Migrating from MS Access to mySQL

Migrating from MS Access to mySQL

In an era where data becomes volumetric in every business, much attention has been given to proper database management and the ease of data access. Businesses that use Access begin to look for an alternative which allows better database performance, higher reliability, higher flexibility, yet inexpensive.

With the numerous choices available in the market, considering you don’t want to put too much investment on it, only one, MySQL, stands out from the crowd. MySQL’s flexibility allows you to deploy it cross various platforms, it also allows multiple user access concurrently. If you wish, you can still continue to do your data administration through Access as a front end. However, despite the various MySQL’s features overtaking Access, whether or not to migrate your data from Access to MySQL still need an in-depth consideration.

In this paper, I will firstly discuss about whether or not to migrate your Access data to MySQL. Then, I will cover about the considerations, planning and preparations which you should made before migrating your data. After all the planning and preparation stages has been finished, I will illustrate to you how the migration can be done with the help of Navicat, a MySQL database administration GUI.

by Allen Lee, Read full article...
Useful tips to secure your SQL Server

Useful tips to secure your SQL Server

Microsoft SQL Server is a relational database management system (RDBMS) produced by Microsoft. Its primary query language is Transact-SQL with it's most popular version Sql server 2005.

You can determine what version SQL Server is running by running:

Select @@version (Where @@Version is a system level variable that holds the current version).

How do I restict clients by IP Address?

As the SQL Server has no built-in support for restricting clients by IP address, the most common work-arounds are firewalls, IPSec, or third-party network layer filters to allow only certain source IP addresses and target TCP ports (the port on which SQL Server is listening).

What are some things I can do to secure my SQL Server?

- Keep up to date on SQL Server service packs and patches
- Audit SQL Server accounts for weak passwords
- Restrict access to the SQL Server to only trusted clients
- Use Windows Only authentication where possible
- Store SQL Server backup files in a secure location and encrypted
- Disable all netlibs if the SQL Server is local-only
- Regularly scan the installation with Microsoft's Baseline Security Analyzer

How to applying SQL Server Service Packs


Giles is a Sketch Artist, Asian Blogger and loves SQL Servers.
Article Source: Free Article Directory - Search And Submit Articles
CodeBank, Portable tree-based PIMs

CodeBank, Portable tree-based PIMs

When you need a quite handy for storing and carry personal information database anywhere you go then you need CodeBank Portable. It's a tree-based personal information database. It is geared towards storing code snippets, with built-in syntax highlighting for C/C++, Object Pascal, Java, XML, Visual Basic, VBScript, JavaScript, CSS, HTML, PHP, Perl, Python and SQL.
It supports ZIP compression for a smaller database, and AES encryption to keep your sensitive data safe from prying eyes. Its search function supports a filtered view that displays all matching records at a glance.

Download the ZIP package and extract to a folder of your choice. Launch the program by double-clicking on CodeBank.exe.

Download CodeBank v.2.1.2. from zeraha.org
Author: Nikola Dachev
Attendance Record Application Video Tutorial

Attendance Record Application Video Tutorial

I found this youtube videos about Staff Annual Leave Attendance Recording, this is from sellwindowsmedia.com, click play for 02:50 seconds layers and watch step by step tutorial.

Tutorial description:
MS Access Attendance Record is a light compact application that allows your staff to record and maintain their own annual leave attendance.
* On screen indicator showing annual leave allocated and remaining.
* Ability to automate and send email of annual leave requested.
* On screen pie chart showing type of leave taken. Example annual, exam, flexi etc..
* Print the annual leave sheet for defined periods.

ActiveX component to retrieve password

ActiveX component to retrieve password

This is a small ActiveX component that allows you to retrieve the database password of every password-protected mdb file that created with Microsoft Access 95/97/2000/XP or with Jet Database Engine 3.0/4.0 .
You can use this component in all development tools that supports ActiveX components, including Visual Basic, Visual C++, Microsoft Access, Delphi, and other development tools.

Limitations:
  • Passwords of Access 2000/XP files cannot be recovered if their length is longer than 18 characters.
  • This ActiveX DLL can only reveal the main database password. It cannot recover the user-level passwords.
In order to start using this ActiveX DLL, you have to register it on your machine. You can use the regsvr32 utility for registering the Access PassView ActiveX component. In order to do it, type the following command: regsvr32 accesspv.dll

The Access PassView ActiveX package includes a Visual Basic sample that demonstrates how to use this component. You can watch it by opening the accesspv.vbp project.

Download Access PassView ActiveX DLL v1.00
Visit Publisher's homepage
VB Recordset Generator

VB Recordset Generator

VBRSGen is a Visual Basic 6.0 Add-In creates complete ADO or DAO recordset and SQL code ready to paste into your VB project from Clipboard or Notepad, including declaring variables and objects.
Uses any Access database table or query, has a "Where" clause builder tool and a results preview grid. Extracts actual SQL statements from Access queries and formats output for VB 6 forms or code modules.

Supported Operating Systems: Win95,Win98,WinME,WinNT 4.x,WinXP,Windows2000
System Requirements:Visual Basic 6.0
Install Support: Install and Uninstall.

Download shareware VBRSGen
Visit website to buy with paypal with only $20


IT data Search Engine

What is Splunk?
Splunk is the search engine for logs and IT data. It's software that indexes and enables you to search, navigate, alert and report on all the data logged by any application, server or network device in real-time.

What's new in Splunk 3.1?

Form search
Search strings can now contain variables that are rendered as form elements in the SplunkWeb interface. When used with Saved searches, inexperienced users can search efficiently without knowing the details of the search language. This feature simplifies searching by asking the user to input exactly the parameters he is looking for, instead of a complete and potentially complex search.

Search language simplification
As part of a general effort to simplify the search language, equal signs can now be used where double colons were required. In prior releases, search field syntax required a double colon but extracted field syntax required an equal sign. For example, host::splunker for the host search field and myfield=value for the extracted field myfield. Now search and extracted fields can both be used with equal signs in searches.

Archiving

With the introduction of enhanced archiving and export, customers now have the capability to flexibly archive their Splunk data based on time and size, critical for large and long-term data storage issues common with compliance mandates. This data can be easily resurrected back into Splunk for historical searches, and data can be exported simply and easily to put Splunk-gathered data anywhere an operator desires.

New release: Splunk for Windows (preview version)

Download Splunk 3.1.5
Download Splunk for Windows (XP Professional, Server 2003)
Visit website
Databases and Sql as a Middle Tier Storage Medium

Databases and Sql as a Middle Tier Storage Medium

DOTNUTSHELL Technologies are an experienced database designing company , with Oracle accredicated qualification providing services both in the OpenSource and Enterprise field.

Microsoft SQL Server is a relational database management system. Its primary query language is Transact-SQL, an implementation of the ANSI/ISO standard Structured Query Language (SQL) used by both Microsoft and Sybase.

Microsoft SQL Server uses a variant of SQL called T-SQL, or Transact-SQL, an implementation of SQL-92. T-SQL mainly adds additional syntax for use in stored procedures, and affects the syntax of transaction support.

SQL Server includes support for database mirroring and clustering. A SQL server cluster is a collection of identically configured servers, which help distribute the workload among multiple servers. All the servers share an identical virtual server name, and it is resolved into the IP address of any of the identically configured machines by the clustering runtime. Automatic failover clustering is also available, in which the workload of a server is transferred to another system in the event of a system failure.SQL server also supports data partitioning for distributed databases. Database mirroring, introduced in SQL Server 2005, allows creation of mirrors (or replicas) of database contents, along with transaction logs, on another instance of SQL Server, based on certain predefined triggers.

Microsoft and other vendors provide a number of software development tools designed to allow business applications to be developed using the data stored by Microsoft SQL Server. Microsoft SQL Server 2005 now includes the common language runtime (CLR) component for Microsoft .NET. Applications developed with .NET languages such as VB.NET or C# can implement stored procedures and other functions. Older versions of Microsoft development tools typically use APIs to access Microsoft SQL Server functionality.

We can design and engineer databases based on your business model and provide tools and interfaces that can be used to mine your business data. We also have experience in database persistence and create custom persistence frameworks and algorythms which can be used to predict patterns and trends from your data.

Oracle Database is a relational database management system released by Oracle Corporation. Oracle Database has become a major feature of database computing.

An Oracle database system comprises at least one instance of the application, along with data storage. An instance comprises a set of operating-system processes and memory-structures that interact with the storage. Typical processes include PMON (the process monitor) and SMON (the system monitor).

Users of Oracle databases refer to the server-side memory-structure as the SGA (System Global Area). The SGA typically holds cache information such as data-buffers, SQL commands and user information. In addition to storage, the database consists of online redo logs (which hold transactional history). Processes can in turn archive the online redo logs into archive logs (offline redo logs), which provide the basis (if necessary) for data recovery and for some forms of data replication.

The Oracle RDBMS stores data logically in the form of tablespaces and physically in the form of data files. Tablespaces can contain various types of memory segments; for example, Data Segments, Index Segments etc. Segments in turn comprise one or more extents. Extents comprise groups of contiguous data blocks. Data blocks form the basic units of data storage. At the physical level, data-files comprise one or more data blocks, where the block size can vary between data-files.

Oracle databases can be used to create distributed database running over contiguous or disparate logistical locations. It can be used to store data and information and provides high availably and performance and is used extensively as a practial and reliable database.

We can design and engineer databases based on your business model and provide tools and interfaces that can be used to mine your business data. We also have experience in database persistence and create custom persistence frameworks and algorythms which can be used to predict patterns and trends from your data.

MySQL is a multithreaded, multi-user SQL database management system which has, according to MySQL AB, more than 10 million installations. The basic program runs as a server providing multiuser access to a number of databases.

Libraries for accessing MySQL databases are available in all major programming languages with language-specific APIs. In addition, an ODBC interface called MyODBC allows additional programming languages that support the ODBC interface to communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server and official libraries are mostly implemented in ANSI C/ANSI C++.

MySQL is popular for web applications and acts as the database component of the ;

- LAMP (Linux-Apache-MySQL-PHP/Perl/Python)
- MAMP (Mac-Apache-MySQL-PHP/Perl/Python)
- WAMP (Windows-Apache-MySQL-PHP/Perl/Python)

Its popularity for use with web application is closely tied to the popularity of PHP, which is often combined with MySQL. PHP and MySQL are essential components for running popular content management systems such as WordPress and Drupal blogging platforms. Wikipedia runs on MediaWiki software, which can also use PHP and a MySQL database.

MySQL is the most widely used OpenSource SQL database in the world. It provides features and services which make it ideal for small to medium enterprises to effectively manage small to reasonably large business data. It is also fulyl compliant with the SQL standard and provides support for stored procedures and object abstraction when coupled with object persistence frameworks.

We can design and engineer databases based on your business model and provide tools and interfaces that can be used to mine your business data. We also have experience in database persistence and create custom persistence frameworks and algorythms which can be used to predict patterns and trends from your data.



---------------
Article Source:
http://www.articlesbase.com
About the Author:
DOTNUTSHELL Technologies
Your Data Is Your Life! How To Back It Up, Secure It, Sync It And Sleep Better At Night.

Your Data Is Your Life! How To Back It Up, Secure It, Sync It And Sleep Better At Night.

No one likes to admit it, but by January 3rd. each year we’ve mostly forgotten or postponed our well-intentioned New Year’s resolutions of self improvement. How many of us have chosen ‘losing weight’ as one of our personal pledges? Although a healthier lifestyle is an admirable goal, I will suggest that the most critical resolution is that we take steps to ensure the weight we lose is not from our bank account or our hard drive. Personal security in all areas of our lives should be resolution number one. It does not matter that New Year’s Eve is history and this wasn’t on your list, getting yourself protected and your data backed-up securely is no longer something anyone should put off.

Our electronic world is fraught with external computer threats and internal software and hardware problems. Viruses and Trojans batter your firewall relentlessly and at some point almost every hard drive will fail. It is not a question of if it will happen to you, but when it will happen. In addition, this brave new world of ours offers universal Internet access. Criminals behind bars and the criminal who lives down the block can find their way into your home or your business and plunder your electronic records. If the bad guys don’t get you, their malicious viruses eventually will – it’s only a matter of time.

The objective of every person who owns a computer must be bulletproof security for personal data, protection of our personal identity and all related digital information. There is no more important resolution you can make than to protect yourself and your family from digital loss or theft. To make matters worse, managing and organizing our personal data is getting increasingly more complex. We store our data on our desktops, copy updates from our laptops and try to juggle everything between our Blackberry or cell phone.

For the average non-techie user (that would be most of us), this data dance is reaching the ‘out of control’ stage. Fortunately there are a number of things we can do using inexpensive or free products and services to help wrangle this back under control. As a small business consultant and one who earns a living online, I was forced to discover a solution that was secure, convenient, scalable and cost effective. After security, my primary issue was the convenience factor; I needed something that was basically automatic. I have forgotten to backup critical files in the past and I’ve lost a number of hard drives over the years, and I never want to relive those experiences.

The following recommendations are not hypothetical or offered purely as well meaning advice, this is how I manage, backup, protect and sync my data with inexpensive products and services that I use every day.

Data Backup:

My desktop computer performs a full hard drive backup as I sleep using a remote backup service called Mozy. I have talked about Mozy in previous articles that are available on my website. Mozy is 100% automatic, secure and incredibly economical! They use 128-bit SSL encryption during the data transfer process, which is the same method banks use. 448-bit Blowfish encryption secures your files on their servers keeping your data safe from hackers. Mozy backs up your files whether they're open or closed and it backs up Outlook files providing disaster-proof email protection. World-class unlimited backup, state-of-the-art security, automatic administration and 100% peace of mind will set you back a whopping $4.95 per month. Duh! That shouldn’t require much thought.

I am not paranoid about data loss (well maybe a little), but in addition to Mozy I sometimes employ a local backup. There are occasions where I have created important documents, written chapters in a book or made site-wide changes to a website and it could be many hours before Mozy begins its nightly backup. In such cases I will do a quick backup to an external drive such as a Maxtor or Flash drive. If you have ever accidentally lost a document that you slaved over for hours… you’ll understand.

Data Synchronization:

Once you have put your main data backup service in place, you’ll want to coordinate the synchronizing of data between all of your computers and peripheral networks or devices. The best solution I have found is a program called GoodSync, which will synchronize data between your desktop PC and laptop, home and office computers, computer and removable devices (USB Key, Flash Drive, CDRW disc), over a local network or the Internet. PC Magazine, Network World and other trusted sites give GoodSync their seal of approval and you can add my endorsement to that list.

GoodSync offers true bi-directional synchronization, which prevents the deletion of files and data loss. Like Mozy, GoodSync is by far the easiest and most intuitive syncing program I have discovered at any price. GoodSync offers effortless automatic synchronization, and this is another no-brainer. You can download and use GoodSync for free, but I would recommend that you upgrade to GoodSync Pro for $19 and use all of their amazing features and free updates.

Data Protection:

My antivirus program of choice is avast! Home Edition. I have been using this program for years and I have never had an incident. avast! is a full-featured antivirus package designed for home users and non-commercial use and the Home Edition is free of charge. I’m sure you are curious as to why such a robust program would be free. It is their opinion that it is possible to prevent global viruses from spreading by efficient prevention, and many users are not able to or do not want to pay for antivirus software. I think the marketing twist is that when you see how well this program performs, you’ll buy the commercial version for your business.

Resident protection (the real-time protection of the operating system), is one of the most important parts of an antivirus program. avast! features a powerful resident module that is able to detect a virus before it has any chance to infect your computer. You can expect 100% detection of In-the-Wild viruses (viruses already spreading between users) and excellent detection of Trojan horses.

Personal Security:

While we are talking about securing and backing up personal data, it is my opinion that the job is not complete until you have protected yourself. You have medical and life insurance, but odds are that you do not yet have ‘identity insurance’. Identity theft occurs to someone in America every few seconds and it is reaching epidemic proportions.

I remember the early days of the commercial Internet when rumors began to circulate about malicious programs that were being spread by file downloads. The early virus attacks were harmless by today’s standards and antivirus programs hadn’t yet been introduced. They were mostly rumors back then, but everyone seemed to know someone - who knew someone - who had been attacked by such a ‘virus’. It wasn’t long before such a thing developed into a global calamity and antivirus software became the first program you loaded onto a new computer.

I believe that is where we find ourselves today as it relates to Identity Theft. Although this is one of the fastest growing crimes, we are in the early stage of a global scourge. You've probably heard Paul Harvey or Sean Hannity talk on the radio about a company called LifeLock. LifeLock gets a lot of attention because their CEO Todd Davis publishes his Social Security number online. LifeLock is a proactive identity theft protection agency, specializing in prevention of identity theft rather than just the reporting of it. LifeLock, founded in 2005, is already considered the industry leader.

Such crimes are an unfortunate part of living in our modern world, but there is something you can do to protect yourself from even the craftiest identity thieves. This is by far the cheapest insurance you can buy to prevent identity theft from happening to you. LifeLock is the Identity Theft Prevention Solution backed by a one-million dollar guarantee! I probably will not publish my Social Security Number on the Internet, but I am a customer of LifeLock and the have peace of mind in knowing that I have closed the loop on my security concerns for the New Year and beyond.

DIY Security

When it comes to our personal data, losing it or having it stolen is a devastating, life altering experience. None of us question the need for medical insurance and life insurance, but few of us have identity or data insurance safeguarding us. This is no longer something you should put off as next year’s resolution. You can implement a strategy such as I outlined above for a few dollars per month, and you can DIY in a matter of hours.

When your data insurance is in place, I would be willing to bet you’ll have the most restful night’s sleep you can remember, and there will be no hangover in the morning regardless of how much data you did the night before. To learn more about the things I mentioned in this article and other time-saving data management tools for non-geeks; visit the website at www.DIY-Secure.com.


----------------
About the author
Tom Heatherington is author of "The Complete Small Business Internet Guide", former Pres. of Opinioneering Corp., co-founder PICnet, one of the first ISPs in USA. Tom is principal of The Webunet Group and was VP of Sales for Wireless Products for NEC America. Visit his website, http://www.DIY-Secure.com.
Article Source: Free Article Directory - http://www.articleManiac.com Search And Submit Articles
Hard Drive Data Recovery

Hard Drive Data Recovery

Data recovery can be tedious. The good news is data recovery, more often than not, is still possible. Data recovery can be done in either two ways: by using data recovery software or data recovery services. Data recovery software can help you revive the data which you thought was lost. However, data recovery services can do more than that.

So what exactly is data recovery?

Data recovery, according to the word sleuths and data recovery experts, is the process of salvaging deleted or inaccessible data stored on damaged media like magnetic disks and computer hard drives, optical devices, and tape cartridges. Many data recovery software programs and data recovery services are designed to help users retrieve their files at the event of a computer crash or viral infection.

How does data recovery work?

The first step of the process of data recovery service usually involves evaluation to determine the extent of the data lost. After the prognosis, the data recovery experts and technicians would then proceed in “cloning” or copying the media into their systems. The actual data recovery process occurs when the technicians secure and extract the data from the copy of the damaged media.

Hardware and software teams

A damaged media has the data locked within it and it is the job of highly experienced hardware and software engineers to unlock it. These two teams of data recovery experts work very closely together throughout the project, combining all their experiences in their respective fields to solve the problem quickly and surely.

For safety measures, hardware engineers access as much of the disk as they can to produce the copy which they then share with the software specialists. The bulk of the data recovery process lies on the software team as they are the ones who do the actual extraction using complicated software programs designed especially for data recovery work. The ensuing data are then filed and written onto a new, undamaged media.

Before engaging a hard drive recovery service to attempt data recovery, it pays to know what a hard drive and hard drive failure are. A hard drive is a stack of discs coated with thin layers of substrate and magnetic material. Hovering above the disc is the drive head. The discs create a slight breeze as they spin, creating a cushion of air for the head. The drive head, as a rule, never touches the discs unless something happens to that cushion of air beneath it. If however, the head touches the discs, it will drop through the magnetic layers and cut slashes into the surface of the discs. It grinds through the aluminum substrate and sprays dust from all three layers all over the discs. The result is hard drive failure.

Utilizing data recovery services from data recovery experts usually comes as a last resort. But they do not come cheap. Data recovery software like, say Symantec’s, could cost something like $39.95. A data recovery expert could charge from $250 to $3,500 on their data recovery services.

Each data recovery service has a unique approach in solving the data recovery problem. But usually, the priority is to get the damaged drive running again. However, data recovery services cannot perform miracles. A massive head crash in the drive usually mean it’s gone for good.


--------------------
About the author
by By: Laurence Clunie
http://www.computer-supplies-info.com provides helpful information on hard drive data recovery, computer power supplies, computer data storage and numerous links to useful computer products. Article Source: Free Article Directory - http://www.articleManiac.com Search And Submit Articles
DBF Repair Tool for your Databases

DBF Repair Tool for your Databases

Today, we are living in the era of database-driven applications and rely on databases more that we could imagine even in the recent past. Information is valued much higher than any hardware or software tools used for its processing. However, the risks associated with database crashes or corruptions increase proportionately to the intensity of their use, making a broken database a nightmare for any accountant or business owner, especially when a backup is unavailable.

The DBF format, unfortunately, is not 100% crash-proof, just as any other database format in the world. If your DBF file is corrupted or damaged, standard database applications may not be able to help you get your data back - all you will see is undecipherable abracadabra or nothing at all. Luckily, there are tools out there that will make a DBF repair procedure a real breeze. DBF Recovery from HiBase Group is an affordable and highly efficient application that is intended for repairing DBF files and recovering your important data. Not only does it retrieve and fix headers, but, unlike the majority of its competitors, also runs an in-depth analysis of the file structure in an attempt to fix it completely.

The great thing about DBF Repair Tool is that you don't need to have a Master's degree in computer science to do your first DBF repair. The program was created for all categories of users that need immediate assistance whenever they are experiencing problems with their database. When pointed to a broken DBF database, the application determines the data format automatically. The program supports all specific file formats used by the most popular database management systems, such as Dbase III/IV, FoxPro, Visual FoxPro and others. Once this is done, all you have to do is lean back and watch DBF Recovery work its magic. The completely automated recovery engine will scrupulously scan the internal structure of the file, identify discrepancies from the normal state and attempt to restore the data.

The DBF repair process may take a while, depending on the size of the file. However, rest assured that DBF Recovery is pushing the envelope to recover your information with maximum accuracy. In fact, its recovery success rate, combined with the obvious simplicity of use, affordability and compact size make it one of the top utilities of its class. Not only is it a must-have for any serious system or database administrator, but also for regular end users who would like to be protected from such an unexpected force majeure as data loss after a database corruption.

DBF Recovery from HiBase Group is easy to install and use. It requires absolutely no external drivers for database connectivity. Supporting Windows 95/98/NT/2000/2003/XP and Vista, it will work on the overwhelming majority of modern systems.

You cannot control everything in this world and accidents sometimes happen. Don't forget to buckle up when you get into a car, as it may save your life. Don't forget to get yourself a copy of DBF Recovery, as it may save the most important thing in today's business - your information. Have a nice ride!

--------------
Article Source:
Free Article Directory -
http://www.articleManiac.com
Search And Submit Articles
Source code and database code generator

Source code and database code generator

iCodeGenerator is a free tools database centric template based code generator for any text(ascii) programming language like C, PHP, C#, Visual Basic, Java, Perl, Python...
Supported databases are SQL Server, MySQL and PostgreSQL.

Project Admins: victoryoalli
Operating System: All 32-bit MS Windows (95/98/NT/2000/XP)
License: GNU General Public License (GPL)
Category: Database, Code Generators, Interpreters


Download iCodeGenerator

http://sourceforge.net/projects/codegenerator/
CodeBank v2 Personal Data

CodeBank v2 Personal Data

CodeBank v2 is tree based (XML) personal information database. It allows you to maintain a hierachical database of textual information like:

* programming code snippets
* notes
* links
* quotes
* SQL queries
+ whatever you like you name it

Unlike similar programs CodeBank is fully portable and can be carried on removable media.The internal search engine can search for words, phrases and regular expressions.


Download CodeBank v2
by nikola dachev


Database Manager 2.1

This tool will support you in your database management activities for dBase-compatible tables, especially if you are a user of Vista Software's Apollo Database engine or the Advantage TDataSet descendant or MySQL tables. Supported functions are: Table creation (generates table creation source code for BDE engine, Apollo driver, Advantage driver), converts between Windows and DOS charset, XML export of tables for easy, standardized data exchange, table encryption, packing tables (permanent removes "deleted" (hidden) records), supports deletion, adding, editing and converting database records, displays table statistics, displays and prints table structure, displays index keys and orders, changing of active index order, undeletion of individual or groups of records, supports Clipper-, FoxPro-, and HiPer-SIx indexes and more!

Download
0,79Mb
Call DB2 stored procedures in VB6.0 App

Call DB2 stored procedures in VB6.0 App

DB2 stored procedures in Visual Basic 6.0: If you're a database administrator or stored procedure author for DB2 for OS/390 and z/OS, you might use server-side tests (in COBOL) to test stored procedures. But there are also benefits in running some simple client-side tests. More on db2 stored procedures and vb db2 connectivity
------------------------------------------
by Judith.M. Myerson and Sarah Packowski.
First published at IBM developerWorks.
http://www.developers.net/ibmshowcase/view/78
------------------------------------------
If you are a database administrator or stored procedure author for IBM DB2 for OS/390 and z/OS, you probably use server-side tests (in COBOL) to test your server-side stored procedures. However, there are also benefits to taking the extra step in running some simple, client-side tests. By doing this, you can be aware of complications arising from communication or system problems related to stored procedures before client-side application developers try to use those stored procedures.

For example, if the database server is DB2 for OS/390 or z/OS, the complications that might arise include TCP/IP services being down or problems with the SQL stored procedure builder/processor DSNTPSMP. Creating these client-side tests can give you a better understanding of the way in which your database and stored procedures are being used (which might affect system and stored procedure design and implementation choices). Finally, the experience of creating and running client-side tests help you bridge the communication gap that sometimes develops between you and the client-side application developers.

Highlights include:

* Sample 1: Calling a stored procedure
* Sample 2: Navigating a result set
* Sample 3. Navigating multiple result sets
* Sample 4: Calling a stored procedure that takes one parameter
* Sample 5: Calling a stored procedure with multiple parameters
* Appendix A. Unattended batch processing
* Appendix B. Adding a graphical user interface
* Appendix C. Sample stored procedures in COBOL

[Download Tutorial | 140.28 KB, pdf files]
Some Tips for Using MySQL

Some Tips for Using MySQL

This document presents information, tips and suggestions for making the conversation based on the experience of staff at the University of Kentucky College of Education Database and Information System Project.

1. Why Mysql?
2. Exporting an MS Access Database to MySQL
3. Useful Websites
4. Using Access as a client with mySQL
5. Some other useful tips
6. Installing MySQL drivers
7. Installation

Mysql Useful Tips (Doc)
By. Bharath K R &
Vinay Srivastava
ukdame.coe.uky.edu/dameportal/documents/

MySQL Connector/ODBC 3.51 Downloads

MySQL Connector/ODBC 3.51 Downloads

MySQL is a relational database management system (RDBMS) that provides users with a powerful multi-user, multi-threaded SQL (Structured Query Language) database solution. It is fast, robust, and easy to use. Information system managers who oversee MS ACCESS database systems that are beginning to show their age may wish to consider converting their ACCESS files to MySQL files. Data moved to MySQL can continue to be accessed using already-developed ACCESS queries, forms, and reports.

NOTE: By downloading the software from this page, you acknowledge that the software available from here is licensed under the GPL.
We advise that you review the GPL before downloading.

MySQL Connector/ODBC 3.51.16 (Win32)
Select other OS and Mirror Download click here
http://dev.mysql.com/downloads/
VB To SQL Server Client Shell Program 1.1

VB To SQL Server Client Shell Program 1.1

If your learning or programming SQL Server with Visual Basic front ends, this program is for you!
Save a ton of hours programming the login and interfacing front end to SQL server, and concentrate on writing the application!
This program is a complete front end for you to use with Visual Basic 6.0 to SQL server 7.0 or 2000, and is perfect if you are starting to program on SQL server, or write utility programs or projects.
If your just learning to code VB programs, this program will help you get up to speed quickly, and learn by example. All the hard work is done, you have a MDI form project, login screen, Error display screen and also a demo query/grid output screen for a example on using ado connections to load flex grids, with a sql query!

Download VBtoSQLClientDemo.zip
How Do You Fix A Corrupt Access Database ?

How Do You Fix A Corrupt Access Database ?

Every now and again our customers and even members of my team run into an Access database that is corrupt. Our usual approach is to stubbornly try and fix the database ourselves and generally we are good at doing this.
Early in May, 2005, when we were battling with a database, I concluded that we were wasting too much time trying to fix our databases. After a lot of research, we teamed up with one the best repair companies on the web to bring you this unique automated repair service.

Read page on common Access corruption symptoms
Start the repair service now


Relates pages:

Find a list of database corruption problems and symptoms here and here
Backups and recoveries page
Uncorruption page - plenty of options here

fullnote: vb123.com