(Michael Sansoterra) With respect to computer systems, Dictionary.reference.com defines a “default” as: value that a program or operating system assumes, or a course of action that a program or operating system will take, when the user or programmer specifies no overriding value or action.
Tag: IBM
Implement a data growth solution using InfoSphere Optim 11.3
(Pirabu Pathmasenan and Martin Dizon) Readers for the first time can explore the new data growth architecture and self-service features of InfoSphere Optim 11.3 for all their enterprise-wide data growth and application retirement needs. We will showcase a step-by-step approach of how to use InfoSphe
SQL30082N – ROOT CAPABILITY REQUIRED
(Jack Vamvas) An application owner reported an error
Developing a plug-in connector for web service endpoints using WebSphere Cast Iron: Part 5: Implementing connector activity orchestrations
(Raghvendra Neelekani) This five-part tutorial series shows you how to use the WebSphere Cast Iron Connector Development Kit (CDK) to quickly and easily develop plug-in connectors for web service and ReST based applications. Part 5 shows you how to implement the orchestrations for your plug-in conne
Going Off the Grid with IBM i Mobile Apps
(Alex Woodie) If you’re going mobile with your IBM i apps, you’re not alone. Every day, IBM i shops are giving their users the ability to access core applications from Android phones, iPads, and even the occasional Windows Mobile device. This can give your company a big productivity boost, especiall
Disaster Recovery and Big Data
(Lockwood Lyon) Big data applications tend to have massive data storage capacity coupled with a hybrid hardware appliance and analytical software package used for data analytics. These applications are not typically used to process operational data; rather, users query the data to analyze past produ
TechTip: Secure Sensitive IBM i Data in DB2 for i Monitor Collections
(Kent Milligan) Data breaches are unfortunately becoming a regular item in news reports these days. As a result, IT teams everywhere are scrambling to making sure they’re using every available security control to protect the sensitive data they own.
Application first database second
(Jack Vamvas) “Application first database second” said the scrum master. I had an interesting conversation with a colleague about the philosophy underpinning his development methodology. We were discussing the merits of solid data modelling underpinning the agile method.
IBM Cloudant: Database as a Service Advanced Topics
(Christopher D. Bienko, Marina Greenstein, Stephen E Holt and Richard T Phillips) This IBM Redpaper publication describes advanced topics for IBM Cloudant, a NoSQL JSON document store that is optimized for handling heavy workloads of concurrent reads and writes in the cloud, a workload that is typic
Optimize data storage for cloud
(Kane Scarlett) Data storage is no longer a warehousing issue; implicit in the new world of data everywhere is the implied ability to find, access, and use that data in an efficient manner. Much of that data exists on a cloud, so you need to know how to make sure data storage is optimized and doesn’
