(Muthusamy Anantha Kumar) When installing SQL Server, regardless of versions and editions, SQL Server database administrators tend to choose the default collation and sort-order, which is SQL_Latin1_General_CP1_CI_AS. Though case insensitiveness makes the life of the database developers and database
Other News
What’s New In MySQL 4.1 Part One: Overview and Subqueries
(David Fells) The current release of MySQL, version 4.1.10, offers significant improvements over version 4. While it still has some room for improvement, its new features and capabilities should silence the critics who have up until now regarded it as little more than a toy. In this article, the fir
Build Your Own Oracle RAC 10g Cluster on Linux and FireWire
(Jeffrey Hunter) One of the most efficient ways to become familiar with Oracle Real Application Clusters (RAC) 10g technology is to have access to an actual Oracle RAC 10g cluster. There’s no better way to understand its benefits—including fault tolerance, security, load balancing, and scalability—t
New backup and restore features in IBM Informix Dynamic Server, Version 10.0
(Martin Fuerderer) Find out how to take advantage of the two new backup and restore features of IBM Informix Dynamic Server, Version 10.0. External Backup and Restore (EBR) is supported for setting up a High-availability Data Replication (HDR) server pair using either ON-Bar or ontape. Additionally,
Weekend with Indigo:Part 2 – Messaging and Explicit Addressing
(Clemens Vasters) In this 2nd part I am extending the simple messaging example of Part 1 by adding some explicit WS-Addressing trickery. Addressing is so fundamental that its properties are baked right into the Headers collection of the Indigo Message. Even though there are (and I will eventuall
Code Access Security with Microsoft .NET Framework, Part 2
(Mark Strawmyer) This .NET Nuts & Bolts installment is the second part of an exploration of code access security and what it means in the Microsoft .NET Framework. It builds on the examination of evidence-based security in Part 1 and looks at imperative and declarative security checks, as well as ho
Take Advantage of ASP.NET 2.0’s Data Caching Techniques (Part 1)
(Alex Homer) One unfortunate by-product of the rapid move away from standalone and client/server applications to the Web-based environment is the disconnected nature of the HTTP protocol. Web servers and clients briefly exchange data, and then (by default) each forgets about the other entirely until
Putting the ‘V’ in Virtualization
(Robert Dick and Kristi Schultz) Lately, there’s been a lot of information about virtualization, automation and utility frameworks in the technology news. Some of it is buzzword associations with current products and technologies, and some of it is strategic direction and vaporware promises. But som
Seeing is Believing
(Michael H. Alcorn and Pat Bates) When an Internet-media company needed to step up to the next level of scalability and performance for its click stream analysis workloads, a lot was at stake. Before putting any new configurations into production, the client needed to see a Proof of Concept (POC) s
Microsoft Set to Launch 64-Bit Blitz
(John Fontana) Microsoft next month will finally ship the long-awaited 64-bit editions of its latest server and client operating systems–and the move is just the tip of a 64-bit iceberg.
