(Uche Ugbuji) The XML declaration is optional in XML files, and defaults determine most of the information in the file. However, problems are common when these defaults do not match reality — for example, the document could use an encoding other than one of the defaults. It’s always safer to make t
Other News
Using WebSphere Application Portlet Builder to build portlets that tap into DB2 UDB
(Kulvir Singh Bhogal) Many users of DB2 data don’t have the ability or desire to roll up their sleeves and use the DB2 command line to manipulate DB2 data. End users of the database might be business users who would not touch SQL with a ten foot pole. However, the business may require these individu
Practical XML: Form Validation
(Lachlan Cannon) I like XML. I really do. Still, my eyes glaze over just as much as the next person’s when I hear about how wonderful it is. Wonderful it may be, but as a Web developer, how does XML help me?
Management Tools: No Secrets
In enhancing existing management tools and designing new ones for SQL Server 2005—formerly code-named Yukon—Microsoft’s SQL Server Tools team followed two guiding principles: “no secrets” and integration. Euan Garden, product unit manager for SQL Server Tools for SQL Server 2005, tells SQL Server Ma
Flash Back to a Better Time
(Arup Nanda) It’s New Year’s Eve. John, the DBA at Acme Bank, is reveling with his friends, counting down the arrival of the new year. Just when the clock strikes midnight and the crowd roars, his pager goes off. At the bank’s data center, during the end-of-the-year bookkeeping process in the in
Stinger Takes Flight
(Victor Alvarez) An upcoming release of DB2 UDB for Linux, Unix, and Windows contains a slew of new features and support for emerging technologies. Among those features is support for Microsoft’s Common Language Runtime, the software giant’s answer to Java.
Implementing XML Encryption in Java
(Bilal Siddiqui) In the first column of this series, we presented a high-level WSS4J API, which we wish to implement in this series of columns. In the second column, we discussed the various Java components we are going to use in implementing the WSS4J API. The most important component is XML Securi
Tracing Deadlocks
(Shiv Kumar) The article here is to identify and track the source for the cause of deadlock. Typically in a system integration solution you wouldn’t encounter deadlock in your testing. This deadlock might creep in production or in live phase as your solution talks to different systems, which is con
Getting Connected: DB2 Universal Database V8 Database Administration Certification
(George Baklarz and Bill Wong) Access to both local and remote databases uses entries in the DB2 directories. The directories hide the requirement for the user to know where a database actually resides. Users are able to connect to local databases and remote databases (including DRDA databases) by s
Tips on Optimizing SQL Server Clustered Indexes
As a rule of thumb, every table should have a clustered index. Generally, but not always, the clustered index should be on a column that monotonically increases–such as an identity column, or some other column where the value is increasing–and is unique. In many cases, the primary key is the ideal
