(Laurie Sullivan) Recruiting employees with the right skills remains a burning issue for many small businesses trying to expand and grow. In the software services business, service companies sometimes hire away talent from the company whose applications they support.
Other News
VB .NET Tip: Encryption in Just Twelve Lines of Code!
(Karl Moore) At times, you may want to very simply encrypt a small piece of text to store in the registry, a database, or file, but you don’t want the overhead or complexity of a government-standard encryption technique.
Service-Oriented ETL Architecture
(Roger Deng) Do you know what kind of architecture your ETL system is built on? Do you feel pain in maintaining a constantly growing and very complex ETL system? Do you share and reuse existing ETL code for your different projects? Making ETL applications efficient, maintainable and reusable i
Protecting DB2 performance from unnecessary rebinds
(James F. Koopmann) When I moved from administering DB2 environments to Oracle I really missed the stability that DB2 binds gave to an application. Unlike Oracle that can constantly change access paths at runtime you always knew the access paths DB2 would take because they were bound to an applicati
Deliver an effective and flexible data warehouse solution, Part 3: Design and implement a warehouse ETL process
(Leon Gong, Mike Olivas, Christine Posluszny, Donna Venditti and George McMillan) Data integration is the key concept in data warehousing. The design and implementation of an ETL (data Extraction, Transformation, and Loading) process is a very important part of a data warehousing solution. ETL proce
Locking conflicts resolution in Oracle RAC environments
(David Gornshtein and Boris Tamarkin) In this short topic we will explain relatively simple case of distributed lock problem. Shortly we will present two additional topics regarding usage of “oradebug lkdebug” statement and another topic about reading results of “oradebug -g all hanganalyze 3″ and ”
Controlling Transactions and Locks in SQL 2000 and 2005 – Part 1
(Don Schlichting) Locks are the mechanism databases use to control problems that may arise from simultaneous multi-user access. Some common issues locks try to manage include; what happens when two users try to change the same piece of information at the same time – who wins? Or user one tries to re
10 things you should know about Microsoft’s SharePoint Services
Microsoft’s SharePoint Services gives you a lot of features you may have found yourself wishing for, features you couldn’t have because you’d have to go to the trouble of rolling your own or fiddling with your infrastructure in order to achieve them. Some of these features might not be immediately a
FIX: SQL Server 2000 may load an incorrect certificate when the ClusterName value is longer than the ClusterIpAddr value
In Microsoft SQL Server 2000, the ClusterName value and the ClusterIpAddr value are in the following registry subkey: HKEY_LOCAL_MACHINESoftwareMicrosoftMSSQLServerCluster When the ClusterName value is longer than the ClusterIpAddr value, SQL Server 2000 may load an incorrect certificate.
New security standards seek to establish trust
(Colleen Frye) Industry cooperation around security in a Web services world has taken several steps forward recently with the announcement that three more specifications in the IBM/Microsoft Web Services (WS-*) Security Roadmap are being submitted to OASIS in September, and a successful interoperabi