(Jim Czuprynski) With the possible exception of having to rebuild a database server from a “cold metal” starting point, I have to admit that the scenario that holds the most dread for me as an Oracle DBA is to run out of disk space for a production database’s datafiles or tempfiles. Though, in most
Other News
SQL Server freebie: PromptSQL for word completion
(Serdar Yegulalp) Experts typically use Query Analyzer or a dedicated development product to do work in SQL Server, but they must contend with Query Analyzer’s many little limitations as a result. (R)
BSDS and Bufferpools
(Chris Eaton) Now let’s move on in our discussion of DB2 for LUW and DB2 for z/OS by covering some of the memory structures (address spaces). First let’s take a look at bufferpools. The concept is exactly the same but the implementations and allocations are slightly different. In DB2 for z/OS your b
An interview with Adam Machanic
(Douglas Reilly) I have never met Adam Machanic, but I regularly read his blog as part of the SQL Junkies RSS feed. He is one of the authors of the recently released book Pro SQL Server 2005, in which he contributed chapters covering T-SQL for DBAs, .NET integration, and programming assemblies. He a
Nine principles of security architecture
(Bruce Byfield) Security architecture is a new concept to many computer users. Users are aware of security threats such as viruses, worms, spyware, and other malware. They have heard of, and most use, anti-virus programs and firewalls. Many use intrusion detection. Architectural security, though, re
Creating a Searchable Inventory System: Retrieving and Managing Search Results
(Brian Vaughn) In this third article in our series, we will look at the type of functions for which we need to use our search information, then take a look at retrieving records based on various search criteria.
Level 3 and 4 disasters: Data loss and critical system failures
(Mike Talon) In previous columns, I laid out a classification system for the most common types of disaster recovery (DR) situations, and last time I focused primarily on what to do when there is proof of a network intruder. Now let’s deal with what happens in more traditional DR situations: –Lev
Extending Formal Traceability Across The Lifecycle
UML (Unified Modeling Language) has emerged as the dominating industry standard graphical language for analyzing and describing software. This paper focuses on the significant project benefits that can be derived from tight integration between UML modeling and Requirements Management. (R, pdf)
IBM Takes Virtualization to DB2 ‘Viper’
(Brian Fonseca) In an effort to join the move toward virtualization, IBM is building a software tool to enable customers to change data sources or rules that govern data without affecting applications.
Intelligent Architecture
(Kim Moutsos) Everyone — from customer-facing employees to line-of-business managers to CEOs — is clamoring for the information necessary for better decisions. Meanwhile, government and industry agencies are demanding more and more reporting and transparency. Designing a business intelligence system