(Adam Machanic) As database systems continue to be more widely used to back stores of networked applications, it is increasingly necessary to focus on security. Although much of the buzz surrounding SQL Server 2005 has been from a development perspective, Microsoft’s new database management syst
Other News
Let’s begin our Compatibility Mode discussions
(Willie Favero) You have completed all of the suggested planning, and the tapes have arrived. It is finally time to start your migration from DB2 Version 7 to Version 8. The most important thing you want to remember now is that this is just a migration. Sure, V8 is probably the most significant new
Oracle Tip: Consider MD5 checksums for application passwords
(Scott Stephens) It’s common to store username and password combinations in a database table for application-level security. This is a good practice because it avoids giving your actual database username and password combinations, which someone could use to access the tables and application code dir
MySQL Stored Procedures: Part 3
(Ian Gilfillan) In part 3 of the ongoing series about MySQL’s stored procedures, we look at handlers and cursors in particular – both logical constructs that allow added functionality. Handlers allow you to run statements if a certain condition is met, while cursors, although only nominally supporte
Auditing and Risk Management: Data Auditing Can Help Meet Corporate Governance, Risk Management and Compliance Challenges
(Murray S. Mazer) The effects of corporate governance, risk management and compliance pressures on the management team of an organization have been oft publicized. It is foolish, however, to assume that these pressures start and end in the boardroom. Database professionals face similar pressures
Discover Dynamic Code Compilation
(Mark Strawmyer) Not sure where dynamic code compilation makes sense? A common scenario should help illustrate the need for it. Suppose you have to pull data out of one database and put it into another. Piece of cake: You’d just use a SQL statement to extract from the source and insert into the dest
Faster Coding with the ‘My’ Object in Visual Basic 2005
(John Traenkenschuh) A few months ago, I wrote a series of weblogs on Informit regarding transitioning from VB 6 to Visual Basic .NET. I wanted to know why a few developers were hanging back. The blog and the responses seemed well received, and I got some fantastic views on transitioning to .NET or
Migrating from ADO ‘Classic’ to ADO.NET
(William Vaughn) Thanks to Calvin, Hobbes and Bill Waterson, I’ve been fascinated with the term “transmogrify” for some time. This technology has (apparently) been around for some time and purportedly been used to describe the process of changing frogs into princes and puppets into people (or vice-v
Call SOAP Web services with AJAX, Part 1: Build the Web services client
(James Snell) This paper is the first of a short series that illustrates the implementation of a cross-platform, JavaScript-based SOAP Web services client based on the Asynchronous JavaScript and XML (AJAX) design pattern for Web applications.
iSeries and SQL Server Integration
In this Webcast, learn about the different ways that you can integrate data on the iSeries with SQL Server. In the first part of this presentation, Michael Otey, senior technical editor for iSeries NEWS and president of TECA, Inc., will show how to setup an ODBC and OLE DB connection between the two
