(Ted Kemp) The company that owns the rights to the dBASE database program has repositioned itself as a business intelligence vendor and today launched software that it hopes to use to forge new inroads into the BI market.
Tag: Development
EII is a Strategy, not a Technique
(S. Radhakrishnan) Enterprise information integration is the latest buzzword; it is largely associated with federated databases by the database technology vendors. Not to be confused with enterprise application integration, which integrates applications, EII is slated to integrate information. Infor
An Introduction to Java Object Persistence with EJB
(Jeff Hanson) Storing and retrieving information for most applications usually involves some form of interaction with a relational database. This has presented a fundamental problem for developers for quite some time since the design of relational data and object-oriented instances share very differ
Perform Exception Handling in .NET Exceptionally
(Mark Strawmyer) An exception is an error condition or unexpected behavior that occurs within an application. Exceptions can occur from within classes in the Microsoft .NET Framework or other classes you use. You also can raise them in your own code. Exceptions can result from various conditions, su
Take Advantage of Isolated Storage with .NET
(Mike Amundsen) Many applications commonly handle user preferences. Application developers often need to store items such as the arrangement of windows on the screen, default color selections, and other values somewhere so that the application can call them up the next time the user loads it. In add
ASP.NET 2.0 Databinding
(Jesse Liberty) In ASP.NET 2.0, a great deal of the ADO.NET object model has been incorporated into controls that let you interact with data declaratively, and that spare you from writing boilerplate code to create data sets, extract tables, bind tables or views to controls, and so forth. In this ar
Fast Tracking Continuous Data Protection and Recovery
(John Wernke) Busy corporate IT managers invented or inherited backup practices that are now well established. Pressure grows, however, with every application failure or even full-scale disaster teaching us the real value of protecting data resources is totally strategic. Managers face hours of work
Creating a PHP-Based Content Management System
(Peter Zeidman) If you’re going to run an intranet site, then you’ll probably want a content management system (CMS) — a tool used to organize documents and keep track of what’s where. I’ve covered a plethora of such systems in previous articles, but for many businesses there can be only one solutio
How A Criminal Might Infiltrate Your Network
(Jesper Johansson) One of the great mysteries in security management is the modus operandi of criminal hackers. If you don’t know how they can attack you, how can you protect yourself from them? Prepare to be enlightened. This article is not intended to show you how to hack something, but rather
Make Code Robust With Flexible Queries
(Kathleen Dollard) In the past, if you needed extensive flexibility in data selection, you’d probably concatenate the query as a text string in your application. However, this concatenated Transact-SQL (T-SQL) is vulnerable to SQL injection attacks and platform-dependent, which suggests you should u