store procedure
Recently Published Documents


TOTAL DOCUMENTS

5
(FIVE YEARS 1)

H-INDEX

0
(FIVE YEARS 0)

Tech-E ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 8
Author(s):  
Nahrun Hartono ◽  
Erfina Erfina

Store procedure is a group of query stored in database catalogue which allows it to be recalled. Insert, update and delete data could performed using store procedure. Stored procedure is an alternative to optimize query performance and also to reduce security gap at interface level of a system. This research provides an overview implementation of stored procedure insert, update and deleting in two DBMS, MariaDB and PostgreSQL. Software developers prefer MariaDB and PostgreSQL because it is open-source, which means free. This research is an experimental research and descriptive analysis. This research data uses student data with amount of data 25000, 15000 and 5000 data. Research result show PostgreSQL require less processing time than MariaDB. Results of this research can used as a reference to design application programs which sometimes choose a DBMS is not a concern of developer.


2019 ◽  
Vol 5 (3) ◽  
pp. 196
Author(s):  
Akrilvalerat D W ◽  
Joni Saputra ◽  
Irfan Purwanto ◽  
M. Afriansyah ◽  
Nur Fitrianingsih Hasan ◽  
...  

Perusahaan Planet Host adalah perusahaan penyedia layanan pembelian domain dan web hosting untuk menyimpan data website yang dibutuhkan konsumen. Selayaknya perusahaan lain, strategi pemasaran melalui promosi menjadi salah satu hal yang harus dilakukan perusahaan untuk menyediakan penawaran produk yang menarik konsumen dengan tujuan konsumen akan berlangganan secara terus-menerus. Strategi promosi dilakukan pihak perusahaan agar tepat sasaran, sehingga tujuan perusahaan tercapai. Biaya modal pemasaran yang cepat kembali menjadi salah satu tujuan perusahaan. Tingkat kesuksesan dalam kegiatan pemasaran menerapkan perhitungan menggunakan ROI (Return on Investment). Hasil perhitungan ini dibantu penelusuran melalui database untuk mengetahui hasil profitable dari ROI untuk membantu pengambil keputusan mengukur efektivitas dari keseluruhan operasi perusahaan. Hasil dari penelitian setelah penelusuran query basis data dengan View, Store Procedure, Trigger, analisa ROI penjualan produk pada kode promo Harbolnas total pembelian 12 produk, Black Friday total pembelian 23 produk dan total pembelian nonpromo 12 produk. Namun, kode promo Harbolnas lebih signifikan dalam memperoleh laba yaitu 54% selama periode November-Desember, dibanding dengan promo Black Friday yaitu 51,75%.Kata Kunci — web hosting, domain, strategi promosi, basis data, ROIPlanet Host company is a company that provides domain and web hosting services to store website data needed by consumers. Like other companies, a marketing strategy through promotion is one of the things that companies must do to provide product offerings that attract consumers with the aim of consumers going to subscribe continuously. Promotion strategies are carried out by the company to be right on target, so that the company's goals are achieved. The cost of marketing capital is fast becoming one of the company's goals. The level of success in marketing activities applies calculations using ROI (Return on Investment). The results of this calculation are assisted by searching through the database to find out the profitable results of ROI to help decision makers measure the effectiveness of the company's overall operations. Results from research after searching database queries with View, Store Procedure, Triggers, analysis of product sales ROI on Harbolnas promo codes total purchases of 12 products, Black Friday total purchases of 23 products and total purchases of 12 nonpromo products. However, Harbolnas promo code is more significant in gaining profit, which is 54% during the November-December period, compared to the Black Friday promo, which is 51.75%.Keywords — web hosting, domain, promotion strategy, database, ROI


2015 ◽  
Vol 77 (13) ◽  
Author(s):  
Muhammad Saidu Aliero ◽  
Imran Ghani ◽  
Syeed Zainudden ◽  
Muhammad Murad Khan ◽  
Munir Bello

SQL injection vulnerability is one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack. Successful SQL Injection Attacks (SQLIA) result in unauthorized access and unauthorized data modification. Researchers have proposed many methods to tackle SQL injection attack, however these methods fail to address the whole problem of SQL injection attack, because most of the approaches are vulnerable in nature, cannot resist sophisticated attack or limited to scope of subset of SQLIA type. In this paper we provide a detailed background of SQLIA together with vulnerable PHP code to demonstrate how attacks are being carried out, and discuss most commonly used method by programmers to defend against SQLIA and the disadvantages of such an approach. Lastly we reviewed most commonly use tools and methods that act a firewall for preventing SQLIA, finally wean alytically evaluated reviewed tools and methods based on our experience with respect to five different perspectives. Our evaluation results point out common trends on current SQLI prevention tools and methods. Most of these methods and tools have problems addressing store-procedure attacks, as well as problems addressing attacks that take advantage of second order SQLI vulnerability. Our evaluation also shows that only a few of these methods and tools considered can be deployed in all web-based application platforms.


2014 ◽  
Vol 789 ◽  
pp. 599-602
Author(s):  
Yu Jia Liu ◽  
Shuai Hou ◽  
Jia Dong Li ◽  
Zhao Dong Wang ◽  
Guo Dong Wang ◽  
...  

The purpose of this paper is to improve the process tracking system, in order to meet the factory MES system requirements. Through the research process control systems and single process control system used in iron and steel enterprises in home and abroad, the integrated process control system, tracking control system and data acquisition system were established, and applied to the heat treatment lines of JISCO. In this system, the store procedure was used to complete the transaction processing in the database for improve the flexibility of the system. Practical applications validate the security and stability of performance system.


Sign in / Sign up

Export Citation Format

Share Document