(Ben Nadel) Over the past few months, I have been learning a lot about XML and especially the use of XPath in ColdFusion. As a natural extension of that, I felt it was time to look into some ColdFusion XML Transformation stuff in the form of XSLT. I don’t know anything about it other than I looked a
Other News
Get Started with Silverlight Using Visual Studio 2008 and Expression Blend 2
(Wei-Meng Lee) Over the years, we have all seen the proliferation of Web applications. In the early days, Web sites consisted of sets of static HTML pages, with nice graphics and lots of information. Then, server-side technologies like CGI, ASP, and JSP made Web applications possible and suddenly us
Creating an ASP.NET 2.0 Polling User Control: Creating Administration Web Pages
(Scott Mitchell) The polling User Control examined in the first two installments (Design Decisions and the Data Model and Building the Polling User Control) is functionally complete at this point. A page developer can add, edit, or delete new polls and poll answers by manually inserting, updating, o
Multi-Org Views are dead. Long live Multi-org!
(Andy Noble) Access to org specific data in 11i was enabled by views that included a reference to CLIENT_INFO to limit a query to _ALL tables to only include the current organization in context. However, in Release 12 a single responsibility can now access multiple organizations simultaneously, so h
Oracle Lite, JDeveloper and Invalid Oracle URL specifiedError Code 17067
(Stellan) Oracle Lite and me have never been friends, but I think that I now have finally beaten the ghost. The background is that I simply wanted to use the OLite in order to do some testing, instead of having run to run a full DB, I wanted to use OLite. So far so good.
Cross Site Scripting – The Underestimated Exploit
(Jacques Guillaumier) Cross Site Scripting (or XSS) is one of the most common application-layer web attacks. XSS commonly targets scripts embedded in a page which are executed on the client-side (in the user’s web browser) rather than on the server-side. XSS in itself is a threat which is brought ab
Best-Practice Analytic Architecture to Support Business Strategy
(Glyn Heatley) A primary objective of any analytic architecture is business enablement – the ability to provide business users with access to quality information that can be used to drive decision-making. The analytic architecture, in the simplest terms, helps turn operational data into information
Index Compression with DB2 9 for z/OS
(Paolo Bruni and Jeff Berger) In data warehouse applications, it is common to have many very large indexes defined on large tables. It is also possible that the index spaces exceed the size of the tables upon which the indexes are based. As one way of helping you to manage the cost of ownership, in
MODIFY RECOVERY [DB2 9 for z/OS]
(Craig Mullins) Another IBM DB2 utility that has received some attention under Version 9 is MODIFY RECOVERY. For those not sure what this utility is, MODIFY RECOVERY is used to remove records from the SYSIBM.SYSCOPY table in the DB2 Catalog, along with related log records from the SYSIBM.SYSLGRNX di
Voice enabling XML, Part 2: Develop a voice-enabled calendar
(Martin Brown) In this second article of a four-part series, you learn to develop a voice-enabled calendar. Save the data of the calendar as XML; then to modify calendar entries, have the application read VoiceXML that contains your specified commands. The calendar can also output VoiceXML to speak
