Skip to main content

Home/ BI-TAGS/ Group items tagged code

Rss Feed Group items tagged

cezarovidiu

Password Protection with .htaccess and .htpasswd - 0 views

  • .htaccess The .htaccess file is a simple text file placed in the directory you want the contents of the file to affect. The rules and configuration directives in the .htaccess file will be enforced on whatever directory it is in and all sub-directories as well. In order to password protect content, there are a few directives we must become familiar with. One of these directives in the .htaccess file ( the AuthUserFile directive ) tells the Apache web server where to look to find the username/password pairs. .htpasswd The .htpasswd file is the second part of the affair. The .htpasswd file is also a simple text file. Instead of directives, the .htpasswd file contains username/password pairs. The password will be stored in encrypted form and the username will be in plaintext.
  • There is a special program on a *nix machine that is designed to manipulate the .htpasswd file on your behalf. The name of this program is htpasswd.
  • The first way is to create a new .htpasswd file and add a username/password pair to the file. The second way is to add a username/password pair to an existing .htpasswd file.
  • ...1 more annotation...
  • To create a new .htpasswd file in /usr/uj/jurbanek/ with username john, the following command would be used. # '-c' stands for 'create'. Only to be used when creating a new .htpasswd file. # You will be prompted for the password you would like to use after entering the command below. htpasswd -c /usr/uj/jurbanek/.htpasswd john
cezarovidiu

How Do I Enable Remote Access To MySQL Database Server? - MySQL - ServerGrove Support - 0 views

  • Step 3: Edit the my.cnf file
  • Search for the following line:[mysqld] Make sure line skip-networking is commented (or remove line) and add following line:bind-address=YOUR-SERVER-IPSo if your IP is 69.195.199.51 the entire block should look like this:[mysqld] port = 3306 socket = /var/lib/mysql/mysql.sock skip-locking key_buffer_size = 16K max_allowed_packet = 1M table_open_cache = 4 sort_buffer_size = 64K read_buffer_size = 256K read_rnd_buffer_size = 256K net_buffer_length = 2K thread_stack = 128K bind-address = 69.195.199.51 # skip-networking
  • Step 4: Save & RestartSave your edits by clicking on the Save button and restart MySQL by clicking RestartStep 5: Grant access to remote IP addressGo to the terminal in the control panel and log in (or connect via SSH) and connect to your MySQL database.$ mysql -u root -p mysqlGrant access to a new database If you want to add a new database called foo for user bar and remote IP 69.195.199.100 then you need to type the following commands at mysql> prompt:mysql> CREATE DATABASE foo; mysql> GRANT ALL ON foo.* TO bar@'69.195.199.100' IDENTIFIED BY 'PASSWORD';How Do I Grant Access To An Existing Database? To grant access to an existng database called foo for user bar and remote IP 69.195.199.100 type the following command At mysql> prompt for existing database, enter:mysql> GRANT ALL ON foo.* TO bar@'69.195.199.100' IDENTIFIED BY 'PASSWORD';
cezarovidiu

Saving Current Values with Cascading LOVs - 0 views

  •  
    "Saving Current Values with Cascading LOVs A friend, Monty Latiolais, recently asked an interesting question regarding cascading LOVs: Say you've got two LOVs...STATES and CITIES. They both default to 'ALL' and 'ALL'. Since CITIES is dependent on STATES, as soon as STATES is changed, CITIES is blanked out. What should happen is that CITIES gets re-evaluated as in the following example... let's say STATES is ALL and CITIES is "Houston". If one then changes STATES to "Texas", CITIES should remain "Houston" as that is a valid value for CITIES. So basically, is it possible to maintain the selected value of an item if that same value exists in the list of values after refreshing? That's a great question! Thanks to new events in the APEX framework and Dynamic Actions the solution is far easier than it would have been in the past! Click here to see the demo but continue reading to learn how it all works… There are a three main events you need to be concerned with when it comes to cascading selects: change apexbeforerefresh apexafterrefresh The change event is a standard part of JavaScript and the DOM. This event fires when the user manually changes the value of the select list but can also be triggered programmatically via JavaScript. The apexbeforerefresh and apexafterrefresh events are custom events in the APEX framework. They fire just before and just after AJAX requests refresh something on the page. The events work with many items and regions that utilize this technology. In this example we have two select lists: parent and child. If you change the value of the child select list then the change event will fire and that's it. But if you change the value of the parent select list a lot more happens to the child select. Here are some of the highlights: The current LOV values are cleared out The apexbeforerefresh event is triggered An AJAX request brings back new values. This only happens if optimize refresh is set to false optimize refresh is set to true and
cezarovidiu

Convert VirtualBox (vdi) hard drive image to VMWare (vmdk) format » MikeBeach... - 0 views

  • Example (Windows):

    1"c:Program FilesOracleVirtualBoxVBoxManage.exe" clonehd "Win XP.vdi" xp.vmdk  --format vmdk --variant standard
  • Example (Linux):

    1VBoxManage clonehd "Win XP.vdi" xp.vmdk  --format vmdk --variant standard
  • Next, open VMWare and select Create a new virtual machine Select “I will install the operating system later” Make your OS selection about the OS that’s currently on the vmdk you will be using. (The guest OS, not the host OS). Later on, you will have the option to use an existing vmdk image as your virtual hard drive. Do so. You should now be able to finish setup and boot your converted disk image.
  • ...1 more annotation...
  • Absolute path to VBoxManage is necessary unless it’s in the Windows $PATH.
cezarovidiu

Oracle Public Yum Server - 0 views

  • # cd /etc/yum.repos.d # wget http://public-yum.oracle.com/public-yum-el5.repo
  • Open the yum configuration file in a text editor Locate the section in the file for the repository you plan to update from, e.g. [el4_u6_base] Change enabled=0 to enabled=1
cezarovidiu

16.4.2. Replication Compatibility Between MySQL Versions - 0 views

  • MySQL supports replication from one major version to the next higher major version. For example, you can replicate from a master running MySQL 4.1 to a slave running MySQL 5.0, from a master running MySQL 5.0 to a slave running MySQL 5.1, and so on.
  • However, one may encounter difficulties when replicating from an older master to a newer slave if the master uses statements or relies on behavior no longer supported in the version of MySQL used on the slave. For example, in MySQL 5.5, CREATE TABLE ... SELECT statements are permitted to change tables other than the one being created, but are no longer allowed to do so in MySQL 5.6 (see Section 16.4.1.4, “Replication of CREATE TABLE ... SELECT Statements”).
  • Important It is strongly recommended to use the most recent release available within a given MySQL major version because replication (and other) capabilities are continually being improved. It is also recommended to upgrade masters and slaves that use early releases of a major version of MySQL to GA (production) releases when the latter become available for that major version.
cezarovidiu

How to restrict access to web pages with apache web server - IRC-IT - Teamwork at Jacob... - 0 views

  • In this article we explain how you can utilize the apache authentication to restrict access to you website or parts of your website.
  • You have to create the files .htaccess and .htpasswd. These files are protected by the server software so you can not download or view them with your web browser.
cezarovidiu

Install apex 4.2 - 0 views

  • @apexins.sql SYSAUX SYSAUX TEMP /i/
  • @apxchpwd.sql
  • Shut down with normal or immediate priority the Oracle Database instances where you plan to install Oracle Application Express.
  • ...9 more annotations...
  • Full development environment.
  • Runtime environment
  • 3.3.3 Change the Password for the ADMIN Account
  • 3.3.4 Restart Processes
  • Unlocking the APEX_PUBLIC_USER Account
  • The APEX_PUBLIC_USER account is locked at the end of a new installation of Oracle Application Express. You must unlock this account before configuring the database access descriptor (DAD) in a new installation.
  • ALTER USER APEX_PUBLIC_USER ACCOUNT UNLOCK
  • ALTER USER APEX_PUBLIC_USER IDENTIFIED BY new_password
  • PASSWORD_LIFE_TIME parameter is set to unlimited
cezarovidiu

Planning to Upgrade from Oracle BI 10g to BI 11g - 11g Release 1 (11.1.1.7.0) - 0 views

  • ORACLE_HOME/bin/config.sh
  •  
    "1.7 Moving from 11.1.1.3, 11.1.1.5, or 11.1.1.6 to 11.1.1.7"
cezarovidiu

Adding Extensions to the Layout Editor - 11g Release 1 (11.1.1) - 0 views

    • cezarovidiu
       
      /middleware/user_projects/domains/obi/config/bipublisher/repository/Admin/Plugins
  • To implement a plug-in: Code the JavaScript plug-in using the guidelines described in Section 11.3, "Coding the Custom Plug-in." Place the JavaScript (.js) file in the following location <BI Publisher repository>\Admin\Plugins. Reload the Layout Editor. Your plug-in icon appears in the layout editor Insert menu.
cezarovidiu

Understanding the Oracle REST Data Services Configuration Folder | cdivilly - 0 views

  • java -jar ords.war configdir /tmp/wls/conf
  • Configure ORDS by doing: 1java -jar apex.war
  •  
    "java -jar apex.war"
cezarovidiu

BI Brief - Four Legs of a Successful Business Intelligence (BI) Project Team - 0 views

  • 1. Project Sponsorship and Governance 2. Project Management 3. Development Team (Core Team) 4. Extended Project Team
  • 1. Project Sponsorship and Governance IT and the business should form a BI steering committee to sponsor and govern design, development, deployment, and ongoing support. It needs both the CIO and a business executive, such as CFO, COO, or a senior VP of marketing/sales to commit budget, time, and resources. The business sponsor needs the project to succeed. The CIO is committed to what is being built and how.
  • 2. Project Management Project management includes managing daily tasks, reporting status, and communicating to the extended project team, steering committee, and affected business users. The project management team needs extensive business knowledge, BI expertise, DW architecture background, and people management, project management, and communications skills. The project management team includes three functions or members: Project development manager - Responsible for deliverables, managing team resources, monitoring tasks, reporting status, and communications. Requires a hands-on IT manager with a background in iterative development. Must understand the changes caused by this approach and the impact on the business, project resources, schedule and the trade-offs. Business advisor - Works within the sponsoring business organization. Responsible for the deliverables of the business resources on the project's extended team. Serves as the business advocate on the project team and the project advocate within the business community. Often, the business advocate is a project co-manager who defers to the IT project manager the daily IT tasks but oversees the budget and business deliverables. BI/DW project advisor - Has enough expertise with architectures and technologies to guides the project team on their use. Ensures that architecture, data models, databases, ETL code, and BI tools are all being used effectively and conform to best practices and standards.
  • ...2 more annotations...
  • 3. Development Team (Core Team) The core project team is divided into four sub-teams: Business requirements - This sub-team may have business people who understand IT systems, or IT people who understand the business. In either case, the team represents the business and their interests. They are responsible for gathering and prioritizing business needs; translating them into IT systems requirements; interacting with the business on the data quality and completeness; and ensuring the business provides feedback on how well the solutions generated meet their needs. BI architecture - Develops the overall BI architecture, selects the appropriate technology, creates the data models, maps the overall data workflow from source systems to BI analytics, and oversees the ETL and BI development teams from a technical perspective. ETL development - Receives the business and data requirements, as well as the target data models to be used by BI analytics. Develops the ETL code needed to gather data from the appropriate source systems into the BI databases. Often, a system analyst who is a expert in the source systems such as SAP is part of the team to provide knowledge of the data sources, customizations, and data quality. BI development - Create the reports or analytics that the business users will interact with to do their jobs. This is often a very iterative process and requires much interaction with the business users.
  • 4. Extended Project Team There are several functions required by the project team that are often accomplished through an "extended" team: Players - A group of business users are signed up to "play with" or test the BI analytics and reports as they are developed to provide feedback to the core development team. This is a virtual team that gets together at specific periods of the project but they are committed to this role during those periods. Testers - A group of resources are gathered, similarly to the virtual team above, to perform more extensive QA testing of the BI analytics, ETL processes, and overall systems testing. You may have project members test other members' work, such as the ETL team test the BI analytics and visa versa. Operators - IT operations is often separated from the development team but it is critical that they are involved from the beginning of the project to ensure that the systems are developed and deployed within your company's infrastructure. Key functions are database administration, systems administration, and networks. In addition, this extended team may also include help desk and training resources if they are usually provided outside of development.
cezarovidiu

Install Oracle Java 7 in Ubuntu 12.10/12.04/11.10/Any Ubuntu or Linux Mint Version ~ No... - 0 views

  • For 64-bit users: wget -O jdk-64bit.tar.gz http://goo.gl/MSzBj wget -O jre-64bit.tar.gz http://goo.gl/yZgjI sudo -s cp -r jre-64bit.tar.gz /usr/local/java sudo -s cp -r jdk-64bit.tar.gz /usr/local/java cd /usr/local/java sudo -s chmod a+x jre-64bit.tar.gz sudo -s chmod a+x jdk-64bit.tar.gz sudo -s tar xvzf jre-64bit.tar.gz sudo -s tar xvzf jdk-64bit.tar.gz
  • sudo nano /etc/profile Add the following lines at the end of file: JAVA_HOME=/usr/local/java/jdk* PATH=$PATH:$HOME/bin:$JAVA_HOME/bin JRE_HOME=/usr/local/java/jre* PATH=$PATH:$HOME/bin:$JRE_HOME/bin export JAVA_HOME export JRE_HOME export PATH
  • Now enter following commands one by one in terminal: sudo update-alternatives --install "/usr/bin/java" "java" "/usr/local/java/jre1.7.0_12/bin/java" 1 sudo update-alternatives --install "/usr/bin/javac" "javac" "/usr/local/java/jdk1.7.0_12/bin/javac" 1 sudo update-alternatives --install "/usr/bin/javaws" "javaws" "/usr/local/java/jre1.7.0_12/bin/javaws" 1 sudo update-alternatives --set java /usr/local/java/jre1.7.0_12/bin/java sudo update-alternatives --set javac /usr/local/java/jdk1.7.0_12/bin/javac sudo update-alternatives --set javaws /usr/local/java/jre1.7.0_12/bin/javaws . /etc/profile
  • ...1 more annotation...
  • Check installed java version java -version
cezarovidiu

Static IP Address Assignment - 0 views

  • Static IP Address Assignment To configure your system to use a static IP address assignment, add the static method to the inet address family statement for the appropriate interface in the
  • file /etc/network/interfaces.
  • The example below assumes you are configuring your first Ethernet interface identified as eth0. Change the address, netmask, and gateway values to meet the requirements of your network. auto eth0 iface eth0 inet static address 10.0.0.100 netmask 255.255.255.0 gateway 10.0.0.1
cezarovidiu

mysql - Best of MyISAM and InnoDB - Database Administrators - 0 views

  • Some people can make the table's row format FIXED using ALTER TABLE mydb.mytb ROW_FORMAT=Fixed; and can get a 20% increase in read performance without any other changes. This works and works effectively FOR MyISAM. This will not produce faster results for InnoDB because ... that's right ... you must consult the gen_clust_index each time.
cezarovidiu

What's in a Tag? | ClickZ - 0 views

  • The tag-management industry is growing rapidly, as tags are critical to gathering data about your customers.
  • It's the early days for tag management, but the industry is growing rapidly because it's not so much about tags, but about the bigger challenge of using digital data.
  • Where does tag management fit in the data picture? Here's an example someone shared with me recently: He had gone to an antivirus product's website, read the reviews, and bought the software. In the days that followed, however, he suddenly began to see banner ads from that same software maker whenever he visited CNN, ESPN, and other favorite websites. The software maker knew he had visited its website, but not that he already bought the product. They were retargeting him with banner ads at unnecessary cost and no purpose.
  • ...11 more annotations...
  • Tag management fixes this problem.
  • Most marketing teams struggle with the volume, velocity, and variety of digital data generated every time someone touches the brand. You need insights from the data. You need to understand cross-channel behavior and run predictive "what if" scenarios to improve the effectiveness of your media mix. Tag management can create a foundation to make it easier to use multichannel marketing analytics for these purposes.
  • But one of the big improvements introduced by tag management systems is this: non-technical marketers can do their own tag management.
  • No need to ask IT to deploy tags.
  • You can deploy just one tag, sometimes even just a single line of code, and then manage all the tags through a single user interface.
  • That's a big change from being forced to modify source code on your website.
  • The best tag management systems unite tagged data in one place - automatically.
  • Now the best tag management systems track a data record each time a consumer touches your brand - and deliver it to you in one place.
  • what each consumer has viewed, on what platform, how long they spent with your content, and whether they purchased anything. You get a unified view for everything the consumer has done across all marketing channels.
  • they include the right to be forgotten, easier access to your own data, explicit consent over the use of your data, and privacy by design by default.
  • And, it's clear that the best tag management systems can be a foundation for building those elusive, one-to-one relationships with customers, while using marketing analytics to further improve your marketing decisions about how, when, and where to relate to them.
1 - 20 of 25 Next ›
Showing 20 items per page