(Eddie Awad) Reading through other programmers’ code I often discover interesting things that sometimes I find hard to explain. For example, consider the following simple PL/SQL block:
Other News
Unleashing Oracle Services: A Comprehensive Review of ‘Services’ in Oracle Databases
(Jeremy Paul Schneider) Performance management and high availability have become base requirements for today’s enterprise relational database management systems. In Oracle databases users create “services” to meet these challenges and those services touch almost every aspect of database configuratio
Understanding Transaction in ADO.NET
(Sanjit Sil) A transaction is a set of operations that must either succeed or fail as a unit. The goal of a transaction is to ensure that data is always in a valid, consistent state. For example, consider a transaction that transfers $1000 from account A to account B; clearly there are two transacti
Pop Rivett and the Expanding Log
(Pop Rivett) The phone rings “Aargh! Quick Pop, we need help! The website’s down, we can’t trade, we’re losing business and the browser page shows nothing but some gobbledygook saying ‘Can’t allocate space for object syslogs in database Snibbo because the logsegment is full’. What should I do!?”
AJAX Demystified – Part One – The AJAX Shoutbox
(UsualDosage) AJAX stands for Asynchronous JavaScript and XML, and is one of the fastest growing technologies on the web, leading the charge for the “Web 2.0” generation. While definitely not a “new” technology per se, it’s only recently gained market share with its use by Google, Wikipedia, and num
DB2 and Ruby on Rails, Part 3: Testing with DB2 and Ruby on Rails
(John Chun, Alex Pitigoi, Christine Law and Naomi Ngan) A key requirement in agile application development is incremental integration of the code that ensures regression testing. The Ruby on Rails framework is making all this effort easier than ever. Rails not only has support for unit and functiona
Web services hints and tips: JAX-RPC versus JAX-WS, Part 4
(Russell Butek and Nicholas Gallardo) This fourth part of the series about Java API for XML-based RPC (JAX-RPC) 1.1 and Java API for XML Web Services (JAX-WS) 2.0 compares the dynamic invocation models. This tip walks you through the similarities and describes the major differences, using an example
Should you take DB2 V8 or V9 Exams?
(Susan Visser) Since I volunteer to proctor exams to employees of the Toronto Lab, I quite often get questions about how to get certified. At this point the most common question is whether people who have not received any DB2 certifications, where should they start? Here is the path I recommend.
Shared Servers and Automatic Workarea Management
(Alex Fatkulin) Oracle 10g introduced the ability to run shared server sessions within the workarea_size_policy=auto parameter. However, there is one caveat I would like to point out.
Top 10 Application Security Vulnerabilities in Web.config Files – Part Two – Learn about Authentication and Authorization Application Security Issues
(Bryan Sullivan) Some of the most common and dangerous application security vulnerabilities that exist in ASP.NET Web-based applications come not from the C# or VB.NET code that make up its pages and service methods, but instead from the XML code that makes up its Web.config files. Incorrect configu
