(Doug Henschen) Oracle at long last has control over PeopleSoft after a protracted 18-month fight. But what can PeopleSoft users expect to gain from Oracle? The merger is compelling from a process perspective, with Oracle offering infrastructure and middleware that PeopleSoft always lacked, while Pe
Other News
UML for the Software Developer, Part 2: Mastering Associations
(Mark Goetsch) Associations are a key part of the UML lexicon. Use them to define the ways in which your application’s classes communicate. In this article you’ll see that adding a database introduces design patterns for the first time using the façade pattern.
MySQL readies beta of enterprise open source database
(Paul Krill) MySQL at the end of January is expected to release a beta version of its MySQL 5.0 open source database, which is to feature enterprise-level functionality such as stored procedures and triggers, according to a company representative.
Venetica bridges Notes, DB2 data
(Jack Vaughan) Venetica’s middleware offering provides a link to digital assets that are stored in Lotus Notes. Documentum, FileNet, Hummingbird, Interwoven, Open Text and Stellent are among the other data repositories that the Venetica software also supports. (R)
Web services programming tips and tricks: Improve interoperability between J2EE technology and .NET, Part 1
(Wangming Ye) Weaving together Web services to create cross-organizational business processes requires all partners to program to the same standard model and to avoid exposing proprietary implementations. After many years of promoting the interoperability among vendors through joint efforts on stand
Manipulating Microsoft SQL Server Using SQL Injection
(Cesar Cerrudo) This paper will not cover basic SQL syntax or SQL Injection. It is assumed that the reader has a strong understanding of these topics already. This paper will focus on advanced techniques that can be used in an attack on a (web) application utilizing Microsoft SQL Server as a bac
Design First, Code Next
(Scott W. Ambler) If there is one thing I’ve noticed over the years, it’s that the best programmers think through the design of their code before they actually write it. Some will talk through their design with another programmer, often drawing sketches on a whiteboard while they’re doing so. Others
Encrypt Your Data Assets
(Arup Nanda) John, the lead DBA at Acme Bank, is involved in a very important initiative regarding security and privacy. Jane, the chief information security officer of the company, has outlined Acme’s security strategy, and John has identified his team’s responsibilities.
Manipulating And Using DateTime Data
(Robert Marda) Sooner or later someone will ask you to include dates and/or times in a query or two. Sometime after you start using dates and/or times you will notice that data stored with the datetime data type doesn’t always react the way you expect in a query and that storing the date and time in
FIX: You receive an error message when you run a statement on a table that contains a trigger in SQL Server 2000
When you try to run an update statement, an insert statement, or a delete statement on a table in Microsoft SQL Server 2000 post-Service Pack 3 (SP3) hotfix build 8.00.818 or a later build, the trigger on the table is not successful. You receive the following error message (where yourTrigger is the