(Tieu Luu) Because these security requirements are not as apparent when thinking about Web services security, they tend to get built in as an afterthought without as much design and consideration as is necessary. This article describes some of the important security requirements that need to be cons
Other News
Behavior Changes to Database Engine Features in SQL Server 2005
This topic describes the changes in behavior of some Database Engine features in Microsoft SQL Server 2005 from their behavior in earlier versions of SQL Server.
Displaying single table database hierarchy with DataSet and DataRelations
(Jigar Desai) Hierarchies can be difficult to store SQL tables and even more difficult to query and display. This example will show you how you can use DataRelation to convert single table hierarchy in to nested XML and then use XSLT to transform it to nested list.
IBM makes $1 billion software investment in Information Management
(Chris Eaton) you follow industry news articles, you may have already seen the press on the latest announcement from IBM. Today IBM announced that it will be investing $1 billion to expand its information management software development. As well IBM is dedicating 15,000 practitioners (and growing t
Validation Controls in ASP.NET
In this short tutorial, we will consider the following controls in ASP.Net: · RequiredFieldValidator; · CompareValidator; · RangeValidator; and · Validation summary.
Introduction to Data Mining
Nagendra Rao) Data Mining is an analytic process designed to explore data (usually large amounts of data – typically business or market related) in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to
VSAM Demystified
(Craig S Mullins) VSAM is used “under the covers” of every DB2 page set. VSAM is also used as the storage mechanism by some IMS databases. It is also used to store a lot of mainframe data outside the control of any DBMS. But there is a lot of confusion about what exactly VSAM is, how it can be used,
Case Study of Building a Data Warehouse with Analysis Services (Part Two)
(Baya Pavliashvili) The first article in this series introduced you to steps involved in building a data warehouse. It also presented an example scenario of solving business problems with a data warehouse. This article continues exploring challenges involved in building and maintaining a warehousing
You will be integrated (when you’re ready): Oracle
(David Braue) Consolidation of Oracle’s business applications into a single code base has passed the halfway mark, but the company’s customers won’t be forced into an upgrade before they’re ready, Oracle executives promised an attentive crowd of more than 400 primarily JD Edwards users at this week’
Developing with Apache Derby — Hitting the Trifecta: Introduction to Apache Derby
(Robert Brunner) This article is the first in a new series, “Developing with Apache Derby — Hitting the Trifecta,” which is devoted to exploring the software technology developed by the Apache Derby project. The software released by the Apache Derby project is an open source database system based o
