(Mark Mulligan) If you ever need to copy an IBM DB2 database and its data from one environment to another, a DB2 redirected restore is the fastest, most thorough way to accomplish your goal. And, if your database has a lot of table spaces, then you may be interested in a semi-automated approach usin
Other News
Information Integrator for Content applet viewer sample
(Bryan Daniel and Jerald Schoudt) IBM Information Integrator for Content Version 8 provides a rich set of APIs which allows developers to build transparent access to critical unstructured and structured information across and beyond the enterprise. Access to heterogeneous data sources is accomplishe
The Great Migration Week Experiment
(Bill Burke) If you’re like most Oracle DBAs, you’re looking forward to the release of Oracle’s next-generation database, Oracle Database 10g, with a mixture of excitement and dread. You know that this new version will include many improvements and new features that will make your job easier and mor
Guide to Using SQL: Identity Columns
(Ian Smith) There have been many requests for Oracle Rdb to generate unique numbers for use as PRIMARY KEY values. In Rdb 7.1 we chose to implement two models that capture the functionality of most SQL database systems on the market and reflect the current planning for the draft SQL Database Langu
XML: We Ain’t Seen Nothin’ Yet
(A. Russell Jones) XML is a fundamentally simple idea—take bits of content and give them identifying tags—but it has far-reaching effects. In just a few short years, XML’s evolution has sparked an explosion of innovation that’s touched nearly every facet of computing, even the most basic computing b
Building a Code Analysis Utility for PL/SQL
(Steven Feuerstein) In this 8-part series, one of the world’s leading experts on PL/SQL explains how he created Codecheck, a PL/SQL utility that relies on information in the data dictionary to analyze packages for ambiguous overloadings.
Mapping W3C Schemas to Object Schemas
(Ronald Bourret) This paper summarizes two different mappings. The first part of the process, generally known as XML data binding, maps the W3C’s XML Schemas to object schemas. The second, known as object-relational mapping, maps object schemas to relational database schemas. The two mappings can
HOW TO: Determine Proper SQL Server Configuration Settings
This article describes the following configuration settings and considerations for their use: –Affinity Mask –Lightweight Pooling –Max Async IO –Max Worker Threads –Memory –Priority Boost –Set Working Set Size SQL Server can obtain a very high level of performance with relatively l
Using XSS4J for XML Encryption
(Bilal Siddiqui) In the previous column of this series, we discussed the usage model of Web Services Security (WSS) and introduced WSS4J, a Java-based API for WSS, a project we will be constructing through this series. In this column, we start implementing the WSS4J API. The first section of thi
Managing SQL Server Proliferation
(Mark Shainman) The growing popularity of Microsoft SQL Server has caused the proliferation of instances of the database throughout the enterprise. However, this widespread adoption with little IT oversight has also produced management issues. To control costs and improve support, your organization
