As we saw in Part 6, what distinguishes Pattern 4 from Pattern 3 is bi-temporality. With Pattern 4, the business effectivity begin date of a version can be different than the date the version was physically inserted into its table. This was not possible with Pattern 3.
Category: Tools
gotAPI/HTML – Instant search in HTML and other developer documentation:
This is neat. I had to have OmniWeb fib about which browser it is, but cool!
(Via Hoffman Labs.)
Top 15 free SQL Injection Scanners – Security-Hacks.com
Top 15 free SQL Injection Scanners
Friday, 18 May 2007 – 15:05 EST | Tools, Web Security, Network
While the adoption of web applications for conducting online business has enabled companies to connect seamlessly with their customers, it has also exposed a number of security concerns stemming from improper coding. Vulnerabilities in web applications allow hackers to gain direct and public access to sensitive information (e.g. personal data, login credentials).
Modeling for Data Quality: Don’t Try This at Home
Do you work on your own car? I used to, a long time ago. One of the tasks is changing spark plugs. It’s like changing lightbulbs: anybody can do it.
Working with the sed Editor in Linux
The sed utility is among the most useful assets in the Linux sysadmin’s toolbox, so it pays to understand its application to everyday tasks thoroughly. [OTN]
We have this on our boxes. We use this. It is a good thing to know