Select into a temp table that has an idenity column and then select the
result from that.
Justin
-Original Message-
From: Matthew Small [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 03, 2003 4:54 PM
To: CF-Talk
Subject: OT: (cross post) SQL row numbering
How can I get SQL
-Original Message-
From: Jochem van Dieten [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 27, 2003 5:20 AM
To: CF-Talk
Subject: Re: SQL Worm
Paris Lundis wrote:
A good summary Jochem would be for folks to tune the firewall and
ensure permissions/allowable IP list...
Since
I believe that openSSH requires that you install their CYGWIN.dll and it is
not the most current version, which they say can cause conflicts if you have
the Current version installed (which is highly recommended if you do command
line stuff). VanDyke SSH server and client are great and highly
We use a com object called cfx_tcpclient to speak to our mail servers CLI
via telnet. Works great.
Justin
-Original Message-
From: Ian Skinner [mailto:[EMAIL PROTECTED]]
Sent: Thursday, January 23, 2003 5:47 PM
To: CF-Talk
Subject: Cold Fusion and Telnet
Here's an interesting
Make your datasource a variable defined in the application.cfm. Switch the
datasource between databases as needed by changing the application.cfm. It
will not matter if the databases are on the same machine or not as they can
have different names and you can change what CF is looking at very
The more sophisticated web bugs do not use a parameter, but instead actually
use the filename itself to identify the individual and each email has a
different image being requested. Quite effective in HTML email and on web
pages.
Justin
-Original Message-
From: Lee Fuller
The service can be told to whitelist the maillist. The idea itself is not
so new... has been around since 95ish. It is only recently going mainstream
though as enough people are fed up with unsolicited email to require that
you be on a whitelist to email them.
Return receipts can be dealt with
AOL has their own internal RBL and uses their own rules. If you are sending
alot of email across their network you should speak with them about being
whitelisted. They may be enforcing rDNS, some anti-spam efforts do this.
They probably have other criteria as well. Most of the AOL delivery
1.3.6 is older than 1.3.27. 6 27. Confusing but rational at the same
time. I am running 4.5 on 1.3.27 and it works fine except for the DEAPI
warnings because there is no DEAPI build of the cold fusion module for 4.5.
Justin
-Original Message-
From: Stephen Moretti [mailto:[EMAIL
We lots of problems with onUnload() and found that it could not be
effectively used to log a user out. I believe that in Netscape, the windows
was closing before the onUnload() event actually finished executing. After
a while we gave up and went back to to just timing out sessions.
Justin
If the file is large, you can use cfexec to BCP the file into a table then
run a stored procedure to process the table and put the data where it really
needs to be. If the file is small, just loop through it and do a series of
inserts then call a stored procedure to process the table.
Justin
We use sitescope (http://www.sitescope.com) to monitor the number of files
in number of different directories and alert us there is a change.
Actually, we use it to monitor the whole production environment to make sure
everything is running smoothly...
Justin
-Original Message-
From:
Michael,
What does running a properly set up mail server mean?
Justin
-Original Message-
From: [EMAIL PROTECTED] [mailto:mdinowit;houseoffusion.com]
Sent: Monday, November 11, 2002 1:01 PM
To: CF-Talk
Subject: (Admin) New spam code
Just a heads up:
In an attempt to crack down on
of the handiest tools there is
http://www.dnsreport.com.
http://www.dnsreport.com/tools/dnsreport.ch?domain=spamex.com
-- Original Message --
from: Justin Greene [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
date: Mon, 11 Nov 2002 17:07:17 -0500
This is a particularly sore spot for me as I started the same thread a while
back when MM refused to create a -EAPI build of the 1.3.x apache dll for CF
4.5. They tried to claim that DEAPI was post 4.5 and therefore I was asking
for legacy support, then when I showed them that DEAPI actually
In SQL7 and SQL2000 you can use IDENTITY safely assuming you have no
triggers that are causing cascading inserts. If you have triggers causing
inserts, then you need to use the select max() method as shown in original
message for SQL 7:
DECLARE nextid
SET TRANSACTION ISOLATION LEVEL
I think that the 3 Tier issue is really one of performance, not security.,
If you can compromise the 1st tier, you can compromise the second, and then
the third. Anywhere there is a hole in the firewall there is an opportunity
to break in. Tiers just add layers and make it more complicated.
Are we really speaking about clustering here or load balancing. I find that
web server require load balancing whereas database servers need clustering.
It is a picky semantic, but if your web servers were truely 'clustered' then
they would act as one and you would not have content replication
I still run it as an internal relay and find that it is a very solid MTA but
it's lack of any form of smtp AUTH makes it useless in the real world. Take
a look at CommunigatePro by Stalker (http://www.stalker.com) . Very nice
package.
Justin
-Original Message-
From: [EMAIL
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Monday, August 19, 2002 3:30 AM
To: CF-Talk
Subject: Re: Post.Office
* Replies will be sent through Spamex to [EMAIL PROTECTED]
* For additional info click - http://www.spamex.com/i/?v=52
P.O has
insight would be appreciated. Not very up on the impact of verity on
performance.
Justin
--
Justin Greene
ClicVU, Inc. - Makers of the Spamex Disposable Email Address Service
P: 212-242-0258 x 101
http://www.clicvu.com
http://www.spamex.com
Spamex - Protect your real email address forever
ItemID, Name, LastModified from items where userid =
1) I LEFT OUTER JOIN Viewed V
ON I.ItemID = V.ItemID
WHERE V.LastViewedDate I.LastModified
or V.UserID is null
ORDER BY I.ItemID
-Original Message-
From: Justin Greene [mailto:[EMAIL
What about something like this. (note the placement of the () with the
AND/OR)...
Justin
SELECT Items.ItemID, Items.Name, Items.LastModified,
Viewed.UserID, Viewed.LastViewedDate
FROMItems LEFT OUTER JOIN Viewed
ON Items.ItemID = Viewed.ItemID
If you DB supports it, use
if exists [query]
the presence of the exists directive will cause the query to stop processing
as soon as it has a match. This can save time if you are querying an
unindexed table or there are multiple results.
Justin
-Original Message-
From: Tangorre,
We usually use
convert(varchar(10),date,102)
which returns .mm.dd which is best for sorting the query IMHO. Also
very usefull for grouping if you need to group by day.
Justin
-Original Message-
From: Brook Davies [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 30, 2002 7:05 PM
as
email). Additionally a 250MB mailbox generates a 4GB-6GB collection and
verity does not appear have a way to trim that. I do not need a way to
index queries, just files.
TIA,
Justin
--
Justin Greene
ClicVU, Inc. - Makers of the Spamex Disposable Email Address Service
P: 212-242-0258 x 101
http
There is an example in the SQL Server book on-line on how to do this. I do
not remember where, but it does not use recursion. Recursion is very cool
(I happen to love it) but is not terribly efficient, probably why LISP never
caught on.
Justin
-Original Message-
From: chris.alvarado
The follow unsolicited email was received to a Disposable Email Address only
used for my now expired Allaire Cold Fusion Partner program registration. I
cannot even check my preferences as I no longer have an account. Anyone
else get this and does anyone recall if the partners policy provides
Here is the response from them RE: where they got my info. Honest, but a
little vague as to whether Macromedia gave them the named or they harvested
them.
Sir
Our marketing team got it from Macromedia. I am truly sorry if it upset
you. I will remove your name.
Eric
-Original
The big issue with IDE v. SCSI is that with IDE the system CPU handles the
I/O and therefore creates additional load. If your application is not
loading the disk I/O system heavily this will probably not make much of a
difference, however if it is or should you have to rebuild one of the disks
Are you actually planning on returning a million rows to CF and trying to
display or manipulate it somehow or just indicating that the tables will be
large and you are querying against a million rows? If the former, good
luck. Moving a million rows out of one DB and into another using Cold
I have been using the same Spamex Disposable Email Address
(http://www.spamex.com) on this list for 18 months and this is the only
place that the address has been used and my real email address is in the
list going back to the very beginning, but I have not received the email in
question to
who's
responsible. Plus, it's easier to remember which
disposable address I
entered for your site.
-Brad
-Original Message-
From: Justin Greene [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 10, 2002 8:25 AM
To: CF-Talk
Subject: RE: Skimmin the list...? [oT
Personally, I avoid using catch all addresses. The first time you get hit
with a dictionary attack to your mail server and have 50,000+ messages in
your catch all address mailbox you will wish you assigned the addresses one
by one. Using a catchall also makes it diffucult to turn off the
I have to say that CF does not sound like the best tool to use for something
like this. Perhaps it can be done... write to the spool directly and let
DART (if they still use that for mail) pick up the messages and send them,
but CF is not that fast and if you want to handle max volume on min
than extra hardware to
compensate for the wrong code. 4 million messages/hour is a lot of
messages, the code should be as fast (note I did not say tight) as possible
or you will spend a fortune on buying more boxes.
Justin
-Matt
-Original Message-
From: Justin Greene [mailto
It is capable of sending up to a thousand emails per minute efficiently and
reliably,
if it could do this per second, it might work...
Justin
-Original Message-
From: Tilbrook, Peter [mailto:[EMAIL PROTECTED]]
Sent: Monday, July 01, 2002 10:41 PM
To: CF-Talk
Subject: RE: 4 million
I would not run a firewall on the NT box, but rather place a firewall
between the NT box and the rest of the world.
Justin
-Original Message-
From: James Smith [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 21, 2002 4:52 AM
To: CF-Talk
Subject: SOT: NT Firewalls
Running public
We had problems with their CFX tag (I do not remember what they were) so we
used their Java classes to create our own CFX. I can ask the developer who
did it for more info if you want it.
Justin
-Original Message-
From: Duane Boudreau [mailto:[EMAIL PROTECTED]]
Sent: Thursday, June
We developed exactly this a while back for our ClicVU advertising product
and used a pixel to cookie and track the user (which is fairly common). We
ended up building an apache module because cold fusion was not capable
(v4.5) of setting a cookie on a redirect or setting a cookie when returning
You cannot block the ability for someone determined to view your source, you
can only make it difficult. I can telnet into the server and get the raw
html regardless of how much munging you do to the file and if you use
javascript to encrypt the file, I can write a routine to unencrypt the
It seems to me that if you are trying to allow the same person to have
multiple sessions taking place from the same physical browser, then you just
need to track sessions in the URL and not use cookies. This will allow as
many logins as you like from a single machine. There should not be a
I am trying to index a number of documents that are basically text
documents, but have no file extension. Verity seems to want a file
extension or it will not index the documents. Is there a way to define the
collection to index these?
Justin
--
Justin Greene
ClicVU, Inc. - Makers
do it that
way..
But question - if they are text files - individual text files
- they have .txt
extensions? Which Verity can search...
jay
Justin Greene wrote:
I am trying to index a number of documents that are basically text
documents, but have no file extension. Verity seems
This is not really something that Transact SQL excels in, but I think the
way to handle it is to create a string 'ABCDEFGH' then in a while loop
select a number between 1 len(string) and and insert the number into a
temp table. After N loops, I would exit the while loop, and select
If you only have 4 groupings then the case statement is the best solution
IMHO. It will let you create the sequence column dynamically.
Justin
-Original Message-
From: Paul Ihrig [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 29, 2002 8:40 AM
To: CF-Talk
Subject: RE: ORDER BY
The way to do this is definitely by creating a sequence field and ordering
by this field. How the sequence is created is up to you... to hard code it
you do something like
select sequence = case when 'a' then 1 when 'z' then 2 when 'f' then 3 else
4 end), next field
from table
The case
We do a fair amount of parsing of email addresses for our
http://www.spamex.com service and found that the regex to properly parse
email and remain RFC compliant is actually about 1 page long (we found it
published somewhere). We ended up not going the regex way due to the
complexity and just
Anyone have a feeling about the Microsoft Data Engine, which is supposed to
be a limited connection version of SQL that can upscale to SQL very easily
rather than Access?
Justin
-Original Message-
From: Bosky, Dave [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, May 21, 2002 9:15 AM
To:
That is what I thought. I have not understood why people do not go this way
instead of using Access... seems like a better solution in terms future
scalability if one is looking to eventually move SQL Server.
Justin
-Original Message-
From: Dave Watts [mailto:[EMAIL PROTECTED]]
(response to original message)
Most of the UNIX tools have been ported to NT. Do a search on cygwin.
Justin
-Original Message-
From: Jon Hall [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, May 21, 2002 8:12 PM
To: CF-Talk
Subject: Re: Reading only part of a really big text file...
The easiest way to avoid this is to close port 1433 in the firewall except
from relevant IP addresses. We only allow connections from our office and
if someone is offsite they have to either tunnel into the production
environment or tunnel into the office to access the SQL servers. I would
Last time I checked it did not support refrential integrity, you enforce it
manually. This and lack of stored procedure support is enough to keep me
away (as much as I would like a free/cheap alternative).
Justin
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
I Have to agree. Hardware based clustering for the front end... and either
SQL Enterprise or Veritas on the backend to handle the database cluster.
Very solid configuration. We have been hardware clustering CF with Alteons
for over 3 years. Just need to keep sessions in the DB and make sure
I just went through a few days of trying to figure this out and found that
the only two ways were using a javascript to load a .gif and passing the
parameters or using a hidden frame and dynamically changing the frame src.
If you have control over the page you are submitting and can cause it
If you do a full backup and truncate the logs and you can only restore from
the most recent backup and then rolling forward the subsequent logs. If you
do a full backup but do not truncate the logs, I do not think you will be
able to roll the logs forward on a restore, but I have never tried. I
The problem with all the solution except this one is that they tie up a
connection on the server, which is the last thing you want to do. Better to
put the pause on the client side or have the client keep checking whether
the task is complete. Perhaps with a simple META REFRESH to check for the
Just to be safe I would probably recommend
WHERE lower(searchfield) LIKE lower('%he%')
however, anytime you perform an evaluation on the left side of the = you
force a table scan, which can create performance issues. This is the
problem with trying to do case insensitive searches in a DB that
How about the missing comma in the Values part of your query... looks like
a temp stored procedure is being created and choking between parameters 10
and 11.
Justin
-Original Message-
From: Jen Perkins [mailto:[EMAIL PROTECTED]]
Sent: Thursday, March 14, 2002 2:38 PM
To: CF-Talk
I would also like to point out that whenever you are dealing with
transaction you INCREASE the possibility of incurring deadlocks and general
slowdown because the lock manager overworking. You need to keep
transactions short and keep a close eye on the what is happening inside of
the transaction
You can write to the registry on IE with a signed applet so make sure
that
you are set to warn you before running such things. This is probably
what
happened.
Justin
-Original Message-
From: Dave Hannum [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 05, 2002 9:26 AM
To:
Do not know about speed, but access to output parameters and the
ability to
trap an error (i.e. detect that an error code was returned) are in
themselves worth it.
Justin
-Original Message-
From: Steven Durette [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 21, 2002 11:01 PM
To:
It will be far more efficient to do the whole query in SQL rather than
creating 2 queries in CF. Let SQL do the work, it is very good at it. I
suspect that you IN clause is causing the Query optimizer to have problems
determining which index to use which is why you are seeing a huge difference
where I can learn how to build an apache
module like the one you made?
--- Justin Greene [EMAIL PROTECTED]
wrote:
We created an apache module for doing this. We
intecept the .CFM request,
check if it is the CFCONTENT page and if not, pass
the request to Cold
Fusion, if so, we handle the user
The below piece is from the SQL books online and provides a sample of
handling expanding heirarchies. This may be what you are looking for
(though it will probably only work in SQL, not access)...
Expanding Hierarchies
Databases often store hierarchical information. For example, the following
We created an apache module for doing this. We intecept the .CFM request,
check if it is the CFCONTENT page and if not, pass the request to Cold
Fusion, if so, we handle the user authentication and return of data in the
module. This allowed us the flexibility of building in Cold Fusion with the
It is so funny to see this discussion keep cropping up. The whole
blacklisting of open relays is a very touchy issue. I agree that there is
little excuse for running an open relay in today's world (though some argue
that it is their right... I think this was an issue in MIT vs. MAPS). I
will
Just came across something interesting that I thought I would pass
along.
We were writing a query along the lines of
select *
from column
where value like 'o'brien'
This of course will not work and needs to be
select *
from column
where value like 'o''brien'
however this was not working
This is usually related to the machine failing to resolve it's own hostname.
Not having the DLL loaded should not stop apache from starting. Try
starting from the command line to see what error it gives you and if it
hostname related, make an entry in your hosts file to fool it.
Also, on W2K
It was an oversimplification. Didn't feel like typing then, don't mind
now... the problem with truncate logs at checkpoint is that you will only be
able to restore until the time of the last backup as there will be no
transaction logs to roll forward to get you completely up to date. Any
If you are speaking of the error log, you can use set how many error logs to
keep in the registry and set SQL Agent to rotate them daily, weekly,
whatever. I do not remember the syntax but it is in the Microsoft
knowledgebase. We are set to keep 30 days and we rotate daily. Makes for
nice
After a few conversations MM agreed to compile it and said it would be
available in a few weeks. That was at the end of August. I have asked for
an update but have not gotten a reply.
Justin
-Original Message-
From: Tony Schreiber [mailto:[EMAIL PROTECTED]]
Sent: Sunday, September 23,
Correct.
-Original Message-
From: Jesse Noller [mailto:[EMAIL PROTECTED]]
Sent: Monday, September 24, 2001 11:43 AM
To: CF-Talk
Subject: RE: cf and apache
For the windows version of the module?
-jesse
-Original Message-
From: Justin Greene [mailto:[EMAIL PROTECTED]]
Sent
I ran tests on Apache 1.12 on windows NT 4.0/sp 5 on a dual PIII 600 with
256MB ram. Serving a .5K file it was able to push about 750 pages/sec.
Serving a 14K file it dropped to about 525 pages/sec, but I also noted that
the 100MB network was saturated. Probably was bottlenecking the LAN (I
Which version of apache are you running and what platform? I have found
that SSL on win32 with 1.3.20 apache required an EAPI Cold Fusion module and
MM has not yet made it available (though they said that they would after the
discussions on the list and some back and forth with their support
Works great so long as you do not need SSL. Been running it for almost 3
years without a problem.
-Original Message-
From: Ben Whalley [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 21, 2001 9:53 AM
To: CF-Talk
Subject: cf and apache
How much experience do people have with CF and
The most recent win32 release (1.3.20) is considered initial release quality
and it works great. Never a problem.
Justin
-Original Message-
From: Jeremy Allen [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 21, 2001 10:29 AM
To: CF-Talk
Subject: RE: cf and apache
Apache does not
skillpath.com. IN AYour IP address
www IN AYour IP address
note the . at the end of the first that is not at the end of the second.
Also need to make sure the web server will respond to both.
Justin
-Original Message-
From: ChristianWatt [mailto:[EMAIL
If I remember correctly, when MS SQL Server is installed one determines
whether the DBs will be case sensitive or case insentitive. If the former
is selected, you have to cast or convert everything to upper or lower case
when doing compares as 'a' != 'A'. This of course forces table scans as
Matt,
I had another conversation with MM yesterday with Dave Emmon (sic?) and I
pointed out that the EAPI for apache was not supported in CF 5 either and
was told that MM considers Win32 apache to be beta software and does not
support beta software, but that they are having a meeting on Friday
We are looking at this as an option. I believe the issue (I am not the
programmer, just the interface) is that some type of modules (mod_ssl for
example) must have support compiled into Apache under the standard API and
with EAPI they are supported at runtime. Using EAPI allows greater
on Apache with Cold Fusion on Win32 and if so, how
did you resolve this issue?
Justin
--
Justin Greene
ClicVU, Inc. - Makers of the Spamex Disposable Email Address Service
P: 212-242-0258
http://www.spamex.com
Sign up for your free Spamex account:
Protect your real email address forever
I have been doing this in my development environment for over a month and am
getting warnings in the Apache error log (about the mix) and sporadic blank
pages. I do not know that the latter is caused by mixing, however, I do not
have the problem in production, which is also 1.3.20, but standard
on this.
Disappointed,
Justin Greene
p.s. Allaire posted a resolution to the EXACT problem for Linux on August
7, 2000 in KB# 16303, however it requires the source for the module which I
was told would not be made available for windows.
--
Justin Greene
Co-Founder
ClicVU, Inc. - Makers
, August 28, 2001 5:23 PM
To: CF-Talk
Subject: Re: Macromedia strong arms developers into 5.0 upgrade
This is called business. If you want something you'll have to pay for it.
There is no free lunch.
On Tue, 28 Aug 2001, Justin Greene wrote:
Hi All,
I just had a very disturbing conversation
I do not code in C so this is a little out of my depth, but I believe that
it is just a matter of re-linking to the apache source and recompiling with
the -DEAPI directive. The actual error from the Apache logs is:
[Sat Aug 18 17:16:59 2001] [warn] Loaded DSO
modules/ApacheModuleColdFusion.dll
Which would you not want to run in production? Apache runs great in
production. I just heard that a PHP module for apache was just released,
but have not looked into this (this may NOT be production quality).
Justin
-Original Message-
From: John Quarto-vonTivadar [mailto:[EMAIL
Make sure to config the SQL client to use TCP/IP not named pipes (especially
if querying from a different machine), and try using SQL security rather
than NT security. Also what happens when you try to login using query
manager (using the same login the webserver uses) and run the query
SQL7 is also per CPU licensing for the Internet Connector license so there
is no gain here by getting 7 over 2000. I did inquire with MS a one point
about getting SQL7 rather than 2000 and was told that you can buy 2000 then
call them and Downgrade the license. You could not, however purchase
Anyone know whether the exploit being used by code red could be used to
launch a counter exploit on the infected system that patches the machine
:-).
Justin
-Original Message-
From: webmaster [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, August 07, 2001 9:54 PM
To: CF-Talk
Subject: OT
: Apache 1.3.20
The steps to rebuild the module for EAPI are here:
http://www.allaire.com/Handlers/index.cfm?ID=16300Method=Full
Deb
-Original Message-
From: Justin Greene [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, August 01, 2001 2:12 PM
To: CF-Talk
Subject: Apache 1.3.20
Is anyone running CF with Apache 1.3.20? We have just upgraded and
everything appears OK but an Apache -S shows the error:
[Wed Aug 01 14:04:07 2001] [warn] Loaded DSO
modules/ApacheModuleColdFusion.dll
uses plain Apache 1.3 API, this module might crash under EAPI! (please
recompile
it with
Messages that Cold Fusion is not able to hand off to the smarthost appear
here. Your smtp server may accept abc and 123 as valid email addresses and
just try to append you domain to the end of them. Try putting a bad IP
address for the SMTP server and watch the directory fill up.
-Original
I would take the log file entries and send them in an email to
[EMAIL PROTECTED] This type of activity is in violation of most ISP's AUP
(Acceptable Use Policy) and many will terminate the users account for doing
this. Be sure to let them know your GMT offset so that if it is a dialup
user they
Also bear in mind that database size also includes indexes and enough of
them can turn a fairly small set of data into a large database file. There
is a procedure to break down the amount of space being used by all tables,
indexes etc. May be worth looking at.
Justin
Justin Greene
Co-CEO
A few thoughts
1. .zip does have a file size and file count limit. Sound like you are
hitting the former. I understand the RAR does not have this limitation, but
have not worked with it.
2. Perhaps you can download the file using a protocol that compresses
dynamically (like zmodem) rather
This header does not look complete to me. Is 216.9.67.204 your system? If
not then where is the Received: line for your system. You need to go ARIN
(http://www.arin.net) and lookup The IP addresses in the header, not the
domain names (which can be easily spoofed). The most-likely-to-be-real
You may also want to look into a piece of software called tripwire
(http://www.tripwire.com). It will create a checksum for all the files on
your system and do a variety of things if something changes. I have not
implemented it yet (NT4 environment) but have an associate (Linux) that
swears by
Write your query to return:
Month (as number), Day (as number), other data
order by Day, Month
Then loop through the result and each time the month is the last
month
start a new row.
Justin
-Original Message-
From: Paul Sizemore [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 17,
If this is SQL server should be able to accomplish it something like this...
CREATE PROCEDURE adhocorder
@position1 as varchar(25),
@position2 as varchar(25),
@position3 as varchar(25),
@position4 as varchar(25)
AS
SELECT AdHocOrder = CASE bp.Description
1 - 100 of 105 matches
Mail list logo