422c aws ec2 create-security-group --group-name my-sg --description "My security group aws ec2 describe-security-groups --group-names my-sg aws ec2 create-security-group --group-name my-sg --description "My security group" --vpc-id vpc-1a2b3c4d aws ec2 authorize-security-group-ingress --group-name my-sg --protocol tcp --port 3389 --cidr 203.0.113.0/24 aws ec2 delete-security-group --group-name my-sg aws ec2 delete-security-group --group-id sg-903004f8 aws ec2 describe-instance-status aws ec2 run-instances --image-id ami-e90dc68a --count 1 --instance-type t2.micro --key-name qwikLABS-L117-359887 --security-groups my-sg aws ec2 create-snapshot --volume-id vol-656f37bf --description "This is my root volume snapshot." aws ec2 describe-volumes aws ec2 describe-snapshots -snapshot-id snap-6ed73e7f aws ec2 create-image --instance-id i-873f1723 --name "My server" --description "An AMI for my server" --no-reboot aws ec2 run-instances --image-id ami-e90dc68a --count 1 --instance-type t2.micro --key-name qwikLABS-L117-359887 --security-group-ids sg-bb8048df --subnet-id subnet-3d076a58 (launch instance in specific subnet) aws elb create-load-balancer --load-balancer-name my-load-balancer --listeners "Protocol=HTTP,LoadBalancerPort=80,InstanceProtocol=HTTP,InstancePort=80" --subnets subnet-15aaab61 --security-groups sg-a61988c3 aws elb create-load-balancer --load-balancer-name my-load-balancer --listeners --scheme internal "Protocol=HTTP,LoadBalancerPort=80,InstanceProtocol=HTTP,InstancePort=80" --subnets subnet-15aaab61 --security-groups sg-a61988c3 aws elb register-instances-with-load-balancer --load-balancer-name my-load-balancer --instances i-d6f6fae3 aws ec2 describe-instances --filters "Name=instance-type,Values=t2.micro,Name=instance-state-name,Values=terminated" aws ec2 allocate-address aws ec2 associate-address --instance-id i-873f1723 --public-ip 52.77.88.244 aws ec2 stop-instances --instance-ids i-1a2b3c4d aws ec2 start-instances --instance-ids i-1a2b3c4d aws ec2 terminate-instances --instance-ids i-1a2b3c4d aws ec2 attach-volume --volume-id vol-1234abcd --instance-id i-abcd1234 --device /dev/sdf aws ec2 detach-volume --volume-id vol-1234abcd
Views: 14845 dython
How to use Audit Command Language (ACL) to detect Ghost names on payroll
 
07:06
This tutorial teaches you how to use audit command language (ACL) to detect ghost names in payroll. Ghost names are names on payroll as been paid as staff but these people are not on HR list of employees. Kindly subscribe, share and like my videos. Enjoy and have fun with ACL for data analysis.
Views: 1452 Divine selasi
Clustering Index | DBMS HINDI | PART - 7
 
11:13
This video contains the basic concepts of Clustering Index and will help students in various competitive exams like GATE , NET, PSU'S etc Following are the important topics of dbms ER‐model - entity–relationship model, strong entity set, weak entity set, single valued attribute, multivalued attribute, stored attribute, derived attribute, simple attribute composite attribute, weak relationship, strong relationship, mapping, cardinality ratios, discriminator attribute, fan trap, chasm trap Relational model – relational table, column, domain, row, tuple, relational algebra – selection, projection, union, intersection, set difference, Cartesian product, natural join, left outer join, right outer join, complete outer join, theta join, division operator, nested query, safe query tuple calculus – tuple relational calculus, domain relational calculus, SQL – select, from, where, order by, group by, max, min, avg, count, sum, having, Integrity constraints – super key, candidate key, primary key, foreign key, alternate key, secondary key, surrogate key normal forms – first normal form, second normal form, third normal form, bcnf, 4nf, 5nf, functional dependency, minimal cover, canonical collection, multivalued functional dependency, dependency preserving, lossy and lossless decomposition. File organization – indexing, B, B+ trees, key attribute, anchor attribute, primary indexing, secondary indexing, clustered indexing, multilevel indexing, block pointer, tree pointer, record pointer, top down search, sequential search, range query, index file, ordering, non-ordering Transactions and concurrency control- transaction, acid properties, atomicity, consistency, isolation, durability, life cycle of a transaction, active state, partially committed state, committed state, abort, rollback, terminated, phantom read, dirty read, unrepeatable read, lost update problem, conflict serializability, view serializability, irrecoverable schedule, cascading rollback, recoverable schedule, cascadless schedule. Lock based protocol, two phase locking, exclusive lock, shared lock, growing phase, shrinking phase, conservative two-phase locking, rigorous two phase locking, strict two phase locking, time stamping, time stamp, read, write, deadlock, granularity, tree based protocol,
Views: 54113 KNOWLEDGE GATE
Esri Geodatabase  UnVersioned w/ Archiving
 
44:10
Full Multi-User Geodatabase Playlist https://goo.gl/nSgYnM We talk about archiving, how to enable it on your enterprise geodatabase. How to hit an archived geodatabase and edit it from ArcObjects using the IMultiUserWorkspaceEdit interface. We ran into a small permission problem at the end that I want a solve in a separate mini episode. We did the workaround by connecting as the table owner (SDE). Boost your GIS knowledge by grabbing my books Learning ArcGIS Geodatabase https://goo.gl/csQdCX Administering ArcGIS for Server https://goo.gl/zvYCRg ArcGIS By Example  https://goo.gl/yJKSqB Building Web Applications with ArcGIS https://goo.gl/brgKUJ Support IGeometry on paypal: https://goo.gl/wZ8hSh Full ArcGIS Javascript API Series Playlist http://bit.ly/2zf7G80 Full Multi-User Geodatabase Playlist https://goo.gl/nSgYnM Full ArcGIS Pro 2.x Playlist https://goo.gl/2j4NoZ Full ArcGIS By Example (C#) [Phonatech] Playlist https://goo.gl/FwdrHa Stay Awesome! Hussein Nasser
Views: 641 IGeometry
Primavera P6 Common Logical Errors (Dangling task & Circular Loop)
 
04:41
Commonest errors to look for after developing a schedule is to look for Logic errors-Circular loop & Dangling task.Most software packages nowadays can easily detect loop but filter could be required to detect the dangling tasks where the project involves a lot of activities. Softwares such Primavera Risk Analysis(PRA) would detect the dangling task as there are always need for import check before proceeding with Monte Carlo Simulation
Views: 1628 ABIMBOLA OWOADE
Visual Basic Tutorial - 11 - Getting User Input
 
06:46
Facebook - https://www.facebook.com/TheNewBoston-464114846956315/ GitHub - https://github.com/buckyroberts Google+ - https://plus.google.com/+BuckyRoberts LinkedIn - https://www.linkedin.com/in/buckyroberts reddit - https://www.reddit.com/r/thenewboston/ Support - https://www.patreon.com/thenewboston thenewboston - https://thenewboston.com/ Twitter - https://twitter.com/bucky_roberts
Views: 126375 thenewboston
String Functions in SQL Server part-V || SPACE, STR, STUFF, SUBSTRING functions in SQL
 
04:42
This video will provide you the details of each string functions in SQL Server 2014. I'll be walking through each and every kinds of build in function which are available in SQL Server in my next videos. Previous video for more String Functions String Function Part I https://www.youtube.com/watch?v=6cgn4... String Function Part II https://www.youtube.com/watch?v=RmyT8... String Function Part III https://www.youtube.com/watch?v=lQVnQ... String Function Part IV https://www.youtube.com/watch?v=cxASmU2hxjc ***************************************************************************************** SPACE (Transact-SQL) Returns a string of repeated spaces.  Syntax SPACE ( integer_expression )  Arguments integer_expression Is a positive integer that indicates the number of spaces. If integer_expression is negative, a null string is returned.  Return Types varchar STR (Transact-SQL) Returns character data converted from numeric data.  Syntax STR ( float_expression [ , length [ , decimal ] ] )  Arguments float_expression Is an expression of approximate numeric (float) data type with a decimal point. length Is the total length. This includes decimal point, sign, digits, and spaces. The default is 10. decimal Is the number of places to the right of the decimal point. decimal must be less than or equal to 16. If decimal is more than 16 then the result is truncated to sixteen places to the right of the decimal point.  Return Types varchar STUFF (Transact-SQL) The STUFF function inserts a string into another string. It deletes a specified length of characters in the first string at the start position and then inserts the second string into the first string at the start position.  Syntax STUFF ( character_expression , start , length , replaceWith_expression )  Arguments character_expression Is an expression of character data. character_expression can be a constant, variable, or column of either character or binary data. start Is an integer value that specifies the location to start deletion and insertion. If start or length is negative, a null string is returned. If start is longer than the first character_expression, a null string is returned. start can be of type bigint. length Is an integer that specifies the number of characters to delete. If length is longer than the first character_expression, deletion occurs up to the last character in the last character_expression. length can be of type bigint. replaceWith_expression Is an expression of character data. character_expression can be a constant, variable, or column of either character or binary data. This expression will replace length characters of character_expression beginning at start.  Return Types Returns character data if character_expression is one of the supported character data types. Returns binary data if character_expression is one of the supported binary data types. SUBSTRING (Transact-SQL) Returns part of a character, binary, text, or image expression in SQL Server.  Syntax SUBSTRING ( expression ,start , length )  Arguments expression Is a character, binary, text, ntext, or imageexpression. start Is an integer or bigint expression that specifies where the returned characters start. If start is less than 1, the returned expression will begin at the first character that is specified in expression. In this case, the number of characters that are returned is the largest value of either the sum of start + length- 1 or 0. If start is greater than the number of characters in the value expression, a zero-length expression is returned. length Is a positive integer or bigint expression that specifies how many characters of the expression will be returned. If length is negative, an error is generated and the statement is terminated. If the sum of start and length is greater than the number of characters in expression, the whole value expression beginning at start is returned.  Return Types Returns character data if expression is one of the supported character data types. Returns binary data if expression is one of the supported binary data types. The returned string is the same type as the specified expression with the exceptions shown in the table. Specified expression Return type char/varchar/text varchar nchar/nvarchar/ntext nvarchar binary/varbinary/image varbinary
Views: 63 Softtech forum
How to insert values into table from Windows form application | GUI using ADO.NET Visual studio 2010
 
24:11
This video illustrates how to insert values into table using Visual studio 2010 window forms | GUI. This video contains following procedure. 1)Create a connection between a database and Visual studio 2010. 2)Opening the connection. 3)Writing the SQL query and executing it to insert values into the table. 4)Display a message box showing how many records have been inserted. 5)Closing the connection. I have used ADO.NET concept to insert values using Windows forms GUI. Connect with Author on LinkedIn: in.linkedin.com/in/mdnaseer Our Website: http://goo.gl/Np6yLJ
Views: 169847 Mind blowing videos
Leveraging Azure Databricks to minimize time to insight by combining Batch and Stream
 
01:18:40
Bringing data to life in a timely manner is every developer's dream. With Azure Databricks Delta, this dream is closer to reality than ever before. Join this session to see how you can create simple pipelines that allow bringing together real-time data and merge with massive batch datasets, with the objective of leveraging the best of both worlds, but with minimal friction. With data driving automated decision-making processes infused into intelligent applications, this session will enable you to develop intelligence integration directly against your in-flight data. Create a Free Account (Azure): https://aka.ms/azft-databricks
Views: 530 Microsoft Developer
Website Hacking & Understanding Databases | phpmyadmin | Hindi
 
10:28
The best way to make sure your database is secure from hackers is to think like a hacker. If you were a hacker, what sort of information would you be looking for? How would you try to get it? There are numerous types of databases and many different ways to hack them, but most hackers will either try to crack the database root password or run a known database exploit. If you’re comfortable with SQL statements and understand database basics, you can hack a database. Find out if the database is vulnerable.[1] You’ll need to be handy with database statements to use this method. Open the database web interface login screen in your web browser and type a ’ (single quote) into the username field. Click “Login.” If you see an error that says something like “SQL Exception: quoted string not properly terminated” or “invalid character,” the database is vulnerable to SQL injections. Image titled Hack a Database Step 2 2 Find the amount of columns.[2] Return to the login page for the database (or any other URL that ends in “id=” or “catid=”) and click into the browser address box. After the URL, hit the space bar and type order by 1, then hit ↵ Enter. Increase the number to 2 and press ↵ Enter. Keep increasing until you get an error. The actual number of columns is the number you entered before the number that gave you the error. Image titled Hack a Database Step 3 3 Find which columns accept queries. At the end of the URL in the address bar, change the catid=1 or id=1 to catid=-1 or id=-1. Hit the space bar and type union select 1,2,3,4,5,6 (if there are 6 columns). The numbers should count all the way up to the total amount of columns, and each should be separated by a comma. Press ↵ Enter and you’ll see the numbers of each column that will accept a query. Image titled Hack a Database Step 4 4 Inject SQL statements into the column. For example, if you want to know the current user and want to put the injection in column 2, erase everything after the id=1 in the URL and hit the space bar. Then, type union select 1,concat(user()),3,4,5,6--. Hit ↵ Enter and you will see the name of the current database user on the screen. Use any SQL statements you’d like to return information, such as lists of usernames and passwords to crack. Method 2 Cracking the Database Root Password Image titled Hack a Database Step 5 1 Try logging in as root with the default password. Some databases don’t have a root (admin) password by default, so you may be able to get in leaving the password field empty. Some others have default passwords that can be found easily by searching database tech support forums. Image titled Hack a Database Step 6 2 Try common passwords. If the admin secured the account with a password (a likely situation), try common username/password combinations. Some hackers publicly post lists of passwords they’ve cracked while using auditing tools. Try some different username and password combinations. A reputable site with collected password lists is https://github.com/danielmiessler/SecLists/tree/master/Passwords. Trying passwords by hand can be time-consuming, but there’s no harm in giving it a shot before breaking out the big guns. Image titled Hack a Database Step 7 3 Use a password auditing tool.[3] You can use a variety of tools to try thousands of dictionary words and letter/number/symbol combinations by brute force until the password is cracked. Tools like DBPwAudit (for Oracle, MySQL, MS-SQL and DB2) and Access Passview (for MS Access) are popular password auditing tools that can be run against most databases.[4] You can also search Google for newer password auditing tools specifically for your database. For instance, a search for password audit tool oracle db if you’re hacking an Oracle database. If you have an account on the server that hosts the database, you can run a hash cracker like John the Ripper against the database’s password file. The location of the hash file is different depending on the database.[5] Only download from sites that you can trust. Research tools extensively before using them. Method 3 Running Database Exploits Image titled Hack a Database Step 8 1 Find an exploit to run.[6] Sectools.org has been cataloging security tools (including exploits) for over ten years. Their tools are reputable and used by system administrators all over the world for security testing. Browse their “Exploitation” database (or find another trustworthy site) to find tools or text files that help you exploit security holes in databases. Another site with exploits is www.exploit-db.com. Go to their website and click the Search link, then search for the type of database you want to hack (for example, “oracle”). Type the Captcha code in the provided square and search. Be sure you research all exploits you plan to try so you know what to do in case of potential iss
Views: 196 Tech Universe
Case Statement in SQL
 
02:01
In SQL Server, the CASE statement has the functionality of an IF-THEN-ELSE statement.You can use the CASE statement within a SQL statement.
Views: 1338 Himadri Patel
Fred Luddy | ServiceNow Knowledge14
 
27:26
Best viewed at http://vinja.tv/undefined. 01. Fred Luddy - Founder & Chief Product Officer of ServiceNow - Visits theCUBE!. (00:43) 02. Listening To The customer. (01:12) 03. The Effect Of Terminating Windows XP. (02:42) 04. Flat Is The New World. (03:53) 05. Thoughts On The Software Industry. (06:36) 06. Can Big Companies Innovate?. (08:15) 07. The Consumerization Of IT. (10:23) 08. How Do You Keep Innovating And Not Become Yesterday's Big Thing?. (12:28) 09. Talking About App Creator. (15:04) 10. The Citizen Developer. (17:22) 11. The Race For The Developer. (18:09) 12. The Single System Of Record. (20:02) 13. The Remodeling Of The House Analogy. (22:23) 14. The Idea Of Share. (23:45) Track List created with http://www.vinjavideo.com. --- --- Fred Luddy, ServiceNow, at ServiceNow Knowledge 2014 with Dave Vellante and Jeff Frick @thecube #Know14 Fred Luddy, Chief Product Officer for ServiceNow, discussed the company’s strategy, their interaction with customers and their approach to technology innovation with theCUBE co-hosts Jeff Frick and Dave Vellante, live from the ServiceNow Knowledge14 conference. “I’ve always been someone who listens to customers, find out what they need, and then build the technology” that solves specific problems, Luddy said. ServiceNow does not create solutions that look for a problem to solve. One need ServiceNow has addressed is end user interface challenges. Luddy stated “the big constraint was that people were using older versions of Internet Explorer (IE). That held it back.” As Microsoft terminated XP and IE6 is gone, the newer browsers allow them to take advantage of all the new capabilities and improve the UI. On disruptive innovation . Asked of the strategy to spur the embracing of disruptive innovation, Luddy made reference to some popular trends, saying, “where everything is being led right now is in sites like Facebook and Google where people bring their expectations of how technology should work.” It’s the ease of use for end users Luddy referenced, making the parallel to enterprises “people are forced into a form metaphor. What we wanted to do is find a better way of working,” he explained. A solution his team put forth was having multiple columns of information flowing, with end users being able to react to data. “We would like to be thought of as more of an Apple and Google, compared to Oracle,” Luddy said, further explaining that in Oracle’s case, the analogy is more of a financial model than an innovative technical model. Google, Facebook and the like make microscopical acquisitions, blend them into their offerings, and make them available to their customers. “We want to be innovative,” Luddy said, rather than making huge acquisitions. Asked what the secret sauce of innovation was, Luddy stated, “my belief is that most organizations become very myopic on their own product.” He used the example Blackberry, which once had 85 percent market saturation and focused on how to make the product better. “They were looking at the current strengths, not what the market expectations were going to be.” What drives the changes in today’s enterprise use of technology, according to Luddy, is the notion of shadow IT and people’s expectations. People see Dropbox, Evernote, and other such services and just start using them. They have a job to do, “their attitude is, ‘I will proceed till I’m apprehended,'” Luddy explained. Asked if he was paranoid about another product replacing ServiceNow’s offerings, Luddy said he is always paranoid. “I’m always frustrated. When we complete something, I am pretty content with it for about 30 seconds. I’ve never been happy with anything I’ve produced for more than a few minutes. I see flaws, I see opportunities.” Building tools for today’s market . Explaining what makes the company’s App Creator great, Luddy said “we look at the market very differently. We think about the problem to be solved and build the proper technology to solve it. We want people to do programming without realizing they are doing it.” App Creator is a simple way to make a set of database tables that interact with each other to create applications. “We have a very appropriate set of technologies that solves tens of thousands of customer challenges,” Luddy explained. Asked if their single system of record, along with the apps built on its framework, and the locking and queuing had become a challenge, Luddy explained that “if you look at how people get work done, there is always some field that is open. In a large part we’ve solved scalability and locking issues by putting in streams of data.” “I think we have a lot of headroom left,” Luddy concluded, referring to ServiceNow’s largest customers and their growing need for managing massive databases.
C# - Insert ,Update ,Delete
 
23:26
See How To Perform Insert,Update,Delete Operation In SQL Using C# Winforms
Views: 535355 Programming At Kstark
How to do insert update delete in MySql Workbench
 
02:40
In this part of the MySQL tutorial, we will insert, update and delete data from MySQL tables. We will use the INSERT, DELETE and UPDATE statements. These statements are part of the SQL Data Manipulation Language, DML. Inserting data The INSERT statement is used to insert data into tables. We will create a new table, where we will do our examples. mysql CREATE TABLE Books(Id INTEGER PRIMARY KEY, Title VARCHAR(100), - Author VARCHAR(60)); We create a new table Books, with Id, Title and Author columns. mysql INSERT INTO Books(Id, Title, Author) VALUES(1, 'War and Peace', - 'Leo Tolstoy'); This is the classic INSERT SQL statement. We have specified all column names after the table name and all values after the VALUES keyword. We add our first row into the table. mysql SELECT * FROM Books; +----+---------------+-------------+ | Id | Title | Author | +----+---------------+-------------+ | 1 | War and Peace | Leo Tolstoy | +----+---------------+-------------+ We have inserted our first row into the Books table. mysql INSERT INTO Books(Title, Author) VALUES ('The Brothers Karamazov', - 'Fyodor Dostoyevsky'); We add a new title into the Books table. We have omitted the Id column. The Id column has AUTO_INCREMENT attribute. This means that MySQL will increase the Id column automatically. The value by which the AUTO_INCREMENT column is increased is controlled by auto_increment_increment system variable. By default it is 1. mysql SELECT * FROM Books; +----+------------------------+--------------------+ | Id | Title | Author | +----+------------------------+--------------------+ | 1 | War and Peace | Leo Tolstoy | | 2 | The Brothers Karamazov | Fyodor Dostoyevsky | +----+------------------------+--------------------+ Here is what we have in the Books table. mysql INSERT INTO Books VALUES(3, 'Crime and Punishment', - 'Fyodor Dostoyevsky'); In this SQL statement, we did not specify any column names after the table name. In such a case, we have to supply all values. mysql REPLACE INTO Books VALUES(3, 'Paradise Lost', 'John Milton'); Query OK, 2 rows affected (0.00 sec) The REPLACE statement is a MySQL extension to the SQL standard. It inserts a new row or replaces the old row if it collides with an existing row. In our table, there is a row with Id=3. So our previous statement replaces it with a new row. There is a message that two rows were affected. One row was deleted and one was inserted. mysql SELECT * FROM Books WHERE Id=3; +----+---------------+-------------+ | Id | Title | Author | +----+---------------+-------------+ | 3 | Paradise Lost | John Milton | +----+---------------+-------------+ This is what we have now in the third column. We can use the INSERT and SELECT statements together in one statement. mysql CREATE TABLE Books2(Id INTEGER PRIMARY KEY AUTO_INCREMENT, - Title VARCHAR(100), Author VARCHAR(60)) type=MEMORY; First, we create a temporary table called Books2 in memory. mysql INSERT INTO Books2 SELECT * FROM Books; Query OK, 3 rows affected (0.00 sec) Records: 3 Duplicates: 0 Warnings: 0 Here we insert all data into the Books2 that we select from the Books table. mysql SELECT * FROM Books2; +----+------------------------+--------------------+ | Id | Title | Author | +----+------------------------+--------------------+ | 1 | War and Peace | Leo Tolstoy | | 2 | The Brothers Karamazov | Fyodor Dostoyevsky | | 3 | Paradise Lost | John Milton | +----+------------------------+--------------------+ We verify it. All OK. mysql INSERT INTO Books(Title, Author) VALUES ('The Insulted and Humiliated', - 'Fyodor Dostoyevsky'), ('Cousin Bette', 'Honore de Balzac'); Query OK, 2 rows affected (0.00 sec) Records: 2 Duplicates: 0 Warnings: 0 We can insert more than one row into the table with the INSERT statement. Here we show how. We can insert data from a file on the filesystem. First, we dump data from the Books table in a books.csv file. mysql SELECT * INTO OUTFILE '/tmp/books.csv' - FIELDS TERMINATED BY ',' - LINES TERMINATED BY '\n' - FROM Books; We write data from the Books table into the books.csv file. The data will be in a CSV format. $ cat /tmp/books.csv 1,War and Peace,Leo Tolstoy 2,The Brothers Karamazov,Fyodor Dostoyevsky 3,Paradise Lost,John Milton 4,The Insulted and Humiliated,Fyodor Dostoyevsky 5,Cousin Bette,Honore de Balzac We show the contents of the books.csv file. mysql TRUNCATE Books; Query OK, 0 rows affected (0.00 sec) mysql SELECT * FROM Books; Empty set (0.00 sec) We delete all data from the table. mysql LOAD DATA INFILE '/tmp/books.csv' - INTO TABLE Books - FIELDS TERMINATED BY ',' - LINES TERMINATED BY '\n'; We use the LOAD DATA INFILE syntax to populate the Books table from the books.csv file.
Views: 85 Computer Study
Peace on Earth: Healing Music for an Awakening World by Aurora with Bruce BecVar
 
05:22
Exotic vocals of Aurora with Bruce BecVar weave a mystical blend that is both uplifting and inspiring, transporting us into a brilliant world of transcendence and light. Talented musicians grace this gypsy world music album including renowned multi-instrumentalist, Bruce BecVar; Percussionist Rafael Padilla; Peruvian Shaman, Tito La Rosa on Andean Pan Pipes; Gypsy Violinist – Don Lax; and Brian BecVar on Synthesizer. "Aurora Juliana Ariel is one of those rare artists whose clear voice and beautiful music transmit to more than just the ear, but reaches into the listener‘s heart with hidden healing messages. Coupled with the extraordinary talent of musician/composer Bruce BecVar, Aurora‘s offering awakens our inner peace and invites our own calm center to bubble up to the surface." -Pamela Polland, Award Winning Recording Artist, Vocal Coach Aurora Juliana Ariel, PhD - Healing Lives, Actualizing Potentials, Inspiring Destinies Whether its pioneering work in the psyche, heading her Global Healing Ministry, bringing out her landmark discoveries in global conferences, writing books, facilitating healings, leading mastery intensives, or expressing her musical talents, Aurora Juliana Ariel possesses the proverbial Midas touch. Her brand of alchemy is the sacred sort, yielding a gold one can only discover within. Pioneering doctor and scientist, author and musician, entrepreneur and producer, mystic and healer, Aurora is a Renaissance woman for the New Millennium. #1 Bestselling Author, Creator of The Quest, and Award Winning Author of the Earth 2012-33 series, Aurora is a pioneering doctor whose research and work have given her a profound understanding of the psyche and the tools to heal an ailing humanity. She has successfully healed conditions once thought incurable, irreversible or unchangeable, releasing countless individuals from life sentences of suffering. A living testimony of her own work, she is now sharing her Alchemical Keys with the global community, helping others realize a Higher Destiny than the fate their human programs would dictate. Aurora was awakened in her teens to a planetary conscience that inspired her mission and dedicated her life to the healing and advancement of humanity. At that young age, she received an extraordinary Divine Sponsorship that helped guide her destiny, giving her a vast body of knowledge, deep understanding of global conditions, their underlying causes and remedies, and an exceptional healing ability that has resulted in countless transformed lives since she was 16. Aurora holds over 38 certificates and degrees in advanced healing methods as well as a BA, MA, and PhD in Psychology. She is also a Kahuna in the Hawaiian Tradition, successor of Shaolin Grand Master Pang in the Morna Simeona Lineage. ABOUT AURORA’S OFFERINGS… http://www.AuroraJulianaAriel.com Transformational books, audios, and healing music, 33 Day Self Actualization programs, certification courses, Sacred Alchemist Mastery Intensives in Sedona and at sites around the world, The Oracle: A Voice of Positive Planetary Change weekly radio show and more! MONTHLY NEWSLETTER WITH FREE BOOK! Sign up for Aurora’s Newsletter with its many exciting offerings, inspiring articles and columns: Insights from the Oracle, Aurora’s Secrets to Eternal Youth, Sacred Alchemy of the Soul - Letters from the Inner Creative Self, Earth 2012–2033 Updates, and more... to help you heal your life and change your destiny, actualize your greatest potential, and fulfill a destiny beyond your human programs. SIGN UP NOW AND RECEIVE AURORA’S FREE BOOK, TheQuest: Heal Your Life, Change Your Destiny. https://gem.godaddy.com/signups/161290/join The Temple of Sacred Alchemy VIRTUAL HEALING CENTER provides advanced healing protocols and wide range of modalities and life changing programs. http://www.sacredalchemy.com