(Muthusamy Anantha Kumar) Every organization has a system of weekly reboots or monthly reboots etc., for all their servers. When it comes to clustered servers, the reboot cycle would be little different. Usually the active node in the cluster will always be active, unless there is a failover initiat
Other News
Use presentation layer table sorting to achieve a better user experience
(Greg Griffiths) One of the most common uses of the Internet is to display information in a tabular format; examples of this include: –Lists of events in date order. –Contents of an article. –Price lists.
PRB: The XSLT current() method may return incorrect data when try to count the number of consecutive elements with the same key value
You use the Extensible Stylesheet Language for Transformations (XSLT) current() method when transforming XML data. When try to count the number of consecutive elements with the same key value, you may receive incorrect results.
How SQL Server Determines an Execution Plan Using Available Indexes and Statistics
(Nils Bevaart) As a SQL Server DBA, one of my tasks is to monitor the performance of our databases. Our primary database holds the data of over 18 million people. A web-based application queries the database with a variety of search options. When examining the performance of these queries, most perf
Statistical Sampling with Informix XPS and DB2 UDB
In BI or OLAP queries, you need to interactively explore the vast amounts of data in the modern data warehouse. To speed up the calculation, you can use statistical sampling to give results that are sufficiently accurate in a reasonable amount of time.
MySQL CEO: Open source & MySQL will rise, legal foes will fall
(Jan Stafford) 2004 was a portent of things to come for Linux in 2005, both because of what didn’t happen (SCO Group’s victory) and what did (the rise of open source software), according to Marten Mickos, CEO of Sweden-based MySQL AB. In this interview, he predicts how those events, which included t
Auditing Tells All
(Arup Nanda) Suppose user Joe updates a row of the table as shown below, assuming he has update privileges on that table. update SCOTT.EMP set salary = 12000 where empno = 123456; How do you track this activity in the database? In Oracle9i Database and below, auditing captures only the “who”
Penn State’s QFilter puts security in XML database queries
(Jay Lyman) New software developed at Penn State University promises to protect XML database queries and filter out unauthorized requests, thereby boosting query performance as many as 100 times, researchers said.
Guidance on Patterns & Practices: Security
(Keith Pleas) Create secure applications on the Microsoft platform with patterns & practices guides described in this article.
Isolation Levels with Informix XPS and DB2 UDB
Locking isolation levels affect the behavior of SQL statements. This Technote discusses locking isolation levels in DB2 and XPS.