(Brett McLaughlin) For the past two years, the industry has inundated you with messages that you’ve reached a new plateau in high-speed connectivity. Around 25 percent of the world’s computer users now have at least a cable modem or DSL connection; of course, this implies that speed is no longer an
Other News
Developer Best Practices and Guidelines for Applications in a Least Privileged Environment
This white paper provides guidelines and suggested best practices for independent software vendor (ISV) developers on how to integrate with the new security infrastructure of User Account Protection (UAP) on Microsoft Windows Vista Beta 1. By following these guidelines, developers will be able to ga
Part 2: Building a Web Services Network with BPEL
(Yves Coene and The Hoa Nguyen) Buoyed by maturing Web service standards, more and more organizations are using Web services in a collaborative environment. BPEL is fast becoming the platform for orchestrating these Web services for inter-enterprise collaboration. BPEL offers the compelling benefits
PHP and JavaScript, Pooling Your Resources
(Brian Vaughn) As a web programmer, a wide variety of scripting languages are available for you to use. Each language has limitations, but by using more than one in conjunction many of those limitations may be overcome. This article will discuss the benefits of using two such languages, PHP and Java
The Four Cornerstones of Enterprise Data Integration Performance
(James Markarian) Hardware and networks are getting faster all the time – but, as you have probably discovered, that doesn’t guarantee high performance for your IT environment. That is because real-world performance is more complex than a measurement of raw processing power. It is made up of four ba
How to Market Open Source Software: Top 3 Mistakes & 5 Useful Tactics
Marketers in the open-source world deal with a technically sophisticated audience — generally DBAs and developers — that won’t tolerate marketing fluff. “They’re skeptical about puffery or anything that’s too polished. There’s a lot of cynicism towards marketing,” says Zack Urlocker, VP of Marketi
Oracle Unveils ‘Fusion’ Plan for Acquired Product Suites
(Glen Kunene) At its OpenWorld Conference, which combined for the first time with the PeopleSoft Connect conference, Oracle unveiled its vision for Project Fusion, which promises to push forward the best features from its combined PeopleSoft, JD Edwards, and Siebel product suites. The enterprise
Using XML Queries and Transformations – Introduction (Sample Chapter)
Now we have an easy and platform-independent method of describing XML data, validating its type as we wish and modifying and reading it programmatically. So we basically have a transportable miniature database. No surprise then that when you start to work with it, you’ll feel the need for a query me
Thanks for the Memory
(Robert Catterall) Exabyte. Now there’s a word you probably don’t use in everyday conversation. What is an exabyte? It’s one quintillion bytes. It’s one million terabytes. It’s one billion gigabytes. It’s one-sixteenth of the amount of byte-addressable server storage that can be accessed via a 6
Hacker’s-eye view of SQL Server
(Hilary Cotter) If a hacker sets sights on your SQL Server, there are four primary methods he can use to take control and carry out unauthorized, malicious activity. I will look at each method in the following tip. (R)
