(Julian Hyde) One of the strengths of mondrian’s design is that you don’t need to do any processing to populate special data structures before you start running OLAP queries. More than a few people have observed that this makes mondrian an excellent choice for ‘real-time OLAP’ — running multi-dimen
Author: SSWUG Research
Find It
(Alan Joch) For organizations that depend on high-quality information at every level of the company, having people find what they need—and what they are allowed to see—can be a problem. Now, Oracle Secure Enterprise Search provides a way for users to search secure content inside the enterprise, whil
FIX: The password that you specify in a BACKUP statement appears in the SQL Server Errorlog file or in the Application event log if the BACKUP statement does not run in SQL Server 2000
Consider the following scenario. In SQL Server 2000, you use the BACKUP statement to back up up a database, a transaction log, files, or filegroups. Additionally, you specify a password in the BACKUP statement. You run the BACKUP statement. In this scenario, the statement does not run. When you open
SQL Server Security- The Crib Sheet
(Robyn Page) In a production database, any access to data and processes must be restricted to just those people who require it. Generally, the DBA will also want to know who did what within the system, at any point in time.
Some V8 migration reading material from IDUG
(Willie Favero) I was just cruising the online version of IDUG’s Solution Journal and came across a very well written article on a DB2 migration to Version 8… written from a customers point of view and written by that customer. Very cool… very well done.
Developing with Apache Derby — Hitting the Trifecta: Java database development with Apache Derby, Part 3
(Robert J. Brunner) Learn how to modify an Apache Derby database from a Java program. This article builds on the previous two articles in this series to demonstrate how to create and drop tables as well as how to insert, update, and delete data in an Apache Derby database from within your Java appli
XML and Java technology: What’s XML really good for?
(Brett D. McLaughlin, Sr.) It’s no secret that XML continues to be one of the most popular technologies that’s shown up in the last ten years. But what is XML really good for? Is it useful for configuration data? For data exchange? As a medium for data storage? What is XML really good for? This arti
Integrating ASP.NET AJAX with SharePoint
(Mike Ammerlaan) Ok, so now that this blog is going, now for a common topic I’ve been asked a bit about recently. How does Microsoft ASP.NET AJAX integrate with SharePoint? Here are some notes I’ve collected on this.
User Authentication and PHP Security
(Leidago) So far we have covered security vulnerabilities that involve form data, databases and file systems. In this article we are going to look at authentication and the security issues around it. We will also look at some of the most common attacks in this field.
Put VB.NET events in the hands of AddHandler
(Bruce D. Neiger) A simple conundrum posed by Visual Basic 6 — how to trap and handle events from objects that are not assigned to an individual variable — was solved by the earliest versions of VB.NET. The solution is the AddHandler command. (R)
