WHITE PAPER:
Technical white paper covering the impact of XML on data warehousing and how to deliver new levels of business analysis and bring users closer to their data.
WHITE PAPER:
As new technologies become more widely adopted, your role as a database administrator (DBA) will change. This paper outlines the common challenges you face, the critical tasks you perform, and examines the trends will impact your role as a DBA.
WHITE PAPER:
This case study explores why Nervogrid, a cloud service provider, needed to update the user interface (UI) of their cloud control panel in order to support the latest web standards. Read on to find out how they successfully made the move to HTML5 in less than two months.
WHITE PAPER:
This knowledge path begins with an overview of the JavaScript language to provide a foundation for writing JavaScript code. It then covers more advanced topics such as object-oriented JavaScript and DOM modification for HTML page manipulation before covering introductory Asynchronous JavaScript + XML (Ajax) concepts and how to make Ajax requests.
WHITE PAPER:
This white paper explores how to enhance the electronic transmission of critical data across an SOA using a SOAP Message Transmission Optimization Mechanism.
WHITE PAPER:
SOA is being proclaimed the future of Web services - While promising flexibility and integration, unique and unforeseen challenges to stability and quality are also arising. Is your organization prepared?
WHITE PAPER:
IBM DB2 9 (previously codenamed 'Viper') for Linux, UNIX, and Windows marks a new stage in the evolution of data servers. This IBM white paper introduces and details many of DB2 9's innovative features and capabilities.
WHITE PAPER:
As organizations continue to employ larger data warehouses, the need for performance will continue to outpace the capabilities of traditional relational databases. This paper explores the data explosion and why column-oriented database systems are able to provide the boost needed to gain the performance edge.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.