(Billy Cripe) While there are several ways to go about doing this here is one: 1. In the entry event of the first step of the workflow initialize a companion variable indicating whether or not the item needs a new evaluator, e.g.
Other News
I have always really liked incremental image copies, and now they just got a little better
(Willie Favero) For the longest time I had difficulty convincing others they should consider using DB2’s incremental image copy. There always seemed to be some kind of aversion to using incrementals that I never could quite understand. However, most people I talk with today have gotten past what eve
How to include an ActiveX control within an SB+ input screen
(Kevin Drury and Pavel Smelianski) ActiveX technology provides a rich set of self-contained controls that can enhance the IBM U2 SB+ user experience. This article takes you through two examples. In the first example, you see how to include a calendar control within an input screen. In the second exa
MySQL Stored Procedures problems and use practices
(Peter Zaitsev) To be honest I’m not a big fan of Stored Procedures, At least not in the form they are currently implemented in MySQL 5.0
(68) SelectViews: Technology specialization and keeping up with technology over all…
Video Programming for IT Professionals
The SOA requirement for data integration
(Michael Meehan) In the rush to build out service-oriented architecture a few fundamentals have gotten lost in the shuffle, perhaps none more than data integration. (R)
Information exchange model at the next level
(Joab Jackson) The National Information Exchange Model has gotten its first upgrade. Version 2 should be released by the end of this month, and the final beta is available on the NIEM site.
AJAX Security Options
(Aleksey Shevchenko) For the past few months, several Internet security companies (such as Fortify Software and WhiteHat Security) have been speaking out regarding AJAX security concerns. Fortify Software claims that AJAX technology contains a “pervasive and critical vulnerability”. Given that AJAX
Black Belt Administration: Reporting Services Configuration Manager
(William Pearson) A common attribute of enterprise reporting systems is their provision for single points of maintenance for significant aspects of system configuration. Reporting Services meets the general need for centralized maintenance of reports and their constituent components by housing them
Virtualization means changing roles for DBAs
(Mark Brunelli) New processor technology expected from Intel and AMD will one day make database workload virtualization on x86 platforms a more practical affair than ever before. In the meantime, companies that want to virtualize database workloads will be looking to database administrators (DBAs) f
