New functionality in DB2 Web Query version 1.1.2 simplifies JD Edwards reporting. Written by Robert Andrews
In my last TechTip, "How'd You Get Your SQL Server Data in My IBM i DB2 Data!?!," I explained how we could integrate Microsoft SQL Server data into the drag-and-drop world of DB2 Web Query reporting. In this TechTip, I will discuss how to integrate data from Oracle's JD Edwards line of applications. The IBM i has consistently been a strong platform for this application. However, because of the data structure, accessing JD Edwards data outside of its application was difficult.
Start planning now and help those near you understand what a geek really needs.
Written by Chris Smith
This holiday season, let's all get in touch with reality and quit pretending that we are someone we're not. If you have young children and you want to be Santa Claus, well fine. But everybody else needs to let the truth be told. You're a geek, OK? If you don't step up to the plate and admit it, how do you expect to get any geek gifts at Christmas?
Find out why security officers represent your greatest security threat.
Written by Robin Tatam
OK, I know that the title of this article is probably going to upset some people. After all, I'm a professional security officer and make a good living helping customers secure application environments from both external attacks and "inquisitive" end users. So why would I be so willing to throw my own profession under the proverbial bus? It's actually quite simple. I truly believe that the security officer (SO) represents the biggest threat to many shops. To make matters worse, I will extend my definition of SO to include programmers and system administrators.