by D. Britton Johnston – The business application architecture many companies use is as archaic as the decades old centralized mainframe model. Companies would be better served by a decentralized architecture in which their applications and databases are distributed across regional locations and loc
Other News
Calculating Concurrent Sessions
By Itzik Ben-Gan – Can a cursor really out-perform a set-based solution? Put your skills to the test in calculating maximum concurrent sessions.
Protecting Oracle Instance with Local Clustering
Follow along with Marin Komadina as he explains the ins and outs of Local Clustering with Sun Cluster software.
Microsoft delivers new Office beta
By Ed Scannell – With the second beta of Office 2003 expected to be doled out to a record 500,000 users on Monday, Microsoft continues its mission to broaden the suite’s appeal to both corporate and mid-size companies by including three new XML-based applications.
Oracle deal: Good omen for Linux group?
By Sandeep Junnarkar – Oracle on Thursday lent UnitedLinux a hand in its turf battle with Linux leader Red Hat.The database heavyweight announced that it would provide technical support to customers who are using open-source software from UnitedLinux, a consortium of second-tier Linux compan
Efficient XML Document Exchange
by Dan Wahlin – Data exchange can be problematic when XML documents grow large. See how to use an open source .NET component to compress XML documents and make your data transfers more efficient.
Using SAX for Proper XML Output
by Uche Ogbuji – There are other tools for helping with XML generation. In this article I introduce an important one that comes with Python itself. Generating XML from Python is one of the most common XML-related tasks the average Python user will face; thus, having more than one way to complete suc
Copy text or image into or out of SQL Server
In this article, Alexander Chigrik shows you how you can copy a single text or image value into or out of SQL Server by using the textcopy.exe utility.
New Anti-Virus Apps Fight Worms
By Dennis Fisher – Security vendors are introducing capabilities that up the ante for traditional anti-virus applications to help catch more viruses and rein in emerging threats, including memory- resident worms such as SQL Slammer and Code Red.
Decoding the lessons of Slammer
By Robert Lemos – A viral one-two punch–the Code Red and Nimda worms–convinced Microsoft in mid-2001 that security needed to become its top priority. That decision led directly to the creation of the company’s Trustworthy Computing initiative. Mike Nash, vice president of the security busin
