The SOA blog with observations and commentary for software architects, developers and application development managers about SOA, Web services, integration technologies (ESBs, Grids, XML) and development platforms such as Java EE and .NET.
I teach 3D animation at the University of Colorado at Boulder, and am frequently asked by students how they can get their hands on free or cheap image editors (for preparing textures), video editors (for rendering video segments from the single frames rendered by AutoDesk Maya, the most popular 3D a…READ MORE
What are the most common mistakes IT managers make when doing a server virtualization project? There are many, and they’re easily avoidable, said a gaggle of Gartner analysts at the Gartner Data Center Conference in Las Vegas this week.
Most virtualization goofs center around lack of planning a…READ MORE
LINK :: Microsoft Vista Bad – Texas Bans Vista For State Gov
The malignment of Windows Vista has reached a new height: A Texas lawmaker added a provision to the state budget that would effectively ban Vista from being purchased by any state government agency.
The rider says that any agency mu…READ MORE
By Kathleen Kriz
With Microsoft’s Visual Studio LightSwitch beta software, users are given the opportunity to build business applications by using a simplified process, according to an early adopter. LightSwitch helps line-of-business and small business users quickly create both desktop and brows…READ MORE
“This excerpt is from the book, Building Windows 8 Apps with C# and XAML by Jeremy Likness, published by Addison-Wesley Professional, October 2012, ISBN-10: 0-321-82216-1. For more info please visit the publisher site: http://www.informit.com/store/building-windows-8-apps-with-c-sharp-and-xaml-978…READ MORE
This is, as the title suggests, my final post here at this site. I have been here for a few years and it has been great. But I feel that it is time to start my own blog site and try to build a bit of a brand all my own. So my new blog is DBYAY.com. This will be a site about SQL Server, Powershell, a…READ MORE
Happy Friday Everyone!
(Originally I meant last Friday, when I started writing this)
One of the projects on my Side List is to convert the User Menus on our system from either a DSPF type or a MNUDDS/MNUCMD type member to a UIM Menu. I must say, ever since I started modifying UIM Menus as small …READ MORE
Another VMworld is in the books. The show was very interesting this year for a number of reasons. First off, go back and take a look at my focus for this year and let’s recap from there.
Mobility, VMware Horizon Suite, etc.
*crickets*… *crickets* There wasn’t much in the way of mobility this y…READ MORE
Edison Peres was recently named the new channel chief at Cisco, and I had the opportunity to sit down with him and find out what he has planned for channel partners over the next few quarters. Here is a basic rundown of Peres’ top five strategies and what Cisco partners can expect:
1.) Build ca…READ MORE
We have seen how in the first part how DMVPN works, the dynamic tunnels and how we can peer Spokes to each other to allow direct traffic. But all will fail if our Hub goes down, as it is critical in keeping the DMVPN network up. For redundancy Dual Hub DMVPN networks were designed, we would look at …READ MORE
In speaking with customers lately, I am finding more and more attention spent on the lineage of data. It isn’t enough these days to manage these type of complex movements and manipulations of data with spreadsheets. More often than not, I am finding customers asking for the golden nugget feature…READ MORE
The future is bright for IBM i, as the powerful machine that could continues to provide data processing for hundreds of thousands of businesses across the globe.
In April 2010, IBM i 7.1 was released with enhancements that include:
DB2 for i support for XML and column level encryption
I have said more than once that working on an open source project can help you get a job writing proprietary or in-house software. When your potential employers can see, evaluate, and discuss the actual code you wrote, you are head and shoulders above anoth applicant who can only say, “I worked on t…READ MORE
How to Make Your B2B Marketing Breakthrough During the Holidays
For many, the holiday season translates to shopping, socializing and stress. Research shows we spend more time socializing and shopping in December at the expense of exercising. While many B2C connections are made during this month, B2B…READ MORE
“Tape is dead” is probably one of the most successful aphorisms in IT; it is oft repeated and also represents the triumph of a sound bite over reality. The truth is that the global tape market is in a state of very slow shrinkage, being eaten at by disk-based methods of storage, although in the …READ MORE
Heard about SOC 3 and SysTrust | WebTrust, commonly known as the “Trust Services”? If not, you are about to start seeing SOC 3 reports surface, due in large part to the American Institute of Certified Public Accountants (AICPA) extensive efforts in reshaping service organization reporting. In shor…READ MORE
Twenty-two Media & Entertainment IT professional filled the room at the Morton’s Steakhouse in Beverly Hills, CA for our first ever Media & Entertainment focused Storage dinner last month. Attendees came from major production companies and networks such as Megatrax, Lion Gate, Disn…READ MORE
You’re never safe in Enterprise IT. Just when you feel you’ve gotten a handle on the last hot topic you’re hit with another. SOA, BPM, Agile, ITIL; You feel like screaming “Enough!” but you know resistance is futile. Gartner have said it’s important so you know full well that you’ll be…READ MORE
The good news is we can handle these samples very easily. The first base64 looks like it will take a bit of work but the second one we can decode right now.
I just happen to have a perl script I wrote to do just the thing.
$new = …READ MORE
Technology deployment and associated management information systems can provide a competitive advantage as well as increased control requirements. Legal noncompliance risks are an irrefutable fact, where consequences range from significant financial penalties to the threat of damage to an entity’…READ MORE