Business intelligence tools frequently utilize queries with multiple outer joins. This article presents evidence supporting the vulnerability of outer joins ...

The Vulnerability of Outer Joins in Business Intelligence Tools: A Simple Test Scenario