(Mike Lehmann) Often the first reaction developers have when they hear about BPEL is a question: Why do I need a standard to solve something that could likely be done programmatically? Obviously there is nothing forcing a developer to use BPEL, and a developer can create a simple business process th
Other News
How to create a bar graph that has a trend line in a chart in Report Designer
This article describes how to plot data on a chart as a bar graph that has a trend line by using Report Designer. You must have two sets of data to plot a bar graph that has a trend line. This article discusses two methods to plot data based on the complexity of the query that is used to retrieve […]
Keeping QA Up To Date
(Steve Jones) All programmers test their code, right? Everyone I know writes code that works and the only bugs that we find are due to differences in interpretations in the business rules. By the time code is complete from the developer, it is ready for prime time. Ready for the real world, ready fo
Identifying XML Schema Design Objectives
(Roger L. Costello) There are two purposes for creating and documenting the design objectives of the XML Schemas that you create: –Guide Schema Development: the objectives will guide you in the creation of your schemas. –Facilitate Schema Evaluation: how do you measure the goodness of your
Accessing and Manipulating XML Data
(Kirk Hausman) Over the past several releases, Microsoft SQL Server has become increasingly integrated with XML. In the current release, you can generate XML with SQL statements, using Microsoft T-SQL extensions to the SQL standard query language. You can also update SQL Server tables by sending
Tips for improving INSERT performance in DB2 Universal Database
(Bill Wilkins) Improving the performance of database inserts is very important to managing a database, especially in an OLTP environment. This article explains exactly what happens when an insert occurs, looks at alternatives, and examines issues that affect insert performance, such as locking,
The Microsoft Identity and Access Management Series
This series of papers provides dozens of identity and access management concepts, techniques, and solutions for use in heterogeneous IT environments. Identity and access management combines processes, technologies, and policies to manage digital identities and specify how they are used to access
In defense of full-table scans
(Jeff Maresh) Often times in life, we make decisions based upon the Law of Primacy. This law implies that what you learned first is what you recall first. This occurs even after new concepts appear that contradict what was originally learned. The adage, “old habits die hard” is the popular version o
Creating XSQL Queries in Oracle JDeveloper
(Deepak Vohra) PL/SQL is commonly used to create a connection to a database, generate tables, retrieve result sets, and perform updates. The result set from a SQL query with PL/SQL, of course, is a text table. With the increasing use of XML in J2EE applications, many J2EE developers now require
Dealing with a large transaction log file
(Nigel Rivett) Whenever a data update is made entries are added to the transaction log. It is not possible to prevent this as it is part of the way sql server maintains integrity – particularly during recovery. The transaction log is a circular file i.e. when the end is reached any free entries
