New SQL Delta Version 3.1

COMMAND LINE FUNCTION

A powerful command line script processor has been introduced to SQL Delta 3.1. The script processor provides the user with a mechanism for controlling SQL Delta by remote control, allowing databases to be compared and changes scripted without any user intervention. The script language is standard XML and provides a variety of commands for configuring and controlling SQL Delta. In addition to the standard comparison and script functions the user can export reports in various formats including HTML format and then have those reports automatically emailed to the appropriate user. Even scripts can be emailed as attachments if a change is detected in the database.

"We have designed the script processor to provide users, especially DBA's, with the convenience of programmatic style control of SQL Delta without the need to dig out a compiler and build an application. Even so a programmer can very easily create a seamless execution of SQL Delta from within their own application if they desired" Jay Bailey ? SQL Development Manager.

Owner Mapping

SQL Delta 3.1 now provides object ownership mapping and now it is possible to perform comparisons between databases with different users and different ownership configurations. The user can map on a user to user basis or a many to one user basis and there is no limit to the number of users that can be mapped.

Other New Features

Improved tools such as "star view" checking to ensure all views that may use "select * .." are up to date and a qualify names tool for checking to see if stored procedures include qualified names, therefore ensuring the best performance from your server.

Sydney, 10th May 2005 ? TASC have released SQL Delta version 3.1, a high performance SQL schema and data comparison tool for analysis and synchronization of databases.

Version 3.1 of SQL Delta offers the following new feature and improvements and is available now http://www.sqldelta.com

Founded in 1991, The Australian Software Company (TASC) is an Information Technology solutions provider developing customer orientated applications. Over the past years we have developed a vast range of software applications.

Our specialty is developing systems based on TASC's business and systems analysis. The development of these systems is done using our range of components, which have been built, tested and implemented for various clients. These components, plus our quality assured methodologies, enable us to build high quality systems in a timely manner. Typically we develop our software using the Microsoft Windows or NT platforms, although we are able to develop in differing areas especially when relating to Web/Java based systems. We also use a variety of database servers although this is dependent on the client and their available technology.

shuttle from O'Hare Bingham .. Lockport Chicago limo O’Hare
In The News:

Attackers use caller ID spoofing and AI voices to steal money. Tech expert Kurt “CyberGuy" Knutsson provides seven ways to protect yourself.
Tech expert Kurt “CyberGuy" Knutsson talks about the Genesis GV60 MIV, an electric rescue EV with snow tracks for extreme missions.
Tech expert Kurt “CyberGuy" Knutsson helps you ensure a smooth online experience with a reliable, secure home network setup.
Kurt “CyberGuy" Knutsson talks about Vollebak’s Shielding Suit, which blocks EM radiation, infrared and tracking for privacy.
Even Apple products are vulnerable to cybercriminals, and a new report suggests the owners of Mac products will have to be more vigilant this year.
An inflatable six-person tiny house from a firm called 2001 looks like a space station with its inflatable dome that is transportable and eco-friendly.
Scams cost Americans an estimated $159 billion every year and average about $3,500 in losses per victim. The CyberGuy has advice to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Zeekr and Waymo are joining forces for the world's first mass-produced autonomous vehicle, combining an electric vehicle with self-driving technology.
A humanoid robot training center has opened in Shanghai, a big step in China's efforts to become a global leader in robotics and artificial intelligence.
Security experts have discovered that hackers are targeting apps on the App Store to spread malware that steals information from saved screenshots.
A new luxury SUV combines military-inspired design and high-end luxury transportation and includes two military-grade gas masks to protect against chemical warfare.
80% of stalking victims are tracked using tech. GPS trackers, like AirTags, are among the most popular ways to do it. Here's how to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how to protect yourself against artificial intelligence-fueled romance scams, which have become the most common type of fraud in 2025.
Kurt "CyberGuy" Knutsson explains the steps to declutter text messages on a Mac or iPad. Apple offers ways to do this more efficiently.
Here's how to take control of the algorithms on Facebook, YouTube, Instagram and TikTok if your social media feeds aren't showing you content you want to see.
Beware of iCloud scams using urgent messages. Tech expert Kurt “CyberGuy" Knutsson helps you spot the red flags to protect yourself.
Travel abroad worry-free with these top translation apps for travelers. Tech expert Kurt “CyberGuy" Knutsson highlights some favorites.
The European Space Agency's Euclid space telescope was going through preliminary tests in September 2023 when it captured images of an Einstein Ring in a nearby galaxy.
Tech expert Kurt “CyberGuy" Knutsson says hackers are using Microsoft Teams for phishing, vishing and quishing via social engineering.
Red light camera tickets: Not liable to ID the driver; some are fishing expeditions. Tech expert Kurt “CyberGuy" Knutsson helps you fight back against tricky fake tickets.
The apps collecting the most data about you are among the most widely used. Kurt the CyberGuy takes a look at 20 of these apps and how you can protect personal information.
AST SpaceMobile of Texas is developing the world's first global cellular broadband network that can connect directly to your smartphone without special equipment.
Community Health Center, a Connecticut-based healthcare provider, has disclosed a recent data breach affecting over 1 million people in the U.S.

Microsoft CRM: Implementation, Customization, Support ? Consultant Overview

Microsoft Business Solutions CRM is present several years on the... Read More

Crystal Reports For Microsoft RMS ? Overview For Developer/Report Designer

If you are software developer or database administrator - we... Read More

OSI Layers Model

IntroductionDuring the early years of our modern computer era, very... Read More

QuarkXpress Tips: How to Move Content Between Print and Web Layouts

Since its release in 1987, QuarkXpress had made an immediate... Read More

10 Steps To Secure And Manage Your Passwords

Passwords protect your most sensitive personal, financial and business information.... Read More

Ukraine IT Myths Dispersed

While Ukraine is becoming a new popular IT outsourcing destination,... Read More

Microsoft Great Plains GL: General Ledger ? Overview For Consultant

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

New Web-Based HR Tool is Max From NAS, Hannibal, and InfoLink

Three highly respected names in Human Resources have joined forces... Read More

Software Tools To Help Your Business Sell More

Sales are all about leverage, because there is only so... Read More

Who Is Minding Your Sensitive Data?

Stealing company information used to be the specialty of spies... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

How to Get The Best Accounting Software For Your Small Business

Buying accounting software is a major investment. It's an important... Read More

Free PDF Publishing Software

In a previous article, I wrote about OpenOffice... Read More

Microsoft Great Plains Integration with Microsoft Access ? Overview for Developer

... Read More

Microsoft CRM for Corporate Business ? Working Offline

If your company has regional and worldwide operations, you might... Read More

Crystal Reports - Geterogeneus databases: SQL Server, Oracle, Unidata, Btrieve ? Tips For Developer

Crystal Reports is the most flexible tool on the market... Read More

What is Spyware? Are You Being Watched?

Find out why Spyware Removal from computers is important and... Read More

Microsoft Great Plains Customization Tools Evolution ? Overview for Consultant

When Great Plains Software introduced the first graphical accounting application... Read More

Hubris - Definition: Microsofts Passport

Before September of 1995, Microsoft ignored the Internet because their... Read More

Start Developing Your Own Software

Learning how to program software seems like a daunting task... Read More

SQL Administrator Skills Required to Support Microsoft Great Plains

Microsoft Great Plains is becoming more and more popular and... Read More

Benefits of Shareware

Shareware has been fighting the stigma of being misunderstood for... Read More

RFID: Strengthen the Position for SAP; United States

SAP Inc., a global leader in client/server enterprise application software... Read More

Great Plains Customization Upgrade? Overview For CIO/IT Director

Around the same time Microsoft made its move with .Net... Read More

Preventive Maintenance Software Companies

Several software companies design programs for preventive maintenance. Most of... Read More

Mishawaka limo O'Hare ..