(Tibor Jager and Juraj Somorovsky) XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It is employed in a large number of major webbased applications, ranging from business co
Other News
Using Nightly ASP.NET Web Stack NuGet Packages with VS 2012 RC
(Henrik F Nielsen) In a previous blog we described how to use the nightly ASP.NET Web Stack NuGet packages with VS 2010. This blog describes using these packages with Visual Studio 2012 RC. The same disclaimers apply this time meaning that the packages come with no guarantees and they do not substit
Putting CoffeeScript into XQuery Databases
One of the central challenges that vendors such as MarkLogic face right now is the limited number of XQuery developers currently in the marketplace, to the extent that it is becoming an impediment to adoption of these databases.
Introducing MicroXML, Part 1: Explore the basic principles of MicroXML
(Uche Ogbuji) Parts of the XML community have always grumbled that XML is difficult to understand and process. XML is fundamentally complex, for a variety of historical reasons, and people have proposed simplified versions for over a decade. HTML5 has become a threat to some of XML’s most basic tene
Retrieving User Password and Email Address From Database Using C#
(Rohatash Kumar) Today, I have provided an article showing you how to retrieve a user’s password and email address from a database in ASP.NET. In this article, we will use a TextBox control, two Buttons named Retrievepass and RetrieveEmail and a Label control.
Improve performance and reduce costs for DB2 for Linux, UNIX, and Windows with InfoSphere Optim
(Thuan Bui) Learn how the staff at a fictional organization uses various InfoSphere Optim tools that are included in the DB2 Advanced Enterprise Server Edition to gain more value from their business-critical applications.
Now available… for free: DB2 10 for Linux, UNIX, Windows New Features eFlashbook
(Susan Visser) Last week at the IDUG Conference, we handed out 250 copies of this new Flashbook to attendees. It was fun & exciting. Here’s a photo:
Index Range Scan and db file scattered read as session wait event
(Anand) I was asked to check a session which was running for more than expected time on 11.2.0.3 single instance database.The session was running a simple select statement
Google-like Search and LOVs using Oracle Text and ViewCriteria
(Paco van der Linden) Do you know the Google Advanced Search page? Very few people have ever seen the page, let alone used it. Now, why is that? It is simply because the “normal” single-field quick-search (that what we normally just call Google) is so incredibly effective.
Proactively Monitoring JDeveloper 11g IDE Heap Memory
(Andrejus Baranovskis) There is possibility to monitor during runtime consumed heap and permgen memory by JDeveloper IDE process. It will show consumed memory, also allows to force garbage collection. This can be extremely useful when running JDev on less powerful hardware – developer could force ga
