(Marcin Policht) In our most recent article covering security-related features introduced in the SQL Server 2005 Integration Services, we mentioned that, in addition to restricting access when saving or running packages, it is also possible to detect unauthorized changes to their content and prevent
Author: SSWUG Research
Exploiting the WebSphere Application Server V6.1 portlet container: Part 2: Going beyond the basics
(Stephan Hesmer and Birga Rick) This article series examines the JSR 168 portlet container available in IBM WebSphere Application Server V6.1 and differentiates its use from WebSphere Portal. Part 1 introduced the portlet container, including how to install a portlet, how to access the portlet, a
FIX: The SQL Server process may end unexpectedly when you turn on trace flag -T1204 and a profiler trace is capturing the Lock:DeadLock Chain event in SQL Server 2000 SP4
A computer that is running the Microsoft SQL Server 2000 SP4 may unexpectedly end the SQL Server process and you may receive the following message in the SQL Server log: Date/Time spid4 SqlSecurityHandler is invoked. Server is terminating.
Asked & Answered
(Roger Miller) We require the ability to provide DBAs access to a database in RW or RO mode for maintenance purposes while leaving it unavailable to the end users (applications). The UT mode doesn’t allow us to perform the maintenance we require.
The Semantic Web Revisited
(Nigel Shadbolt, Wendy Hall and Tim Berners-Lee) In the 50 years since the term AI was coined at the Dartmouth Conference, the digital world has evolved at a prodigious rate. It has produced an information infrastructure that few would have anticipated—with the possible exception of Vannevar Bush, a
The Java XPath API
(Elliotte Rusty Harold) XPath expressions are much easier to write than detailed Document Object Model (DOM) navigation code. When you need to extract information from an XML document, the quickest and simplest way is to embed an XPath expression inside your Java program. Java 5 introduces the javax
Building control in Visual Studio 2005 with XML as data source
(Michael Livshitz) The most part of the questions, which I have been asked when the article “Building the Address control”(part 1 , part 2 , part 3) has been published, I can formulate as follows: how a control can be built in Visual Studio 2005 and how can be used XML as data source. In this artic
Tracing the Sessions(s) of a Given User
(Bruno Vroman) In a case where you cannot (because you don’t have enough time, for example) query V$SESSION to initiate a trace for the session, and you have to trace a "fast" user session, (for example, initiated by clicking on a button on the GUI of an application), this code traces the session(s)
Case sensitive text searches in Sql Server 2000
(Abey George) The default installation of Sql Server is case insensitive, means HEllO is same as hello. It does not differentiate between Upper and Lower case letters. Case sensitive searches is useful while doing password comparisons. People have a habit of using combination of upper and lower case
Adding time calculations to Analysis Services 2005 cubes
(Baya Pavliashvili) Using Microsoft Analysis Services (MSAS) 2005, you can design a basic cube with relative ease by defining the data source(s) and data source views, then adding dimension and fact tables. Once basic structures like dimensions, facts and measures are in place, you may want to exten
