(Robert Cozzi, Jr.) Until recently, moving to browser-based RPG IV applications has been limited because Web pages have to be reloaded or new pages need to be displayed in order to give the end-user the appropriate feedback. Users never really had the same quality experience as they had with a 525
Other News
IBM Needs to Act Boldly in Database Field
(Charles Garry) Opinion: IBM made a smart move when it decided to introduce DB2 Express-C as a free download for database developers. But it should act more boldly to improve its position in the Windows/Linux market and show leadership in licensing trends.
Achieving Data Privacy Through Database Encryption
The growing need to make sensitive information more broadly available to individuals within and outside of an organization greatly increases the opportunity for malicious activity and misuse. Perimeter and point security solutions cannot adequately protect sensitive data at rest from these threats,
Insurance Data Standards—Designing XML Messages
(Tana Sabatino) This is the second in a series of articles that explores the issues regarding the usage of XML to develop data standards in the insurance industry. This article will address how to design XML messages for standards purposes, as well as various approaches for maximizing your implement
Oracle to buy communications software vendor
(Stephen Lawson) Oracle has agreed to buy HotSip, a vendor of communications software based in Stockholm. The company sees the company as a means of strengthening its hand in telecommunications infrastructure software
Best Practices for WebSphere Business Integration Server Foundation for z/OS, V5.1
(Rica Weller, David Bonaccorsi, David J Brett, Steve Matulevich, Carl Parris, Michael M Poirier, Julie Reese and Ken Rogers) This Redpaper will help systems programmers and WebSphere administrators exploit WebSphere Business Integration Server Foundation (WBISF) functions. It covers the functional i
Playing Together Nicely: Getting REST and SOAP to Share Each Other’s Toys
(Jason R. Briggs) It’s tremendously difficult to argue a RESTful approach to a service-oriented architecture (SOA), when the corporate mindshare is SOAP–where project stakeholders tout the SOA buzzword, nod their heads sagely when you say SOAP, nod their heads again when you say XML-RPC, and then l
Encrypting Configuration Information in ASP.NET 2.0 Applications
(Scott Mitchell) When creating ASP.NET 2.0 applications, developers commonly store sensitive configuration information in the Web.config file. The cannonical example is database connection strings, but other sensitive information included in the Web.config file can include SMTP server connection inf
Standardizing Service Endpoints
(Thomas Erl) More than any prior distributed-computing architecture, service-oriented architecture (SOA) demands a consistent commitment to standardization. The broad scope of SOA transition efforts provides an opportunity to incorporate far-reaching standardization in support of attaining a state o
FIX: Automatic checkpoints on some SQL Server 2000 databases do not run as expected
Automatic checkpoints on some SQL Server 2000 databases do not run as expected. The automatic checkpoints previously ran as expected. Other SQL Server 2000 databases have no issues.
