(Edd Dumbill) In the previous two articles in this series, I explained the rationale and design considerations for an XML/RDF vocabulary to describe open source projects. The Description of a Project (DOAP) vocabulary will meet the needs of project maintainers who find they must register their softw
Other News
IBM’s Selinger enters Women in Technology Hall of Fame
(Robert Westervelt) A software engineer who worked with researchers at IBM on the very first relational database more than two decades ago, Patricia Selinger was recently inducted into the WITI (Women in Technology International), Hall of Fame. Selinger was among four other women who received the
DB2 Limits
This article is a reference for various physical and structural limitations to whichDB2 must conform. (pdf)
Using Pipelined Table Functions (Oracle 9i)
(Toji Mammen George) This article will present a brief overview of the usage of Pipelined Table Functions, introduced in Oracle 9i, which enables accepting and returning multiple rows using Table Functions in PL/SQL.
Using Subqueries
A subquery answers multiple-part questions. For example, to determine who works in Taylor’s department, you can first use a subquery to determine the department in which Taylor works. You can then answer the original question with the parent SELECT statement. A subquery in the FROM clause of a S
Improve XML transport performance, Part 2
(Dennis M. Sosnoski) Part 1 of this series gave you some background on the issues of text versus alternative representations of XML. Now in Part 2, I’ll cover the actual performance tradeoffs involved in using different representations. This isn’t intended to be a comprehensive comparison — there a
Oracle SQL and index internals (excerpt 1): High performing SQL — where do you start?
(Kimberly Floss) Once you know all the things that can be tuned, within the database, where do you start? The answer is, with the code. You can double check all the init.ora parameters to start, monitor hit ratios and use operating system monitoring tools, but most often, the issue is in the cod
MDX Essentials: Basic Set Functions: Subset Functions: The Tail() Function
(William Pearson) In this lesson, we continue a “triptych” of articles that expose set functions that deal specifically with subsets – that is, each function returns a subset of a larger set as part of its operation. Having covered the Head() function in the previous article, we will introduce t
Implementing NTLM Authentication for Your ASP.NET Web Services
(Dan Appleman) Anyone who uses the Web is familiar with the two common forms of authentication. The most common one is “form-based” authentication, in which you enter some sort of user ID and password on a form. The Web application then authenticates you based on some internal scheme, and typically
FIX: An AWE system uses more memory for sorting or for hashing than a non-AWE system in SQL Server 2000
The memory that SQL Server uses during sorting and hashing operations is allocated from the buffer pool as a stolen buffer. Stolen buffers must always remain in the virtual address space. They cannot be unmapped to a Microsoft Windows 2000 Address Windowing Extensions (AWE) location. SQL Server uses
