(Dinesh Asanka) Temporary tables are always a great help for a developer. In the early days when I used Access I used to create tables that I treated as temporary and then delete them whenever I finished my task. Using SQL Server this is much simpler. Or is it? (R)
Other News
Understanding IBM DB2 Records Manager 3.1 Architecture
(Naga Ayachitula and Michael S. Schwartz) This article describes the architecture of the IBM DB2 Records Manager V 3.1(IRM) product. We describe the various components of the IRM and discuss the architecture and design of the engine, Web administrator application, J2EETM design patterns like Session
Tip: Passing files to a Web service
(Benoît Marchal) In this tip, Benoît discusses the different solutions available for passing binary data (typically files) to a Web service. The evolution of Web service protocols has gone from supporting very simple requests with simple parameters to fully supporting modern, object-oriented lang
XML Strengths and Weaknesses with DOM, ASP and XSL
(Nakul Goyal) Since the inception of XML, many developers have wondered why we need XML… How is it better than HTML and what does it do? For starters, XML is far more powerful than HTML, and the power resides in the “X” in XML (which stands for extensible). Rather than providing a set of pre-defin
Setting Up Oracle and PHP on Mac OS X
(Matt Rohrer) With Apple’s move to a UNIX base with Mac OS X, many developers have been excited about the prospects of a development platform that combines legendary ease of use with a rock-solid foundation. Considering that Oracle has a developer release of the Oracle9i Database Release 2 for OS X
Googling for XML – Tips and tricks
(Bob DuCharme) The introduction of the O’Reilly book Google Hacks tells us that the filetype: query qualifier restricts your Google search to files whose names end with a particular extension. The book’s first example of this is homeschooling filetype:pdf, a query that searches for the word “homesch
Java application deployment considerations
(Rahul Kitchlu and Connie Tsui) If you are responsible for developing and delivering three-tier Java applications that access data on DB2 servers, you may have found it hard to choose between various available accessibility options. In a typical scenario, applications could access data from one or m
DBA Call to Action: Zeroing in on Performance Problems
(James Koopmann) In my early days of being a database administrator, I was thrown straight into the fire of database performance issues. Now, I did not have any experience, except for the education of database systems from my local college, and was at the mercies of other professionals around me. Th
DDL Event Security in Oracle Database
(Amar Kumar Padhi) We have various levels of security (inside and outside of Oracle database) that can be implemented according to one’s requirements. Mentioned here is a way of implementing security against structural changes or Data Definition Language (DDL) changes. This security is put within th
Code Access Security in SQL Server 2000 Reporting Services
(Bryan Keller) The Microsoft .NET Framework provides a rich security system that can run code in tightly constrained, administrator-defined security contexts. The .NET Framework system that secures code is referred to as code access security (or evidence-based security). Under code access security,