(Andy Patrizio) Paul Ferguson, a network architect with antivirus vendor Trend Micro, summed up Web 2.0 as thus: “We’re basically training our online users to be exploited.”
Other News
Get RAD with ASP.NET Extensions
(Bill McCarthy) The ASP.NET 3.5 Extensions Preview gives you a first look at some interesting paths ASP.NET might take in the coming year. The download includes the ASP.NET Model-View-Controller (MVC), ASP.NET Dynamic Data and ADO.NET Data Services, as well as additions to AJAX and some Silverlight
Inside ASP.NET AJAX back end services – Services in ASP.NET
(Dino Esposito) In my spare time at conferences and training sessions, I often get asked questions regarding AJAX. Most of the time, these are about the role of partial rendering, tricks to optimize it, and the architectural points it misses out. The remark that sparked off this article regards the
New XSLT stylesheet template in Visual Studio 2008 (again)
(Oleg Tkachenko) When you create new XSLT stylesheet in Visual Studio via project (Add/New Item) or globally (File/New/File aka Ctrl+N), you start with template content. This template is changing in every new Visual Studio version, probably because every new generation of developers working on XSLT
.NET Debugging Demos Lab 2: Crash
(Tess Fernandez) It was nice to see that so many people downloaded the demo site already and checked out the lab instructions for the first lab, and thanks to Pedro for pointing out that the original demo site required .NET Framework 3.5… I’ve changed it now so the one that you can download from t
Announcing the XSLT Profiler Addin for VS 2008
(Irinel Crivat) XML Tools team has released the XSLT Profiler Addin for VS 2008 – a quick and reliable performance analysis profiler tool that assists in the development and debugging of XSLT documents. The XSLT Profiler Addin for VS 2008 allows developers to measure, evaluate, and target performanc
Gleaning Information From Embedded Metadata
(Brian Sletten) One of the fundamental visions of the semantic web is the ability to provide improved technologies for machine-processable data. The current web is a swell place for people, but absent a series of open, global standards for metadata, it is difficult to imagine the interoperability ne
Locking issues
(Radhesh Kumar) Locking issues in a database often lead to finger-pointing between DBAs and Application developers. Application folks will complain that their application is performing poorly because of database locking issues. DBAs will respond that it’s the application design issue that’s causing
Use External Database Access with U2
(Yinghong Fei) External Database Access (EDA) has been created to allow U2 users the flexibility of storing some or all of their data in external relational database management systems (RDBMS). While EDA documentation describes all the EDA features and their usages, the purpose of this article is to
Intelligent Automatic Reoptimization? [DB2 9 for z/OS]
(Craig Mullins) Most seasoned SQL programmers know that when you use host variables, DB2 may not always come up with the absolutely most optimal access path at bind time. Without knowing the actual values of the host variables the optimizer has to make some best guesses as to how best to satisfy the
