(Dinesh G Shetty and Vineet Gupta) To reach new channels of mobile customers, organizations are investing in exposing existing IT assets via web APIs, making their business available instantly on mobile devices. IBM WebSphere Cast Iron Live Web API Services is a cloud offering that enables organizat
Author: SSWUG Research
What is the use of c# ‘Yield’ keyword ?
(Shivprasad koirala) “Yield keyword helps us to do custom stateful iteration over .NET collections.”
Example of Indexing for a Problem Delete
(Ember Crooks) Go-lives bring all kinds of opportunities to find problem SQL. A new site going live or a new site design going live can put a completely different load of SQL on a database. Depending on the level of load testing done, there can be some problems still to find.
Big Data: Four Security Improvements Required
(Dave Beulke) At the BLU acceleration technology briefing, I was able to talk to a wide variety of analysts from many well-known firms along with other architects, consultants and industry practitioners. Everyone was talking about the IBM BLU technology for Big Data that I blogged about earlier, bu
Rotating MySQL slow logs safely
(Peter Boros) In my last post, I described a solution for keeping the caches of a MySQL standby server hot using MySQL slow logs with long_query_time set to 0. Here are a some lessons we learned when logging a high volume of queries to the slow log.
Oracle BPM 11g Mobile Worklist with ADF Mobile
(Andrejus Baranovskis) I have developed ADF Mobile application to bring BPM worklist tasks to the mobile device – I would like to share concepts of such ADF Mobile application with the community.
Authenticate Web API using Access Tokens
(Mira Javora) In a common Web API scenario, you may want to secure your endpoints so that certain actions can only be executed by authenticated users who posses the correct permissions and are authorised to access the endpoints. For example, you would not want expose your DELETE endpoint of a resour
Oracle Database 11g: Working with the Data Masking Pack Part Two
(Karen Reliford) In my article last month we started looking at using the Data Masking Pack in order to address the balance between needing to protect the data and the requirement to provide realistic test data.
Building an Image Resizer using .NET Parallel Dataflow Library in .NET 4.5
(Sumit Maitra) With .NET 4.5, the Task Parallel Library team went another step ahead and built a little known library called Parallel Dataflow Library. This article explains why as a .NET developer, you must know about this powerful library.
The undocumented status ‘M’ of an RMAN backup
(Rene Antunez) It is not uncommon for Oracle to have something undocumented , and this is just another case of this ailment.
