Tech Kraft

Documentum, AWS, Java, Ruby on Rails, Linux, Windows, App Servers


  • Documentum: How to find physical file location

    In order to find the physical file location of any file: select i_contents_id from dm_document where folder(‘/<CABINET_NAME>’, descend) and object_name = ‘<File Name>’ execute GET_PATH for ‘<content_id returned from above>’   Continue reading

  • SQL: How to insert new rows that are copies of existing rows

    In SQL you can create/insert new rows that are essentially copies of the old rows, without needing to specify every column value. Let’s say you have a table called “EVENTS” with the following columns: event_name location_name promoter_name event_date promote_address location_address Now, let’s say you want to create a new row with all the same information Continue reading

  • Documentum: How to recover database password

      Copy the content of dbpasswd.txt file from the following folder: $DOCUMENTUM/dba/config/<REPOSITORY NAME> Content will be in this format: DM_ENCR_TEXT_V2=AAAAEFpxldCW8pnF4gbWPFV+1jP8TEK9HS8d28MW0HwWw+C3uV/+rshuoJ/3j Open IAPI, and do the following: $>iapi $>Please enter a docbase name (docubase): <REPOSITORY NAME> Please enter a user (dmadmin): Please enter password for dmadmin: $>initcrypto,c $>decrypttext,c,DM_ENCR_TEXT_V2=AAAAEFpxldCW8pnF4gbWPFV+1jP8TEK9HS8d28MW0HwWw+C3uV/+rshuoJ/3j     Continue reading

  • Documentum: How to find out if you have a custom registered table

    Documentum has the concept of a registered table. It is basically a regular database table accessible via DQL. This allows you to add information to a regular database table and access it via regular DQL. To find out if you have any custom registered tables, run the following query: select * from dm_registered where object_name Continue reading

  • Linux: vi search and replace command

    Format The format of the command is given below: %s/<string_being_replaced>/<replacement_string>/ Examples In order to replace the word “hate” with “love”. Open the file in vi Hit [Esc] (Esc in vi lets you type commands instead of typing content) Type : (colon) followed by %s/hate/love/ and hit [Enter] key. :%s/hate/love/ Above command will replace first occurrence Continue reading

  • Documentum D2: About D2 returns dfc.properties

    If you click on the About D2 link, it returns the complete dfc.properties file which may include your servername or ip address. This is a security vulnerability. To resolve this issue, open the D2.war and D2-Config.war files, find the following file: WEB-INF/lib/D2FS4DCTM-WEB-4.5.0.jar Open the file above and find the following file: xml/dialog/AboutDialog.xml Comment out the Continue reading

  • Java: Singleton Pattern

    In most cases, instances of objects are created, which result in several objects being created from the same class. Using the Singleton pattern, we can ensure that only a single object of this class is created during the lifetime of the application. Step 1: Create a Singleton Class public class SingletonClass {       //Create singleton Continue reading

  • Linux: Can’t open display for xterm

    When using xterm, if you are not able to see the display show up on your screen, or you get an error, try setting your display. Find the ip of your local windows desktop using the following command: C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection 6:    Connection-specific DNS Suffix  . : dev.company.gov Continue reading

  • Setting up Spring Security in Eclipse – III

    Using Method based Security  Scenario: Only an account holder can deposit or withdraw money. Only an employee can charge fees to the account, and only a manager can allow overdraft on an account.  ——————————————————————— Modify WEB-INF/applicationContext-security.xml by adding the following line under the root element: <global-method-security secured-annotations=”enabled” />  ——————————————————————— Create a new xml called WEB-INF/applicationContext-security.xml Continue reading

  • Setting up Spring Security in Eclipse – II

    Setting up Spring Security – Using URL based Security  Scenario: There is a bank called NoFraudBank, which has two branches – HisBranch and HerBranch. Each branch has 4 employees – a Manager, a Teller Supervisor, and two Tellers. Each branch has one account, being a small privately owned bank. The bank allows the account holders Continue reading

About Me

Senior Software Engineer professional with over 16 years of success with multiple open source technologies and various Content Management platforms and solutions.

Proven technical abilities through numerous projects involving enterprise web application design and development, application installation, configuration and support, and workflow and collaboration system designs.

  • Ability to learn new technologies and platforms quickly and apply them to the task at hand.
  • Excellent analytical skills, and strong communication and collaboration abilities.
  • Technical emphasis in including but not limited to Java, Ruby on Rails, Documentum and Alfresco
    in both Linux and Windows based environments

Newsletter