(Steve Friedl) A customer asked that we check out his intranet site, which was used by the company’s employees and customers. This was part of a larger security review, and though we’d not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts.
Other News
An XML Schema Tutorial
Much like Data Type Definitions (DTDs), Schemas define the elements that can appear in an XML document and the attributes that can be associated with those elements.
Patterns: Information Aggregation and Data Integration with DB2 Information Integrator
(Nagraj Alur, YunJung Chang, Barry Devlin, Bill Mathews, John Matthews, Sreeram Potukuchi, Uday Sai Kumar and Raj Datta) This IBM Redbook documents and prototypes the role of DB2 Information Integrator technologies and architecture in IBM’s Patterns for e-business using a typical customer insight e-
Managed Data Access Inside SQL Server with ADO.NET and SQLCLR
(Pablo Castro) Using the new SQLCLR feature, managed code can use ADO.NET when running inside SQL Server 2005. Learn about SQLCLR via basic scenarios of in-process data access, SQLCLR constructs, and their interactions.
Will Microsoft offer EII? And what about Oracle?
(Philip Howard) SQL Server 2005 will have a lot of good stuff in it. One of the things I particularly like is the BI Development Studio, which is effectively an extension to Visual Studio for developing BI applications. One of the features of this product is its support for building virtual cubes –
Oracle Adds Resources To Make Retek A Global Powerhouse
(Laurie Sullivan) Oracle laid out an 18-month road map late last week to beef up Retek’s service and development capabilities by infusing it with resources it could never have afforded on its own. Oracle completed its acquisition of the retail-management application vendor last week after a monthlon
Borland Gets Together Again With .NET
(Jim Wagner) Software development tool vendor Borland updated its modeling platform for Visual Studio .NET developers, officials announced.
Oracle Database 10g: The Self-Managing Database
The Oracle database has always been known as the industry leader in terms of performance and reliability, while at the same time providing extremely rich functionality. Most successful businesses today use the Oracle database to power their mission critical applications. However, as the business en
SQL Server: How to Check the Status of a File Before Processing
(Muthusamy Anantha Kumar) SQL Server Database administrators often copy(refer Fig 1.0) huge files, such as Full backup files and transaction log backup files from production to QA or from production to development environment and so on. Sometimes they need to copy source data files for importing. If
Oracle Security: A Definition in Plain English, Part 1
(Lewis R Cunningham) This is a three-part definition of Oracle Security. Part 1 covers the various types of security Oracle provides. Part 2 deals with Users/Schemas, Roles, Permissions and Data Access. Part 2 will be a more technical discussion than parts 1 or 3. In part 3, I will discuss imple
