(Mark Brunelli) Oracle developers are still speaking out about their favorite PL/SQL editing and debugging tools, and their opinions truly run the gamut. (R)
Author: SSWUG Research
DB2 security: The starting point
(Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong and Yuk-Kuen Henry Chan) When thinking about organizational information security, your mind might jump to the technical details such as firewalls, access control lists, certificates, auditing, cryption, and all those wellknown electronic trappi
Rman Admin and Backup Script for RAC on ASM
(Alejandro Vargas) This script does a couple of Admin activities, then make a backup ‘as copy’ to File System.
An idea how to speed up nested-loops join a little
(Sergey Petrunia) Working on subquery optimizations, got an idea how to speed up join execution a little. Read on.
Create data structures with JavaScript arrays
(Tony Patton) While JavaScript has many similarities to more robust languages like Java and C, it does have many features that are less than intuitive. JavaScript arrays are one such design element that provides some obscure features that developers often overlook. This article examines some of thes
Working with nested subqueries in SQL Server
(Arthur Fuller) Many SQL Server programmers are confused about the use of subqueries, especially nested subqueries (i.e., a subquery that contains a subquery). Let’s start with the basics.
SqlCredit – Developing a Complete SQL Server OLTP Database Project
(Rob Garrison) The purpose of the SqlCredit series is to demonstrate the database design and development portion of a development project. We will build a complete, functioning, tested credit card database to illustrate the complete software development lifecycle. Microsoft provides us with Adventur
How Many Data Files Should I Create for a User Database?
(Linchi Shea) Whenever this question comes up, my typical response is to pass along the following Microsoft recommendations: –The number of data files within a single filegroup should equal to the number of CPU cores. See the "Physical Database Storage Design" whitepaper. –Lining up the num
ASP.NET: Access Client Info Server-side
(Mads Kristensen) I was playing around with HTTP request headers and for some reason started thinking about how limited information they provide about the requesting browser.
ASP.NET Tip: Encrypting a Configuration File Section
(Eric Smith) Leaving passwords unencrypted in a configuration file is generally considered a bad idea. Although some level of access is required to get to the file, encrypting the passwords—especially database passwords—adds a layer of security. However, implementing this type of encryption has been
