(Tim Chapman) Administering SQL Server 2005 is no easy task. Here are examples of a number of SQL Server options that DBAs can set to enable different functionality by the database engine. Even though you may rarely (or ever) need to change these options, it’s useful to know how if the occasion aris
Other News
Skipping Locked Rows [DB2 9 for z/OS]
(Craig Mullins) In DB2 9 it is possible for a transaction to skip over rows that are locked. This can be accomplished by means of the SKIP LOCKED DATA option within your SQL statement(s). SKIP LOCKED DATA can be specified in SELECT, SELECT INTO, and PREPARE, as well as searched UPDATE and DELETE sta
How to Use Oracle (25) – understanding deadlocks
(Dratz) A client site has discovered some deadlock issues and I thought this would be a good time to talk to you about what deadlocks are, why they exist, and what you can do about them.
Database threats include unruly insiders
(Kevin Beaver) Ask just about anyone in IT management what they believe is a greater threat to database security — employees and contractors or external hackers — and you’re almost guaranteed to hear, “The bad guy outsiders, of course!” Sure, a lot of people still quote the “80% of all attacks com
FIX: A deadlock occurs when the scheduled SQL Server Agent job that you add or that you update is running in SQL Server 2000
Consider the following scenario. In Microsoft SQL Server 2000, you add a SQL Server Agent job, or you update a SQL Server Agent job. At the same time, another connection tries to delete a SQL Server Agent job. In this scenario, a deadlock occurs when the scheduled SQL Server Agent job that you add o
Rich Validation functionality in Oracle ADF Faces 11g Rich Components
(Lucas Jellema) In preparing for my ODTUG 2007 presentation on AJAX in ADF Faces, I decided to play a little with JDeveloper 11g Technology Preview, to have an interesting demo in order to go out with a bang. I was happily surprised with some of the functionality I accidentally stumbled into while t
Service Update now available for DB2 for z/OS Version 8
(Willie Favero) Here’s something that could make the process of upgrading to DB2 for z/OS Version 8 just a bit easier.
Build BPM applications using FileNet, Part 1: A guided tour to content and process modeling with the FileNet P8 platform
(LaiFeng Zhang, Wei Liao and Ning Wang) This is the first of a series of three articles introducing you to the process of building Business Process Management (BPM) applications using the IBM FileNet P8 platform and the Business Process Framework (BPF). Taking a fictitious trading company called XYZ
Using Relevance Rankings for Full Text and Boolean Searches with MySQL
(Alejandro Gervasio) If you’re a web developer who is searching for a step-by-step guide on how to quickly implement full text and Boolean searches with MySQL, then look no further. This group of articles might be what you need. Welcome to the second tutorial of the series that began with “Performin
The Concordia Project and XML security interoperability
(Ed Tittel) Those already familiar with XML security standards, especially those that relate to identity presentation and management, also know that this is a fragmented landscape, populated with multiple, formerly unrelated and not always compatible, schemes. Simply put, the Concordia Project seeks
