(Willie Favero) I once asked my wife where my glasses were. Her reply: “You’re wearing them”. Am I trying to demonstrate that I’m not all that bright, or perhaps extremely absentminded? No, not exactly. So, why start an entry this way? To illustrate the point that there is so much information out th
Other News
DB2 UDB security, Part 4: Understand how authorities and privileges are implemented in DB2 UDB
(Ted J. Wasserman) A series of articles about IBM DB2 Universal Database for Linux, UNIX, and Windows (DB2 UDB) V8.2 security features would not be complete without a discussion of the different administrative authority levels and privileges. This article is the fourth part of a series that examines
A surrogate key architecture to perform powerful database operations
(Brian Walker) I have written previous articles in support of surrogate keys, but they were mainly rebuttals to ridiculous comments by others. This technical advice feature goes beyond rhetoric and describes a proposed surrogate key architecture. It also provides several T-SQL tools to support the a
Review: Oracle Streams, High Speed Replication and Data Sharing, Part 2
(Lewis R Cunningham) This entry is the second of a two part review of the book Oracle Streams, High Speed Replication and Data Sharing by Madhu Tumma. In the first part, I included the topics covered and the chapter by chapter overview of the preface and chapters 1-3. In this part, I will conclude w
A Low-level Look at ASP.NET Architecture
(Rick Strahl) Understanding how ASP.NET really works under the covers can help you make decisions that can make your ASP.NET applications better. Understanding the innards of a platform always provides me with a certain satisfaction and level of comfort, as well as insight that helps me write better
RACing ahead with Oracle on VMware – Part VI
(Tarry Singh) The year 2005 has been a great year for the IT industry, mainly the Web but for databases too. Oracle had a very busy year with acquisitions and its continued support and contribution to Open Source Community (like membership on Eclipse Board, JDeveloper was released free).
Mask Your Web Server for Enhanced Security
(Joe Lima) Masking or anonymizing a Web server involves removing identifying details that intruders could use to detect your OS and Web server vendor and version. This information, while providing little or no utility to legitimate users, is often the starting place for crackers, blackhat hackers an
FIX: An access violation may occur when a dimension that is used as the basis for multiple virtual dimensions is dropped and then re-created in SQL Server 2000 Analysis Services
In Microsoft SQL Server 2000 Analysis Services, a fatal exception may occur, and Event ID 117 may be logged in the Application event log. You experience this problem when the following conditions are true: • Lazy aggregation is running. • A dimension that is used as the basis for multiple virtu
Reporting Services and Multivalued Parameters
(Rodney Landrum) Watching a product grow over the years is kind of like watching a child grow to maturity, adding skills and capabilities to his or her repertoire. I’ve been working with SQL Server Reporting Services since its infancy as a bouncing baby beta born into SQL Server 2000. At the tim
Convert the local time to the time zone of your choice with this JavaScript
Displaying the local time on a Web page is a common interface feature. But what if you want to display the time of a different time zone? By performing various temporal calculations and combining that information with JavaScript, you can convert local time to a destination time of a different zone.
