New SQL Delta Version 3.1

COMMAND LINE FUNCTION

A powerful command line script processor has been introduced to SQL Delta 3.1. The script processor provides the user with a mechanism for controlling SQL Delta by remote control, allowing databases to be compared and changes scripted without any user intervention. The script language is standard XML and provides a variety of commands for configuring and controlling SQL Delta. In addition to the standard comparison and script functions the user can export reports in various formats including HTML format and then have those reports automatically emailed to the appropriate user. Even scripts can be emailed as attachments if a change is detected in the database.

"We have designed the script processor to provide users, especially DBA's, with the convenience of programmatic style control of SQL Delta without the need to dig out a compiler and build an application. Even so a programmer can very easily create a seamless execution of SQL Delta from within their own application if they desired" Jay Bailey ? SQL Development Manager.

Owner Mapping

SQL Delta 3.1 now provides object ownership mapping and now it is possible to perform comparisons between databases with different users and different ownership configurations. The user can map on a user to user basis or a many to one user basis and there is no limit to the number of users that can be mapped.

Other New Features

Improved tools such as "star view" checking to ensure all views that may use "select * .." are up to date and a qualify names tool for checking to see if stored procedures include qualified names, therefore ensuring the best performance from your server.

Sydney, 10th May 2005 ? TASC have released SQL Delta version 3.1, a high performance SQL schema and data comparison tool for analysis and synchronization of databases.

Version 3.1 of SQL Delta offers the following new feature and improvements and is available now http://www.sqldelta.com

Founded in 1991, The Australian Software Company (TASC) is an Information Technology solutions provider developing customer orientated applications. Over the past years we have developed a vast range of software applications.

Our specialty is developing systems based on TASC's business and systems analysis. The development of these systems is done using our range of components, which have been built, tested and implemented for various clients. These components, plus our quality assured methodologies, enable us to build high quality systems in a timely manner. Typically we develop our software using the Microsoft Windows or NT platforms, although we are able to develop in differing areas especially when relating to Web/Java based systems. We also use a variety of database servers although this is dependent on the client and their available technology.

shuttle from O'Hare Brocton .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
According to the FBI, cybercriminals are sending extortion letters, threatening to release victims' sensitive information unless a ransom is paid.
FireSat is a satellite project designed to detect and track wildfires early, aiming to detect a fire that's the size of a classroom within 20 minutes.
Tech expert Kurt “CyberGuy" Knutsson reports that researchers have uncovered a Chrome vulnerability used in a cyber espionage campaign.
Preserving voicemails securely on Android: Tech expert Kurt “CyberGuy" Knutsson reveals easy methods to keep memories alive forever.
This phishing kit bypasses 2FA via session hijacking and real-time credential theft. Kurt “CyberGuy" Knutsson offers four ways to stay safe from Astaroth phishing attacks.
Tech expert Kurt “CyberGuy" Knutsson discusses Joby Aviation and Virgin Atlantic planning to launch 200-mph U.K. air taxis linking airports and cities.
Fake Apple virus warnings, security alerts and messages are tactics used to prompt you to call a number or click on a malicious link. The CyberGuy explains how to protect your devices.
The combination of artificial intelligence and neuroscience allows a paralyzed man to manipulate a robotic arm by using his brain to imagine movements.
With the help of artificial intelligence, sophisticated fraud techniques emerging today are virtually undetectable to the untrained eye.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
If you need to free up space on your Mac, consider deleting duplicate photos in your image library. Apple makes it easy to do, and the CyberGuy explains the process.
Microsoft is discontinuing Skype in May after 22 years of service. Kurt the CyberGuy addresses other options for internet-based phone and video service.
Tron 1, a Chinese company's two-legged robot, is versatile and can walk, roll and pivot, even on rough terrain. Tron 1 stands 33 inches tall and weighs 44 pounds.
Hackers are tricking people into installing password-stealing malware by making them press keyboard shortcuts under the pretense of proving they're not bots.
Saving the voices of loved ones can be a comforting way to keep alive memories. Kurt "the CyberGuy" Knutsson explains how to preserve voicemail messages.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI warns that some free online document converters load malware onto people's computers, making their private information vulnerable to attack.
Toyota's compact electric FT-Me is designed to tackle challenges of city living while offering an accessible and eco-friendly transportation solution.
Kurt “CyberGuy" Knutsson says 23andMe's bankruptcy raises data privacy fears: Opt out, download and delete data now.
UBTech and Zeekr unite with AI robot swarms to make car manufacturing faster and smarter. Tech expert Kurt “CyberGuy" Knutsson explains how the process works.
Tech expert Kurt “CyberGuy" Knutsson says Apple's Passwords app had a three-month phishing flaw from iOS 18 to 18.2 patch.
Tech expert Kurt “CyberGuy" Knutsson discusses how this super-small electric mini-truck takes a big step toward production.
Artificial intelligence-generated images and videos that use someone’s likeness typically target women without their consent. The CyberGuy unpacks how to protect loved ones.
A humanoid robot developed in China has transformed from a nimble dancer to performing kung fu moves with surprising precision and balance.

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Reduce TCO: The Java Database Way

TCO (Total Cost Ownership) is the buzzword in... Read More

How to Backup Windows XP Home Edition

Your computer cost you from hundreds to thousands of dollars,... Read More

Great Plains Accounting Migration to Microsoft Great Plains - Overview for IT Specialist

This is a short article, written in question/answer/FAQ style to... Read More

How to Build a Basic CSS Layout

Designing without tables by using CSS layouts is fast becoming... Read More

Managing Stress in the Computer Industry - Five Steps to a Stress-free Life

It would be easy to think, like most people apparently... Read More

Microsoft Update - 5 Reasons to Update Service Pack 2

Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More

How to Tell You Have Spyware, Ad-ware or Viruses

Usually, the easiest way to tell you have spyware is... Read More

Causes of ERP Failures

ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More

The Hidden Power of Online Manual

Writing software manuals is boring, isn't it? We often think:... Read More

Mozilla Vs. Firefox

For those who are unclear on the differences between the... Read More

Behave, Word, Behave!

If you copy something from a Web site or elsewhere...... Read More

Assertion in Java

Assertion facility is added in J2SE 1.4. In order to... Read More

Who?s Watching What You Type?

If someone entered your home, uninvited and installed numerous cameras... Read More

Programming Environments And The Software Production Process

Introduction: The creating of a computer program involves a number... Read More

Daffodil DB: Web Database

What is a Web Database?A web database is a database... Read More

The Top 5 Wrong Reasons For Not Hiring Testers

Considering whether or not your software company should hire a... Read More

Microsoft Great Plains Payroll Module Customization Scenarios

It is now common thing when large corporation selects mid-market... Read More

Microsoft Great Plains: Large Scale Implementation

Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More

Microsoft Great Plains: Government & Non-Profit Organization ? Workflow Implementation

Usually workflow & messaging is realized in CRM and then... Read More

How the Firefox: How to... Manual Helped Me

A few months back I really got sick of my... Read More

Keep Your Software Simple! A Review of EditPlus

I like my software simple. If it's too complex or... Read More

New Web-Based HR Tool is Max From NAS, Hannibal, and InfoLink

Three highly respected names in Human Resources have joined forces... Read More

Getting Patched with Windows Service Pack

Are you one of those people that keeps track of... Read More

Can Group Collaboration Software Meet Business Needs?

According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More

Chicago charter limousine service Hickory Hills ..