(Kevin Beaver) Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the s
Other News
Oracle Pounces on Sleepycat
(John G. Spooner) Oracle has purchased database maker Sleepycat for an undisclosed sum. Database giant Oracle announced the acquisition on Feb. 14, saying it would add Sleepycat’s Berkeley DB to its line of embedded databases.
Work in multiple databases using these methods
(Arthur Fuller) SQL Server developers sometimes have to use tables residing in a database other than a project’s “home” database. This need typically arises when you need to draw information from some other application; for instance, you may want to be able to SELECT from one or more tables residing
IBM DB2 Recovery Expert for Multiplatforms V2 Usage Guide
(Whei-Jen Chen, Hiromichi Shinozaki, Kevin Taylor, Marcia Miskimen and Yasir Warraich) IBM DB2 Recovery Expert for Multiplatforms provides an enhanced data recovery solution that enables more precise recovery operations while reducing disruption during the recovery process. DB2 Recovery Expert creat
Ink And The Database
(Larry O’Brien) Whether it’s full-text search or geometric queries, you’ll have to move beyond BLOBs to get the most from storing Ink in the database. The SQL standard does not provide an Ink storage type, so the question is what shape the underlying database should take to accommodate your needs? T
Backup and restore SQL schemas for DB2 Universal Database
(Serge Rielau) The SQL language provides the concept of a schema to group SQL objects of all kinds together. Schemas can be understood as the SQL equivalent of directories in a file system. DB2 UDB for Linux, UNIX, and Windows traditionally has had strong support for the SQL schema concept, having s
Write Time Zone Aware Code in Oracle
(Natalka Roshak) In our increasingly interconnected world, it’s more and more important for code to be able to handle time zones gracefully. For example, if call centers in Bangalore and London use the same call center application, then the code that writes call logs to the database will have to be
Understanding ASP.NET Provider Model – Part 1
(Bipin Joshi) ASP.NET 2.0 includes host of new features such as Membership, Roles and Profiles. These features are based on the Provider Model. This series of article will demystify the internals of provider model and will illustrate how to create your own custom providers.
Steps for recovering database with RMAN hot backup
(Brian Peasland) I took the RMAN hot backup on database open stage. What steps should I follow to recover the database using the RMAN hot backup? Can I do it in database mount stage or open stage? (R)
Oracle looks to take on Eclipse
(Paul Krill) Oracle has just released a free JDeveloper Java development tool, in an attempt to compete with the open source community Eclipse.
