Databases

55K

Solutions

39K

Contributors

Databases are organized collections of data, most commonly accessed through management systems including schemas, tables, queries and processes that allow users to enter and manipulate the information or utilize it in other fashions, such as with web applications or for reporting purposes.

Share tech news, updates, or what's on your mind.

Sign up to Post

I have an access form, "frmCompetition" with a subform, "sfrmDogBrace." This is a database for field trials for bird dogs.   I would like to filter the contents of the subform based on selections I make in 3 separate comboboxes in the main form.  Any advice?  I've tried makeing the underlying query of the subform reference the contents of the 3 comboboxes as criteria.  No luck. Is there some vba code I could use?  My comboboxes are cboyear, cboday, and cbo brace.
0
 
LVL 59

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
Use the blue "Ask a Question" button in the page header.

Posts are for sharing news items.

Jim.
0
 
LVL 59

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
or something that you did and want to share, without writing an article or doing a video (think blog type stuff).

Jim.
0
Industry Leaders: We Want Your Opinion!
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Are you looking at migrating your data centers to the cloud? Here’s how Experts Exchange successfully made the transition. #TechTuesday
2
I am struggling to complete a formulation for calculating the expiration of data entered which depending on which database table they are in depends on their expectoration time, either 24hrs, 7days, 14days or 21 days.
If there isn't any withing that particular table then it will default to 14.
This is my so far attempt, but have gaps i know and it is so frustrating that I cannot get my head around it....If anyone can shed some light it would be gratefully appreciated.

@example = INT(Table.example/2) MOD 2 <> 0

Open in new window


If {@example} then 1
Else
(

If IsNull{table.NAME} then
14
Else if {table.NAME}= help then
7
Else if {table.NAME} = more help then
21
Else
14
) 

Open in new window

0
 
LVL 101

Expert Comment

by:mlmcc
You probably should ask this as a question as not all Crystal experts follow the posts.

There is a BLUE button for ASK
https://www.experts-exchange.com/askQuestion.jsp

Need more information as to when each length applies

mlmcc
1
 

Author Comment

by:Kev wood
Sorry didn't realise, thank you. I have now done what you have said.
1
EQIFAX DATA BREACH.

The Equifax data breach is one of the deadliest cyberattacks in the modern times not only in terms of affected people but also due to the intensity of accessed personal data. Equifax reported that between mid-May and June 2017, their system was hacked and the personal information of 173 million customers was exposed. Below we highlight some incites about this breach and then take a look at exactly how this was accomplished at the bottom.

Accessed information

According to Equifax, the hackers were able to access customer’s names, Social Security Number, customer’s date of birth, card numbers, addresses and driver’s license numbers.

Why this breach is one of the deadliest attacks

The Yahoo data breach in 2016 had 1 billion customers affected where only the passwords and phone numbers were accessed. But in the case of Equifax, sensitive data was accessed which means that:

Criminals can use the Social Security number to other credit accounts using a customer’s names.
Hackers can also maneuver their way and shop online using the credit card details obtained.
The hackers can sell the data to other criminals which makes the effect very grave.
An accessed customer’s data is not immune to future’s fraud, extortion and blackmail. The accessed information can haunt a customer forever.
How to find out if your information was exposed

Equifax has established a “Potential Impact” tab on its website (www.equifaxsecurity2017.com) that helps …
0
 
LVL 8

Expert Comment

by:Sean Plemons Kelly, CISSP
This was literally copied and pasted from hackingloops.

Let's go to a "Security" site from a company that hid the fact that they had a massive data breach that affected (more or less) everyone with a credit score in the US. Let's plug in our SSN anyway (fun fact, it doesn't matter if you are on a secure system or using encryption if the destination isn't secure).
0
0
Black Friday Hosting.

About this time every year, my hosting clients begin asking about resizing hosting to handle Nov-Dec traffic increases, both real traffic + attack traffic (from competitors).

Here's the simple answer about how to handle traffic for any site.

Disk I/O is the killer. Database writes are the worst.

For MariaDB/MySQL installations, the fix is simple. Run mysqltuner + fix all diagnostics. Then enable the Performance Schema + track table i/o (file_summary_by_instance stats table) + track any table which has a huge amount of writes for no good reason.

Usually tables will relate to specific offender plugins, like those which handle security or link tracking or link rewriting (redirection). Simply replace these offending plugins, so your database writes approach zero.

These few simple activities allow sites to maintain speed + stability, independent of whatever traffic occurs.
1
Let’s learn something new is the term known Error Database. What is this KEDB? And how it is connected to software testing world?

The key to progress lies in climbing the stairs step by step, instead of a single jump skyward. Approaching slowly and carefully expects knowledge to be stored, utilized and enhanced. In Information Technology Infrastructure Library one such tool that enables associations to make this progress is the Known Error Database.

What is a Known Error Database Tool?

A known error database is a database that portrays the majority of the known issues inside the general frameworks. It depicts the circumstances in which these issues show up, and when conceivable, it offers a workaround that will get the client around the issue and back to profitable work. The configuration management system is part of known error database.

This database also turns out to be a part of the general Problem Management Database, where IT can go to distinguish and organize issues that need perpetual resolutions. Workarounds are just impermanent fixes with the goal that work can precede until the point when issues are definitely settled.

The ITIL known error database must incorporate screenshots of the issues, and additionally the content of error messages, and portrays the issue from the perspective of the client.

Advantages of a Known Error Database

IT groups inside undertakings build up a known error database format as it offers …
0
Today is the last day you'll be able to download Office 2007 SP's, Access 2007 Database Engine, Access 2007 Run time, and other software related to Office 2007 from Microsoft.

Make sure you download what you need to support your software.   Original post with some Microsoft Access links is here:

https://www.experts-exchange.com/posts/3107/MS-Access-2007-Users-Developers-IMPORTANT-NOTE.html

  You'll also want to download the Service Packs (SP's).
2
v2-native-ad-no-button.pngOnly five days left to enroll in October’s Course of the Month! Once you enroll, you’ll have 30 days to complete the Microsoft SQL Server and Database Concepts course.
0
native-ad-no-button.pngThe end of October is approaching and you only have nine days left to enroll in our Microsoft SQL Server and Database Concepts course. Enroll today and take advantage of this complimentary Course of the Month training.
4
Concerto Cloud for Software Providers & ISVs
LVL 5
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Have you enrolled in this month’s complimentary course? Enroll now for a free Microsoft SQL Server and Database Concepts course. Get 7+ hours of step-by-step SQL training, including possible topic interview questions.
0
MS Access 2007 Users/Developers - *** IMPORTANT NOTE ***

  This is a heads up that the following Access components available as standalone downloads are moving past extended support in the near future and along with other Office 2007 products, will not be available for download after that time.

  If you have any software that depends on the 2007 (32bit) database engine or the 2007 run time, you'll want to download these as soon as possible so you have them.  

•      Access 2007 runtime  - https://www.microsoft.com/en-us/download/details.aspx?id=4438
•      Office Data Connectivity Components (ACE) - https://www.microsoft.com/en-us/download/details.aspx?id=23734&40ddd5bd-f9e7-49a6-3526-f86656931a02=True&a03ffa40-ca8b-4f73-0358-c191d75a7468=True&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
•      ADE - https://www.microsoft.com/en-us/download/details.aspx?id=24569 (includes the packaging wizard, source code control, and the save as template functionality)
 
4
How can I share out an old *.exe application to multiple users in an AD environment who are connected from home via VPN? The requirement is that the execution of *.exe must be from the office network, the *.exe application calls a bunch of databases from other servers in the office and will disconnect if the application runs from the user's computer via VPN.

I am thinking of setting up a Windows 2012 servers and allow RDP connections for users to run the *.exe on the server from home(via VPN). Are there any other ways?
1
 

Author Comment

by:Panda 5888
Thanks
1
 
LVL 26

Expert Comment

by:Brian B
0
onsite-native-ad-no-button-2017-sept.pngAccess to September’s Course of the Month expires in 2 days! Enroll today in our VMware Professional - Data Center Virtualization course.
1
v2-twitter-2017-september-ad.pngDon’t miss the chance to add VMware virtualization skills to your resume. Five days remain to enroll!
5
 
LVL 8

Expert Comment

by:Senior IT System Engineer
So if I enrol today, can I still access it on the next month ?
2
 
LVL 17

Expert Comment

by:Kyle Santos
You have 30 days from the date of enrollment to complete it for free.
3
Gain valuable virtualization processes skills that allow you the ability to store data, prevent vulnerabilities, and replicate environments for fast deployment. Enroll in September’s Course of the Month today!
0
Capture.JPG
Cyber News Rundown: Edition 9/8/17

The Cyber News Rundown brings you the latest happenings in cyber news weekly.
If you have any other questions, just ask!





Consumer Credit Reporting Agency Equifax Suffers Cyberattack Affecting 143 Million Customers

Equifax announced hackers gained access to sensitive company data that potentially compromised information for 143 million American consumers, including Social Security numbers, driver’s license information, and credit card details. This is the third major cybersecurity incident for the agency since 2015. Most concerning, Equifax knew of the breach on June 29 but waited until September 7 to disclose the information.

Instagram Hack Exposes Millions of Accounts
A group of hackers recently gained access to a large number of Instagram accounts for high-profile celebrities and other victims. The attackers were able to use an exploit in the Insta app to retrieve the email addresses and phone numbers for millions of account holders. They then used this information to take control of more valuable accounts and posted the credentials for sale on the dark web. While Instagram was quick to fix the bug, it is still unclear just how many accounts were compromised.

Customer Databases Belonging to Time Warner Cable Publicly Exposed
1
Please, i need help on how to upload files (PDF) into different categories of a database of an E-library so that the uploaded books or files can display books or be searched, on their individual categories using MySQL and php ... Thanks
0
 
LVL 8

Expert Comment

by:Sean Plemons Kelly, CISSP
Try reposting this as a question. You will likely have more assistance from experts.
1
Capture.JPG
Cyber News Rundown: Edition 8/25/17

The Cyber News Rundown brings you the latest happenings in cyber news weekly.
If you have any other questions, just ask!





UK NHS Database Exposes Over 1 Million Patient Records
During the past week, a breach was discovered in patient booking system SwiftQueue, which is widely used by several National Health Service (NHS) facilities. The database may have contained patient information for up to 1.2 million UK citizens, though the actual data has yet to be fully examined. Even worse, attackers now claim they have found additional SwiftQueue vulnerabilities and are in possession of all 11 million records stored by the company.

Booking Provider’s Data Found in Public Data Dump
Researchers recently discovered a large customer data dump in a publicly-facing Amazon S3 bucket. The data in question belongs to Groupize, a groups and meetings solution, and contains everything from customer interactions to full credit card information used to book hotels and other meeting spaces. Fortunately for anyone who has used the service, the data was properly secured within a week of the discovery.

Phishing Site Hosted on .fish Domain
1
Free Tool: SSL Checker
LVL 11
Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

I am doing a very simple linked database.  I query it to generate a report that is exported.   I need to add a form to  contain the value queried so I can use it to generate the file name.   However all the "create" functions are greyed out and I can't figure out how to add a form.  All my searches talk about not being able to add data which is not my problem.    When I create a new database the functions are there.
0
Used jquery ui sortable function for the first time this week. It was really easy to create a drag and drop list and serializing the order to save in a database was really easy. Not sure why I hadn't tried to use it before.
5
A technology that is kind of a fad,but will probably last but be not as popular are the no sql databases. They have there place for certain applications, but I don't believe they will replace SQL databases. Having to know how you are going to query before you store your data is just not realistic.  
3
The version of the report server database is either in a format that is not valid, or it cannot be read. The found version is '163'. The expected version is '162'. (rsInvalidReportServerDatabase) Get Online Help
0
 
LVL 13

Administrative Comment

by:Andrew Leniart
Hi MAGLOCLEN,

What you have done is made a "Post" here.  To get expert help, you need to "Ask a Question" so that more experts are able to see that you need help. Click the Big blue button near the top of your screen.

Ask-a-Question.png

The following link also explains more about asking for help at Experts Exchange..
http://support.experts-exchange.com/customer/portal/articles/336330

Hope that's helpful.

Regards,
Andrew
EE Topic Advisor
0
how can i export oracle 10g database in fronted need code level help how can i do it please help me
0
 
LVL 3

Administrative Comment

by:Allie Watts
Hey Farhad! You made a post instead of a question. In order to get more responses from experts and members of the community on your question, create a question with this content in it! Best of luck getting this issue resolved!
2
SysAdmin Day is this Friday! If you have a story of a time when your technical skill and expertise saved the day comment here. You can also message us!

Looking forward to reading more of your experiences!
3

Databases

55K

Solutions

39K

Contributors

Databases are organized collections of data, most commonly accessed through management systems including schemas, tables, queries and processes that allow users to enter and manipulate the information or utilize it in other fashions, such as with web applications or for reporting purposes.