(Brian Peasland) I want to generate the unique ID based on records in the table. If I have any record in the table then I’m able to fire a query like “select max(id) from table” but the first time, when there is no record, then what should I do? (R)
Author: SSWUG Research
CASE Function in SQL Server 2005 – part IV
(Muthusamy Anantha Kumar) In Part I, part II and part III of this article series, we saw how to use simple case expressions in queries. In this installment, I illustrate how to use case functions in clauses like ‘group by’.
Using ASP.NET AJAX for large-scale Web applications
(George Lawton) One of the key benefits of Ajax is the ability to precisely deliver data where it is needed to parts of the interface in order to reduce the overall bandwidth and server load. In other words, a page refresh occurs only on the part of the page where data is changing, and the rest of t
More Details Emerge on Query/400’s Java-Based Replacement
(Alex Woodie) As part of the latest round of System i announcements last week, IBM provided more details on the new Web-based query tool that it’s developing with OEM partner Information Builders as a replacement to Query/400. The new product will be called DB2 Web Query for System i, and it should
Creating a composite application using IBM Lotus Component Designer
(Anna G. O’Neal and Salvatore Mazzotta) Learn how IBM Lotus Component Designer and IBM WebSphere Portal are the ideal tools for creating and delivering composite applications. Follow along with a real-life scenario in which you download a sample component created with Lotus Component Designer, deplo
Using delayed JOIN to optimize count(*) and LIMIT queries
(Peter Zaitsev) In many Search/Browse applications you would see main (fact) table which contains search fields and dimension tables which contain more information about facts and which need to be joined to get query result.
9 Reusable Parallel Data Structures and Algorithms
(Joe Duffy) This column is less about the mechanics of a common language runtime (CLR) feature and more about how to efficiently use what you’ve got at your disposal. Selecting the right data structures and algorithms is, of course, one of the most common yet important decisions a programmer must ma
PHP 5 Security Techniques
(Larry Ullman) With more and more personal information being stored on the Web—credit card data, social security numbers, maiden names, favorite pets—today’s PHP developer cannot afford to be ignorant when it comes to security. Sadly, most beginning programmers fail to understand the truth about sec
Oops! Were did that piece of data go?
(Willie Favero) In my not to distant past, I spent a bunch of time doing stuff with recovery. In fact, at quite a few past IDUGs, both in the US and Australia, I did a full day seminar on recovery. With my return to IBM, I stopped doing the Sunday seminars. However, when I was given the opportunity,
Audit data using SQL Server 2005’s COLUMNS_UPDATED function
(Tim Chapman) Auditing data changes in your production environment is very important, especially if you are dealing with confidential information. Besides tracking the data that has been modified, it is also useful to track the individual field names that have been modified. This information is grea
