(Jeffrey R. McCormick) Flashback Database is a new approach to point-in-time (PIT) database recovery. This incomplete recovery strategy can be used to recover a database that has been logically corrupted due to human error. Introduced in 10g, it is designed to maximize availability by reducing recov
Author: SSWUG Research
Refactoring MySQL Cursors
(Roland Bouman) Quite a while ago, I wrote a few articles on using MySQL cursors. This time, I will try and shed some light on why cursors are often unnecessary. To illustrate that, I will refactor a typical case of cursor usage.
Multithreading in .NET 2.0: The ThreadPool Class
(Peter Aitken) A couple of years ago, I wrote a multi-threaded graphics application using the .Net Framework version 1.1, which was the latest and greatest at that time. The Framework’s classes made it a breeze to create a multi-threaded app that remained responsive to user input while performing in
Using Introspective Methods with the DirectoryIterator Class in PHP 5
(Alejandro Gervasio) If you’re one of those PHP developers who want to explore the package of classes that come bundled with the Standard PHP Library (SPL), then fear not, because you’re at the right place. Welcome to the concluding part of the series “A Close Look at the DirectoryIterator Class in
Creating Validator Controls for the CheckBox and CheckBoxList
(Scott Mitchell) ASP.NET provides a variety of validation Web controls that can be used to validate a user’s form field inputs. (See Form Validation with ASP.NET – It Doesn’t Get Any Easier! for general information on the validation Web controls and Dissecting Validation Controls in ASP.NET 2.0 for
How to reverse a string in VB.NET
(Irina Medvinskaya) There are situations that require reversing the order of characters in a string. In the Listing A example, I show you how to utilize the Reverse method of an array to reverse the order of characters in a particular string.
Application State Data using XML
(McGahanFL) What follows is a utility that iterates through the controls in a container and saves or restores values for the controls in an XML file. The enclosed namespace captures application data, also known as sticky data or state data. The concept is the same as the now denigrated INI file or W
Use trusted context in DB2 client applications
(Samantha Tran and Manoj Mohan) Learn how to implement trusted context on DB2 in a command line interface (CLI), XA, or Java Database Connectivity (JDBC)-based application. Using a trusted context in an application can improve security by placing accountability at the middle-tier, reducing over gran
DB2 Integration with SQL Server 2005, Part 2: CLR Integration
(Michael Sansoterra) The introduction of SQL Server 2005 has brought some exciting new features for developers. For instance, the ability to integrate heterogeneous systems with SQL Server in real time keeps getting easier. Part I of this series covered the power and ease of using linked servers
XForms tip: Dealing with dates and time with XForms
(Tyler Anderson) Forms often use a date to log the day that a transaction occurred. The time is also useful since it can be used to log when a job was completed, or when something was purchased. This tip shows you how to use the date and time schema types using XForms.
