(Ben Nadel) Almost every application that I’ve ever built has required thumbnail generation of some kind. And typically, I’ll use ColdFusion as the image generation engine.
Other News
When to Try New Things
I have been considering why many companies do not consider No-SQL or Document based storage systems for their applications. Instead they continue to churn out object to relational database mappings with lots of custom code in order to get adequate performance. One of my most recent experiences brought the reasoning to the surface. The individuals making the decision were quite […]
Writing JavaScript for an Intel Edison
(Jeremy Foster) In my last article about the Intel Edison, I showed you how to take yours out of the box, and get it set up. Consider this article a follow-on. I’m going to pick up pretty much where the last one ended.
How to connect SQL Server to an IBM UDB DB2 data source
(Kaushik Nagaraj) You will need the following to install the drivers and connect to the IBM UDB DB2 data source:
Generate Screenshot Using HTML and JavaScript
(Sibeesh Venu) In this article you will learn how to generate a screenshot using HTML and JavaScript.
Introduction to IBM Datacap Taskmaster Capture 8.1 Development Kit
(Robert Ferin) Learn about the cross-industry and industry-specific sample applications and tools available in the IBM Datacap Taskmaster Capture Development Kit (DDK), and find links to each of the components.
Using DB Adapter to connect to DB2 on AS400
(Martien van den Akker) In my current project I need to connect to a DB2 database on an AS400. To do so is no rocket science, but not exactly a NNF (Next-Next-Finish) config.
Retrieving Bind Values from SQL Monitor in EM12c Release 4
(Kellyn Pot’Vin) I know others may want to know how to do this and I had challenges until Gagan Chawla, a teammate from Oracle, was kind enough to point out how to still get to this hidden, little gold nugget, so I’m posting it here for others!
Securing Sensitive Database Data Stores
(Chris Foot) Database administrators, since the inception of their job descriptions, have been responsible for the protection of their organization’s most sensitive database assets. They are tasked with ensuring that key data stores are safeguarded against any type of unauthorized data access.
12.1.0.2 Introduction to Zone Maps Part III (Little By Little)
(Richard Foote) I’ve previously discussed the new Zone Map database feature and how they work in a similar manner to Exadata Storage indexes.
