(Roger E. Sanders) Identity theft is the fastest-growing crime in the United States. Thieves steal personal data (Social Security, bank account, and credit card numbers, for example) and use it to commit fraud or deception for economic gain. Criminals get this data from a variety of sources — faxes,
Other News
Consuming Java artifacts made easy with WebSphere Process Server and WebSphere Integration Developer
(Peter Xu) This article introduces to you a new feature in the latest versions of IBM WebSphere Process Server and IBM WebSphere Integration Developer that can dramatically reduce the effort needed to consume existing Java artifacts from SCA components.
SQL Server replication
In this podcast, you’ll grasp the functionality of replication and what it can do for your SQL Server environment. SQL Server database administrator and architect Eric Johnson starts by explaining the three replication types: snapshot, transactional and merge. He then takes you through setting up re
Using Oracle’s XQuery without a database
(Andrej Koelewijn) Did you know you can use Oracle’s Java XQuery library without a database? I wasn’t aware that it was possible. All the examples i know show you how to use XQuery in combination with XMLDB. But JDeveloper contains an XQuery library which you can use in any java program. The library
Administrative Policies for HIPAA Compliance
(Cyrus Peikari and Seth Fogie) The proper implementation of Security and Electronic Signature Standards (SESS) requires a formal and procedural approach. This is accomplished by creating a series of comprehensive policies that address the many security issues facing your organization. From the initi
AJAX Demystified – Part Two – The AJAX DataGrid
(UsualDosage) Welcome to part two of my series on Demystifying AJAX for .NET. If you haven’t yet tried the first article about creating an AJAX Shoutbox using AJAX and ASP.NET, it’s a good place to start for AJAX beginners. It also covers some of the introductory parts regarding what AJAX is, as wel
Archive strategies for OLTP servers, Part 2
(Xaprb) In the first article in this series on archiving strategies for online transaction processing (OLTP) database servers, I covered some basics: why to archive, and what to consider when gathering requirements for the archived data itself. This article is more technical. I want to help you unde
How Do I… Restore a SQL Server database to a new server?
(Steven Warren) As a DBA, I have been in many situations where I had to move databases to a new server due to old hardware, failed hardware, failed drives, etc. You have two options you could use to carry out this task: –SQL Server Management Studio (GUI) –T-SQL (Command line)
Semantics and the Evolution of Specialized Languages
(Dan McCreary) The semantic web, or what is often called Web 3.0, is a collection of technologies that associate meaning with individual data elements that are usually embedded in XHTML files. Having precise semantics for each data element allows collections of highly specialized languages to evolve
TechTip: Secret Font Tricks
(Joe Pluta) Sometimes it’s important to know the inside scoop on things. For example, it’s (relatively) easy to change the font in WebSphere Development Studio Client for iSeries (WDSC). You just go to the Preferences. OK, you have to know exactly where to change the font, but I’ll show you that
