(Chris Eaton) I spent last week on vacation working on renovating my kitchen. Now my kitchen is completely empty (no sink, no stove, and no cabinets) and I’m at the point where I wish I had a spare kitchen (and I’ve still got 5 weeks to go). So when I thought about my blog, the first thing that popp
Other News
Use profiles in Oracle to create a password management policy
(Scott Stephens) Most Oracle database users create user accounts with the default profile. Since Oracle 8, it’s possible to lock an account by creating a profile and assigning it to a user.
Critical Patch Update – July 2005
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by those security patches. The Oracle Database Server, Enterprise Manager, and the Oracle Application Server patches in the U
Migrating from DB2 Everyplace 8.1.4 to WebSphere Everyplace Access 5.0
Before migrating from a DB2 Everyplace version 8.1.4 standalone installation to a WebSphere Everyplace Access (WEA) 5.0 installation, make sure to do the following: Synchronize all client devices to the DB2 Everyplace version 8.1.4 server. Stop all DB2 Everyplace version 8.1.4 Sync Server and
Object Interaction in PHP: Introduction to Composition
(Alejandro Gervasio) From a PHP programmer’s point of view, there are many interesting ways that objects can interact with each other within an application. Used extensively across well-structured projects, inheritance is one of the major foundations of the object-oriented paradigm. It allows a
Introduction to MSSQL Server Analysis Services: Mastering Enterprise BI: Relative Time Periods in an Analysis Services Cube, Part II
(William Pearson) In this article, we will continue our examination of the design and creation, within Analysis services, of relative time periods. As we stated in our previous article, Relative Time Periods in an Analysis Services Cube, Part I, a popular feature found in Cognos PowerPlay Transforme
Cryptography and .NET Framework – Part 3 (Public Key Encryption)
(Bipin Joshi) In the Part 2 of this series we learnt to use Secret Key Encryption techniques using Triple-DES algorithm. More often to transfer data encrypted via secret key encryption public key encryption is used. This puts one extra layer of security over the data being transferred. From Part 1 w
FIX: The Subscriber may not be able to upload changes to the Publisher when you incrementally add an article to a publication in SQL Server 2000 SP3
When you incrementally add an article to a publication in Microsoft SQL Server 2000 with Service Pack 3 (SP3), the Publisher can download changes to the Subscriber. However, the Subscriber may not be able to upload changes to the Publisher. You experience this problem when the following conditions a
Tier Pressure and Isolationism
(Chad Z. Hower) Logical layers within n-tier systems should be designed to interact and be influenced by neighboring layers only. This restriction is often violated, to the detriment of the system. In this article I will discuss why this is common, the consequences, and why we should focus on layer
How to set up an event forwarding server
(Kevin Kline) In part one of this series, I described why and how I use event forwarding to implement a cheap and effective monitoring feature for my large SQL Server environment. Here I’ll describe how to set up a central server and highlight issues you should be aware of at the central point of co
