Other News

Editorials

SQL Server Merge Replication, SQL Server Maintenance and More

Featured Article(s) Tips for using SQL Server 2005 Merge Replication (Part 4) Here are some helpful tips to performance tune and optimize SQL Server 2005 Merge Replication. Looking for the Best SQL Server Technical Conference Going? Check out SQL Connections. We’ll be there with our SSWUG track, and you’ll find technical tracks on everything from administration to new features in […]

Uncategorized

SQL Server Merge Replication, SQL Server 2008, DMVs and More

Featured Article(s) Tips for using SQL Server 2005 Merge Replication (Part 3) Here are some helpful tips to performance tune and optimize SQL Server 2005 Merge Replication. Tweaking for High Transaction Loads When it comes to updating your storage subsystem for use with a high transaction load type implementation, you know that getting information can get pretty confusing. I know […]

Community

Keyed Anonymous Types in VB9

(Paul Kimmel) Anonymous types use the Dim keyword but do not include a formal type—that you code—in the initialization statement. That is, the New keyword is used but there’s no class name. These are not invariant types; these are strong types but the class is code-generated by the compiler and emit

Community

Extended XQuery for SOA

(Dino Fancellu and Edmund Gimzewski) In a services-oriented architecture (SOA), a business process is implemented as a web service that programs (orchestrates in SOA terminology) other web services. An orchestrator web service is usually coded in a language outside the XML domain (e.g., Java), and i

Community

Understanding Inheritance in Java

(Cay S. Horstmann and Gary Cornell) Chapter 4 introduced you to classes and objects. In this chapter, you learn about inheritance, another fundamental concept of object-oriented programming. The idea behind inheritance is that you can create new classes that are built on existing classes. When you i

Community

Wrap and compile in one step

(Tyler Muth) The PL/SQL wrap utility is a great way to obfuscate code that you do not want anyone to view. Typically this is used for security functions Virtual Private Database and Fine Grained Auditing policies, encryption and hashing functions, and authentication and authorization procedures. The