(Jeff Smith) I find that programs that are developed by the same folks that use that program in production are some of the best applications out there. The developer is the user. They have to eat their own dog food – an unpleasant metaphor, but one that’s pretty well understood. Two great examples o
Other News
Cohabitation/Migration ODSEE->OUD: schema checking
(Sylvain Duloutre) By default, OUD schema scheck is stricter than ODSEE. Schema checking is key for data sanity, however this might cause some trouble when “incorrect” data have to be imported into OUD or when incorrect data are replicated from ODSEE.
XML data mining, Part 3: Clustering XML documents for improved data mining
(Laura Irina Rusu) Similar to the task of mining association rules from an XML document, clustering XML documents is different from clustering relational data because of the specific structure of the XML format, its flexibility, and its hierarchical organization. Learn about clustering XML documents
Beyond Role Based Authorization in ASPNET MVC
(Steve Smith) A fairly frequent requirement in applications is to check for authorization to perform an action. At the most basic level, this might just involve seeing if the user is authenticated (at all) or checking a flag to see if they are an Admin.
Data Resource Integration
(Michael H. Brackett) The data resource in most public and private sector organizations is in a state of complete disarray. The data resource does not conform to any consistent organization-wide data architecture. It is seldom maintained by any formal set of concepts, principles, and techniques. It
The .NET Command Pattern, Part 2
(Eric Vogel) Part 1 of this series demonstrated how the Command pattern can be used to handle UI actions in a unified manner. The Command pattern is also very well suited for handling a sequence of actions that can be rolled back. This article will show how to create an undo system for a basic data
DB2 Tech Talk: Technical Tour of DB2 10 and InfoSphere Warehouse 10
Technical tour of the details behind IBM DB2 10 and IBM InfoSphere Warehouse 10 new product releases as announced on April 3rd. We will cover powerful new features such as:
The CL Corner: Using the SQL Select Statement with RUNSQL
(Bruce Vining) Last month, in “Introducing the New Run SQL Command,” we reviewed how you could insert, update, and delete rows/records in a database using the RUNSQL CL command. Today, we’ll look at how the RUNSQL command can be used to query, or select, data from the SAMPLE database we created in t
Geek City: Build a Big Table with a Columnstore Index
(Kalen Delaney) I was looking all over to find a big table to use for my my columnstore examples in my SQL Server 2012 book, and the only one I found was from someone at Microsoft and was not publicly available. When I demonstrate code in my writings, I like to have the code available for anyone to
Using an SSIS Script Component to Import Data to a Wide Table
(Ann Lewkowicz) Wide tables are a feature introduced in SQL Server 2008. Their primary advantage is implied by their name: A wide table can have 30,000 columns, as opposed to the 1,024 columns you can have in a non-wide table.
