(Chuck White) XSLT is meant to change the form of XML, but you can also use it to perform analysis. In this tutorial, the second in a series, the MindMap team creates a system that enables them to pass parameters that not only determine the properties to analyze but also change the desired criteria
Other News
Create Versatile Web Services From Stored Procedures
(Roger Jennings) Web services are a moving target and Microsoft’s SQLXML 3.0 is no exception. If you downloaded the code from my January 2002 FTPOnline article, “Generate XML Web Services from Stored Procedures,” and the SQLXML 3.0 Beta bits within two weeks of its publication, the sample SQLXML3 Wi
Get Number of Rows Per Table in Current Schema
(Shahid Hafeez) This script will get the number of rows per table in the current schema. (script)
IBM Preps New Base1 II Tool
(Lisa Vaas) As the deadline for Basel II compliance nears, IBM’s business intelligence solutions group is readying a new DB2-based tool to help financial institutions comply.
DDL Event Security in Oracle Database
(Amar Kumar Padhi) We have various levels of security (inside and outside of Oracle database) that can be implemented according to one’s requirements. Mentioned here is a way of implementing security against structural changes or Data Definition Language (DDL) changes. This security is put within th
On-line Maintenance
DB2 UDB V8 has several new on-line database maintenance features. These features can improve both the database availability and performance. This article reviews some of those features.
Getting a look at 10g
(Robert Westervelt) With the Unix and Linux versions of the Oracle 10g database now available, and the Windows version due out in several weeks, database administrators are clamoring to get their hands on its automated features and new manageability options. (R)
Web Architecture Review: Representation
(Kendall Grant Clark) In this column I shall examine the third of the three key architectural principles of the AWWW, which it calls “data formats” but which I choose to call “representation”, following the first two principles, identification and interaction.
Getting the Wrong Identity in Microsoft SQL Server identity Columns?
(Don Schlichting) An Identity column is used in SQL server to create a surrogate key value for a table. This will be a unique identifier usually in sequential order. Starting at some predefined number, the Identity column increments every time a new record is added to the table. For MS Access users,
Data Access Accountability: Who’s doing what to which data when?
The risks associated with your organization’s “data dependence” have never been greater. Customers and partners are accessing your data. Government regulations require audit trails of data activity. Bad data can lead to poor decision making. Internal misuse – intentional or not – can mean lost r