Four new webcasts are scheduled for January, covering such topics as Microsoft Business Intelligence Solutions, Migrate from Access to SQL Server and more.
Other News
Getting Ready for Vista Development
(Jeff Cogswell) With Vista, the latest version of Windows, arriving, you, as a developer, may be faced with learning a new set of technologies. You’ve probably heard many of the terms and acronyms (Windows Presentation Foundation, WinFX, and all that). But what does it all mean? And what do you need
Integrating IBM DB2 with the IBM System Storage N series
(Alex Osuna, Jawahar Lal and Roger Sanders) This IBM Redbook describes the steps carried out to configure and install an IBM DB2 database in a N series storage system UNIX environment. It particularly elaborates the configuration steps for the UNIX host as well as the IBM N series storage system. Th
mysql cluster
(Jayant Kumar) The NDB mysql cluster is an in-memory storage engine which offers high availability and data-persistence features. Mysql cluster is available with mysql-5.1 and with mysql5.0-max binaries. This can also be compiled after obtaining the source and the binaries can be used.
Basic (X)HTML Structure
(Elizabeth Castro) This chapter covers the most basic (X)HTML elements—the ones you need to create the structure of your document. You’ll learn how to create new paragraphs, headers, page breaks, comments, and more.
User Logon Validation Trigger
(Babu Rangasamy) This trigger verifies whether a user logging into the database is (pre)authorized to connect to the database using the approved client machine, client software, etc.
Build Your Applications with a Solid Foundation—SQL Server 2005
(Ty Anderson) Starting a business isn’t easy. First you have to think of a great idea that the market needs. Next you should probably build a business plan of a certain depth. And although there are several other steps of the accounting and legal nature, you must summon up the courage to leave the s
Combining Structured, Semistructured and Unstructured Data in Business Applications
There is a growing consensus that both semistructured and unstructured data sources contain business-critical information and therefore must be made accessible both for business intelligence (BI) and operational needs.1, 2 It is also clear that the amount of relevant unstructured business data is no
Oracle RAC Administration – Part 12: RAC Essentials
(Tarry Singh) In the year 2006, we looked at the RAC database installations on Windows 2003 Server and Linux (Both RHEL and Centos 4.2). Red Hat will soon be releasing version 5 (based on 2.6.18 kernel) and we will test it against our new Oracle RAC. We will also take an opportunity to test Oracle R
Oracle Applications 11i User Password Weakness
The inherent weakness of the Oracle Applications 11i user password algorithm is a topic that every so often gets some attention. It bubbles up and then is largely forgotten by most. However, the issue doesn’t go away and is very much alive today even in 11.5.10.2. See the references at the end of
