(George Walsh) AS/400-based independent software vendors (ISVs) are finding it increasingly difficult to sell their wares to new customers. Many companies will not accept a legacy platform such as the AS/400 when there are more modern environments, such as Windows and .NET, which utilize hardware wi
Author: SSWUG Research
DB2 LUW Performance: Index Read Efficiency (IREF)
(Scott Hayes) How many rows must be read (evaluated) to retrieve one row? If DB2 lacks sufficient indexes to filter the result set according to the WHERE predicates, then DB2 will have to evaluate many, possibly too many, rows from the data pages to find result sets.
Encrypted columns and SQL Server performance
(Dmitry Tsuranoff) For legal reasons it is very important to encrypt table columns containing sensitive data, like SSNs. SQL Server 2005 allows you to encrypt data using different algorithms that employ symmetric and asymmetric keys. Alternatively, you can also use password-based encryption, where t
ColdFusion Feature — Coding with XML
(Andrew Schwabe) As a ColdFusion developer, hopefully by now you have heard at least a little about XML (eXtensible Markup Language). Wikipedia defines XML as a “general-purpose markup language” designed to “facilitate the sharing of data” and also designed to be “relatively human-legible.”
SQL SERVER – 2005 T-SQL Paging Query Technique Comparison (OVER and ROW_NUMBER()) – CTE vs. Derived Table
(Pinalkumar Dave) I have received few emails and comments about my post SQL SERVER – T-SQL Paging Query Technique Comparison – SQL 2000 vs SQL 2005. The main question was is this can be done using CTE? Absolutely! What about Performance? It is same! Please refer above mentioned article for history o
Get the Sum of a particular column values in a DataGrid
(Rahul Saxena) In this article, I am going to show how we can add a column value in a DataGrid. To add a column value in this programme I am using a function. In the function, I am passing the value of that particular column. Let us see how to do this through the below code.
Buried Treasure: Finding Money in Your Storage Systems, Part 2
(Frank Kettenstock) Effective capacity planning delivers the strategic insight necessary to maximize the utilization of existing resources, while proactively planning for future needs. Part one of this two-part article discussed the benefits of storage capacity planning and the consequences of poor
Understanding XForms
(Kurt A. Cagle) With XML-based technologies such as XForms, XQuery, and XSLT, it is possible to create complex multi-user applications, from interactive help systems to custom “game” applications in which multiple users can interact with at once. This article shows how to create you fairly simple sc
Performing Full-text and Boolean Searches with MySQL
(Alejandro Gervasio) When a database-driven web site grows past a certain size, it requires an internal search engine. If it is a very big site, it may be desirable for visitors to be able to use full-text searches and Boolean operators to find the information they need. This article, the first of a
Avoid the @ symbol in Oracle passwords
(Bob Watkins) Password complexity is one of many things that IT auditors examine to see whether a system is secure. IT policies usually state that a password must be a minimum length and include a mix of uppercase and lowercase letters, numbers, and special characters.
