Database Tutorials & Articles
-
Spatial data in SQL Server 2008
by Jason FollasJason takes you back to those high school geometry lessons and demonstrates how to take advantage of the new geospatial and geometric data types in SQL Server 2008.
-
Bluffer's Guide to C# 3
by Jon SkeetPretend you know what you're talking about in suitably geeky company. More seriously, it will give you a very rough overview to give some context if you choose to investigate a particular feature further.
-
LINQ to Objects for the .NET developer
by Mike JamesMike James explains that LINQ isn’t just for SQL programmers but is usable by every .NET developer. Learn how take the power of LINQ queries to your every-day coding through the lowly IEnumerable interface.
-
Java in a Python body
by Sing LiSing Li explores the advantages of Jython, a Python implementation created in Java.
-
Synchronising data across disparate systems using BPM
by Kay EwbankDeveloping connected applications with InterSystems Ensemble.
-
An introduction to object to relational data mapping with SQLAlchemy
by Sing LiUse SQLAlchemy to ease the creation, testing, and maintenance of database code - with objects.
-
Jazz up your JSP applications with Cewolf
by Sing LiDo you want to create web applications incorporating compelling charts and graphs? Cewolf provides a quick route.
-
MultiValue data with InterSystems Caché
by Kay EwbankWhile the majority of attention in the media focuses on traditional relational databases, the MultiValue market continues to thrive.
-
New C# 3.0 Language Features
by Scott GuthrieLearn about some of the new features in C# 3.0 including automatic properties, collection initializers, extension methods, lambda expressions and anonymous types.
-
What's new in SQL Server 2008
by Kay EwbankThis year sees the arrival of SQL Server 2008. What are the key features?
-
Dynamic Search Conditions in T-SQL
by Erland SommarskogA very common requirement in an information system is to have a function (or several functions) where the users are able to search the data by selecting freely among many possible criterias. In this text I will look at various techniques to solve this problem.
-
SQL Trusted Connections with ASP.NET
by Barry DorransHard coding passwords into your application or your web site is a bad thing. Barry looks at how we can use trusted connections to provide the authentication we need, without the need for these potential security hazards.
-
Microsoft Indexing Service and ASP.NET
by Barry DorransMicrosoft Indexing Service is a service that provides a means of quickly searching for files on the machine. Barry investigates how we can use the indexing service to expose full-text searching in ASP.NET.
-
Using SQL Server for ASP.NET session state
by Barry DorransLearn how you can use an alternative session storage method, using SQL Server - very useful if you're running sites across multiple servers, or need session state to persist across application restarts.
-
Creating rich Internet applications with InterSystems Zen
by Kay EwbankLast month, we looked at the combination of Jalapeño and Caché from InterSystems to see how well the two worked together for the Java developer. This month, it's the turn of the web browser development feature in Caché, Zen.
-
Caché and Jalapeño
by Kay EwbankThe unified approach to objects, data structures and programming.
-
Service Broker - the asynchronous messaging framework in SQL Server 2005
by Klaus AschenbrennerSQL Server's Service Broker sounds mysterious, but it's easy to use and effective, as Klaus Aschenbrenner demonstrates.
-
Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle
by Caleb SimaImproving your Web application development process is one of the best ways to avoid security vulnerabilities and nasty surprises during security assessments. Learn about the points in the software development life cycle where additional security awareness and training is needed to ensure that your organization remains successful and secure.
-
Web Application Vulnerability Assessment Essentials
by Caleb SimaIt is important for a business to understand the fundamentals of running a vulnerability assessment in order to determine how one will be run and what can be expected from the results. A web application security scanner can automate the process, but a quality assessment may still require actual human eyes to catch specific issues. Learn more about the whys and hows of vulnerability assessments.
-
Top 10 Application Security Vulnerabilities in Web.config Files - Part One
by Bryan SullivanIn part one of this two part article, you will learn about five of the top ten “worst offenders” of misconfigurations of application security that can cause overall problems for ASP.NET Web-based applications. Learn more about how to secure the Web.config files of an ASP.NET application.