(Stephane Faroult and Peter Robson) Any SQL statement that we execute has to examine some amount of data before identifying a result set that must be either returned or changed. The way that we have to attack that data depends on the circumstances and conditions under which we have to fight the batt
Other News
XTree – Part II
(Marc Clifton) In Part I, I introduced the idea of using a template to describe a tree structure. The primary missing feature was automatic instantiation of the backing object for the node. In this update, that issue has been taken care of and a couple additional features have been implemented:
SOA Best Practices – Four Steps to Securing Your Web Services
(Adam Kolawa) Security has the inherent nature of spanning many different layers of a Web Services system. Web Services vulnerabilities can be present in the operating system, the network, the database, the Web server, the application server, the XML parser, the Web Services implementation stack, th
Get More from Your Oracle Database: Best Practice Performance Management for Real Results
DBAs are constantly challenged to increase database performance while keeping costs down. This short paper discusses Resource Mapping Methodology (RMM) which defines a systematic process for performing Wait-Event analysis to optimize database performance. It includes a brief overview of Ignite for O
Security and More in MySQL Databases
(Paul Dubois) Starting from MySQL 4.0.3, we provide better access to a lot of system and connection variables. Many variables can be changed dynamically while the server is running. This allows you to modify server operation without having to stop and restart it.
IBM expands the reach of business intelligence with new search and discovery solution
IBM has announced a solution that combines enterprise search and unstructured information discovery software with advanced reporting and analytics to help clients more quickly find, access and gain insight from business information.
Checking All CheckBoxes in a GridView Using Client-Side Script and a Check All CheckBox
(Scott Mitchell) Last week I authored an article titled Checking All CheckBoxes in a GridView that illustrated how to add functionality to check all CheckBoxes in a GridView at the click of a button. Specifically, the article examined how to accomplish this using both server-side code and client-sid
XML application migration from DB2 8.x to DB2 Viper, Part 3: Sample XML application migration scenario
(Hardeep Singh) In this article you go through an XML application migration process using an example scenario. The scenario goes through the steps of creating a sample application using DB2 UDB Version 8.x functionality for XML. This application then is migrated using DB2 Viper XML capabilities. As
DB2 packages: Concepts, examples, and common problems
(John Chun and Paolo Cirone) Packages in DB2 are control-structure database objects that contain executable forms of SQL statements or placement holders for executable forms. In DB2 for Linux, UNIX, and Windows, packages may also be referred to as access plans. Packages are stored in the database sy
Real-world Reflection in .NET
(Andrew Troelsen) The .NET platform supports a number of seemingly esoteric programming techniques, such as reflection, dynamic loading, late binding, and custom attributes. At first glance these topics may appear to be of little more than academic interest, having little use in the “real world.” Ho
