10 March 2008
Java, Web Service, and database apps with Rational App. Developer v7
Get an overview of Rational Application Developer V7 in this basic tutorial, which includes demos and hello world exercises. This tutorial includes practical exercises that show how to create a Java application, create and invoke a Web service, and create a Web application that can access a Derby database using a Relational Record List.
07 March 2008
Changing UIDs and GIDs without harming your server
It's important to know what happens to file ownership in AIX once you make a UID or GID change. If you don't understand the results of altering a UID or GID, you could cause serious issues to your server and environment.
06 March 2008
Stick a fork in it: Java ParallelArray
In this article, discover the ParallelArray classes, which simplify parallel sorting and searching operations on in-memory data structures in Java 7. Be sure to check out the first part of the series for further instruction.
05 March 2008
Understand your Domain Name System
by 1 otherThe Domain Name System (DNS) is the service that converts hostnames and domain details into the IP addresses required for application to communicate. This article looks at the basics of DNS setup, how servers and requests are distributed, and exchanged and how to set up and keep a DNS environment running smoothly.
04 March 2008
Rational ClearCase Innovator’s Series eKit
With transparent real-time access to files and directories and sophisticated branching and graphical merge tools, Rational ClearCase can help you automate manual error prone processes, collaborate with your teams without sacrificing individuality and stay flexible in the way you work while developing better software, faster.
03 March 2008
IBM Enterprise Modernization Sandbox for System Z
These sandboxes make it easy and fun to quickly try practical scenarios guided by self-paced exercises. Leverage existing assets, architectures, and skills to quickly develop modern applications for System z, System i, and distributed platforms. You can also integrate, test, and deploy applications in a live test environment.
29 February 2008
Configure HTTP basic authentication with Rational
This second installment in the three-part series shows you how to configure HTTP basic authentication for your Web services and Web services client, and monitor the HTTP basic authentication information using the TCP/IP monitor. Check out the first part of there series for the initial steps.
28 February 2008
Get the most out of Z Shell
Examine key parts of the Z shell (zsh) and how to use it's features to ease your UNIX system administration tasks. zsh is a popular alternative to the original Bourne and Korn shells. It provides an impressive range of additional functionality, including improvements for completing different commands, files, and paths automatically, and for binding keys to functions and operations.
27 February 2008
Keep an eye on your system with Log File Basics
A typical UNIX or Linux machine creates many log files during the course of its operation. Some of these contain useful information; others can be used to help you with capacity and resource planning. This article looks at the fundamental information recorded within the different log files, their location, and how that information can be used to your benefit to work out what is going on within your system.
26 February 2008
SSL configuration for Tivoli Directory Server 6.0
Gain an overview of SSL configuration for IBM Tivoli Directory Server (ITDS) 6.0 on the AIX 5L operating system. Learn about command line configuration steps for SSL key database creation, certificate creation, certificate extraction, SSL authentication mechanisms, troubleshooting for SSL issues, and steps to perform LDAP client-server communication.
25 February 2008
Learn 10 good UNIX usage habits
Adopt 10 good habits that improve your UNIX command line efficiency - and break away from bad usage patterns in the process. This article takes you step-by-step through several good, but too often neglected, techniques for command-line operations. Learn about common errors and how to overcome them, so you can learn exactly why these UNIX habits are worth picking up.
22 February 2008
Understand Scala’s class syntax and semantics
In this second installment of The busy Java developer's guide to Scala series, learn a basic premise of language measurement: that the power of a language can be measured in direct relation to its ability to integrate new facilities -- in this case, support for complex numbers. Along the way you'll see some interesting tidbits related to class definitions and usage in Scala.
21 February 2008
Support AIX functionality with LDAP servers
Some platforms may lose their operating system-specific functionality due to the lack of schema support from the LDAP server. This article presents a solution for some non-IBM LDAP servers to support full AIX user management functionality by providing the AIX schema for these server types and the steps to update these LDAP server types with the schema.
20 February 2008
Protecting JSF applications with Acegi
This article first explains the features Acegi provides for this purpose and dispels some common misconceptions about using Acegi with JSF, then presents a simple web.xml file that you can use to deploy Acegi to secure a JSF application.
19 February 2008
Build your own memory manager for C/C++ projects
As a developer, one of the most powerful tools that C/C++ arms you with to improve processing time and prevent memory corruption is the control over how memory is allocated or deallocated in your code. This tutorial demystifies memory management concepts by telling you how to create your very own memory manager for specific situations.
18 February 2008
Get started with GAWK: AWK language fundamentals
Discover the basic concepts of the AWK text-processing and pattern-scanning language. This tutorial gets you started programming in AWK: You'll learn how AWK reads and sorts its input data, run AWK programs, manipulate data and perform complex pattern matching. When you're finished, you'll also understand GNU AWK (GAWK).
15 February 2008
How to setup and work with secure RPC with AIX 5.3
Find out how to use Secure RPC using Data Encryption Standard (DES) authentication on AIX 5.3 to achieve a secure communication between the client and server. In this article, you'll examine the setup required to initiate Secure RPC between the client and server, DES authentication, and how to make applications secure using the Secure RPC application programming interfaces (APIs).
14 February 2008
Transition to AIX from Solaris
Need to know how to work with partitioning and virtualization? Want to know the differences between WPARs and zones and how the process differs from creating zones and WPARs? Have your questions addressed with this article and make your transition easier.
13 February 2008
Mastering Grails: GORM: Funny name, serious technology
Any good Web framework needs a solid persistence strategy. In this second installment of his Mastering Grails series, Scott Davis introduces the Grails Object Relational Mapping (GORM) API. See how easy it is to create relationships between tables, enforce data validation rules, and change relational databases in your Grails applications.
12 February 2008
Theory and Practice of Ropes for Java String Manipulations
Systems that manipulate large quantities of string data are poorly served by the Java language's default String and StringBuilder classes. A rope data structure can be a better alternative. This article introduces Ropes for Java, a rope implementation for the Java platform; explores performance issues; and provides pointers for effective use of the library.
11 February 2008
Project and Portfolio Management Executive Resource Kit
Portfolio Management is about effectively managing portfolio value by aligning portfolio investments with business goals. This article provides insights and ideas around the commonly asked question of how to start the introduction and implementation of portfolio management practices in an organization.
08 February 2008
Optimizing AIX with performance tuning
Just when you thought you understood performance tuning on AIX Version 5.3, here comes AIX 6.1 on its heels to throw you a curveball. In this article, get up-to-date information on the recent changes to performance monitoring and tuning in AIX 6.1, including CPU, virtual memory, and I/O (disk and network).
07 February 2008
IBM Data Studio v1.1
IBM Data Studio is a comprehensive data management solution that helps you effectively design, develop, deploy and manage your data, databases, and database applications throughout the data management life cycle utilizing a consistent and integrated user interface.
06 February 2008
Build better systems, faster with IBM’s Developer Solution eKit
With systems teams under so much pressure to develop products faster, reduce production costs, and react to changing business needs quickly, communication and collaboration seem to get lost. Now, there’s a way to improve product quality and communication. Read the “Model Driven Systems Development” white paper to see how.
05 February 2008
Websphere Extended Deployment Compute Grid v6.1
Download a free trial version of WebSphere Extended Deployment Compute Grid, which lets you schedule, execute, and monitor batch jobs. Because online transaction processing and batch jobs execute simultaneously on the same server resources, you can avoid costly duplication of resources.