(Tamas Vilaghy, Mariangela Cecchetti, Mitch Johnson, Frank P Jones, John Kettner and Fabio Riva) This redbook gives a broad understanding of architectural choices you may have when designing an IT infrastructure containing WebSphere Application Server for z/OS and one or more back-end systems. The s
Other News
Open Source Intrusion Detection: No-cost System Lockdown
(Alexander Prohorenko) Nowadays, basic information security at any level should include an intrusion detection system (IDS) that gathers and later analyzes intrusion data. The primary goal of IDS software is monitoring hostile operations of all types, whether human (hackers and crackers) or programm
IBM DB2 Information Integrator planning and sizing
(Micks Purnell) This article discusses hardware and network planning for three different major uses of DB2 Information Integrator: –Online and batch applications that read, update, or read/update non-DB2 data (federated database applications). –Data analysis and reporting applications that
.NET Smart Client Applications
In this episode of MSDN TV, Tim and Shawn discuss the buzz around the .NET Smart Client Application Revolution. They discuss what a smart client application is by defining its attributes, business & ROI impacts, and Tim shows some powerful tools and technologies that are used to build them.
Using Customized Schema Constraints
(Bob DuCharme) Last month we looked at XSLT’s role in the reference implementation for Schematron, a schema language that lets you express many constraints that can’t be expressed in RELAX NG (RNG) or the W3C Schema language (XSD). Instead of defining an entire schema, Schematron rules usually s
Implement User-defined Functions in SQL Server 2005 with Managed Code
(Thiru Thangarathinam) One of the excellent features of SQL Server 2005 is its integration with the .NET common language runtime (CLR), which extends SQL Server’s capability in several important ways. The integration enables developers to create database objects such as stored procedures, user-defin
Unqualified Imports for XML
(Oliver Steele) In ‘A Fresh Canvas’ I argued that there’s a human-factors advantage to allowing an XML document to contain names from multiple namespaces without requiring namespace prefixes on the elements from all but one of them. In ‘What’s in a Namespace’ I looked at how namespaces and namespace
Converting Flat Files to XML (Sample Chapter)
(Elliotte Rusty Harold) When all you have is a hammer, most problems look a lot like nails. Since you’re reading this book, I’m willing to bet that Java is your hammer of choice, and indeed Java is a very powerful hammer. But sometimes you really could use a screwdriver, and this may be one of those
Skip Scan Index Access
(Jeff Hunter) In Oracle, releases before Oracle9i, the Cost Based Optimizer (CBO) would only use a composite index (sometimes referred to as a concatenated index) if you referenced the index prefix column in the WHERE clause of the SQL statement. If the SQL statement omitted the index prefix column
Using the Updater Application Block
(Bill Wagner) In this article, I’ll discuss one other option: the Application Updater Starter Block from the Practices and Guidance Group at Microsoft. The Application Updater block provides one implementation you can use to automatically update your applications. Unlike some other solutions, the Ap
