June 2006 Blog Posts

  • Reading and Writing an encrypted Dataset to Disk

    I am using Windows Forms for my current project and with so much processing power going to waste on most users desktop, I have been trying to offload network traffic via client side caching.  The requirements stated that the cache needs to be accessible for every user who uses the PC, encrypted and able to be copied between 2 PC’s. When the app starts and the first successful logon occurs, I reach out to the DB and suck down the primary data domain.  This dataset contains nearly half the database.  It’s only a couple of megabytes and is compromised mostly of...

  • The Difference between Theory and Practice or Grab a towel

    Ø        The relational model can handle hierarchies with ease.  I'll give the SQL DBA's out there a moment to clean up the coffee they just spat over the keyboard...... RM gives you multiple ways to do it.  Adjacency list, nested-set, fixed level or just stuff the whole model into a data type ala XML.  RM "prefers" the  adjacency list as it has an operator just for it. "Transitive Closure" or TCLOSE in geek parlance.  The introduction of CTE's in SQL Server 2005 helps resolve some issues for "walking the tree" but comes with several gotchas that are not immediately obvious.....