(David C. Knox) This chapter looks at securing database schemas by limiting their privileges, providing good password support, restricting access using multiple defenses, and securing the network channels to and from the database. These steps represent many of the best practices used by organiza
Other News
Dreaming of an Atom Store: A Database for the Web
(Joe Gregorio) After a year of work — two if you count the work done before the AtomPub WG was formed — the Atom Publishing Protocol (APP) is moving closer to being done. There are still parts that are unspecified, and other parts of the protocol are under debate even now. Even given that, som
IBM Content Manager OnDemand for z/OS: System Monitoring
System monitoring is an integral component of IBM Content Manager OnDemand (‘OnDemand’) daily operations, system management and report generation. OnDemand version 7 provides ‘built-in’ monitoring facilities that allow for the monitoring of OnDemand transactions on a transaction by transaction basis
Bring Your Data to Life
(Andy Clark) Graphics Server .NET provides an outstanding set of tools for adding graphs to your VS.NET applications. These tools work within both WinForms and ASP.NET, and they support a large variety of graphs with an object-oriented API that is both powerful and easy to use. Version 2.5 adds supp
Returning a Comma-Delimited List of Related Records
(Scott Mitchell) In any non-trivial database design, there are related entities within the system. Some entities may share a one-to-many relationship, others a many-to-many relationship. For example, a student database may have a Faculty table that lists its teachers, along with a Students table tha
Web services tip: Use polymorphism as an alternative to xsd:choice
(Russell Butek) xsd:choice is a somewhat common XML construct. However, mappings of xsd:choice to a programming language are not always straightforward. For example, the Java mapping of Web services, defined by the JAX-RPC specification, does not provide an explicit mapping from xsd:choice into Java
Avoid these six common development mistakes
(Tony Patton) I’ve been working with junior and entry-level developers lately, and I’ve noticed some common misconceptions that all developers (even veterans) can fall victim to if they aren’t careful. These range from ideas about what tool to use to the appropriate use of Web services. Below I addr
XML to Relational: Bridging the Gap
(Sean Dillon) XML is a great way to share data between systems, organizations, and disparate technologies, but once you’ve received that XML, what do you do with it? In this column, I review how you can store the contents of your XML documents in relational tables.
Hide and Seek
(Howard Goldberg) CSI: Crime Scene Investigation, one of my favorite television shows, always operates on the same premise: a medical examiner searches for a victim’s cause of death by combining physical information gathered from the cadaver with the victim’s profile, crime scene information, and ot
FIX: You receive a ‘Failed to open a table’ error message when you try to open a trace table by using SQL Profiler after you upgrade to SQL Server 2000 Service Pack 4
After you install Microsoft SQL Server 2000 Service Pack 4 (SP4), you receive the following error message when you try to open a trace table by using SQL Profiler: Failed to open a table.