(Tieu Luu) Because these security requirements are not as apparent when thinking about Web services security, they tend to get built in as an afterthought without as much design and consideration as is necessary. This article describes some of the important security requirements that need to be cons
Author: SSWUG Research
Visual Basic 2005 and MySQL 5 Developer Notes – Part Two
(Mike Hillyer) In my last article I covered the schema that I would be using for this application, and in this article I will cover some of the preparation that I will be performing in VB2005.
OPENROWSET function in SQL Server 2005
(Muthusamy Anantha Kumar) Among other enhancements in SQL Server 2005, enhancements were made to the OPENROWSET function. This article illustrates BULK operations of the OPENROWSET function.
FIX: Automatic checkpoints on some SQL Server 2000 databases do not run as expected
Automatic checkpoints on some SQL Server 2000 databases do not run as expected. The automatic checkpoints previously ran as expected. Other SQL Server 2000 databases have no issues.
Standardizing Service Endpoints
(Thomas Erl) More than any prior distributed-computing architecture, service-oriented architecture (SOA) demands a consistent commitment to standardization. The broad scope of SOA transition efforts provides an opportunity to incorporate far-reaching standardization in support of attaining a state o
Encrypting Configuration Information in ASP.NET 2.0 Applications
(Scott Mitchell) When creating ASP.NET 2.0 applications, developers commonly store sensitive configuration information in the Web.config file. The cannonical example is database connection strings, but other sensitive information included in the Web.config file can include SMTP server connection inf
Playing Together Nicely: Getting REST and SOAP to Share Each Other’s Toys
(Jason R. Briggs) It’s tremendously difficult to argue a RESTful approach to a service-oriented architecture (SOA), when the corporate mindshare is SOAP–where project stakeholders tout the SOA buzzword, nod their heads sagely when you say SOAP, nod their heads again when you say XML-RPC, and then l
Best Practices for WebSphere Business Integration Server Foundation for z/OS, V5.1
(Rica Weller, David Bonaccorsi, David J Brett, Steve Matulevich, Carl Parris, Michael M Poirier, Julie Reese and Ken Rogers) This Redpaper will help systems programmers and WebSphere administrators exploit WebSphere Business Integration Server Foundation (WBISF) functions. It covers the functional i
Oracle to buy communications software vendor
(Stephen Lawson) Oracle has agreed to buy HotSip, a vendor of communications software based in Stockholm. The company sees the company as a means of strengthening its hand in telecommunications infrastructure software
Insurance Data Standards—Designing XML Messages
(Tana Sabatino) This is the second in a series of articles that explores the issues regarding the usage of XML to develop data standards in the insurance industry. This article will address how to design XML messages for standards purposes, as well as various approaches for maximizing your implement
