(Guy Lohman) You’ve probably heard how IBM is endeavoring to make the DB2 family – and in fact all IBM products – more autonomic, or self-managing. The key aspects of self-managing systems can be easily remembered with the handy acronym “self-CHOP”: self-Configuring, self-Healing, self-Optimizing, a
Other News
Source Code Management and Database Deployment
(Dejan Sunderic) Source code control (or version control) is typically introduced in development environments in which more than one developer needs to work with the same piece of code. It allows development organizations and their members to –Manage code centrally –Manage multiple versions o
Sun Service Registry for SOA Supports UDDI 3.0 and ebXML Registry 3.0 Standards
Sun Microsystems has announced the development of Web Services Registry and Repository for building Service-Oriented Architectures (SOA). The Sun Service Registry “enables service oriented architectures by providing centralized access to discovery, use, and reuse of web services as well as secure, f
LAMP – the Fiery Foursome
(Ravi Kumar) LAMP stands for Linux, Apache, MySQL and PHP, an open-source Web development platform that uses Linux as the operating system, Apache as the Web server, MySQL as the RDBMS and PHP as the scripting language.
Three Vs: Best Practices for a Unified Business Intelligence Infrastructure
(Ronen Feldman) Unified business intelligence (UBI), the combined analysis of structured data and unstructured content, is a relatively new practice, but one that can yield significant ROI if approached in a focused, methodical way. The two practices – structured data analysis and unstructured c
Oracle Supports Fusion Components with J.D. Edwards, iSeries
(Alex Woodie) New identity management and financial applications unveiled recently by Oracle will work with the iSeries, DB2/400, and J.D. Edwards software, the software giant confirmed last week. World and EnterpriseOne shops will be able to utilize Oracle’s Identity Management and Financial Co
Mitigate Business Intelligence Project Risks with Rule-Based Audits and Proof-of-Concepts
(Michael L. Gonzales) This white paper describes two methods for minimizing the risk associated with BI iterations: Rule-Based Audits and Proof-of-Concepts. Independently used, each will help you clarify and better understand risk points associated with your project. (R)
Veritas Unveils SQL Server 2005 Support for High Availability Software
(Alex Woodie) When SQL Server 2005 becomes available this fall, Veritas will be there to support it with its storage virtualization and high availability software, the vendor announced last week at the Microsoft TechEd conference in Florida. Veritas says it will support the new database with its
Securing Critical Data in Databases: An Overview of the Database Encryption Process
As security breaches and the demands of privacy legislation continue to increase, organizations are starting to encrypt critical data inside corporate databases. Historically, however, data encryption has posed many complexities. (R,pdf)
Loading Blowfish-Encrypted Data into an MSXML2 DOM Object
(Tom Archer) When using the MSXML2 library, you typically load XML files from disk into a DOM (Document Object Model) object by creating an instance of IXMLDOMDocument and calling its load function—where you pass a BSTR representation of the file name. However, I had a situation recently where, due
