(Yashwant Shukla) I was working on a Web Application in which client requested to keep backup of the Application DataBase in the Form of Access data in a MDB file for that i tried DTS package but the Database Server for application was kept on remote server where the host was not ready to provide ri
Other News
Security Steps for Strong Authentication
(Sonu Chauhan) Weak authentication increases the identity spoofing threat. If a user’s logon credentials fall into the wrong hands, an attacker can spoof the user’s identity and gain access to the application. The attacker shares all of the user’s privileges in the application. Credentials must be p
Informix OnBar and Tivoli Storage Manager, Part 1: Configure and use IDS/OnBar with Tivoli Storage Manager for powerful backup and restore
(Eric Herber) Relational database servers build the information backbone for many companies today. These companies rely on the smooth operation of their database servers and any outages could have an great impact on their business. Keeping that in mind, backup is one of the most critical aspects for
DB2 SQL Introduction
(Ramesh Krishna Reddy) SQL (structured query language) is used to acccess, manipulate or control the access of rantional database. Databases like DB2, ORACLE, SQL SERVER 2000 support the SQL (Structured query language).
Features and limitations of the .NET Managed Provider for Oracle
This article describes the features and the limitations of the current version of the Microsoft .NET Managed Provider for Oracle.
XHTML-Print leaps to recommendation status
(Ed Tittel) In the late 1980s and early 1990s, when Novell and Microsoft were duking it out for network dominance, Novell’s then-marketing VP Craig Burton said "the great thing about [networking] standards is that there are so many to choose from." Though it was meant half-jokingly, Novell’s tardine
Introduction to Service Broker
(Srinivas Sampath) Service Broker is the new kid in the block in SQL Server 2005. Before we actually delve into the features of Service Broker and write our first program, let us first imagine a scenario where we would want to fit Service Broker and then work off that.
Giving Permissions through Stored Procedures
(Erland Sommarskog) When designing an application for SQL Server, you rarely want users to have full permissions to access the tables in the database. Many applications are designed to perform all database access through stored procedures, and it is through the stored procedures users can access and
Deliver SQL Server Reports To SharePoint To Enhance Team Collaboration
(Ed Hild) Imagine you work for a company that has a critical database application that continually records new incoming information. This database could be storing order information, sales contacts, or just about any other kind of data. Now consider that a group of individuals within your company re
Generating XML Schema Dynamically Using VB.NET 2005: Working With Attributes
(Jagadish Chaterjee) This is the third article in a series concentrating on generating XML Schema dynamically using Visual Basic 2005.
