(Teo Lachev) In Part 1 of this series, you learned that, by default, the Report Server uses Windows-based security to authenticate and authorize incoming requests based on the Windows identity of the interactive user. While Windows-based security works well for intranet applications, it is usual
Other News
Downloadable Databases Pose Security Dangers
(Lisa Vaas) Are they lazy? Stupid? Or merely inexperienced? It’s baffling that so many database administrators or casual non-DBA downloaders were responsible for leaving weak or default passwords on MySQL databases and thus allowing the MySpooler bot attack against Windows installations of MySQL
Web services programming tips and tricks: Improve the interoperability between J2EE and .NET, Part 2
(Wangming Ye) Part 2 of this series explores the source of common interoperability challenges facing Web services integration across platforms. Follow along as the author analyzes the interop failures resulting from the use of certain data types and ways to overcome them such as collections, arrays,
Get All the Stored Procedure Names In One Shot
(Jaya Nehru Kumar) The following query will list all the stored procedure names available in the current database.
Securing a MySQL Server on Windows
(Mike Hillyer) At the end of January 2005 a new worm-like malware named Forbot spread across the Internet, targeting poorly configured MySQL installations and exploiting them to gain access to the Windows host machines. Forbot was not a worm, in the sense that it had to be signalled to continue infe
Oracle Expands Its Performance Management Offerings
(Paul Dean) The new Oracle Enterprise Planning and Budgeting — EPB — is the hub of Oracle’s corporate performance management offerings. You’ll want to look at this product if you need to control the business processes of planning, budgeting, forecasting, monitoring and analysis, especially if you’re
Sorting Objectively
(Jonathan Goodyear) One of my personal pet peeves is when I go to a conference or user group meeting and someone is doing a marketecture demo. That is, they are showing how something can be done, but are doing so in a manner that no self-respecting programmer would ever do in a production system of
How To Configure SQL Mail to Work With GroupWise
(Chris Sheperd) This document walks through how to configure SQL Mail for Microsoft SQL Server to work with Novell GroupWise. For the purpose of this document I will refer to the user account as sqluser and the password as sqlpassword.
Case Study for Content Manager OnDemand Backup, Recovery, and High Availability #1: Global Voice and Data Communications Company
This document is the first of two documents in a series that present case studies for IBM DB2 Content Manager OnDemand solutions. This case study presents a global voice and data communications company. It presents background information, the backup procedures, the high availability configuration, a
Managing Workloads in z/OS
(Jurgen Holtz and Robert Vaupel) The zSeries platform and z/OS can run multiple, concurrent workloads within one z/OS image or across multiple images that share the same physical processor. The dynamic workload management function, implemented in the workload manager (WLM) component of z/OS, makes t
