Earlier I posted about using cipher references to refer to data stored in the same document. Today I’ll use the same technique, but instead of storing the encrypted data elsewhere in the document, I’m going to store it on a seperate server. Of course, I’ll be using the familiar order.xml sample to w
Author: SSWUG Research
MSDE With SQL Web Data Administrator : Authentication
(Scott) Security in computer software applications allows you to control the answer to two critical questions. Who will you grant access to? What operations will you allow them to perform? The first step in answering these questions is determining the identity of the person trying to access the data
Oracle9i Analytic SQL Features, Part 3
(Brad Cowdrey) This article will take an in depth look at the GROUPING SETS and composite columns through examples including syntax and behavior. In addition, this article will build on the information and examples from the previous articles in the series. All of the examples run off of a base t
JDeveloper Comes of Age: Visual and Declarative J2EE Development in 10g
(Torsten Winterberg and Stefan Scheidt) Oracle JDeveloper has gone through an amazing evolution over the past few years. While older versions were a little bumpy at times, Oracle JDeveloper 10g offers an integrated development environment with substantial features—including modeling, coding, debuggi
Communicating with the Database (Using ADO)
(Chaudhary Pradeep K. Roy) ADO provides developers with a powerful, logical object model for programmatically accessing, editing, and updating data from a wide variety of data sources. Its primary benefits are ease of use, high speed, low memory overhead, and a small disk footprint.
Structured Exception Handling in Visual Studio .NET
(Peter G. Aitken) For programmers, exceptions—that’s just a fancy name for run-time errors—are a fact of life. Good programming practices can minimize exceptions, but it is impossible to prevent them altogether. Many of the causes, such as network errors or incorrectly set file permissions, are beyo
Discover the flexibility of Schematron abstract patterns
(Uche Ogbuji) If you have the basics of an XML format in mind, but know that you will not be able to get everyone at the table to agree to every detail of the schema, consider Schematron abstract patterns. Schematron is probably the most powerful XML schema language available (and it can be much mor
Network Address and Network Port for AS/400 Connections
This articles explains how to determine the Network Address and Network Port number for the following data providers with an AS/400 over TCP/IP: Microsoft OLE DB Provider for AS/400 and VSAMMicrosoft OLE DB Provider for DB2Microsoft ODBC Driver for DB2.
WS-Security Protocol with .NET – A Overview
(Mahesha Channabasappa) WS-Security is a security mechanism for web services coined by IBM, Microsoft and VeriSign. WS-Security introduces the concept of security tokens. These XML-based tokens contain claims about the sender of a SOAP message, and can include data sufficient to prove these claims.
RDF Triples in XML
(Jeremy J. Carroll and Patrick Stickler) It is well known that RDF/XML presents problems. A cursory search with Google reveals half-a-dozen suggestions for alternative XML syntaxes for RDF. This paper presents another, which is called TriX. Distinctively we select the simplicity of N-triples