Marcin Policht examines SQL Server Integration Services' component, Derived Column Transformation,and how its usefulness is enhanced by its ability to implement fairly elaborate mathematical, logical, and string operations.
<b>Groklaw:</b> "The sale of the mobility business to Darl was approved, but he ended up paying $100,000 for it instead of the original $35,000 because there was a second bidder that responded to the sale ad in the newspaper."
<b>The Open Road:</b> "Novell, once the king of the software world, is like that. Over the years it has built up a broad portfolio of software (with associated revenue streams) in repeated attempts to regain its glory days. That portfolio now stifles its ability to focus on other areas with the most promise."
<b>developerWorks: </b>"Whether you are monitoring your network to identify performance issues, debugging an application, or have found an application on your network that you do not recognize, occasionally you need to look deep into the protocols being used on your UNIX network to understand what they are doing."
The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year.
<b>Linux Pro Magazine:</b> "Keeping your system clean can be a time-consuming affair, unless you use specialized tools like BleachBit (thanks to Nick Lord for the pointer). With just a few mouse clicks, this nifty little utility can help you to purge all the junk produced by the system and installed applications."
New design guides and services are being aimed at service providers looking for faster and less-expensive ways to help enterprise customers build and manage both private and public cloud computing environments.
Remember when every business needed a web site, but few knew why? Those days are back, only this time it's all about mobile apps. Here are some tips to get you started, particularly if resources are scarce.
Moving from self-hosted to cloud-hosted e-mail services makes a lot of people nervous, but with a little planning and good communication with your user base, there's no reason it has to be hard.
<b>Sure, It's Secure:</b> "I'm no friend to Windows. I know the operating system too well to trust it. But, I did think that even though Windows is defective by design, you could keep it relatively safe by installing patches quickly and using anti-virus software religiously. I was wrong."
New cloud-based payments platform provides payments processing environment that allows SMBs to accept payments from Web, phone, terminal, mobile and scanner.
<b>Groklaw:</b> "GPL enforcement is successful in Europe. In several court decisions and out of court settlements the license conditions of the GPL have been successfully enforced. In particular, embedded systems are the main focus of such compliance activities. The article describes the practice of enforcement activities and the legal prerequisites under the application of German law."
As we come to the end of Akkana Peck's excellent series on mastering GRUB2, it's not clear what advantages it has over legacy GRUB, or even good old LILO. It seems it's gone backwards. In today's installment we learn how to translate some common and mysterious error messages, and how to manage a multi-boot system with GRUB2.
Software giant rushes out Security Advisory to warn customers about code for a zero-day vulnerability in SharePoint collaboration server that's making the rounds on the Web.