(Byte64) Lately i am working a lot with regular expressions. At first the syntax of regular expressions is rather tough to remember, but after a while a whole world of possibilities opens up to the developer.
Author: SSWUG Research
Asked & Answered
(Roger E. Sanders) We do a lot of database cloning as you described in your DB2 Magazine article. How do you reconcile cloning with data privacy and obfuscation requirements? Would you advocate changing the data after the restore process or as part of it, and if so how would you do it as part of the
Building Google gadgets, Part 1: Fundamentals of Google gadgets
(John Muchow) In this new Web development series, learn how to develop Google gadgets. Gadgets are small applications that you can add to most any Web page as a means to offer dynamic and rich content. Google has an abundance of gadgets to choose from. However, the most intriguing aspect of gadgets
Better Entities with Nullable Types
(Paul Kimmel) There is an impedance mismatch between objects and normalized relational databases. Everyone knows this. Almost everyone has tried to fix it—think object-oriented databases—and some people have gotten famous off of proposed solutions. (Deservedly so or not.) Well, truth be told Microso
Ajax security holes and how to fill them
(George Lawton) Every data theft, security breach and Web site vulnerability that grabs headlines further emphasizes the need to secure Web applications. As developers begin to move to Ajax and ASP.NET AJAX programming, security takes on a new level of importance. (R)
DB2 Upgrade Exam – Now Available
(Susan Visser) If you are one of the many people who has earned an IBM Certified Database Administrator – DB2 UDB V8.1 for Linux, UNIX and Windows Certification… you’ll be happy to know that the upgrade exam is now available for you to take. You’ll only need to answer 38 questions and the price is
Hello World: Learn how to create a Java Web application without knowing the Java language using Rational Business Developer Extension
(Tim McMackin) Learn how to build a simple dynamic Web site using Rational Business Developer Extension and Enterprise Generation Language (EGL). The site you build has two pages: one to display a list of records in a database and another to allow users to change the data in one of those records. Yo
Should you have your swap file enabled while running MySQL?
(Peter Zaitsev) So you’re running dedicated MySQL Linux box with plenty of memory, so the good question arises if you should have swap file enabled or disable it ? I’ve seen production successfully running on boxes both with and without swap file so it is not the question of you must do it this or t
How to know if a MySQL slave is identical to its master
(Xaprb) A frequently asked question about MySQL replication is “how do I know whether my slave is identical to the master?” Until recently there hasn’t been a good way to know, but now you can compare all the data in your master to the data in the slaves and get a reliable yes-or-no answer. And you
Enhance Informix Dynamic Server security using the Pluggable Authentication Module framework and JDBC
(Manoj Mohan, Ramesh Gopal Srinivasan and Thamizhchelvan A. Anbalagan) As existing authentication mechanisms evolve and newer authentication mechanisms come into existence, system-entry services (such as login, ftp, and rlogin) need to be continually customized to incorporate these changes. The Plug
