by Randy Dyess – Learn how to audit login security in your SQL Servers.
Community
Oracle Licensing Under Fire Once Again–This Time From Gartner
By Barbara Darrow – For the second time in as many weeks, Oracle finds itself the subject of an analyst report blasting its software-licensing and sales tactics.On Monday, Gartner Group told its corporate clients to double-check Oracle software-licensing fees to ensure that the company has n
Thinking XML: Basic XML and RDF techniques for knowledge management, Part 5
Uche Ogbuji moves on to define RDF and DAML+OIL schemata for the issue tracker application, continuing the discussion of modeling as he goes along.
IsaViz: A Visual Authoring Tool for RDF
IsaViz is a visual tool for Resource Description Framework (RDF) model authoring and browsing that was developed with Xerox's Java-based Visual Transformation Machine user interface toolkit for visual editors. Its inherited Zoomable User interface (ZUI) allows rapid navigation of the graphs used
JavaOne: Sun wades into open-source waters with Java
By Ashlee Vance – Sun Microsystems answered a long-standing call from open-source software developers, saying Java fans will be able to submit some changes for the platform under open-source licenses and receive financial support from Sun for their projects.
Session time statistics capture
By Ofer Harel – In this tip, I will demonstrate how to use a feature introduced in Oracle 8i: a trigger on a database event. The trigger will be used to capture the LOGON and LOGOFF from the database.
Redundant Index Report
by Andrew Allen – Yeah, yeah, yeah. Nobody likes ’em but we all got ’em (redundant indexes, that is). So here is an easy way to find redundant indexes. This script will list all redundant indexes in a database by owner, table (up to a max of 16 columns).
XN3 – XML for N3
By Graham Moore – This paper shows how the ideas in N3 can be captured as an XML language. We have developed such a language and called it XN3 (XML N3). The aim of this language is to gain the useful property of parsability inherent in XML while being as simple, powerful and elegant as N3. We conclu
Exploring XML Encryption, Part 1
By Bilal Siddiqui – XML Encryption provides end-to-end security for applications that require secure exchange of structured data. XML itself is the most popular technology for structuring data, and therefore XML-based encryption is the natural way to handle complex requirements for security in data
SVG Tips and Tricks, Part One
by Antoine Quint – This month's column, rather than a focused exploration of a particular SVG topic, will examine a few helpful tips and tricks. First, I'll introduce the viewBox attribute for zooming purposes, then explain how to use the SMIL DOM interfaces for remote animation startups, an