(mmiller) Clients often contact Integrigy requesting assistance to protect their sensitive data. Frequently these are requests for assistance to locate and then encrypt sensitive data. While encryption offers protection for sensitive data, it by no means solves all security problems. How to protect
Other News
ECB Resource Monitor PUT10 Enhancements on z/TPF
(Gabriel Nieves) The latest changes to the entry control block (ECB) resource monitor on IBM z/Transaction Processing Facility (z/TPF) give the users more flexibility to define and retrieve resource usages in the system. This article gives an introduction to the enhancements in APAR PJ40979. It also
Nice Cloud, no rain: Using Cloudant/couchDB with Python on Bluemix
(Henrik Loeser) My last two blog entries were about getting started with Python on IBM Bluemix and how to use a custom domain with my Bluemix weather application. Today I am going to show how I added Cloudant and couchDB to my application, both locally and on Bluemix.
Replication channel fail-over with Galera Cluster for MySQL
(Shinguz) Sometimes it could be desirable to replicate from a Galera Cluster to a single MySQL slave or to an other Galera Cluster. Reasons for this measure could be:
Understanding Expression and Expression Trees
(Shailendra Chauhan) In .NET, Expression is an abstract class which contains static methods and inherited by various types (like ParameterExpression, MethodCallExpression) to create expression tree nodes of specific types. A ParameterExpression represents a named parameter expression and a MethodCal
WEB API TRACING WITH SLAB AND ELASTICSEARCH
(damienbod) The article demonstrates how to use Web API Tracing, and trace the data using SLAB, in-process or out-of-process to a flat file or an Elasticsearch sink. Semantic.Logging from Enterprise Library now includes an Elasticsearch sink.
db_ddladmin and the SSMS table designer
(Kenneth Fisher) If you want to grant a user the ability to create/alter/delete any table, SP, function etc in a database you have a several options. For example:
Url-Encoding Amazon S3 Resource Keys For Pre-Signed Urls In ColdFusion
(Ben Nadel) Yesterday, I looked at which characters where being encoded by ColdFusion’s urlEncodedFormat() function. This exploration was prompted by some recent trouble I’d been having with generating pre-signed URLs for Amazon S3 objects.
TechTip: DB2 for i Impersonation Take 2: External Routines
(Michael Sansoterra) In “Impersonate Your Neighbor Using DB2 for i,” I outlined how to use the SET SESSION AUTHORIZATION SQL statement to override the user profile of the current thread or, in many cases, the current job. The benefits of doing this include providing temporary authorization to resour
MVC 5 with EF 6 in Visual Basic – Async and Stored Procedures with the Entity Framework
(Mike Brind) This tutorial is the ninth in a series of 12 that teach you how to build MVC 5 applications using Entity Framework for data access and Visual Basic. In earlier tutorials you learned how to read and update data using the synchronous programming model.
