Click here to Skip to main content
15,888,527 members

Articles by h_wiedey (Articles: 4, Tip/Tricks: 4)

Articles: 4, Tip/Tricks: 4

RSS Feed

Average article rating: 4.65

Database Development
12 May 2013   Updated: 15 May 2013   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: CPOL    Views: 13,261     Bookmarked: 7   Downloaded: 9
Please Sign up or sign in to vote.
Implementation of relative database constraints and permissioning using triggers and shadow tables.
SQL Server
7 Aug 2013   Updated: 8 Aug 2013   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: CPOL    Views: 43,766     Bookmarked: 3   Downloaded: 0
Please Sign up or sign in to vote.
An approach using updatable views with check option and deferred constraint checking.
29 Jul 2013   Updated: 29 Jul 2013   Rating: 4.15/5    Votes: 3   Popularity: 1.98
Licence: CPOL    Views: 28,774     Bookmarked: 3   Downloaded: 0
Please Sign up or sign in to vote.
The article treats the differences between triggers in Oracle and MS SQL and demonstrates the mutating table problem.
22 Nov 2013   Updated: 22 Nov 2013   Rating: 4.43/5    Votes: 6   Popularity: 3.45
Licence: CPOL    Views: 17,862     Bookmarked: 10   Downloaded: 0
Please Sign up or sign in to vote.
Asynchronous processing of triggers using cursors

Average blogs rating:

No blogs have been submitted.

Average tips rating: 5.00

31 Mar 2014   Updated: 31 Mar 2014   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: CPOL    Views: 11,923     Bookmarked: 4   Downloaded: 0
Please Sign up or sign in to vote.
Usage of instead of triggers in Object-Relational (O/R) Mapping
macOS
14 Oct 2020   Updated: 14 Oct 2020   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: CPOL    Views: 2,569     Bookmarked: 2   Downloaded: 0
Please Sign up or sign in to vote.
Organize files by using Unix find on MacOS
Programming Languages
Bash
14 Oct 2020   Updated: 14 Oct 2020   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: CPOL    Views: 9,479     Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
Using file name databases on MacOS Unix
Shell
17 Nov 2022   Updated: 17 Nov 2022   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: CPOL    Views: 4,940     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
This tip shows how md5 and locate can be used to find duplicate files.

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.
Germany Germany
This member has not yet provided a Biography. Assume it's interesting and varied, and probably something to do with programming.