(Shweta Sinha) For optimum database backup and restore performance for your IBM Informix Dynamic Server (IDS) database, take advantage of parallelization with the ON-Bar utility. This article introduces ON-Bar, describes the parallel backup and restore sequence, and includes a discussion of configur
Author: SSWUG Research
How do I… Transfer and store data from an XML document in a relational database?
(Edmond Woychowsky) Between AJAX, Web services and just plain XML there is a plethora of information going to and fro. Yes, XML really makes it easy to move data from here to there and from there to here. While this is really great it totally ignores the fact that eventually the data needs to be sto
Oracle: Choosing and Using the Right Code
(Steve Callan) Sometimes a programming background can make a task harder than it is when you lose sight of what SQL can do independently of PL/SQL. How often do you find yourself using PL/SQL to loop through records where an update for each record depends on some test or condition? That is certainly
Why ODBC?
(Peter Harvey) MySQL offers one of the most complete selection of application programmer interface support. Some of these are in the form of a library (such as the MySQL C API library) while others are in the form of a driver (such as the ODBC driver). For most people/situations – the choice of whic
Introducing IBM Workplace Services Express
(Ellen Tiberi) IBM Workplace Services Express is collaborative software that facilitates communication among team members, allowing them to work together more efficiently to achieve their project and business goals. By accessing the same collaborative portal interface, users can access their applica
SQL Express SP2 and Windows Vista UAC
(Mike) Now that SQL Server 2005 SP2 has been released I thought I should make good on my promise to explain more about how we handle Windows Vista User Access Control in SQL Express SP2. I explained earlier that UAC works by removing the administrator ACEs from your User Token when you are a member
Developers, Arm Yourselves Against Hackers
(Shari L. Gould) Hackers recognize that security vendors have provided companies with an arsenal of products to secure their networks, so they’ve moved on to their next challenge, attacking applications. Even respected analyst groups claim that 75 percent of attacks happen at the application level.
When EXPLAIN can be misleading
(Peter Zaitsev) One think I can see with people using EXPLAIN is trusting it too much, ie assuming if number of rows is reported by EXPLAIN is large query must be inefficient. It may not be the case.
How to get line number for a node in XSLT
(Oleg Tkachenko) It’s surprisingly easy in .NET 2.0. Obviously it can’t be done with pure XSLT, but an extension function returning line number for a node takes literally two lines. The trick is to use XPathDocument, not XmlDocument to store source XML to be transformed.
Learn PL/SQL: Procedures and Functions
(Lewis Cunningham) This is part of an ongoing series on learning PL/SQL. If you are new to PL/SQL, you should check out the article Index.
