(Santveer Singh) I was reading the article Every DBA Should Know Which Databases are be Backed Up by Leo Peysakhovich. I agree with Leo, that most of the time when we need a backup of database, we noticed that we don’t have backup of that database or we have a very old set of backups. To avoid this
Other News
Everything you always wanted to know about SAX (and XmlReader)
(Richard Mansfield) When you need to process XML documents, you must first decide whether to use DOM (Document Object Model) or SAX (Simple API for XML), the two main XML APIs in use today. You can use either (or both at the same time) to process XML documents, but DOM loads the document into memory
IBM to make Java database open source
(Stephen Shankland and Martin LaMonica) In conjunction with the LinuxWorld Conference & Expo this week, Big Blue is expected to detail the open-source initiative, code-named Derby, according to a source familiar with IBM’s plans. The software will be governed by the open-source Apache Software Licen
IBM’s Next DB2 Content Manager Will Simplify Programming
IBM’s “Project Cinnamon,” still in beta but due to be released with IBM’s next DB2 release, will put XML at the heart of DB2 Content Manager and allow customers to create automatically the data model of a database based on the document type definitions or XML schemas they choose.
Learn to Use the New XML Encryption Class in .NET 2.0
(Sanjay Shetty) XML is the de-facto language of business transactions. It enables structuring data. And the 2.0 version of the .NET framework, heretofore known by its codename, Whidbey, will finally enable you to encrypt and decrypt XML data. In this article I will explore the implementation of XML
Bulk Binds and Collects in PL/SQL – Part 2
(Amar Kumar Padhi) The SQL engine will bulk bind all the values present for a column in a table before returning the collection to the PL/SQL engine. If the amount of data being retrieved is immense, this fact itself, will result in degradation of performance. An alternative is to retrieve one
Taming the paper tiger
(Steven Aoki, Darryl Bloch and Stacia Sambar) Finding product-related information in traditional hard-copy documentation is often a difficult user task because of searchability and retrievability obstacles. The introduction of the Information Center, here described for the IBM DB2 Content Manager On
Securing Identity a Novell, Oracle Affair
(Clint Boulton) With interest in secure single sign-on services reaching new heights, Oracle and Novell unveiled new identity management products at the Burton Group Catalyst Conference in San Diego. Oracle revealed enhancements to its Oracle Identity Management (OIM) product, including securit
Track Updates, Changes, and Deletions
(Sanjay Ray) This tip was written for use with Oracle8i. This code tip demonstrates a technique to track changes occurring in the underlying database tables following a sequence of events in the front-end application. That is, the user keys in data through the application, or runs a process,and the
XML programming in Java technology, Part 3
(Doug Tidwell) This advanced tutorial covers more sophisticated topics for manipulating XML documents with Java technology. It shows you how to do tasks such as generate XML data structures, manipulate those structures, and interface XML parsers with non-XML data sources. As you’d expect, all of the
