(M. David Peterson) A while back, Abel Braaksma posted a request to XSL-List for interesting use-cases/implementations in which XSLT 2.0 played a role. While I am still working on optimizing things a bit, one of the pains I’ve been dealing with as part of the nuXleus project is attempting to keep th
Other News
Record Versioning with SQL Server
(Ben Allfree) Maintaining a version history of SQL Server data has many benefits, but the top three are: –Undo history –Auditing –Soft delete
Diagnose and resolve lock problems with DB2 for Linux, UNIX, and Windows
(Bill Wilkins and Yasir Warraich) This article discusses lock waits, deadlocks, and escalations, and tells you how to monitor them, and what to do about them using DB2 for Linux, UNIX, and Windows. Sample monitoring scripts are included.
Understanding DB2 9 Security
(James F. Koopmann) A book for anyone that wants to learn about DB2 security: Understanding DB2 9 Security by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Pop Rivett and the Uncontrolled Release
(Pop Rivett) Pop Rivett gazed reproachfully at Clarke Minor. ‘I ended up teaching Needlework to the infants today dy’ know, Clarke Minor. Dashed embarrassing for a Technology teacher, what, given that it is not really my subject’
Oracle RAC Administration – Part 15: Connection Load Balancing and FAN
(Tarry Singh) In our last article, we looked at the service architecture. We will continue our quest to understand the workload characteristics and the load balancing connections in our Virtualized RAC.
An Overview of Cryptographic Systems and Encrypting Database Data
(Erich Peterson and Siqing Li) As the attacks in which hackers use become more and more sophisticated, and the programs in which they attack become increasingly complex, encryption is becoming the last line of defense in database management system (DBMS) security. Since Microsoft announced their Tru
Running totals in SQL Server queries
(Arthur Fuller) You’re tasked with creating a SQL Server query containing running totals based on the moment of the event. The classic example is a bank account.
Understanding the Falcon Transaction Storage Engine – Part 2
(Robin Schumacher) In Part 1 of this article series, we looked at how the Falcon transactional storage engine was architected and how it compared to some of the other MySQL storage engines. In this article, I’ll focus on how Falcon performs transaction management, including some special points on wh
Normalization
Normalization is a design technique that is widely used as a guide in designing relational databases. Normalization is essentially a two step process that puts data into tabular form by removing repeating groups and then removes duplicated data from the relational tables.
