Author: SSWUG Research

Community

Understanding SQL Injection

(Hardik Shah) A technique often employed by malicious users for gaining illegal access to remote machines, through the web applications’ vulnerability, is SQL injection. The basic idea behind this technique is to run the SQL query, something not intended by the programmer. SQL injection relies heavi

Community

Why should I create an index?

(Conor) There are many cases where the database administrator does not control the queries being submitted of the system. As a result, the physical database design is often not tuned as well as it could be. In a number of actual customer cases where we investigated performance issues with them, we

Community

XML and Web services: SOAP

(William Brogden) Early experiments with XML-based messaging using XML-RPC encouraged the development of an extension called SOAP. In the initial submission to the W3C, SOAP was said to stand for Simple Object Access Protocol. Many people have pointed out that SOAP is not particularly simple and doe

Community

Data Modeling, RDF, and OWL

(David C. Hays) Everyone knows that we are drowning in information, both from the databases in our companies as well as from the world-wide web, the media, and life in general. The information technology industry has been wrestling with this problem for years, and one is entitled to wonder if thing

Community

More on when to rebind in Version 8

(Willie Favero) Today’s post is inspired by Rick’s comment to my Saturday, April 1st entry that discussed “One more reason to bind after migrating to DB2 V8”. Rick asked what other optimizer enhancements would be available in new function mode (NFM) if a plan or package was already bound while in co