(John Charles Olamendy) An increasing number of applications require access to multiple databases located at different sites, perhaps widely separated geographically.
Other News
Reorganize permissions in SQL Server 2005 step by step
(Michelle Gutzait) You read many articles and best practice documents about SQL Server security. Life would be easy if you already had security standards and everything was planned out ahead of time. But your reality might be different. You probably inherited SQL Server 2000 and SQL Server 2005 envi
Mock Interview, Part II. The Technical Interview
SQLonCall Mock Interview, Part II. The Technical Interview: Go through the interview process, questions, answers and interpreting the responses. Learn About Questions, Answers and Tips for a Great Experience. > Watch the show here Also, don’t miss: Watch: Microsoft’s Matt Nunn on SQL Server, Visual Studio, features, roles and disciplines. Watch: Handling a DBA interview. A Mock interview with questions, […]
SQLonCall: Mock Interview, Part II. The Technical Interview: Go through the interview process, questions, answers and interpreting the responses.
Pro-Center Video Programming for IT Professionals
Continuing the Exposed Server Debate
Virtual Conference Update We’ve started posting our first pass at sessions – take a look! If you’d like to be involved in reviewing and commenting on the sessions and other aspects of the virtual conference, get signed up today and we’ll be sure you’re included. Remember, 3 days of outstanding content, from your computer – NO travel, NO out of […]
The Difference Between CSS and XSLT
(Jennifer Kyrnin) Cascading Style Sheets or CSS were developed a few years ago to define the look and feel of markup languages. Extensible Style Sheet Language for Transformations or XSLT were created to transform documents. They are both style sheets, but they serve vastly different purposes.
Introducing E4X
(Kurt Cagle) ECMAscript for XML (more colloquially known as E4X) has had comparatively limited success of adoption in the face of the power of JSON, I suspect partially because of a general ambivalence that the JavaScript community has towards working with XML, but more so because there is comparati
The Time Has Come for Database Security
(Rani Osnat) Although databases have been around for a long time, it is only in recent years that particular attention is paid to database security, and even so, this has been progressing slowly. Driven mostly by the need for regulatory compliance with Sarbanes-Oxley and other legal and regulatory r
Scheduling Jobs in the Database
(Jeyarani Venkatasamy) Operating systems such as UNIX/Windows provide a facility called a cron program, which is used to execute certain tasks at specified times and/or repeated at regular intervals at the operating system level. This facility is very useful to run commands on a regularly scheduled
Linked List Application – The MRU List
(Jim Mischel) One of the truisms of search is that if you search for something once, you’re likely to search for it again. In addition, some things are searched for much more often than others. It makes sense, then to cache the results for the most common searches so that you don’t have to query the
