(Micah Dubinko) XML devotees are, as a general rule, thoughtful, creative, and a bit mischievous. So when the calendar rolls around to April 1, a safe bet is that you’ll find some interesting reading across not only the internet, but also on the XML-Dev mailing list. This year held no exception.
Other News
Building a data mining solution using IBM Intelligent Miner Modeling and WebSphere
The objective of this tutorial is to get you confident with the problem of handling multiple mining tasks at the same time in your J2EE Web application. The tutorial also demonstrates how to use the Easy Mining Procedures interface of Intelligent Miner Modeling to handle these mining tasks. (R)
Set Operations (Sample Chapter)
(Sanjay Mishra and Alan Beaulieu) There are situations when we need to combine the results from two or more SELECT statements. SQL enables us to handle these requirements by using set operations. The result of each SELECT statement can be treated as a set, and SQL set operations can be applied on t
How to perform bulk updates and inserts by using the OpenXML method with .NET providers in Visual Basic .NET
This step-by-step article describes how to perform bulk inserts and updates with different Microsoft .NET data providers by using the OpenXML method in Microsoft Visual Basic .NET. The sample project in this article uses the Microsoft SQL Server .NET Managed Provider (SqlClient). However, you ca
Tip: Asynchronous SAX
(David Mertz) Even though every abstract description of SAX prominently mentions that it is an event-driven interface, very few SAX applications really use SAX for event-driven programming. Instead, SAX is mostly just a way to save memory while extracting data from an XML document. However, over asy
DB2 Annoyances
(Craig S. Mullins) If you are a regular user of any type of software you know what I mean by an “annoyance.” Annoyances are those little things software does to drive intelligent people crazy. There isn’t a piece of commercial software out there that is not plagued with annoyances and DB2 has its fa
Limitations of Developing for Foreign Datasources
Business Components for Java was designed to work with Oracle databases, and as such there are limitations when working with other databases. When you chose to work with a different SQL dialect, the framework automatically changes the SQL style to suit. However, you must be careful to use the approp
Multiple Paths in Workflow
(Darren Green) Branching workflow is a common requirement, and is quite easy to achieve using the basic On Success or On Failure constraints available through the designer. However branches go in different directions and do not meet up again.
IBM WebSphere Everyplace Access V5 Handbook for Developers and Administrators Volume III: E-Mail and Database Synchronization
(Juan Rodriguez, Anna Gangitano, Gianfranco Rutigliano and Guillermo Villavicencio) This IBM Redbook is part of a series of four volumes related to WebSphere Everyplace Access Version 5.0. These books will help you plan, install, administer, and develop mobile applications to run in a WebSphere Ever
How to Set Up SQL Server Integrated Security For Use With SMS
(Ahmed Sayed) When Systems Management Server is used on a large scale administrators often find it necessary to give other people permission to use the Systems Management Server Administrator utility. In response to this need and since granting full permissions to all the features of the Systems Man
