By Marcin Policht – In the last article of this series, we will focus on Web Services and their implementation in the SQL Server 2000 environment with the help of the SQLXML component. In particular, we will look into a non-programmatic way of publishing SQL Server 2000 stored procedures, user-defin
Author: SSWUG Research
Reseeding identities in SQL Server
by Baya Pavliashvili – Check out this and other tips at SearchDatabase.com.(R)
Reliance On Microsoft Danger To National Security
By Gregg Keizer – A panel of leading security experts Wednesday blasted Microsoft for vulnerabilities in its software, and warned that reliance on the Redmond, Wash.-based developer’s software is a danger to both enterprises and national security.
Performance Considerations for Mining on DB2 Information Integrator for Content
By Rolf Bäurle Peter Gerstl – IBM DB2 Information Integrator for Content provides an information mining service that converts information that is implicit in unstructured documents to valuable metadata. This article gives you an overview of how to optimize information mining for performance.
Oracle sets out grid strategy
By Gareth Morgan – Larry Ellison has claimed that Oracle’s new software will revolutionise the way businesses organise their infrastructure. According to this plan, out goes the big iron and in come low-cost commodity Intel servers and the Oracle enterprise grid.
Oracle’s Richard Sarwal talks servers
Richard Sarwal’s mission is simple: make Oracle the best performing database and the easiest to use. On the eve of Oracle’s latest database release, he explains the vision.
EMC Airs Management Software for SMBs
By Clint Boulton – EMC VisualSRM and EMC VisualSAN Easy improve capacity utilization in addition to making management hands-free by automating tasks, a function that many software makers have been writing into their code to free systems administrators from the chores of manual operation.Spec
Putting a Stop to Database Piracy
(Lisa Vaas) The latest battle in the war against database piracy took place on Capitol Hill on Tuesday, as the Coalition Against Database Piracy testified before a joint House Judiciary and Energy and Commerce Subcommittee hearing on draft legislation to protect against database thievery.
Extreme XML: Revamping the RSS Bandit Application
Dare Obasanjo revisits his RSS Bandit C# application and improves on its previous design by using various XML features of the .NET Framework to build a rich .NET client application.
HTTPS for Implementing Web Services Security
by Jim Clune – Give detailed attention to the server and client configurations for successful deployment of Web services with transport-layer security.
