(Adam Kolawa) Security has the inherent nature of spanning many different layers of a Web Services system. Web Services vulnerabilities can be present in the operating system, the network, the database, the Web server, the application server, the XML parser, the Web Services implementation stack, th
Author: SSWUG Research
Experience the Possibilities with Oracle 10g Express Edition
(Jayaram Krishnaswamy) There are plenty of companies that produce large, expensive database programs with lots of features. But if you’re a small company, you don’t need to spend a lot of money to get a database that suits your needs; in fact, you may not need to spend any money at all. This article
Don’t Retrieve Data When Using Recordset.AddNew
I recently received the following email which brings up a good point for those of you using the Recordset.AddNew method to add new rows to your database tables.
Push Technology – XML In Action
(Jennifer Kyrnin) In order to get information from one source to the consumer, it must be transmitted. In general terms, there can be only two ways to transmit that information – “pull” or “push”.
Integrating WebSphere Partner Gateway V6 and WebSphere Process Server V6 using JMS: Part 1: Overview
(Dave Mulley) This three-part article series uses six case studies to describe the configuration required to integrate IBM WebSphere Partner Gateway and WebSphere Process Server using Java Message Service (JMS). It also discusses the integration options that are available to move documents between W
Building a Leave Application Workflow System using BizTalk Server 2006 and SharePoint Server 2003
(Naveen Karamchetti) This article describes how to design and develop simple workflow systems using BizTalk Server and SharePoint Server. InfoPath is also used for editing XML documents.
More on MySQL 5.1 Partitioning
(Robin Schumacher) In my first article on partitioning, I demonstrated that you can get some pretty impressive performance benefits when you properly design partitioned tables to match the SQL queries that are routinely shot across the bow of your database server. I’d now like to continue in that ve
Extending ASP.NET 2.0 security
(Joel Thoms) The current implementation of ASP.NET 2.0’s security is great and I have fallen in love with it, but it’s still too limited. I will show you how to extend ASP.NET 2.0’s security using a custom HTTP Module and your existing Web.sitemap.
Using ASP.Net Profiles
(Peter Aitken) Many Web sites strive to give their users a personalized experience. The Web site “remembers” each user and provides personalization and/or convenience features that can make the site experience more pleasant. For example, a web portal can present a user-selected array of information,
FIX: Incorrect values may be returned when you use OLE DB Provider for DB2 in Host Integration Server 2004 together with SQL Server
When you use Microsoft OLE DB Provider for DB2 (OLEDB2) in Microsoft Host Integration Server 2004 together with Microsoft SQL Server, incorrect values may be returned. For example, the following SELECT statement may return a value of .0000: SELECT $1.4980 FROM db2.RPUBS.RPUBS.TITLES
