(George Weihs) XML web service technologies are rendering both platform and programming language arbitrary. Programmers are now able to build these services on their platform of choice using their favorite languages and tools. While standards are by no means complete and rival standards often co
Other News
Help! My Database is Marked Suspect.
(Brian McKnight) A database can be marked for many reasons. Generally it falls into the following conditions: –A database or log file is missing. –In SQL 6.5, a device may not be present or in 7.0/2000 a file may not exist. –SQL Server may not have been able to restore the database in amp
Uncovering ADO.NET’s Secret Identity
(Michael Otey) SQL Server’s IDENTITY columns let SQL Server automatically assign unique values to table rows. When you add a row to a table, the application you’re using doesn’t need to know anything about the row’s unique identity number; SQL Server just handles that part automatically. However, in
Control SQL Server locking with hints
For clients dependent upon SQL, the number of concurrent users accessing a database could cause havoc on data integrity if left unchecked. Using these locking hints, you can ensure data changes are handled appropriately.
Technology On Demand—A New Frontier
(David Baum) IT outsourcing has been garnering plenty of headlines this year, but the practice of offloading IT functions to outside firms has been an important part of the computer industry since the 1960s. According to Timothy Chou, president of Oracle On Demand, first-generation outsourcing, led
Installing and Configuring DB2 Server
(Susan Visser and Bill Wong) In this chapter from Sams Teach Yourself DB2 Universal Database in 21 Days, Susan Visser and Bill Wong provide detailed instructions on installing the server.
FIX: You may receive an access violation in the CRowsetTraceData::FGetNextRow function when you trace server activity with SQL Profiler
When you trace SQL Server activity with SQL Profiler or with other third party event tracing tools, you may receive an access violation in the CRowsetTraceData::FGetNextRow function.
From P2P to Web Services: Trust
(Andy Oram) In last week’s article (“From P2P to Web Services: Identification and Addressing”), I examined the ways in which the development of web services might learn some lessons from the peer-to-peer phenomenon of a few years ago. I focused on identification and addressing. In this article I con
TeXML: an XML vocabulary for TeX
(Oleg Paraschenko) TeXML is an XML vocabulary for TeX. The processor transforms TeXML markup into the TeX markup, escaping special and out-of-encoding characters. Intended audience is developers who convert documents from XML to TeX.
DB2 UDB ESE V8 non-DPF Performance Guide for High Performance OLTP and BI
(Nagraj Alur) This IBM Redbook provides detailed information on implementing high performance OLTP and BI applications in DB2 UDB ESE V8 environments involving AIX and Windows 2000 platforms. It is aimed at a target audience of DB2 application developers and database administrators (DBAs). We pro
