(James Koopmann) At the core of most queries is an underlying table structure. Part II discusses how we can issue the most basic of SELECT statements to extract information from a database table.
Other News
Complex Object Structures, Persistence, and db4o
(Rick Grehan) One of the strengths of object-oriented programming — its core strength, in fact — is the ability it gives developers to model data relationships in a natural way. That doesn’t mean that the modeling process is easy. The architecture of many real-world systems can be complicated tree
Ensure object cleanup in your .NET applications
(Tony Patton) Garbage collection in the Microsoft .NET common language runtime (CLR) environment absolves developers from tracking memory usage and knowing when to free memory. However, developers still need to stay abreast of an object’s lifetime, thus being aware of when the object is no longer us
IBM Makes Acquisition
(Tamina Vahidy) IBM has agreed to acquire Canada’s PureEdge, an IBM partner, for an undisclosed sum. The deal is scheduled to close July 23.
Case Study: High-Hat Delivers!
(Robert Schneider) To augment his already-stellar decision-making skills, High-Hat Airways’ CEO employs a diverse squadron of soothsayers, astrologists, and fortune tellers. For months, these experts have been pushing him to enter the lucrative package shipment marketplace. The CEO has been relu
Implications of removing the xp_cmdshell stored procedure from SQL Server 2000
Many Microsoft SQL Server 2000 administrators consider removing the xp_cmdshell stored procedure from SQL Server as part of their security plan. Although the extended stored procedure can be removed, removal has significant support and functionality implications. Examine other security settings befo
Follow the evolution of an SQL query and automate your database reporting
Creating an automated SQL query that will retrieve timely data and transmit that information to a person who can act upon it is a basic task for many SQL Server database administrators. However, the process for developing that automated query is not always as obvious as you might expect. This do
Enterprise Workload Manager z/OS Support
(Paola Bari, Michael Connolly and Franco Meroni) This IBM Redpaper will help you install, tailor, and configure the EWLM managed server on the z/OS image. It also provides an understanding of how the transaction concept differs between the distributed and z/OS worlds and how you can interpret the EW
Critical MySQL Flaw Found
(Lisa Vaas) A “highly critical” flaw has been reported in MySQL that can be exploited to cause a DoS (Denial of Service) or to execute arbitrary code on the open-source database, according to security alerts aggregator Secunia Inc.
XML From Office? Microsoft’s Open Promise
(Doug Henschen) When Microsoft announced in June that the default file formats in the next-generation Office suite would be based on XML, there was reason to both hope and question whether open computing was headed for a major victory. If Office 12, slated for release next year, starts churning
