When you perform a bulk insert operation in Microsoft SQL Server 2000, the transaction log file becomes corrupted and error 3624 is written to the SQL Server error log. Subsequently, the user database is marked suspect.
Other News
Integrated Web Design: The Meaning of Semantics (Take I)
(Molly Holzschlag) Nearly every web designer is guilty of forcing line breaks, creating tables that don’t hold tabular data, and a host of other egregious HTML sins. Now that CSS is around, Molly E. Holzschlag slaps our hands and explains why we should pay attention to each element’s content, not ju
An introduction to backup, restore and rollforward recovery in IBM Cloudscape/Apache Derby
(Suresh Thalamati) Ensure the recoverability of your Cloudscape data. Learn how the backup, restore and rollforward recovery features work in IBM Cloudscape and Apache Derby. Through examples, find out how to restore your databases.
IBM claims real-world SOA success
IBM has sought to dispel the rumor that there is far more hype about service oriented architecture than there are customers actually getting value from it, by highlighting the news from financial services company Standard Life Group that it has successfully implemented SOA.
Overcoming decades old legacy systems with XSLT and Muenchian grouping
(Edmond Woychowsky) Recently I needed to create a Web service that would allow an outside organization to enter orders on a legacy system using XML. My initial optimism about this project was squashed by the reality of dealing with the limitations of a system that was designed and coded sometime dur
OASIS Darwin Information Typing Architecture TC Approves DITA Version 1.0
OASIS announced that the Darwin Information Typing Architecture (DITA) Technical Committee has approved DITA 1.0 as a Committee Draft and recommended its submission for public review.
Running XPath queries in PHP
(Philip Perkins) XPath is a language that allows you to address parts of an XML document, making XSLT transformations practically necessary. It also makes it an invaluable tool for managing XML data in applications such as Web applications.
Sending E-Mail from Your PHP Applications
(W. Jason Gilmore) Communicating with Web site users via e-mail is crucial to the success of any online service. The ability to deliver registration confirmations and newsletters; provide a convenient and relatively secure password recovery tool; and keep clients updated with shipping status reports
Code Access Security with Microsoft .NET Framework
(Mark Strawmyer) This installment of .NET Nuts & Bolts is part one of a two-part series exploring code access security and how it is controlled by the Microsoft .NET Framework. The Microsoft .NET Framework includes a number of security features that assist you in developing secure applications. The
Ensure data integrity with validation
(Tony Patton) This data is often stored in a backend database system, which contains data constraints defining what is and is not allowed, so the data collected and sent to the database system must adhere to the constraints to avoid errors.
