(Chris Eaton) Another new CLP goody that came out in 8.1.2 is that you can customize the command prompt. Now that may sound like a trivial thing, not worth the time it takes to customize it but if you work on a lot of servers at the same time and have multiple DB2 session CLPs up on your screen in […]
Other News
The TransactionScope Object Makes ADO.NET Transactions Easy
(Paul Kimmel) In database development, the concept of consistency dictates that the database is always in a valid state. Transactions exist to support consistency. The transaction is a mechanism by which you can treat multiple operations as an all-or-nothing whole: All the pieces work and all the ch
Data solutions for disconnected applications
(Steve Joubert) “Smart client” is more than a fancy moniker for Win Forms, or a marketing ploy to sell Visual Studio 2005. It is an architecture that allows Win Forms applications to function when they are disconnected from the network and their primary data source.
CHMOD: Tool for Open Source Administration
(Drew Decker) CHMOD (chmod) is a UNIX oriented command that means “Changing Mode.” It lets you change the mode (hence the name) of the file, or directory(ies) depending on how the chmod command is used. When I say “changing mode,” I mean giving the file a different permission scheme, respectively re
Create a complete authentication system with Visual Basic 2005 (Sample Chapter)
(Jesse Liberty) With the ready-to-go controls and built-in functions found in Visual Basic 2005, creating the system is much easier than it used to be. This sample chapter from Programming Visual Basic 2005 explains how to use forms-based security and Visual Basic 2005 to create a complete authe
Just What is AJAX?
(Lee Asher) There’s a craze on the web at the moment, and that craze is named AJAX. What’s that? Well, according to some people, it’s a technology that’s going to redefine the web. Just how many times have you heard that statement.
Cryptography in .NET
(N.Paramaguru) Cryptography is the science of analyzing and deciphering codes and ciphers and cryptograms. The usage of cryptography is critical nowadays, since lot of confidential data is being transferred through highly insecure mediums. Though the mediums claim to be much secured, there are poss
Get Moving with Java-XML Serialization Using XStream
(Doug Tillman) The XML format has become a de facto standard in contemporary IT work. Amongst all the XML-related technology advances, Java-XML binding and serialization has especially been of use to me because much of the work I do involves back-end business components. Java-XML binding and seriali
REST: Simplicity in Web Services design
(Daniel Rubio) Linking Web service requesters and providers entails a fair amount of work for both parties, encompassing such things as agreeing on the business function to be fulfilled, the technical contract details and of course integrating the service into the grander scheme of an application. B
FIX: The ‘Data area passed to a system call is too small’ error message is logged in a multiple-thread application that uses the Virtual Device Interface feature of SQL Server 2000
Consider the following scenario: • You call the CreateEx method at the same time on more than one thread in a multiple-thread application. • The multiple-thread application uses the Virtual Device Interface feature of Microsoft SQL Server 2000.
