(Robin Hohman) “There’s a tendency to think of the community as being entirely volunteers somehow working for free in their basements, but invariably they’re in government or research,” said Red Hat’s Rick Carr. “For the commercial products, such as Red Hat Enterprise Linux, where the customer base
Author: SSWUG Research
The VB.NET-MySQL Tutorial – Part 6
In the fourth article of our series, we covered basic data binding and used it to populate our VB.NET 2005 form with data from our MySQL database. While this worked well to move data from a table to a control on our form, it lacked the versatility needed to allow for blank status messages and custom
How to create and use Master Pages in ASP.NET 2.0
(Pankaj Gupta) A Master Page enables you to store the same content among multiple content pages in a website. You can use Master Page to create a common page layout. For example, if you want all the pages in your website to share a three-column layout, you can create once in a Master Page and apply
Using Enterprise Library in ASP.NET 2.0 Partial Trust Mode
(Alex Homer) Although originally envisaged as a product for use in Windows Forms (executable) applications, Enterprise Library is proving popular with Web application developers as well. For example, the Data Access Application Block, the Cryptography Application Block, the Exception Handling Applic
Accessing and Updating Data in ASP.NET 2.0: Creating Custom Parameter Controls
(Scott Mitchell) As discussed in previous installments of this article series, ASP.NET 2.0 ships with a number of built-in data source controls that can be used to programmatically access data (the SqlDataSource, ObjectDataSource, XmlDataSource, and so on). The SqlDataSource and ObjectDataSource com
WebSphere for Linux on IBM System z: Frequently asked technical questions
(Steve Wehr) This article offers answers to questions not covered anywhere else to help you develop and deploy WebSphere for Linux on System z applications, including updates for the current product versions as of 2006 October. These technical questions and answers address 64-bit Linux distributions
Pro PHP Security / Preventing SQL Injection
(Chris Snyder and Michael Southwell) PHP is an extremely powerful yet easy-to-learn scripting language, affording even relatively inexperienced programmers the opportunity to create complex, dynamic websites. It is, however, notoriously difficult to ensure privacy and security of internet services.
Developing a SSIS Package
(karun123) This article describes how to configure and create expressions in SQL Server 2005 Integration Services (SSIS).
Implement user exit routines in IBM DB2 Content Manager Version 8.3
(Nick Dhupia, Robert Duncan and Michael Hellinger) IBM DB2 Content Manager Version 8.3 provides workflow capabilities that provide native document routing in a content management environment. Such workflows can be used in long lasting processes such as mortgage loan applications or insurance claims
SQL Server Security – Objects (Securables)
(Buck Woody) I’m continuing our discussion of SQL Server Security in this series , where I’ve already described security in general, on the specific platform, as well as a graphical step-by-step tutorial on how to create users and groups of users called “roles” in the last tutorial.
