As we saw in Part 6, what distinguishes Pattern 4 from Pattern 3 is bi-temporality. With Pattern 4, the business effectivity begin date of a version can be different than the date the version was physically inserted into its table. This was not possible with Pattern 3.
This is neat. I had to have OmniWeb fib about which browser it is, but cool!
(Via Hoffman Labs.)
Top 15 free SQL Injection Scanners
Friday, 18 May 2007 – 15:05 EST | Tools, Web Security, Network
While the adoption of web applications for conducting online business has enabled companies to connect seamlessly with their customers, it has also exposed a number of security concerns stemming from improper coding. Vulnerabilities in web applications allow hackers to gain direct and public access to sensitive information (e.g. personal data, login credentials).
Do you work on your own car? I used to, a long time ago. One of the tasks is changing spark plugs. It’s like changing lightbulbs: anybody can do it.
The sed utility is among the most useful assets in the Linux sysadmin’s toolbox, so it pays to understand its application to everyday tasks thoroughly. [OTN]
We have this on our boxes. We use this. It is a good thing to know