By Darryl K. Taft – Microsoft Corp. might be looking to acquire technology to boost its Web services management capabilities. According to published reports, Microsoft chief executive Steve Ballmer advised interested parties “stand by for news” about a possible acquisition in the area of deve
Author: SSWUG Research
Working with Developers and SQL Server
Learn best practices for collaborating with developers to set up development, test, and production environments; streamline processes; work with source control; secure applications; and more.
DB2 and the Need for Speed
(.PDF by Joel Goldstein – requires the free Adobe Acrobat Reader) – Simply stated, DB2 response time is never fast enough unless it’s sub-second. IBM has said that productivity improves by 100% when improving response time from 2 seconds to less than one second. Joel’s presentation reviews what yo
Oracle Label Security, Part 3: Administration
By Jim Czuprynski – Oracle Label Security (OLS) offers a powerful implementation of row-based security that is perfect for restricting user access to specific data, especially in a data mart or data warehousing environment. Previous articles presented a brief overview of how these features work, and
IBM, Adobe Announce Extended Partnership
By Dennis Callaghan – The deal calls for the two companies to further integrate Adobe’s technologies across IBM’s software offerings, beginning with IBM’s DB2 Content Manager and DB2 CommonStore for SAP, and moving to integration with IBM’s WebSphere and Tivoli software brands, officials said.
Oracle extends 8i support
By Mark Street – Oracle has again extended maintenance support for customers of its 8i database on many major platforms, this time until 2005, giving firms another year to migrate to 9i or 10g.
Smart Wells and Smarter Databases
By Joe Lumbley – Telegnomic uses Informix Dynamic Server and DataBlades to pump intelligence from reservoirs of information.
IBM Encryption for IMS and DB2 Databases
IBM Data Encryption for IMS and DB2 Databases provides you with a tool for both IMS and DB2 in a single product, enabling you to protect your sensitive and private data for IMS at the segment level and for DB2 at the table level. IBM Data Encryption for IMS and DB2 Databases is implemented using sta
Think Differently About Set Relationships and Member Properties
SQL Server Magazine columnist Itzik Ben-Gan shows you a few tricks for set-based analysis of data relationships using the NOT EXISTS() predicate.
Import text files script
This process will import text files that arrive in a directory into a table. It will process every file in the directory with the correct filemask and move the file to an archive directory on completion. It can be used in conjunction with an ftpget SP to import files from a ftp server (see ftp).
