(Paul C. Zikopoulos and Roman B. Melnyk) DB2 UDB used to have a dependency on a C compiler for the creation of SQL PL procedures. Customers and partners have expressed their interest in eliminating this dependency in their DB2 UDB environments, for the following reasons. First, there is a cost as
Other News
PL/SQL control structures: Best practices
(Steven Feuerstein) Oracle PL/SQL offers a range of constructs that allow you to control the flow of processing, including: For conditional logic: the IF statement For loop processing: FOR, WHILE, and simple loops For branching logic: the GOTO statement These constructs are relatively strai
Multicast Checker
(Steve Button) Debugging an OracleAS clustered environment, with server configurations, application code requirements, replication settings, etc. can be a somewhat engaging process — particularly if you are in a hurry and need to get it working ASAP. Using a methodical approach, it’s very easy to
You receive a ‘Command line option syntax error’ error message when you install SQL Server 2000 SP3
When you install Microsoft SQL Server 2000 Service Pack 3 (SP3) on your computer, you may receive the following error message: SQL Redist content: Command line option syntax error. Type Command /? for Help. If you click OK in the message box, the installation of SQL Server 2000 SP3 may comple
Trusted clients vs. untrusted clients
(Roger Sanders) If both the server and the client are configured to use the CLIENT authentication type, authentication occurs at the client workstation (if the database is a nonpartitioned database) or at the database partition where the client application is invoked from (if the database is a parti
IBM Releases DB2 ‘Stinger’ Beta
(Jennifer deJong) Promising the production version later this year, IBM Corp. recently made available the beta version of its DB2 Universal Database, code-named Stinger, which will replace version 8.1. Many of its 200 new features aim to ease database administration and boost performance, but St
XML Web Services Security: Learning from Application Security Disasters
Web Services technology promises great benefits, but there are also serious questions about security risks. Download this white paper and examine three basic, yet important questions: – What are the reasons for the frequency of vulnerabilities of today’s Web applications? – How do these vulner
XML Matters: GUIs and XML configuration data, Part 2
(David Mertz) The author continues his discussion of how XML is used in the configuration of GUI interfaces. He looks at Mozilla’s XML-based User Interface Language (XUL) which allows you to write applications that run without any particular dependency on the choice of underlying operating system. T
Automatic Shared Memory Management
(Arup Nanda) Frustrated by trying to allocate the precise amount of memory required for different pools? Automatic Shared Memory Management makes it possible to allocate memory where it’s needed most, automatically.
Get Unique from Duplicates
(Yakov Shlafman) This script shows how to extract unique “valid” accounts from a group of duplicates using Oracle’s analytical function ROW_NUMBER().
