(Robert Catterall) If you’re a regular reader of this column, you probably know that my technical background is primarily in DB2 Universal Database (UDB) for z/OS and OS/390. I like to write about what I know, and what I know best is DB2 on mainframe servers. In recent years, however, I’ve learned a
Other News
Editing XML Data with Microsoft Office Word 2003 and Microsoft Office Excel 2003
(Mary Chipman) Users can create and edit documents containing information marked by XML tags in a completely intuitive fashion without needing to learn or understand XML. Users can search for specific information, aggregate information from numerous sources, and eliminate many of the time-consuming,
Improving DB2 recovery performance
(Barrie Sosinsky) You can take a number of steps to reduce the time it takes to perform a restore operation. First, you should optimize the use of your buffers. Make sure that the restore buffer is a multiple of the buffer that was used during your backup, and that that buffer is a multiple of the e
Fine-Grained Auditing for Real-World Problems, Part 3
(Arup Nanda) In the previous two installments of this series, I introduced you to the concept of Fine-Grained Auditing (FGA) used to track select statements in Oracle9i Database and up. I also explained how to use the feature in complex environments such as within a web application via application c
Building Tree View Resultset
(Ameet Phadnis) Most programmers might have faced the problem about displaying data in Tree View. There are different ways to solve this problem. The best way depends on your environment. As my previous articles I will first explain different approaches and then give you the solution I normally use.
Understanding Buffer Pool Performance and Tuning in DB2 UDB v8.1 Multi-platform Environments
(Scott Olson and Joshua Steffan) When tuning a database environment such as DB2, the Database Administrator (DBA) often needs to look at many things on many different levels before determining a viable approach to resolving the issue at hand. Is the application SQL written properly? Are the database
Oracle Database Resource Manager, Part 3: Conclusion
(Jim Czuprynski) The previous article in this series presented some actual examples of how to use the supplied DRM packages to create new resource plans, resource consumer groups and resource directives that bind them together. The concluding article in this series will discuss the creation of more
Above and Beyond DHTML Menus
(Nigel McFarlane) Up until now, the heart of a Web page was HTML, but that’s changing; HTML is simply not flexible enough to meet modern Web development needs. The element, for example, can contain only one set of menu options, although those options can be grouped a little using the
Injection Protection
(Michael Otey) All relational databases—including SQL Server, Oracle, IBM DB2, and MySQL—are susceptible to SQL-injection attacks. You can buy products that protect your system from SQL injection, but for most businesses, the defense against SQL-injection attack must be code-based. The opening for S
Versatile High Performance Hierarchies in SQL Server
(Dennis W. Forbes) A commonly modeled database design is the ubiquitous hierarchy: A relationship of items, all but the root having a single “parent”, with each having zero or more child nodes. Such a structure is often referred to as an “inverted tree” due to its visualized similarity to, not surpr
