(Kay Lee) With security being the strongest aspect of major development issues, encryption for sensitive data is essential in everyday development. MD5 hashing algorithm is one of the most commonly used algorithms and, mixed with salted hash, is one of the best. Let’s stop fluffing, and get right to
Author: SSWUG Research
Why You Can’t Pass a List to an InterBase SQL Param
(Craig Stuntz) When writing a WHERE clause in your InterBase SQL, it would sometimes be convenient to write WHERE FOO IN (:SomeParam) and pass a list of values to SomeParam. You can’t do that; here’s why. Note: This article applies to InterBase. However, many SQL database servers have a similar
Sample Chapter: Efficient PL/SQL
(Garry Robinson) In this chapter, we discuss PL/SQL efficiency. We have deliberately avoided the term “performance” because efficiency is more than just performance. We’ll define exactly what we mean by “efficient PL/SQL” and explain how to ensure that the PL/SQL you build meets that definition.
Evolutionary Database Design
(Martin Fowler and Pramod Sadalage) In the last few years, we’ve seen the rise of a new breed of software methodologies, the agile methodologies. These make some new and significant demands on database design. One of the most central of these demands is the idea of evolutionary design. On an agi
Application Performance using DBI and mod_perl
A common web application architecture is one or more application servers which handle requests from client browsers by consulting one or more database servers and performing a transform on the data. When an application must consult the database on every request, the interaction with the database
Information Retrieval Optimization in OLTP and OLAP applications
(Syed Hasan Adil) Imagine yourself in front of an exquisite buffet filled with numerous delicacies. Your goal is to try them all out, but you need to decide in which order. What exchange of taste will maximize the overall pleasure? Although much less pleasurable and subjective, this is the kind
A Preview of SQL Server Yukon From a Developer’s Perspective…
(Chris Sully) The intention of this article is to provide a brief overview of the main features of the new version of SQLServer (Yukon) that will be of interest to developers. Note that the information presented is based on the Beta 1 release. This is not available as of the time of writing, and
INF: How to Control a Member’s Unique Name
In Analysis Services a Member’s Unique Name may be different depending on the setting of the MDX Unique Name Style connection string property of the Microsoft OLE DB Provider for OLAP 8.0. This article describes the different formats of the Member’s Unique Name and when you would want to control the
Scanning the network for SQL Server for a range of IP addresses
(Muthusamy Anantha Kumar) In a large IT department, it can be difficult to locate where new SQL Server installations were made and how many of those SQL Servers were patched, etc. This article explains how to scan the entire network for a range of IP addresses to find which boxes have SQL Server
Maintain consistency between the compiled schema and the generated classes
(Olivier Le Diouris) JAX-B is the specification that implements the Java Api for XML Data Binding (JSR 31). It basically allows java programmers to deal with the content of an XML Document, without having to deal with an XML Parser’s Api.