(R. Rajugan, Tharam S. Dillon, Elizabeth Chang and Ling Feng) In data engineering, view formalisms are used to provide flexibility to users and user applications by allowing them to extract and elaborate data from the stored data sources. Conversely, since the introduction of EXtensible Markup Langu
Other News
XML Document: Dissection
Excuse the unpleasant title of this XML lesson, but the name is suited for what we are about to do. In this lesson we will be taking apart and analyzing each part of an XML document. Consider this an overview of the XML document and do not be unsettled if you don’t understand all that is discussed i
Eclipse jumps on the Ajax bandwagon
(Rich Seeley) Ajax was the talk of last year’s Eclipse Foundation annual conference, but at EclipseCon 2007 in Santa Clara, Calif., the promoters of the popular open source IDE plan to show that they are now walking the walk. (R)
IBM OmniFind Enterprise Edition Version 8.4: Configuration and Implementation Scenarios
(Nagraj Alur, Mario Deschatelets, Ashish Jain, Sreeram Potukuchi, Wojciech Radzikowski and Filip Zawadiak) This redbook will help you to exploit IBM OmniFind Enterprise Edition Version 8.4’s new and powerful search capabilities in intranets, extranets and corporate portals. The new single signon and
You have a DB2 license but you don’t have a current Diagnosis Guide and Reference. Now what?
(Willie Favero) What’s the deal? You have a DB2 license so you should have the license materials, right? Well, actually you do have the license doc, you just don’t have up to date documentation. It seems that getting the current documentation has turned into a real challenge. The lab realizes your f
Design Patterns for ASP.NET Developers, Part 2: Custom Controller Patterns
(Alex Homer) As you saw in the first article in this series, ASP.NET automatically implements the Model-View-Presenter (MVP) pattern when you use the built-in “code-behind” approach. However other patterns, usually referred to as “controller patterns,” are also suitable for use in ASP.NET. These pat
Policy Injection Application Block Sample – Enterprise Library 3.0 Coolness
(David Hayden) If you haven’t downloaded the Enterprise Library 3.0 February 2007 CTP, I highly recommend downloading it. It is a pretty significant release for a few reasons: –It is the last CTP before RTM –All the blocks are Release Candidates except for the Policy Injection Application Blo
DB2 9 Application Development exam 733 prep, Part 6: .NET programming
(Peter He) Learn about writing .NET applications that interface with IBM DB2. Get an introduction to the ADO.NET object model and see how to execute SQL statements with ADO.NET. This is the sixth in a series of nine tutorials that you can use to help prepare for the IBM DB2 9 Family Application Deve
Hashing Credit Card Numbers: Unsafe Application Practices
Cryptographic hash functions seem to be an ideal method for protecting and securely storing credit card numbers in ecommerce and payment applications [1]. A hash function generates a secure, one-way digital fingerprint that is irreversible and meets frequent business requirements for searching and
FIX: The operation may take longer than you expect when you run a warm query to obtain information from the Microsoft Search service in SQL Server 2005
In Microsoft SQL Server 2005, you run a warm query to obtain information from the Microsoft Search service. When you do this, the operation may take longer than you expect, and you may notice increased CPU usage. This problem occurs if the query is designed to perform a full-text search.
