(Chris Eaton) In my last posting I wrote about what happens when one member in the cluster updates a row and commits and how that page is written directly into the global buffer pool of the CF from the member at commit time. But what happens if some other members in the cluster have that page in th
Other News
Creating Remote ColdFusion Component (Web Service) Proxies In Node.js
(Ben Nadel) The other day, I blogged about using the ColdFusion Socket Gateway to communicate between a Node.js (V8) and a ColdFusion (J2EE) application on the same server. I had wanted to use Sockets so that I could use “localhost” and a port number without having to worry about different domain na
Dealing with Ranges of Numbers in C#
(Vulpes) Unlike some other programmimg languages (notably F#), C# doesn’t have any built-in support for dealing with ranges of numbers.
Deleting all Data from a SQL Server Database (Part 2)
(Joe Kunk) In part one of this article , I described a scenario in which I needed to empty all the data from a copy of a large database on a remote server, in order to download a minimal backup and populate it with test data for a demonstration on my laptop in a location without a reliable Internet
MySQL Integer Size Attributes
(Mark Johnson) MySQL has those curious size attributes you can apply to integer data types. For example, when creating a table, you might see:
Implement a custom export plug-in for IBM Content Analytics to emit WebSphere Service Integration Bus events
(Vladislav Ponomarev and Carl Osipov) This article focuses on implementation of a scenario where IBM Content Analytics documents are consumed by an external application. A document is sent in a JMS message to the application, starting a business process, and passing unstructured and structured data
Using the Emergency State for a Corrupt SQL Server Database
(Atif Shehzad) I noticed a new feature that was first introduced in SQL Server 2005, which is the Emergency state for a database. It looks that it may facilitate dealing with a suspect database. How can I use the Emergency state for a database effectively while working with a suspect database?
TOP (10) Bad Things to Do In a Database – Voting Begins
TOP (10) Bad Things to Do In a Database – Voting Begins The TOP (10) list is coming along quite nicely. I’ve been very busy trying to read through all of the submissions for Bad Database Practices and consolidate them into items that are concise, and meaningful. Wow! Open something like that up to 800,000+ readers and you’ve got a […]
Ten Worst Things to do In a Database – Day 4
New Show (and new show format!) SelecTViews – JQuery, Couchbase, Watson and Windows Phone Developer Tools…Also, the IMnsHO for Databases, SSWUG newsletter and events update and much more in our new show format! [Watch the Show] (Let us know what you think of the new format…) Ten Worst Things to do In a Database – Day 4 The list of […]
Parsing XML with LINQ
(Paul Galvin) Here’s a quick example using LINQ to parse some XML and get at the sweet, sweet attributes therein.
