(John Leitch) Many web developers consider security a low priority. Security is frequently relegated to the end of the software development life cycle, as little more than an afterthought. Sometimes, software security is neglected entirely, resulting in applications rife with common vulnerabilities.
Other News
Avoiding ‘no data found’ : Tips
(Advait Deo) Some time we face issue about no data found depending on selection criteria. And when this happens in PLSQL procedure we get annoying error.
RESTful SQL Query Service using XML SQL Utility (XSU) API
(Pas Apicella) A little demo showing how easily we can create a SQL query utility using Oracle’s XML SQL Utility (XSU) within a JAX-RS Web Service. Although basic you can easily create more query parameters to take full advantage of the XML SQL Utility (XSU) API.
Top Five New Features in SQL Server 2011
(Mike Chapple) Microsoft recently released the first Community Technical Preview (CTP) of the newest version of SQL Server, code-named Denali. Three years after the release of SQL Server 2008, this new version of the popular database platform promises several exciting new features.
Optimizing the Shared Pool Reserved Area
(Fahd Mirza) Managing the shared pool is not just about setting the sga_target or memory_target or even shared_pool parameter. More often than not, you see ORA-04031: unable to allocate bytes of shared memory error. It is the indicator that there is space problem with the shared pool. Either the
ASP.NET MVC: Create a Custom ActionResult to return XML
(Malcolm Sheridan) If you’re familiar with ASP.NET MVC, you know how important the ActionResult class is. This class encapsulates the result of an action method and is used to perform a framework-level operation on behalf of the action method.
Recursive CTE execution plan explanation
(Ramireddy) Today, I will explain about internal execution details of recursive CTEs. Recursive CTEs will give the solution to some old age problems, where we can express solutions by writing only recursive solutions. Before SQL 2005, cursors were used to express these types of problems. With the in
DB2 and TSM – How to put them to work together (Part I)
(Norberto) Hi fellows… I have been busy for a couple of weeks, and one of the tasks I dealt with was configuring DB2 to target its backups and log archives to TSM. I then thought it would be nice if I shared the related tips and tricks in my blog. Hope it will be useful.
The DB2Night Show #Z01: The history of DB2 for z/OS
(klaas) In episode #Z01, special guest Roger Miller, IBM DB2 Evangelist, guides us through the history of DB2 for z/OS.
Animation In Visual Basic .NET: Interacting with Objects
(Richard Newcombe) In previous Animation articles we’ve covered many different methods and aspects of the animation. This article looks at interacting with objects on a playing field.
