(Jason E. Sweat) This article, the second of two parts, explains how to use the Iterator pattern to manipulate any collection of objects.
Other News
Obtain user, group, and process information in Perl
(Guest Contributor Mellonfire) This document lists the important functions in the Perl library designed specifically to provide user, group, and process information, with recommendations on where each should be used and working code samples to help you on your way.
Grid Computing Looking Forward
(Enrique Castro-Leon and Joel Munter) A number of technology transitions are taking place or will take place within the next five years that will lower the barriers that exist today to deploy, maintain, and run applications on computer grids. Most of the literature dwells on performance gains and ap
Using SQL Server 2005 sqlcmd Utility
(Gregory A. Larsen) SQL Server 2005 provides some new command line utilities. One such utility is “sqlcmd”. The sqlcmd utility is used to run adhoc queries interactively from a command prompt window, or can be used to execute a script containing T-SQL statements. The sqlcmd utility is a great improv
Building Blox
(Nelson King) IT departments are on an quest to put business intelligence (BI) into the hands of the people who need to understand it and use it — nonspecialists, line-of-business managers, sales reps, and CEOs. The path to fulfilling this quest is clear, but hardly easy: Take a vast mountain of bus
Migrating to Oracle HTML DB
(Scott Spendolini) Oracle HTML DB is a Web application development tool based on Oracle Database. Using nothing more than a Web browser, it lets you quickly and securely create and deploy Web applications. Oracle HTML DB is supported in the standard and enterprise editions of Oracle Database 10g Rel
DB2 UDB security: Understand the DB2 Universal Database security plug-ins
(Kevin Yeung-Kuen See, Sushma Narisetty, Raul F. Chong and Il-Sung Lee) Part 1 of this article series presents the DB2 security model, and discusses how user and group accounts interact with DB2 Universal Database (UDB). Part 2 of this series focuses on DB2 security plug-ins, the new method that imp
WebSphere MQ V6 Fundamentals
(Saida Davies and Peter Broadhurst) This IBM Redbook describes the fundamental concepts and benefits of message queuing technology. (pdf)
Tuning AJAX
(Dave Johnson) Unless you live under a rock, you’ve heard about and likely even used AJAX. Asynchronous JavaScript and XML is becoming an increasingly pervasive deployment methodology, which necessitates that people start to both understand how it works and actually consider it more seriously as an
Upcoming V5R4 SQL Enhancements Could Boost Language’s Popularity
(Rita-Lyn Sanders) Not too long ago, SQL’s popularity waned like that of a glazed fruitcake at a holiday banquet. But with the enhancements expected out in V5R4 next year, one might think of structured query language as the spiked eggnog at a company bash.