(Rick Strahl) As of ASP.NET 4, ASP.NET provides a fairly useful identity system. If you create a new project and choose an MVC project and choose to add both internal and external authentication, it’s fairly straight forward to get a reasonable identity implementation into your application.
Author: SSWUG Research
Queryable Services
(Dino Esposito) It’s getting more common for companies to expose their back-end business services as plain old HTTP endpoints. This type of architecture requires no information about databases and physical data models.
Business Process Management Design Guide: Using IBM Business Process Manager
(Dr. Ali Arsanjani, Nakul Bharade, Magnus Borgenstrand, Philipp Schume, J. Keith Wood and Vyacheslav Zheltonogov) IBM Business Process Manager (IBM BPM) is a comprehensive business process management (BPM) suite that provides visibility and management of your business processes. IBM BPM supports the
Why you should specify DISTRIBUTION KEY for tables in a single database partition in a DB2 DPF database?!?
(Pavan Kristipati) In this blog post, I will make a case for why you should specify a DISTRIBUTION KEY clause for a table that is about to be created on a single partition in a DPF database. This doesn’t make sense.. Does it?
Data Server Manager: Light-weight real time DB2 administration and performance monitoring
(Thuan Bui) IBM Data Server Manager is a new, integrated tool for managing performance and administering DB2 for Linux, UNIX, and Windows. Explore the lightweight option for real-time monitoring and administration with auto-discovery of databases, at-a-glance health view of all your databases, detai
Embed Pie Charts, Manage Outliers and Display Reports on a Mobile Device with SQL Server Reporting Services
(Scott Murray) As report designers working with SQL Server Reporting Services (SSRS) charts, what are some tidbits that will help solve common charting situations with pie charts, working with data outliers and rendering reports on my mobile phone?
Make sure you back up the Service Master Key
(Kenneth Fisher) I’m by no means an expert in SQL Server encryption. What I do know however, is that the Service Master Key is the top of the encryption chain on an instance. This means that any certificate or key will be encrypted using, in part, the Service Master Key. So if you are using encrypti
How to Write Queries – Introduction to Three Simple Steps to Writing SQL
(Kris Wenzel) This is the introductory article in a series explaining the three simple steps I take to writing complex SQL statements.
The design of the SCAN algorithm within one LDM instance
(Mikael Ronstrom) As part of optimising scan execution by about 50% in MySQL Cluster 7.4 we made an effort to also write down a description of the scan protocol locally within the LDM threads. This is documented in the source code of MySQL Cluster 7.4 and here is an excerpt from the source code.
Migrating To Oracle Using Custom Object Names
(Dermot O’Neill) Sybase , SQL Server and other databases allow for long identifier names.