Ecommerce theory question...
I've been working on my first online store, and just have a
quick question that struck me whilst trying to think ahead, and how
people could potentially break the system.
I'm using web assist's ecart, and as it's my first, I'm not
sure how things are typically set up.
Basically this set up involves sending the customer to an
externam payment gateway, where card details are taken and
processed, before the customer is returned to the main site.
At the point where the customer is sent on to the gateway, a
record is created in an orders table, which includes a field 'Order
Status', which defaults to 'Pending'. Once the payment has been
approved, the customer is passed back to a 'return' page, which
contains a script to update the order status field from 'pending'
to 'accepted'.
It also seems like a logical place to generate a receipt to
be sent out to the customer.
My question is this tho' - what's to stop a savvy customer
getting to the payment gateway, but not entering any payment
details, and then just manually going to the return page, which
would trigger the update 'Order Status' field, and even worse,
generate a receipt for something which hadn't actually been paid
for?
I suppose the session variables set by the success/failure of
the
transaction between the cart and the payment gateway would be
the roadblock
for this scheme. Surely the return page would check for that
before
triggering the update....
Murray --- ICQ 71997575
Adobe Community Expert
(If you *MUST* email me, don't LAUGH when you do so!)
==================
http://www.dreamweavermx-templates.com
- Template Triage!
http://www.projectseven.com/go
- DW FAQs, Tutorials & Resources
http://www.dwfaq.com - DW FAQs,
Tutorials & Resources
http://www.macromedia.com/support/search/
- Macromedia (MM) Technotes
==================
"Iain71" <[email protected]> wrote in
message
news:[email protected]...
> I've been working on my first online store, and just
have a quick question
> that
> struck me whilst trying to think ahead, and how people
could potentially
> break
> the system.
>
> I'm using web assist's ecart, and as it's my first, I'm
not sure how
> things
> are typically set up.
>
> Basically this set up involves sending the customer to
an externam payment
> gateway, where card details are taken and processed,
before the customer
> is
> returned to the main site.
>
> At the point where the customer is sent on to the
gateway, a record is
> created
> in an orders table, which includes a field 'Order
Status', which defaults
> to
> 'Pending'. Once the payment has been approved, the
customer is passed back
> to a
> 'return' page, which contains a script to update the
order status field
> from
> 'pending' to 'accepted'.
>
> It also seems like a logical place to generate a receipt
to be sent out to
> the
> customer.
>
> My question is this tho' - what's to stop a savvy
customer getting to the
> payment gateway, but not entering any payment details,
and then just
> manually
> going to the return page, which would trigger the update
'Order Status'
> field,
> and even worse, generate a receipt for something which
hadn't actually
> been
> paid for?
>
>
>
Similar Messages
-
International ecommerce website questions
I have two quick questions.
1) Will google translate work with business catalyst ecommerce website?
2) Has anyone here ever used International Checkout with business catalys? Does it work?
Thanks again in advance!Hi there,
1. Since Google translate is just a JS widget you embed on your site it will work with BC.
2. I know that barcelonasouvenirs.com has different subdomains for different currencies and it's redirecting people automatically depending on where they're based.
You can have a look at http://kb.worldsecuresystems.com/521/bc_521.html
Cheers,
-mario -
Graph Theory question...
My graph knowledge is still requiring maturing. ;) I was wondering if anyone could help me with this question:
given a set of verticies in an undirected graph, (not all may be connected) I want to determine whether there exists a "walk" from Vi to Vj and if so, I want to work out the shortest "path" between the two.
I can use a matrix to define my graph view no problems, but how to determine all this computationally is a bit challenging.
Richie !shortest path, as in the "Traveling Sales Person" problem does not require all possible paths to be searched, but it does require setup as if all would be searched (British Museaum style of search using a depth first algorithm). Heuristic clipping of paths can be done once you have an inital path of length L. Any time you reach L length you need not follow that path, nor any of its children. If you reach the destination in shorter than L length, then take the new path as the optimal path length and continue until all paths are exhausted.
-
Virtual Desktops theory questions
Hello!
Help me please clarify several questions on Windows Server 2012 R2 virtual remote desktop infrastructure.
Having read the following artcile http://windowsitpro.com/virtualization/virtual-desktop-infrastructure-part-2-finally-vdi
"The Remote Desktop Connection Broker role service is really the brains of the VDI environment. It communicates with and controls the other components, working particularly closely with the Remote Desktop Session Host in redirection mode, which
is why the Remote Desktop Connection Broker and Remote Desktop Session Host
in redirection mode are frequently placed on the same OS instance. However, when you start having more than 250 simultaneous connections, you might need to consider breaking the roles onto separate servers.
Remote Desktop Session Host in Redirection Mode
The concept of using a Remote Desktop Session Host in redirection mode isn’t new.
Remote Desktop Virtualization Host
The Remote Desktop Virtualization Host role service is installed on any Hyper-V host that will be participating in a VDI pool. This role service lets the Remote Desktop Connection Broker
role service communicate with the Hyper-V hosts, start and stop VMs, and gather internal information to enable client connections."
...I've concluded that RDSH and RDVH are the two separate roles that can be (and should be - according to the Figure1 !) installed onto the two separate OS instances (RDCB + RDSH in Redirection mode on one server and the RDVH on the other).
But when it comes to deploying VDI in practice I don't see how it's possible to separate RDSH in Redirection mode and RDVH services. Moreover, if we look at the following screenshots...
http://blogs.technet.com/b/canitpro/archive/2013/04/25/step-by-step-deploying-virtual-desktops-with-windows-server-2012.aspx
...we'll see that on step 1 Add the Roles and features wizard "wants" to deploy the
RDSH service while on step 3 the RDSH service transforms to the
RDHV service.
Q1) What does this service transformation means?
Q2) Is it possible to have RDSH in Redirection mode and
RDVH services on separate servers in Win2012?
Q3) Is it possible when using pooled virtual desktop collection to set, for example, 2 cores per virtual desktops wich based on Template1 and 1 core per virtual desktops based on Template2?
Thank you in advance,
Michael"With RDSH, you will get RemoteApp, the "terminal sessions". Have you been around during Windows
Server 2003 Tarminal Server? That´s it, but with additional RDWeb. RDSH is pretty much the same as Citrix XenApp overall." -
yes, I understand.
"You can setup VDI infra with only one server, you will need
RDVH, RDWeb and RDConnector roles, that´s all. You don´t need RDSH role for running VDI. -
I'm agree... but if I have VDI up and running without RDSH why its item is present on Deployment Overview diagram??? Can't find corresponding documentation anywhere... :(
Regards,
Michael -
Theory Question on reusing an object
Hi,
I am building a test question program. I have an object called TestQuestion that I would like to reuse by changing the text of the labels for every different question.
I know that I can send arguments when I call or instantiate this object in my Interface class. But is there another way? What I mean is there a way to have all of the text for the questions located in separate methods within the TestQuestion class and then have the Interface send one command to pick and choose what question?
public class Interface extends JFrame { // 300
static JPanel frameForCardPane;
static CardLayout cardPane;
private static JTextArea msgout;
Interface () { // 100
super("This is a JFrame");
setSize(800, 400); // width, height
setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
TestQuestionOne cardOne = new TestQuestionOne(msgout);
public class TestQuestion extends JPanel {
JLabel answerTextA;
void buildConstraints(GridBagConstraints gbc, int gx, int gy,
int gw, int gh, int wx, int wy) {
gbc.gridx = gx;
gbc.gridy = gy;
gbc.gridwidth = gw;
gbc.gridheight = gh;
gbc.weightx = wx;
gbc.weighty = wy;
public TestQuestion(JTextArea msgout) {
// set up layout
GridBagLayout gridBag = new GridBagLayout();
GridBagConstraints constraints = new GridBagConstraints();
setLayout(gridBag);
// answer A
buildConstraints(constraints, 1, 0, 1, 1, 30, 5); // gx, gy, gw, gh, weightx, weighty
answerTextA = new JLabel("This is where I want to change the text!");
constraints.fill = GridBagConstraints.NONE;
constraints.anchor = GridBagConstraints.WEST;
gridBag.setConstraints(answerTextA, constraints);
add(answerTextA);
// answer B
buildConstraints(constraints, 1, 1, 1, 1, 30, 5); // gx, gy, gw, gh, weightx, weighty
JButton answerTextB = new JButton("Answer B");
constraints.fill = GridBagConstraints.NONE;
constraints.anchor = GridBagConstraints.WEST;
gridBag.setConstraints(answerTextB, constraints);
add(answerTextB);
// answer C
buildConstraints(constraints, 1, 2, 1, 1, 30, 5); // gx, gy, gw, gh, weightx, weighty
JButton answerTextC = new JButton("Answer C");
constraints.fill = GridBagConstraints.NONE;
constraints.anchor = GridBagConstraints.WEST;
gridBag.setConstraints(answerTextC, constraints);
add(answerTextC);
setVisible(true);
}Mixing the data question data in with the question display class would generally be poor design.
It would mean that anytime anyone wanted to add another question they would have to have access to the source code of your TestQuestion class and would need to recompile it.
I'd also suggest that passing in a whole JTextArea just to describe the question text is overkill. Wouldn't a String do just as well? -
Hello,
Java is said to be pure object oriented.
In order to make an executable program, one must provide a main function in the class of execution.
This behavior is not pure object oriented.
why couldnt a program start running by executing the constractor of the main class?
if you think this question is posted in the wrong forum, plz notify me where should i post it.The main method also exists for practical reasons. How else would the JVM pass command-line parameters to your program? Either you require that a class has a static main, or you require that it has a constructor that accepts an array of Strings. But what if your class requires a constructor with an array of Strings as it's only parameter? How does Java know that this isn't an entry point to the program? The static main therefore acts as a clear entry point, whereas constructors do not.
I've never used Eiffel, but I have a tough time imagining how you could start a program from anything but a static context. Even if you started from a Constructor, it just means that the RT is creating a static context for you under the hood from which it is calling your constructor. This way, you at least have control over the context you are using. -
I have a doubt on this question:-
purchase order for 25 pcs at 4 Rs / pc. tax = 5%. cash discount = 10 %. What will be the accounting document during invoice verification?
a Input tax will be 4.5+ in net Posting
b Stock account will be 10- in Gross posting
c Stock account will be 10- in Net posting
d Non operating result account will be 10- in Gross posting.
my answer is 'd',because discount is posted as Non operating result
will the gurus correct me
thank youThis may help:
Programmatically Constraining a List In a Popup
At least it will demonstrate how LightSwitch works in regards to creating and consuming a query.
Unleash the Power - Get the LightSwitch 2013 HTML Client / SharePoint 2013 book
http://LightSwitchHelpWebsite.com -
Hello!
Please excuse me if this forum is not the appropriate one for my question but I failed to find a VMM specific forum here...
"Building a Virtualized Network Solution" ebook, page 21:
"When a logical switch is applied to a network adapter in a Hyper-V host, VMM uses the information contained in the logical switch and the selected uplink port profile to create a Hyper-V virtual switch on the host and..."
Usually any Hyper-V host already has at least one virtual switch after the installation of the Hyper-V role. Does it mean that VMM would create the second virtual switch for the same host?
Thank you in advance,
MichaelHi,
>Usually any Hyper-V host already has at least one virtual switch after the installation of the Hyper-V role.
That's wrong. If you installed the role and didn't configured anything after that - you have no vSwitches. IF you nave any vSwitch bound to the NIC you plan to use for a Logical Switch - you'll have to delete a switch first.
http://OpsMgr.ru/ -
Hello!
One more question regarding VMM ("Building a Virtualized Network Solution" ebook (http://blogs.technet.com/b/scvmm/archive/2014/02/19/free-ebook-microsoft-system-center-building-a-virtualized-network-solution.aspx) :
Q: What's the purpose of enabling SR-IOV for a switch if "When a Hyper-V virtual NIC is enabled for SR-IOV it is no longer connected to the virtual switch."?
Thank you in advance,
MichaelTo add to Alexey's statement - what you underlined in read is technically not correct. It is a gross over-generalization of what is actually happening.
There is always a virtual switch. And that virtual switch must be enabled for SR-IOV thus validating that the physical NIC supports it.
Now, when you get into packet flow, the Virtual Switch is actually still involved but very little - as it is the 'virtual network function' within the physical NIC that is handling most of the processing instead of the processor thread of the virtual switch
- but it is still involved - there are still rules that can be set on that virtual port that the virtual switch may have to apply.
And, as the failback - if the VM is live migrated the SR-IOV fails back to a regular vNIC until the Live Migration is complete. And only goes back to being SR-IOV if the destination also supports it.
And, John Howards blog talks about Hyper-V Manager, not SCVMM (which is where you are posting). So be aware that SCVMM has its own rule set that it imposes beyond what you may be able to do with Hyper-V alone.
Brian Ehlert
http://ITProctology.blogspot.com
Learn. Apply. Repeat. -
Hello!
This blog "VMQ Deep Dive 1 of 3" (http://blogs.technet.com/b/networking/archive/2013/09/10/vmq-deep-dive-1-of-3.aspx) states:
"Many people have reported that with the creation of a vSwitch they experience a drop in networking traffic drop from line rate on a 10Gbps card to ~3.5Gbps. This is by design. With RSS you have the benefit of using multiple queues for a single host
so you can interrupt multiple processors. The downside of VMQ is that the host and every guest on that system is now limited to a single queue and therefore one CPU to do their network processing in the host. On server-grade systems
today, about 3.5Gbps is amount of traffic a single core can handle.
Now the question remains, why would I want to use VMQ if I’m capped at a single core for network processing? VMQ is the mechanism we use to spread networking traffic to multiple cores.
Without VMQ, all of the networking traffic is done on a single core so your overall throughput is capped at ~3.5Gbps."
I don't understand the following: if WITHOUT VMQ ALL traffic is done on a single core and the overall throughput is ~3.5Gbps why people report that they "experience a drop in networking traffic ... from 10Gbps to ~3.5Gbps" WITH VMQ???
With VMQ enabled a single queue is affinitized to a single core and the total throughput should be
"throughput" of queue1/cpu1 + "throughput" of queue2/cpu2 ... Otherwise, what's the benefit of enabling VMQ?
Thank you in advance,
MichaelP.S. Regarding "Many people have reported that with the creation of a vSwitch they experience a drop in networking traffic ":
http://blog.osmicro.org/hyper-v-virtual-machine-very-slow-network-vmq/
"OMG Thank you so much! I was very close to pulling the pin on Hyper-V Server 2012 and booting up the old hardware. Instant results with no reboot.
Thank you thank you thank you!
Can’t believe this isn’t on any TechNet articles."
...that's why I'am asking this question: I wouldn't like to deploy some
new technology (having invested extra money in the hardware) and then know that "a drop in networking traffic"
is by design...
Regards,
Michael -
Let's say a reference to an object is visible using final, volatile, synchronized access, whatever. My understanding is that as a result, that reference will now be visible. If someone assigns it a new object, it will point to that object and immediate become visible. However, my question is: will the referred object's data be visible?
This came across my mind when I was reading an example from Java Concurrency In Practice. So I'll post the example:
@Immutable
public final class ThreeStooges {
private final Set<String> stooges = new HashSet<String>();
public ThreeStooges() {
stooges.add("Moe");
stooges.add("Larry");
stooges.add("Curly");
public boolean isStooge(String name) {
return stooges.contains(name);
}(Sorry for not indenting! I'm not sure how exactly.)
Anywayz. So the anyone who looks at the reference stooges will find the latest object (the only object since this is final i guess) assigned to it because of final's properties. However, when another thread calls the isStooge method, our implementation calls stoogest.contains(). However, the contains() method is not necessarily thread-safe. The state, the data, of HashSet is not implemented so that they are always visible.
Therefore, my understanding is that isStooges will not return the truth. Well, in this case it might, because data is only added when constructing the object, but lets say there was another method called addStooge(String name). Would it still hold true?
Lets say one thread calls addStooge("wijjit");. But since HashMap's state isn't designed to be visible in concurrent enviroments, the new "wijjit" stooge isn't visible to other threads ("wijjit" gets cached in local memory not yet flushed to global memory or whatnot). So isStooge("wijjit"); called from another thread could potentially return false could it not?
Sorry if this is a bad way to ask from the example. My question is the same as it is on the top of the thread. ;) Even though the reference to the object is visible, would it be true that the state of the object itself might not necessarily be visible to all threads looking at it?
Thanks in advance!
Edited by: wijjit on Apr 21, 2010 7:08 PMwijjit wrote:
No need to be condescending. I was not being condescending.
Yes I am.Yes you are what? Talking about visibility of writes of shared variables across threads?
You'll find you'll get better answers if you state your question clearly and precisely. This is not particular to Java or Computer Science.
Tx writes "wijjit" into the stooges HashSet. Ty then calls isStooges("wijjit"); (a read). My question is: Wouldn't it be possible that the isStooges called by Ty returns false even though Tx wrote something into it because the internals of HashSet does not guarantee happens-before order, proper synchronization, visibility (however, you want to properly phrase it)?If we call stooges.add(), and there's no syncing or volatile variables, then it's entirely possible that other threads will see an inconsistent or invalid state of the Set, or just see the Set as is was before the add(), or see the Set as it was after the add().
If stooges is volatile, that doesn't help at all for this case. It only means that any value that we assign to stooges will be immediately visible to all other threads. It does not affect the visibility of any internal changes to the object stooges points to.
If, however, we synchronize all access to the map pointed to by stooges--all on the same lock, of course--then the Set will never be seen in an inconsistent state.
T1 T2
synchronized (stooges) { synchronized (stooges) {
stooges.add(x); for (Stooge stooge : stooges) {
stooges.remove(y); stooge.doStuff();
}T2 will either see the Set as it exists before any of the above T1 actions, or after all of the above T1 actions. Anything that T1 does inside that sync block--regardless of whether it relates to the Set pointed to by stooges--will be visible to T2 (if T2 gets the lock after T1, rather than before).
Edited by: jverd on Apr 21, 2010 8:03 PM -
Backing up virtual machines in Hyper-V: theory question
Hello!
This article http://msdn.microsoft.com/en-us/library/dd405549%28v=vs.85%29.aspx says:
"Hyper-V uses the Volume Shadow Copy Service (VSS) to backup and restore virtual machines (VMs).
If the backup (volume snapshot) integration services are installed in the guest operating system, a VSS requester is installed that will allow VSS writers in the guest operating system to participate in the backup of the VM. "
Backing Up the Virtual Machines
Hyper-V uses one of two mechanisms to back up each VM. The default backup mechanism is called the "Saved State" method, where the VM is put into a saved state during the processing of the PrepareForSnapshot event,snapshots
are taken of the appropriate volumes, and the VM is returned to the previous state during the processing of the PostSnapshot event."
The other backup mechanism is called the "Child VM Snapshot" method, which uses VSS inside the child VM to participate in the backup....
Backup (volume snapshot) Integration Service is installed and running in the child VM.
The child VM must be in the running state."
Putting it all together: the backup integration services are installed in the guest operating systems by default (at least in Win2008-2012R2), but "The default backup mechanism is called the "Saved State" method,...",
wich does NOT use child vm snapshot creation. It means that checking the "Backup (volume checkpoint)" checkbox changes nothing (at least with running VMs) because the default method is "Saved state":
Q1: if the default method is "Saved state" and my VMs are running what should I do to take a backup by using
"Child VM Snapshot" method?
Q2: is there any difference between a backup created by method 1 and method 2?
Thank you in advance,
MichaelHi,
The two backup mechanisms used in the different backup scenario:
Short to say is:
Perform a backup from the server running Hyper-V
(host).
Perform a backup from
within the guest operating system of a virtual machine.
The detail explain is:
There are two basic methods you can use to perform a backup. You can:
Perform a backup from the server running Hyper-V. We recommend that you use this method to perform a full server backup because it captures more data than the other method. If the backup application is compatible with Hyper-V and the Hyper-V
VSS writer, you can perform a full server backup that helps protect all of the data required to fully restore the server, except the virtual networks. The data included in such a backup includes the configuration of virtual machines, snapshots associated with
the virtual machines, and virtual hard disks used by the virtual machines. As a result, using this method can make it easier to recover the server if you need to, because you do not have to recreate virtual machines or reinstall Hyper-V. However, virtual networks
are not included in a full server backup. You will need to reconfigure the virtual networking by recreating the virtual networks and then reattaching the virtual network adapters in each virtual machine to the appropriate virtual network. As part of your backup
planning, make sure you document the configuration and all relevant settings of your virtual network if you want to be able to recreate it.
• Perform a backup from within the guest operating system of a virtual machine.
Use this method when you need to back up data from storage that is not supported by the Hyper-V VSS writer. When you use this method, you run a backup application from the guest operating system of the virtual machine. If you need to use this
method, you should use it in addition to a full server backup and not as an alternative to a full server backup. Perform a backup from within the guest operating system before you perform a full backup of the server running Hyper-V. For more information about
storage considerations, see the following section.
The related KB:
Planning for Backup
http://technet.microsoft.com/en-us/library/dd252619(v=ws.10).aspx
Hope this helps.
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. -
Hi,
Why is it possible that we can declare a variable to be of an interface type and yet at the same time assign to it an object?
For example, I have an interface class (Interface), 1 class (FirstClass) that implements the interface and another 1 class (SecondClass) which not only implements the interface but also declares an instance variable to incorporate an interface object. (Concept of re-use by composition).
Subsequently, I have another class that declares a variable to be the interface type (Interface) and yet assign to it a (SecondClass) object. The code goes something like this:
Interface var = new SecondClass(new FirstClass());
How is it possible that I can access all the methods found in FirstClass?
Thanks in advance.You can't use the non-interface methods in FirstClass. The only thing that's important when you writeList list = new LinkedList ();is that you're interested in the methods (and fields) that are defined in the interface. You can't use removeFirst (which is in LinkedList), but you're not interested in it.
-
Some general theory question, pls help !!!
1. How does Java support connection-based communications between two processes ?
2 Why is use-case or scenario-based testing important in testing object-oriented programs.
3. Explain the role of PAM (Pluggable Authentication Modules) in creating secure applications.
4. What is a midlet and when should it be used?
5 Explain how the following conventional testing strategies relate to testing object-oriented software: unit testing and integration testing
6. Explain how designing java programs using UML design techniques can improve a Java program
7. Explain how Servlets can be used in the server side of an application ?
8. When should JSP be used in preference to servlets.
9. Explain what standard actions are and the function of <jsp: forward> standard action.
10. Explain the purpose of a URLConnection object?
11. Explain how Java technology can access remote objects
12. What role does the SecurityManager object play securing java applications and provide an example
13. What is the Java Authentication and Authorization Service and how can it be used to develop secure java applications1. How does Java support connection-based
communications between two processes ? It does this by using what is called the Windows Communication Foundation (WCF).
2 Why is use-case or scenario-based testing important
in testing object-oriented programs.This is so the Project manager will be able to determine scope in future releases.
3. Explain the role of PAM (Pluggable Authentication
Modules) in creating secure applications. PAM helps secure browser cookies from being stuck to the TRAY (Turnable Remote Activation Yearner) after BAKE (Billing Accounts Kernel Energizer)
4. What is a midlet and when should it be used?Within the presentation tier.
5 Explain how the following conventional testing
strategies relate to testing object-oriented
software: unit testing and integration testingUnit testing should be done on the production environment while integration testing should be to verify software needs.
6. Explain how designing java programs using UML
design techniques can improve a Java program UML design techniques improve a code's readability.
7. Explain how Servlets can be used in the server
side of an application ?They can be used for automatically generating dynamic GUI applications.
8. When should JSP be used in preference to servlets.When one wants to display their presentation layer within the database tier.
9. Explain what standard actions are and the function
of <jsp: forward> standard action. This action moves the JSP to the next line of execution.
10. Explain the purpose of a URLConnection object?This object is to maintain a browser instance within a GUI application.
11. Explain how Java technology can access remote
objectsThey do this by creating a contract with which SOA components can communicate.
12. What role does the SecurityManager object play
securing java applications and provide an exampleThe SecurityManager object provides an encryption key for preventing DDOS attacks from remote locations.
n and Authorization Service and how can it be used to
develop secure java applicationsThe Authorization Service is used to authenticate users based on applet certificates. -
Hello!
As per BOL:
http://msdn.microsoft.com/en-us/library/ms186299(v=sql.105).aspx
begins_log_chain bit 1 - This is the first in a continuous chain of log backups.
A log chain begins with the first
log backup taken after the database is created or when it is switched from the simple to the full or bulk-logged recovery model.
As per http://msdn.microsoft.com/en-us/library/ms190440%28v=sql.105%29.aspx
The Log Chain
A continuous sequence of log backups is called a log chain.
A log chain starts with a full backup of the database. Usually, a new log chain is only started when the database
is backed up for the first time or after the recovery model is switched from simple recovery to full or bulk-logged recovery.
So what really starts a log chain - a DB or a LOG
backup???
Thank you in advance,
MichaelMichael,
The confusion falls in the fact that once a database has been changed from Simple to full or bulk logged recovery model then the transaction log will continue to truncate itself upon a checkpoint. The reason is that SQL is
smart enough to know that a database backup has not yet been taken so there is no possibility to recover the database to a point in time. This is sometimes referred to as pseudo simple recovery. After a database backup is taken then the transaction
log will only be truncated after a transaction log backup.
Hope this helps
David Dye My Blog
Maybe you are looking for
-
Creative zen : vision M 30gb strange problem
,Creative zen : vision M 30gb strange problem. Hi people, My mp3 player is 2 and a half years old. A few months ago he didn't charge anymore. ?I thought i could repair it by buying a new battery and install him in my mp3. Afther a few ours of ?assemb
-
I have just had to change my router, which has resulted in my i pad and HPphotosmart 5524 not connecting even though both devices are connecting well to the router. My laptop on windows prints on wi fi perfectly. My previous router a 7 year old Netge
-
Need Help Adding Text To A Template
I am using this template: http://www.templatemonster.com/flash-templates/21091.html I would like to add text as it opens, going across the flag, something like this.... Sam Young. Not Uncle Sam, but here to serve you! Now, obviously, that's not what
-
SQL Server 2K "Linked Server" to Oracle 9i Release 2 via "Oracle Provider
Hi, I'm trying to set up a SQL Server 2000 "Linked Server" to Oracle 9i Release 2 via "Oracle Provider for OLE DB". I have downloaded and installed "Oracle Provider for OLE DB Release 9.2.0.2.0" My SQL*Net alias/datasource in tnsnames.ora works (It p
-
Mark, flag or find a picture previously found in 'Confirm Additional Faces'
iPhoto 11 (9.2.3) I came across this issue yesterday and it just seems another case of No, there is no way to do this, Mac making thinkgs difficult again. Often when going through photos in the 'Confirm Additional Faces' windows, you come across a Fa