SQLite is available on every Android device. Using an SQLite database in Android does not require any database setup or administration. You only have to define the SQL statements for creating and updating the database. Afterwards the database is automatically managed for you by the Android platform. In this chapter we will discuss about developing application with SQLite.
Hands-On Lab Data Transformation Services - SQL ServerSerra Laercio
Treinamento prático com exercícios do tipo step-by-step para você aprender a usar o Data Transformation Services do SQL Server e nele criar pacotes de extração, transformação e carga de dados. Com este treinamento você será capaz de:
Criar um pacote DTS
Criar um projeto no DTS
Monitorar o progresso de um pacote DTS
Visualizar os resultados do log de um pacote DTS
SQLite is available on every Android device. Using an SQLite database in Android does not require any database setup or administration. You only have to define the SQL statements for creating and updating the database. Afterwards the database is automatically managed for you by the Android platform. In this chapter we will discuss about developing application with SQLite.
Hands-On Lab Data Transformation Services - SQL ServerSerra Laercio
Treinamento prático com exercícios do tipo step-by-step para você aprender a usar o Data Transformation Services do SQL Server e nele criar pacotes de extração, transformação e carga de dados. Com este treinamento você será capaz de:
Criar um pacote DTS
Criar um projeto no DTS
Monitorar o progresso de um pacote DTS
Visualizar os resultados do log de um pacote DTS
Presentation prepared for Oracle Tutorials series held at CERN, focusing on Oracle Database security from users and developers point of view. Apart from basics, there is a discussion about SQL injection attacks with illustrative examples.
JavaScript and Friends August 20th, 20201 -- MySQL Shell and JavaScriptDave Stokes
The MySQL Shell has a JavaScript mode where you can use JS libraries to access you data and you can also write (and save) your own custom reports (or programs) for future use.
Advanced SQL injection to operating system full control (whitepaper)Bernardo Damele A. G.
Over ten years have passed since a famous hacker coined the term "SQL injection" and it is still considered one of the major web application threats, affecting over 70% of web application on the Net. A lot has been said on this specific vulnerability, but not all of the aspects and implications have been uncovered, yet.
It's time to explore new ways to get complete control over the database management system's underlying operating system through a SQL injection vulnerability in those over-looked and theoretically not exploitable scenarios: From the command execution on MySQL and PostgreSQL to a stored procedure's buffer overflow exploitation on Microsoft SQL Server. These and much more will be unveiled and demonstrated with my own tool's new version that I will release at the Conference (http://www.blackhat.com/html/bh-europe-09/bh-eu-09-speakers.html#Damele).
Because Windows Installer installations do not contain an explicit script, the debugging techniques are different from those generally used with programming languages. The techniques described in this white paper include:
• Investigating Windows Installer error codes
• Generating and interpreting Windows Installer log files
• Using the InstallShield MSI Debugger
This white paper also discusses how InstallShield® helps you with run-time logging and debugging.
Pymes, transformación digital e internacionalizacion. CEEI Aragon - 8 junioCarmen Urbano
Tecnología e innovación para impulsar la internacionalización de nuestras empresas y modelos de negocio. Transformación digital e internacionalización.
Presentation prepared for Oracle Tutorials series held at CERN, focusing on Oracle Database security from users and developers point of view. Apart from basics, there is a discussion about SQL injection attacks with illustrative examples.
JavaScript and Friends August 20th, 20201 -- MySQL Shell and JavaScriptDave Stokes
The MySQL Shell has a JavaScript mode where you can use JS libraries to access you data and you can also write (and save) your own custom reports (or programs) for future use.
Advanced SQL injection to operating system full control (whitepaper)Bernardo Damele A. G.
Over ten years have passed since a famous hacker coined the term "SQL injection" and it is still considered one of the major web application threats, affecting over 70% of web application on the Net. A lot has been said on this specific vulnerability, but not all of the aspects and implications have been uncovered, yet.
It's time to explore new ways to get complete control over the database management system's underlying operating system through a SQL injection vulnerability in those over-looked and theoretically not exploitable scenarios: From the command execution on MySQL and PostgreSQL to a stored procedure's buffer overflow exploitation on Microsoft SQL Server. These and much more will be unveiled and demonstrated with my own tool's new version that I will release at the Conference (http://www.blackhat.com/html/bh-europe-09/bh-eu-09-speakers.html#Damele).
Because Windows Installer installations do not contain an explicit script, the debugging techniques are different from those generally used with programming languages. The techniques described in this white paper include:
• Investigating Windows Installer error codes
• Generating and interpreting Windows Installer log files
• Using the InstallShield MSI Debugger
This white paper also discusses how InstallShield® helps you with run-time logging and debugging.
Pymes, transformación digital e internacionalizacion. CEEI Aragon - 8 junioCarmen Urbano
Tecnología e innovación para impulsar la internacionalización de nuestras empresas y modelos de negocio. Transformación digital e internacionalización.
Emprendedores e Internacionalización. Misión a Toulouse 26 y 27 de marzo. Zar...Carmen Urbano
26 y 27 de marzo, una delegación de emprendedores de los viveros de Zaragoza Activa y el CIEM, acompañados por Raúl Oliván y Carmen Urbano, visitarán uno de los espacios de coworking más representativos de Francia: La Cantine de Toulouse, donde tenemos organizado un evento de networking.
El martes 27 visitaremos la TIC VALLEY en Labège, uno de los viveros TIC de renombre en el Midi Pyrénées.
Presentación del brochure turístico de Teruel "Garantía e éxito", ciudad española situada en el sur de Aragón, en la zona centro-oriental de España, que posee, entre otras cosas, un importante patrimonio artístico mudéjar (parte del cual ha sido reconocido por la Unesco como Patrimonio de la Humanidad).
"La internacionalizacion es responsabilidad de todos", por Carmen Urbano (ent...Carmen Urbano
Revista "ACTUALIDAD DE LAS EMPRESAS ARAGONESAS"
Septiembre 2015, publicación nº 75. Enlace online: http://www.actualidaddelasempresasaragonesas.es/wp-content/uploads/2015/08/75_ActualidadEA.pdf
En portada: Pedro Santiesteve, Alcalde de Zaragoza.
We are Providing #FREE #SQL #Database #Training to students.. Registration Fees Apply
For Registration Call us : 8087155500 / 8149775757
Java,PHP,UIDesign,.Net,Adnroid,Softwaretesting
Encryption Technology
Above Jijamata Bank, 4rth Floor, Near Karve Nagar Bus stand, Pune
Microsoft released SQL Azure more than two years ago - that's enough time for testing (I hope!). So, are you ready to move your data to the Cloud? If you’re considering a business (i.e. a production environment) in the Cloud, you need to think about methods for backing up your data, a backup plan for your data and, eventually, restoring with Red Gate Cloud Services (and not only). In this session, you’ll see the differences, functionality, restrictions, and opportunities in SQL Azure and On-Premise SQL Server 2008/2008 R2/2012. We’ll consider topics such as how to be prepared for backup and restore, and which parts of a cloud environment are most important: keys, triggers, indexes, prices, security, service level agreements, etc.
CTE Ottawa Seminar Day - September 7th, 2012
This clinic introduces the key features and enhancements in SQL Server 2012. It is designed to provide a high-level overview of the product and the key new capabilities in this release.
This course is intended for technology managers and database professionals who want to understand the key capabilities of SQL Server 2012. In many cases, it is assumed that senior technical managers may attend this clinic in order to assess the further training that their technology-focused employees will need in order to adopt SQL Server 2012.
RightScale Webinar: Best Practices: Software Development Strategies Using Win...RightScale
In April of 2013 Microsoft released the Windows Azure IaaS service for general availability. We were proud to be a launch day partner with Microsoft and here at RightScale we are excited to see the cloud computing market mature and grow.
Please join us for an in-depth discussion and demonstration on how to increase agility and automation in your software development lifecycle.
In this webinar, we will cover how to:
- Enrich the dev/test cycle with Infrastructure as a Service (IaaS)
- Perform rapid testing and validation
- Enable virtual machine usage for dev/test, with a deep discussion of the artifacts and mechanics of it
- Create IT policy without headaches
- Enable dev/test with "approved assets" and policies
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
11 qmds2005 session16
1. Querying and Managing Data Using SQL Server 2005
Objectives
In this session, you will learn to:
Understand managed code
Create managed database objects
Define the Hypertext Transfer Protocol endpoints
Implement the Hypertext Transfer Protocol endpoints for Web
services
Ver. 1.0 Session 16 Slide 1 of 31
2. Querying and Managing Data Using SQL Server 2005
Introduction to SQL Server CLR Integration
CLR integration:
Allows the database developer to write the code in any of
the .NET supported languages
Allows to run managed code within a database
Provides the following functions and services required for
program execution
Ver. 1.0 Session 16 Slide 2 of 31
3. Querying and Managing Data Using SQL Server 2005
Identifying the Need for Managed Code
Managed database objects can be created in the following
situations:
To implement complicated programming logics
To access external resources
To implement a CPU-intensive functionality that can run more
efficiently as compared to the managed code.
T-SQL statements can be used in the following situations:
To perform data access and manipulation operations that can
be done using the T-SQL statements.
To implement programming logic tat can be easily
implemented using T-SQL programming constructs.
Ver. 1.0 Session 16 Slide 3 of 31
4. Querying and Managing Data Using SQL Server 2005
Just a minute
Which of the following is supported by .NET and not by
T-SQL?
1. Writing queries
2. Creating procedures
3. Object-Orientation
4. Writing triggers
Answer:
3. Object-Orientation
Ver. 1.0 Session 16 Slide 4 of 31
5. Querying and Managing Data Using SQL Server 2005
Importing and Configuring Assemblies
Assemblies:
Are created to attach the managed code
Are created using the CREATE ASSEMBLY command
Syntax:
CREATE ASSEMBLY assembly_name
FROM { <client_assembly_specifier> |
<assembly_bits>
[ ,...n ] }
[ WITH PERMISSION_SET =
{ SAFE | EXTERNAL_ACCESS | UNSAFE } ]
Let’s see how…
Ver. 1.0 Session 16 Slide 5 of 31
6. Querying and Managing Data Using SQL Server 2005
Just a minute
Which of the following PERMISSION_SET will you use to
access another database server?
1. SAFE
2. EXTERNAL_ACCESS
3. UNSAFE
Answer:
2. EXTERNAL_ACCESS
Ver. 1.0 Session 16 Slide 6 of 31
7. Querying and Managing Data Using SQL Server 2005
Creating Managed Database Objects
Managed database objects can be of the following types:
Stored Procedures
Functions
Triggers
UDTs
Ver. 1.0 Session 16 Slide 7 of 31
8. Querying and Managing Data Using SQL Server 2005
Creating Managed Database Objects (Contd.)
Managed stored procedure:
Is implemented by creating a procedure that refers to an
imported assembly
Syntax:
CREATE PROCEDURE <Procedure Name>
AS EXTERNAL NAME <Assembly Identifier>.<Type
Name>.<Method Name>,
Let’s see how…
Ver. 1.0 Session 16 Slide 8 of 31
9. Querying and Managing Data Using SQL Server 2005
Creating Managed Database Objects (Contd.)
Managed function:
Is implemented by creating a function that refers to an
imported assembly
Syntax:
CREATE FUNCTION <Function Name>
(
<Parameter List>
)
RETURNS <Return Type>
AS EXTERNAL NAME <Assembly Identifier>.<Type
Name>.<Method Name>
Let’s see how…
Ver. 1.0 Session 16 Slide 9 of 31
10. Querying and Managing Data Using SQL Server 2005
Creating Managed Database Objects (Contd.)
Managed trigger:
Is implemented by creating a trigger that refers to an imported
assembly
Syntax:
CREATE TRIGGER <TriggerName>
ON <Table or View> <FOR | INSTEAD OF | AFTER>
< INSERT | UPDATE | DELETE >
AS EXTERNAL NAME <Assembly Identifier>.<Type
Name>.<Method Name>
Let’s see how…
Ver. 1.0 Session 16 Slide 10 of 31
11. Querying and Managing Data Using SQL Server 2005
Creating Managed Database Objects (Contd.)
Managed user-defined type:
Is created by using the CREATE TYPE command
Syntax:
CREATE TYPE [ schema_name. ] type_name
{
FROM base_type [ (precision [ , scale ] ) ]
[ NULL | NOT NULL ]
| EXTERNAL NAME assembly_name[.class_name]
}
Let’s see how…
Ver. 1.0 Session 16 Slide 11 of 31
12. Querying and Managing Data Using SQL Server 2005
Just a minute
When will you use managed code instead of T-SQL?
1. When you need to write queries.
2. When you need to access external resources.
3. When you need to perform an administrative task on the
database.
Answer:
2. When you need to access external resources.
Ver. 1.0 Session 16 Slide 12 of 31
13. Querying and Managing Data Using SQL Server 2005
Demo: Implementing Managed User-Defined Types
• Problem Statement:
The management of AdventureWorks, Inc. has decided that
they want to include the details of the spouse of employees in
the database. The application that is used to enter the
employee detail will accept the name and date of birth of the
spouse of an employee. In addition, it will concatenate the two
values separated by a ";". As a database developer, you need
to store the spouse details in the following format:
Spouse Name: <name of the spouse> ; Spouse Date of Birth :
<date of birth>
To implement this, you have decided to create a managed
user-defined data type. How will you create this data type?
Ver. 1.0 Session 16 Slide 13 of 31
14. Querying and Managing Data Using SQL Server 2005
Demo: Implementing Managed User-Defined Types (Contd.)
Solution:
To solve the preceding problem, you need to perform the
following tasks:
1. Enable CLR in the database.
2. Create an assembly.
3. Create a managed database user-defined data type.
4. Create a table that will implement the user-defined data type.
5. Verify the output.
Ver. 1.0 Session 16 Slide 14 of 31
15. Querying and Managing Data Using SQL Server 2005
Introduction to Service-Oriented Architecture (SOA)
SOA:
Is an extension of distributed computing based on the
request/reply design pattern
Modularizes the business logic of an application and presents
them as services
Allows to create objects, such as, Web services that can be
accessed from heterogeneous systems
Ver. 1.0 Session 16 Slide 15 of 31
16. Querying and Managing Data Using SQL Server 2005
Introduction to Web Services
Flash presentation: Introduction to Web Services
Web Service is a collection of methods that provide
programmable logic used by client applications over the
Internet.
SQL Server 2005 provides native XML Web services by
using the following open standards:
Hypertext Transfer Protocol (HTTP)
Simple Object Access Protocol (SOAP)
Web Services Definition Language (WSDL)
Ver. 1.0 Session 16 Slide 16 of 31
17. Querying and Managing Data Using SQL Server 2005
Just a minute
Which of the following describes the Web services?
1. WSDL
2. SOAP
3. UDDI
Answer:
1. WSDL
Ver. 1.0 Session 16 Slide 17 of 31
18. Querying and Managing Data Using SQL Server 2005
Just a minute
Which of the following helps in finding a Web service?
1. WSDL
2. SOAP
3. UDDI
Answer:
3. UDDI
Ver. 1.0 Session 16 Slide 18 of 31
19. Querying and Managing Data Using SQL Server 2005
Identifying the Role of HTTP Endpoints in Native Web Service Architecture
HTTP Endpoint:
Is the gateway through which HTTP-based clients can query
the database server
Created for use with SQL Server 2005 can listen and receive
requests on the TCP port (port 80)
Ver. 1.0 Session 16 Slide 19 of 31
20. Querying and Managing Data Using SQL Server 2005
Identifying the Role of HTTP Endpoints in Native Web Service Architecture (Contd.)
HTTP Endpoint Architecture:
Ver. 1.0 Session 16 Slide 20 of 31
21. Querying and Managing Data Using SQL Server 2005
Just a minute
On which of the following ports does the SQL Server listen
for HTTP requests?
1. 80
2. 90
3. 70
Answer:
1. 80
Ver. 1.0 Session 16 Slide 21 of 31
22. Querying and Managing Data Using SQL Server 2005
Creating HTTP Endpoints
Involves the following tasks:
1. Creating the required database code to access the data.
2. Creating an HTTP Endpoint using the CREATE ENDPOINT
statement.
Ver. 1.0 Session 16 Slide 22 of 31
23. Querying and Managing Data Using SQL Server 2005
Creating HTTP Endpoints (Contd.)
Syntax:
CREATE ENDPOINT endpoint_name
STATE = { STARTED | STOPPED | DISABLED }
AS HTTP (
AUTHENTICATION =( { BASIC | DIGEST |
INTEGRATED | NTLM | KERBEROS },
PATH = 'url', PORTS = (CLEAR) )
FOR SOAP(
[ { WEBMETHOD [ 'namespace' .] 'method_alias'
( NAME = 'database.owner.name'
[ , SCHEMA = { NONE | STANDARD | DEFAULT } ]
[ , FORMAT = { ALL_RESULTS | ROWSETS_ONLY } ])
} [ ,...n ] ]
[ BATCHES = { ENABLED | DISABLED } ]
[ , WSDL = { NONE | DEFAULT | 'sp_name' } ]
Let’s see how…
Ver. 1.0 Session 16 Slide 23 of 31
24. Querying and Managing Data Using SQL Server 2005
Just a minute
While creating an HTTP Endpoint, which of the following
format will you use to return only the result set to the user?
1. ROWSET_ONLY
2. ALL_RESULT
3. NONE
Answer:
1. ROWSET_ONLY
Ver. 1.0 Session 16 Slide 24 of 31
25. Querying and Managing Data Using SQL Server 2005
Demo: Implementing HTTP Endpoints
• Problem Statement:
The database server of AdventureWorks, Inc. is located at
Bothell. The organization has various offices located at various
locations spread across the globe.
According to the requirements, the users need to access the
data of all the employees at various locations. Users might
need to use PDAs or mobile phones to access these details.
As a database developer, you have decided to implement a
Web service that allows the users to access the data using the
Internet.
How will you implement this service inside the AdventureWorks
database?
Ver. 1.0 Session 16 Slide 25 of 31
26. Querying and Managing Data Using SQL Server 2005
Demo: Implementing HTTP Endpoints (Contd.)
Solution:
To solve the preceding problem, you need to perform the
following tasks:
1. Create a procedure.
2. Create an HTTP Endpoint for SOAP.
3. Verify the creation of HTTP endpoint. `
Ver. 1.0 Session 16 Slide 26 of 31
27. Querying and Managing Data Using SQL Server 2005
Summary
In this session, you learned that:
The database objects created in any of the .NET supported
languages are called managed database objects.
CLR integration provides the following benefits:
• Better programming model
• Common development environment
• Ability to define data types
T-SQL can be used to perform data access and manipulation
operations that can be implemented using the programming
constructs provided by T-SQL.
Ver. 1.0 Session 16 Slide 27 of 31
28. Querying and Managing Data Using SQL Server 2005
Summary (Contd.)
Managed database objects can be used in the following
situations:
To implement complicated programming logic for which you can
reuse the functionality provided by the .NET base class libraries.
To access external resources, such as calling a Web service or
accessing the file system.
To implement a CPU-intensive functionality that can run more
efficiently as compared to the managed code.
By default, the SQL Server does not allow running managed
code on the server.
Before creating a managed database object in your database,
the CLR integration feature should be enabled in the database
using the sp_configure stored procedure.
The .NET code that is used to create the managed database
objects is compiled in .NET assemblies, .dll or .exe files.
To create a managed database object, first first the.NET
assemblies are imported in the database engine.
Ver. 1.0 Session 16 Slide 28 of 31
29. Querying and Managing Data Using SQL Server 2005
Summary (Contd.)
The assemblies in the database engine can be given any of the
following three permissions:
SAFE
EXTERNAL_ACCESS
UNSAFE
Managed stored procedure can be created using the CREATE
PROCEDURE command.
Managed function can be created using the CREATE
FUNCTION command.
Managed trigger can be created using the CREATE TRIGGER
command.
Managed data type can be created using the CREATE TYPE
command.
A Web service is the piece of code that is exposed over the
Internet.
Ver. 1.0 Session 16 Slide 29 of 31
30. Querying and Managing Data Using SQL Server 2005
Summary (Contd.)
Web services have following advantages:
• Interoperability
• Multilanguage support
• Reusing existing applications
SOAP is a standard communication protocol to interchange
information in a structured format in a distributed environment.
WSDL is a markup language that describes a Web service.
UDDI provides a standard mechanism to register and discover
a Web service.
HTTP endpoints allow you to create and use Web services
within the SQL Server.
Before creating an HTTP endpoint, you need to first create
stored procedures or functions that form a Web service.
Ver. 1.0 Session 16 Slide 30 of 31
31. Querying and Managing Data Using SQL Server 2005
Summary (Contd.)
HTTP endpoints provide the users with a connecting point
through which they can access the implemented functions.
You can create HTTP endpoints by using the CREATE
ENDPOINT statement.
Ver. 1.0 Session 16 Slide 31 of 31
Editor's Notes
Start the session by sharing the objectives with the students.
In this slide, you need to explain the students about CLR. As they have already read about CLR in the previous module, you need not to go into the details of CLR. In addition, you also need to explain them that CLR has now been incorporated in the SQL Server itself. Also explain the students about the benefits of integrating CLR inside SQL Server itself. You can use the examples provided in the Student Guide to clarify the concept to the students. Additional Inputs T-SQL has been the conventional language to write database objects, such as stored procedure, triggers and functions. SQL Server 2005 provides the new possibilities to the database developer by integrating .NET Framework in it. SQL Server 2005 allows the database developers to write stored procedures, triggers, user-defined types, user-defined aggregates, and user-defined functions in any of the .NET supported language, build a dll, register and use it inside a SQL Server.
In this slide, you need to explain the need for managed code to the students. You need to explain the limitations of T-SQL to the students, and how those limitations can be overcome by the introducing managed code in SQL Server. Additional Input T-SQL is a great language to manipulate and query data from a database server, and working on set-based operations. It provides a number of database features
Example: You have created a managed code and saved it as CLRIntegration.dll. To create an assembly for this dll, you can write the following code: CREATE ASSEMBLY CLRIntegration FROM ‘ C:\\CLRIntegration\\CLRIntegration.dll’ WITH PERMISSION_SET = SAFE
For example, the employees data stored in the database need to be converted into an XML file. For this purpose, you need to create a function that will read the data from the table and write it inside the XML file. As you need to access an external file, you need to create a managed procedure.
For Example, you need a function that accepts Employee Id as an input, does all the processing, and finally displays the actual salary of that employee for current month. The processing includes, adding all the components of the salary, checking and adjusting the salary according to the attendance, and deducting the provident fund contribution. Writing this code in T-SQL is very complicated, as it involves a number of decisions and a number of processing. You can create a managed function that accepts employee code and returns the actual salary.
For Example, you want that whenever a new database object is added in the AdventureWorks database, the same should be added in the list of the database objects available with the database administrator. The list of database objects is stored in a text file with the DBA.
For Example, You need to create a data type to store the zip code of addresses of the employees. You also want if user enters valid code, the name of the state is stored in the column else an error message should be displayed. Creating such a UDT is very complicated in SQL Server, for this purpose you will create a Managed UDT.
Do not go into the depth of SOAD, WSDL, and UDDI. Just try to clear the concept of Web Services to the student.
Example: You have created a function that returns the day as number. To create a new endpoint named sqlEndpoint, you need to use the following code in SQL Server. CREATE ENDPOINT sql_endpoint STATE = STARTED AS HTTP( PATH = '/sql', AUTHENTICATION = (INTEGRATED ), PORTS = ( CLEAR ), SITE = 'SERVER' ) FOR SOAP ( WEBMETHOD 'GetSqlInfo' (name='master.dbo.xp_msver', SCHEMA=STANDARD ), WEBMETHOD 'DayAsNumber' (name='master.sys.fn_MSdayasnumber'), WSDL = DEFAULT, SCHEMA = STANDARD, DATABASE = 'master', NAMESPACE = 'http://tempUri.org/' );
You can summarize the session by running through the summary given in SG. In addition, you can also ask students summarize what they have learnt in this session.
You can summarize the session by running through the summary given in SG. In addition, you can also ask students summarize what they have learnt in this session.
You can summarize the session by running through the summary given in SG. In addition, you can also ask students summarize what they have learnt in this session.
You can summarize the session by running through the summary given in SG. In addition, you can also ask students summarize what they have learnt in this session.