Currently browsing

December 2012

The power of column stores

The power of column stores pre { background-color:#444; white-space:pre-wrap; font-size:85%; padding:0px 6px; } using column stores instead of row based stores can reduce access logs from 10 GB to 130 MB of disk space reading compressed log files is 4 times faster than reading uncompressed files from hard disk column …

How to transfer Large File using C# Socket

Now I will discuss about, how we can transfer a large file (file size in GB) using Microsoft dot net socket programming using C# (C sharp) language. This code has written in Visual Studio 2005 (dot net 2). Basic Knowledge To cover this article you need to read my few …

DATETIME in WHERE Clause

DATETIME in WHERE Clause Introductions I saw that a lot of developer makes some common mistake when they are working with DATETIME data type in T-SQL statement. In this article I am trying to gather some common tips and tricks related to DATETIME data type when used in WHERE clause …

Runtime vs memory usage

Runtime vs. memory usage pre { background-color:#444; white-space:pre-wrap; font-size:80%; padding:0px 6px; } Oftentimes, better runtime can result in higher memory usage. Here is an example to create some strings to test bulk inserts on Redis: $cmd = “”;$start = microtime(true);for ($i=0; $i

CLR Integration with MS SQL Server

CLR Integration with MS SQL Server Introduction My friend told me that the CLR Integration is quite complex. I think that nothing is complex if we understand it properly. So in this article I am trying to discuss about MS SQL server CLR integration. I try to demonstrate it as …

Developerss time of permanency is 15 years

Developers’s time of permanency is 15 years? pre { background-color:#444; white-space:pre-wrap; font-size:90%; padding:0px 6px; } This article is not about performance of PHP, but more about performance of developers in general.A nice article from golem.de claims that the developers’s time of permanency is – exactly – 15 years. The main …

Permission set of CLR

Permission set of CLR Introduction In my previous article named “CLR Integration with MS SQL Server” lot of my reader asking for permission set. But I told them that in my first article related to CLR are an introductory article to grow interest of new developer. In this article I …

Applying Scrum to legacy code and maintenance tasks

Applying Scrum to legacy code and maintenance tasks There are some problems with Scrum that mainly occur when dealing with third party components or legacy systems: wrong estimations (time, impact, risk, complexity) bad requirements (inconsistent, incomplete, testable, conflicting, faulty) development involved in operations (bug analysis, data correction, deployment, hot-fixes) delays …

Depth First Search in C++ – Algorithm and Source Code

Basic Theory Depth – first searches are performed by diving downward into a tree as quickly as possible. It does this by always generating a child node from the most recently expanded node, then generating that child’s children, and so on until a goal is found or some cutoff depth …

Asynchronous Socket Client for Beginner

It’s a sample client socket code that code based on MSDN sample code. using System; using System.Net; using System.Net.Sockets; using System.Threading; using System.Text; // State object for receiving data from remote device. public class StateObject { // Client socket. public Socket workSocket = null; // Size of receive buffer. public …

Inserted Scanning Performance

Inserted Scanning Performance Introduction Here there is an interesting case scenario mentioned bellow. We’re pulling values from an “inserted” table that is created in aninsert trigger. When we do an insert and view the execution plan inQuery Analyzer, the “Inserted Scan” accounts for 98% of the entirequery cost So, in …