(Martin LaMonica) Will the software industry’s wave of open-source databases spill onto Microsoft’s turf? Perhaps. The software giant is considering making the source code for its SQL Server database available to customers, according to Tom Rizzo, director of product management in Microsoft’s SQ
Other News
In enemy territory
(Martin Lynch) Oracle’s take-over of PeopleSoft has altered the enterprise applications market forever. SAP is still king of the enterprise resource planning (ERP) market by a good margin, but with Oracle’s new acquisitions, it may actually have to put up a fight to stay out in front.
SQL Server 2005 Security – Part 3 Encryption
(Marcin Policht) After discussing authentication and authorization behavior of SQL Server 2005 Beta 2 in the previous two articles of this series, it is time to look into other security-related changes. In particular, we will focus on the freshly introduced native database encryption capabilities. W
An Introduction To Performance Counters
(Michael Groeger) Although the .NET Framework provides usage of performance counters under the System.Diagnostics namespace, for some reason, documentation on it does little cover using performance counters for average duration per execution. When starting using PerformanceCounterType.AverageTimer32
Novell and MySQL coming to a city near you Feb 22 – Mar 03
Novell and MySQL are inviting you to a 23-city tour across North America to learn about MySQL and Novell Open Enterprise Server from February 22 to March 03. Coming to a city near you, you will be able to meet with technical experts and learn about new exciting offerings!
Fighting computer crooks the Las Vegas way
(John Leyden) Computing techniques used to identify cheaters in Las Vegas are being applied to wider computer security and fraud detection problems. SRD, a Las Vegas software developer which was acquired by IBM last month, is taking its identity resolution software from the gaming tables into corpor
The xml:id Conundrum
(Rich Salz) XML attributes whose type is ID are very important. They are the only fundamental way to identify a piece of XML. While we have XPath, XPointer, and so on, the only identification mechanism that every XML parser, and therefore every XML application, must understand is ID attributes.
Report Materialized View Log Entries
(Jay Zhang) Materialized Views (a.k.a. snapshots) are widely used in data warehouse and replication environments. For systems that use materialized views that are fast refreshed, it is necessary to create materialized view logs on base tables. If the number of entries in these log tables is too high
Relational Database Theory in a Nutshell
(Buck Woody) On April 25, 1986, reactor No. 4 at the Chernobyl nuclear plant was to be shut down for routine maintenance. Sensing a good opportunity, junior-level personnel decided to run a test of the diesel engines that would provide power to the critical cooling system in the event of a power fai
FIX: A deadlock condition occurs when you perform an UPDATE or a DELETE operation against a remote OLE DB provider in SQL Server 2000
When you try to perform an UPDATE operation or a DELETE operation against a remote OLE DB provider in Microsoft SQL Server 2000, a deadlock condition may occur when the following conditions are true: • The remote OLE DB provider is configured as a linked server that has the Index as Access Path o
