(Uwe Hesse) In a Multitenant Database, the handling of initialization parameters has changed. This post shows some major differences. The playing field:
Author: SSWUG Research
You’re Not In The Group
(David Fitzjarrell) In yet another Oracle forum (yes, I’m in a number of them) the following question was posed:
Does parallel_degree_limit work with parallel_degree_policy=manual?
(Kerry Osborne) The Oracle 11g parameter parallel_degree_limit is designed to put a cap on the maximum DOP for a statement.
Eclipse MAT: Querying Heap Objects Using OQL
This article is a follow-up of [1]. Here we continue to explore on how to investigate memory leaks of an application using Memory Analyzer.[2]
SSWUGtv: Laura Rose gives some advice to those who want to change their career completely. What are the first steps you need to take?
Video Programming for IT Professionals Career management advice, coaching and much more. We discuss making the best of your professional development, provide specific tips and ideas for advancing your career and even answer questions from field.
Conquering complexity: Achieve easy front end authentication with DataPower and HTML form-based login
(Simon Kapadia) IBM WebSphere DataPower firmware as of version 3.8.1 supports HTML forms-based login authentication, which is the ability to display an HTML form into which a browser user will provide credentials (such as a username and password) that will then be used to authenticate his access to
Gridview – like jQuery plugin for JSON data and other jQuery fun
(Sitalkes) In a previous article I was playing around with a Javascript object I created for displaying JSON data in a GridView-like way. It seems to work, however rewriting it as a jQuery plugin has some advantages, like improved browser compatibility, chainablity of operations, simplier DOM select
How to find user who ran DROP or DELETE statements on your SQL Server Objects
(Manvendra Singh) Someone has dropped a table from your database and you want to track who did it. Or someone has deleted some data from a table, but no one will say who did. In this tip, we will look at how you can use the transaction log to track down some of this information.
K-Means Data Clustering Using C#
(James McCaffrey) Data clustering is the process of placing data items into groups so that items within a group are similar and items in different groups are dissimilar. The most common technique for clustering numeric data is called the k-means algorithm.
Managing Constraint Exclusion in Table Partitioning
(Keith Fiske) One of the biggest advantages of table partitioning in databases is taking advantage of a feature called constraint exclusion. The PostgreSQL docs explain this best:

