(Colin Goddard) This article shows how to bulk load data from text files into SQL Server, using Perl’s Win32::OLE module to control Microsoft’s Database Transformation Services (DTS).
Author: SSWUG Research
MySQL Session variables and Hints
(Peter Zaitsev) MySQL has two ways to find tune execution of particular query. First is MySQL Hints, such as SQL_BIG_RESULT, STRAIGHT_JOIN, FORCE INDEX etc. You place these directly into the query to change how query is executed for example: SELECT STRAIGHT_JOIN * FROM A FORCE INDEX(A) JOIN B
Building a data mining solution using IBM Intelligent Miner Scoring and WebSphere
(Stefan Warwas) The objective of this tutorial is to get you confident with executing Intelligent Miner Scoring statements from a J2EE Web application. The calculation and presentation of the scoring results is done in real time. (R)
Read and Write Open XML Files in MS Office 2007
(ZeljkoS) With Office 2007, Microsoft decided to change default application formats from the old, proprietary, closed formats (DOC, XLS, and PPT) to new, open and, standardized XML formats (DOCX, XLSX, and PPTX). New formats share some similarities with old Office XML formats (WordML, SpreadsheetML)
Calling Cross Domain Web Services in AJAX
(Chris Ullman) One of the current vogues in web applications is the creation of mashups. This involves the marrying of content and/or functionality from two different sources. Over the last few years, the opening up of formerly proprietary APIs from the likes of Google, Yahoo, Last.fm, Flickr, YouTu
Learning XPath with XSLT using ASP.NET 2.0
(Jagadish Chaterjee) This is the first article in a series focusing on XPath with XSLT using ASP.NET 2.0. In this article, I will be focusing on setting up your own XSD, XML and XSL to test XPath expressions along with a few of the basic XPath expressions, together with XSLT constructs.
Collecting Percentage of CPU Used by Consumer Group
(Marco Gilbert) This tip is for people who use Oracle Resource Manager in Oracle Database 10g to manage CPU usage by consumer group.
Oracle Applications 11i User Password Weakness
The inherent weakness of the Oracle Applications 11i user password algorithm is a topic that every so often gets some attention. It bubbles up and then is largely forgotten by most. However, the issue doesn’t go away and is very much alive today even in 11.5.10.2. See the references at the end of
Oracle RAC Administration – Part 12: RAC Essentials
(Tarry Singh) In the year 2006, we looked at the RAC database installations on Windows 2003 Server and Linux (Both RHEL and Centos 4.2). Red Hat will soon be releasing version 5 (based on 2.6.18 kernel) and we will test it against our new Oracle RAC. We will also take an opportunity to test Oracle R
Event and Error Logging
(Scott Lysle) This article describes an approach to writing to a custom error log and to writing events into the system event log.
