(Jon Galloway) Ever run into problems connecting to a database using Windows Authentication when you’re not on that domain? I sure have – I was connecting over VPN, wanting to use SQL Server Management Studio, but my VPN account wasn’t in the correct domain to authenticate. I ended up just using Rem
Other News
Information Schema and SQL Server 2005
(Uday Denduluri) Information Schema is the part of the SQL-92 standard which exposes the metadata of the database. In SQL server a set of views are created in each of the database which exposes the metadata of the database. The information schema is kept in a separate schema – information schema – w
DB2 LUW Performance: Bufferpool Hit Ratios and Folly
(Scott Hayes) It’s difficult to talk about DB2 performance and not have the subject of Bufferpool Hit Ratios come up. It’s as if high bufferpool hit ratios are somehow capable of saving the planet from global warming. Yes, bufferpool performance is relevant, but we need to evaluate these with a dose
SQL Server Merge Replication, SQL Server Maintenance and More
Featured Article(s) Tips for using SQL Server 2005 Merge Replication (Part 4) Here are some helpful tips to performance tune and optimize SQL Server 2005 Merge Replication. Looking for the Best SQL Server Technical Conference Going? Check out SQL Connections. We’ll be there with our SSWUG track, and you’ll find technical tracks on everything from administration to new features in […]
SQL Server Merge Replication, SQL Server 2008, DMVs and More
Featured Article(s) Tips for using SQL Server 2005 Merge Replication (Part 3) Here are some helpful tips to performance tune and optimize SQL Server 2005 Merge Replication. Tweaking for High Transaction Loads When it comes to updating your storage subsystem for use with a high transaction load type implementation, you know that getting information can get pretty confusing. I know […]
Beautify Your Code With Extensions
(Bill McCarthy) Extension methods are a new language feature that will become available with Visual Basic 9.0 (VB Orcas).
Keyed Anonymous Types in VB9
(Paul Kimmel) Anonymous types use the Dim keyword but do not include a formal type—that you code—in the initialization statement. That is, the New keyword is used but there’s no class name. These are not invariant types; these are strong types but the class is code-generated by the compiler and emit
Extended XQuery for SOA
(Dino Fancellu and Edmund Gimzewski) In a services-oriented architecture (SOA), a business process is implemented as a web service that programs (orchestrates in SOA terminology) other web services. An orchestrator web service is usually coded in a language outside the XML domain (e.g., Java), and i
Understanding Inheritance in Java
(Cay S. Horstmann and Gary Cornell) Chapter 4 introduced you to classes and objects. In this chapter, you learn about inheritance, another fundamental concept of object-oriented programming. The idea behind inheritance is that you can create new classes that are built on existing classes. When you i
Wrap and compile in one step
(Tyler Muth) The PL/SQL wrap utility is a great way to obfuscate code that you do not want anyone to view. Typically this is used for security functions Virtual Private Database and Fine Grained Auditing policies, encryption and hashing functions, and authentication and authorization procedures. The
