(Penny Scharfman) Collaboration technology has evolved to mean more than just email. Organizations are looking for sophisticated, flexible collaboration solutions to address the business objectives of a wide variety of corporate communities, including users, IT administrators, application develope
Author: SSWUG Research
A .NET Framework Text and Font Primer
(Peter Aitken) Almost any application you write has to display text in some form or another. The .NET Framework provides the developer with a full set of tools for displaying text onscreen and also sending it to the printer. This article takes a look at these tools and how to use them. It also gives
Using Stored Procedures in Database Interaction
(Jim Keogh) Throughout this chapter you learned how to create simple queries to perform operations that are common to commercial web sites. These queries are created in the event handler in your web page and are sent to the DBMS for processing.
Creating a Stored Procedure or Function in an Oracle Database
A stored procedure or function can be created with no parameters, IN parameters, OUT parameters, or IN/OUT parameters. There can be many parameters per stored procedure or function.
Introducing Oracle (Sample Chapter)
(Rick Greenwald, Robert Stackowiak and Jonathan Stern) Where do we start? One of the problems in comprehending a massive product such as the Oracle database is the difficulty of getting a good sense of how the product works without getting lost in the details of implementing specific solutions. This
Changes in Default AutoPatch Prerequisite Checking Behavior
(Steven Chan) Earlier versions of AutoPatch (adpatch) would automatically check whether the prerequisites for the current patch were installed properly. An important change to the AutoPatch defaults was made in the Applications DBA Minipack 11i.AD.I.2 release: automatic checks for prerequisite pat
Views and SQL Server Performance
(Greg Low) On a recent consulting job, the performance problems that are easy to get into when using SQL Server Views was again made very clear to me.
Code Access Security: When Role-based Security Isn’t Enough
(Robert Bogue) Ask any typical .NET developer about Code Access Security (CAS) and you’ve got the chance of hearing “Huh?” as the response. Most developers haven’t run into CAS at all—let alone in a way that would cause them to develop a deep understanding of it.
Thinking XML: Review of RFC 3470: Guidelines for the use of XML
(Uche Ogbuji) In the last Thinking XML installment “Good advice for creating XML,” I discussed a couple of resources provided by experts looking to advise XML developers. XML was designed specifically for use on the Internet (the Web to be precise), and many Internet protocols use XML to represent d
Security expert calls for Oracle makeover
(Martin Veitch) A UK security expert has called for change in Oracle’s security strategy, including the removal of the firm’s chief security officer.
