(Michael Schenker and Namrata Misra) Common problems in J2EE applications that access databases occur around end-to-end authentication and authorization, as well as the end-to-end audit path. The concepts of data sources and connection pools provide many advantages, but they can also lead to securit
Tag: IBM
On Recovery Service Levels
(Craig S. Mullins and Brenda Honeycutt) Business availability is more than just having a reliable hardware and database platform in place. Even the best high availability environment cannot safeguard itself from logical errors. Since most companies cannot afford downtime, it is important to plan ahe
Track the data manipulation language operations in your DB2 database
(Amol D. Barsagade) Protecting data against any failure is a huge challenge for the DBA at any organization. In production and 24×7 environments where databases are mission-critical, any data loss is unacceptable. To successfully perform point-in-time recovery, you must have sufficient information a
Finding the Right Page Size for Your Indexes on Informix
(Andrew Ford) In my last blog we took a look at storing indexes in a dbspace with a large page size to try to decrease the number of levels in an index and increase performance by reducing the number of I/Os required to traverse the index. Using the largest page size available, 16K, we were able to
Thoughts From the IDUG Conference
(Troy Coleman) This past week the 2008 IDUG North America conference was held in Dallas. This was the conference’s 20th anniversary, and as usual it was an impressive event.
Best Practices for DB2 for LUW
(Chris Eaton) As I mentioned in my previous posting, Tim Vincent presented a spotlight session at the IDUG North American conference on the Top 10 DB2 Best Practices for Linux, UNIX, Windows. These best practices were actually taken out of a series of whitepapers that are now available on Developerw
KST Offers DataTrigger to Protect DB2/400 Files
(Alex Woodie) There are many different ways to secure data residing on an i OS-based server. From exit point programs and field-level encryption to firewalls and limiting powerful user profiles, there are as many protection techniques as there are ways to access the server. KST Software, an Israeli
Another IDUG in the Books
(Craig Mullins) Well, here it is late in the day on May 22, 2008 and the IDUG North American conference is officially over. And, of course, it was another successful conference!
The information perspective of SOA design, Part 8: Use of IBM WebSphere Information Analyzer in SOA design
(David McCarty, Dr. Guenter Sauter, Harald Smith and Peter Worcester) Learn to use the IBM WebSphere Information Analyzer to support the data quality analysis pattern. This is the eighth paper in “The information perspective of SOA design” series. This article demonstrates to an architect community
Information architecture essentials, Part 8: Packaging and reselling information
(S. E Slack) Whether you find the concept interesting or annoying, information architecture designs can be used to package and sell information to third parties. In this article, learn about these opportunities so you can determine whether or not your organization should jump into the game.
