(Serdar Yegulalp) Triggers make it easy to automatically synchronize the behavior of data between tables and across databases. But their performance can be drastically affected by things that might not be obvious at first glance. Here I’ll identify one command to reduce the impact of some unforeseen
Other News
Using SQL Cache Dependency
(Wei-Meng Lee) Caching has long been recognized as one of the more effective ways to improve your ASP.NET web applications. However, one particular caching feature that was dearly missing in ASP.NET 1.x was SQL cache dependency. SQL cache dependency is the ability to invalidate a database cache if d
MSSQL Server 2000 Reporting Services: Black Belt Administration: Prepare the Execution Log for Reporting
(William Pearson) General optimization of RS’ performance is, beyond argument, one of the more important functions of the Administrator. In evaluating performance from various perspectives at the Administrative level, one readily useful source of information is the data we can obtain from the logs c
Implementing Oracle Real Application Clusters Using Network Block Device Technology
This document describes how to implement cost efficient Oracle Real Application Clusters using only common PC hardware and Linux operating system. In a Real Application Clusters environment, each node has to access all the data stored in the database. While traditional approach requires expensive st
Forms Authentication Against An XML File
This code shows how to validate against an XML file for Forms Authentication security in ASP.Net. Please read one of the earlier articles on Forms Authentication for an introduction and to see the required settings in the web.config file.
XML data validation with XPath and XSL
(Phillip Perkins) If you’re designing Web applications, you should be using XML as your data transport mechanism because most languages provide a robust set of tools for handling XML.
MLS / DB2 Implementation
(Chris Rayns) MultiLevel Security helps address government requirements for highly secure data. New Security features in DB2 V8 and z/OS 1.5 software can enable customers to have a highly secure single repository of data. This access is to designed to be managed at the row level in DB2. (pdf)
Amara XML Toolkit: Simple things simple. Complex things possible
(Uche Ogbuji) I designed Amara XML Toolkit to make the simple things easy and the complex things possible. I’m open to honest, constructive criticism of where I failed in that aim, but I don’t want any misconceptions floating out there.
BDNradio: Database features of Delphi 2005 with Ramesh Theivendran and Joerg Weingarten
(John Kaster) This is a log of the chat room during the live audio chat from December 20, 2004 on Delphi 2005 with Ramesh Theivendran and Joerg Weingarten. They discuss database features in Delphi 2005.
Data mining with Intelligent Miner: Embed Intelligent Miner Visualization into your application
(Peter Bendel) IBM DB2 Intelligent Miner Visualization 8.2 gives you the ability to visually explore data mining models. This article introduces you to the Intelligent Miner Visualization API. This Java™ API allows you to embed IM Visualization into your own Java application to browse and explore st