EMC and HP are just two of many storage vendors with announcements at this week's VMworld show. Will there be big news from the VMware-Cisco-EMC alliance?
<b>Datamation:</b> "How do you know if a cloud computing vendor is secure? When they make claims about their nearly absolute level of safety, should you just...take their word for it? "
Rob Gravelle demonstrates a solution for passing MySQL dynamic field names to the group_concat function using a combination of stored proc input parameters, string concatenation, and prepared statements.
Rob Gravelle demonstrates a solution for passing MySQL dynamic field names to the group_concat function using a combination of stored proc input parameters, string concatenation, and prepared statements.
<b>ServerWatch:</b> "Novell, the parent company of SUSE Linux Enterprise Server, seems to have slapped a huge "For Sale!" sign on its front lawn. It's sad, but this famous enterprise OS maker may soon be little more than a mildly interesting footnote to history."
Executives from a handful of security firms outline the biggest threats facing the enterprise, urge new policies to protect networks as workers bring consumer technologies behind the firewall.
Executives from a handful of security firms outline the biggest threats facing the enterprise, urge new policies to protect networks as workers bring consumer technologies behind the firewall.
Tens of thousands of Arkansas National Guard soldiers became the latest victims of a security breach at a military base after an unencrypted external hard drive was discovered missing last month.
Networking and security firm offers commercial support for Quaresso, a startup offering a new spin on the armored browser with remote support to shore up the last mile.
Before SQL Server 2008, you had to build a custom solution if you wanted to keep track of the changes to the data in your tables. SQL Server 2008 has a new offering called Change Tracking that keeps track of each DML event type and the keys of the row that was affected.
<b>InfoWorld:</b> "Wanted: Sys admin to log long hours and plan vacations around other people's paydays. Must be willing to put up with self-absorbed IT professionals. Ability to sniff out fraud essential."
Learn a technique to fetch column data for MySQL crosstabs by emulating views. By replacing tables with a subquery subset, the resulting view will contain a limited dataset that has been filtered for that column field.
Learn a technique to fetch column data for MySQL crosstabs by emulating views. By replacing tables with a subquery subset, the resulting view will contain a limited dataset that has been filtered for that column field.
<b>Jamie's Random Musings:</b> "...Skype-to-Skype calls will "always be free". Well, it turns out that promise is worth exactly as much as any other promise Skype has ever made, or will ever make for that matter. A big, fat nothing."
<b>The H Open:</b> "Lightweight desktops have a multitude of uses, on netbooks, for mobile devices, for older hardware, for users with limited requirements of their systems, for connecting to applications in the cloud, and for bare knuckled programmers who prefer to work closer to the metal."