IBM has released anevaluation version of its latest IBM Rational Software Architectproduct. Rational Software Architect is a comprehensive application design, modeling and development tool for end-to-end software delivery. The latest version provides comprehensive support for emerging technologies such as Business Process Modeling Notation version 2, Service Oriented Architecture, and Java Enterprise Edition version 5. Stop by the Evaluation Software area of developerWorks to download an evaluation copy of this product.
IBM has released anevaluation version of its IBM DB2 Merge Backup product for Linux, Unix, and Windows. As application databases increase in size and number, so does the amount of time required to complete backup procedures. But the IBM DB2 Merge Backup for Linux, Unix and Windows lets database administrators perform backups without taking databases offline or disrupting applications. Database backups are completely transparent to end users. Visit the developerWorks evaluation software area to download an evaluation copy of the product.
Surajit Paul has published ahow-to guide for Hadoops' Sqoopthat focuses on the Java APIs. Sqoop is an integral part of a Hadoop ecosystem, helping transfer data between NoSQL data storage and the traditional RDBMS. Numerous technical articles have been published featuring the Sqoop command-line interface (CLI) usage. However, as of Sqoop 1.4.3, there is not much insight publicly available about the usage of the Sqoop Java API. This article covers the usage of the Sqoop CLI, with additional emphasis on the Sqoop Java API, using an example of data from the Bombay Stock Exchange. The article is intended to provide preliminary exposure to technical architects, solution architects, technical managers, consultants, data scientists, technical leads, and developers interested in and working in the big data space.
Additional items in this episode:
Joern Klauke, and Martin Jungfer have published a new how-to guide forusing the new scripted interface for DB2 Advanced Copy Services. This new feature introduced in DB2 10.5 allows administrators to invoked the Advanced Copy Services from shell scripts instead of native code. This new feature enables IT shops to incorporate new storage hardware into their back up infrastructure more quickly and consistently. This how to guide will be useful for anyone managing a DB2 backup environment.
Enzo Cialini, Ian D. M. Hakes, Ian D. M. Hakes, Richard Lubell, and Paul McInerney have published a new how to guide on Implementing disaster recovery in IBM PureData System for Transactions. This article outlines the setup and operation of a disaster recovery solution for DB2 V10.5 databases on the IBM PureData System for Transactions, Fix Pack 3 or later. The solution is based on the DB2 High Availability and Disaster Recovery feature, and includes additional elements that are not handled directly by the product. This article will be of interest to anyone who needs to make sure their mission critical data can always be restored.
Neal Ford has published part 2 in hisJava.next series. In this latest installment, he discusses Java's lack of inheritance mechanisms that are commonly found in Groovy, Scala, and Clojure. This installment further explores Clojure's use of protocols as an extension mechanism. If you're interested in the evolution of Java, you'll want to read about these extension mechanisms.
Craig Statchuk has published a how-to guide on developerworks that walks you through the the steps required to implement an interactive map widget for use with IBM Cognos 10.1.1 Business Insight. The interactive map widget implemented in this tutorial can utilize online maps from popular vendors such as ESRI Maps, Google Maps, and Bing Maps. The tutorial provides example code that you can use as the starting point for your own interactive map widget in IBM Cognos.
Sundari Voruganti and Kathryn Zeidenstein have updated their developerWorks article onhow InfoSphere® Guardium® can integrated Hadoop-based environments into Guardium's activity monitoring and auditing policies. They also show how to tailor Guardium's reporting capabilities to specific Hadoop environmanes such as IBM Big Insights, Cloudera, Hortonworks Data Platform, and Greenplum Hadoop.. In their article, you will also learn about a quick start monitoring implementation available only with IBM InfoSphere BigInsights.
Roger Sanders has published a new guide called "DB2 10.x certification: Everything you need to know" which covers the reasons you might want to get certified as a DB2 Professional, the different types of certifications that are available, and how to prepare for certification exams.
Andrew Hoppe and Jeff Klink have published "New APIs in IBM SmartCloud Enterprise 2.2" to describe the use of the new APIs, outline their use cases, describe their functions, and show code samples. The new APIs cover user management, guest messaging, service offering management, service instance management, and storage unit provisioning
Indrani Ghatare, Matt Kalan, Sundari Voruganti, and Kathryn Zeidenstein have just published a two part article series called "InfoSphere Guardium data security and protection for MongoDB." This article series describes how to monitor and protect MongoDB data using IBM InfoSphere® Guardium®. Part 1 describes an overview of the solution, the architecture, and the benefits of using InfoSphere Guardium with MongoDB. Part 2 describes how to configure InfoSphere Guardium to collect MongoDB traffic and describes how to create security policy rules for a variety of typical data protection use cases, such as alerting on excessive failed logins, monitoring privileged users, and alerting on unauthorized access to sensitive data.
Rahul Gupta and Devipriya Selvarajan have published an article series called "Load balancing WebSphere Message Broker HTTP traffic" WebSphere Message Broker V8 lets you generate a configuration file for the WebSphere Plug-in or Apache mod_proxy modules, which are used by IBM HTTP Server and Apache HTTP Server respectively to enable HTTP load balancing. Part 1 of this two-part series shows you how to configure load balancing for WebSphere Message Broker HTTP traffic using WebSphere Plug-in and IBM HTTP Server.
Jeff Hoy talks about his article "Enabling the OAuth service provider in WebSphere Application Server." OAuth 2.0 service provider support was added as part of IBM® WebSphere® Application Server versions 184.108.40.206, 220.127.116.11, and 18.104.22.168. This article provides an overview of OAuth support highlighting architecture, new features, and the minimal configuration steps needed to enable the capability. The article also includes debugging tips, resource links, and pointers for advanced configurations.
David Jarvis, from the IBM Center for Applied Insights, discusses a new report from the Center for Applied Insights called their report, "Cybersecurity education for the next generation" He explains the three types of collaboration recommended for institutions that want to develop a cybersecurity curriculum and discusses three cases studies from the report.
William von Hagen from WordSmiths discusses Scribus, the open source, graphical desktop publishing (DTP) tool that focuses on layout, frames, styles, color management, and intercolumn document flow. Scribus is free software that runs on the Linux, Windows, and Mac OS X platforms, and provides most of the capabilities of traditional DTP tools at no cost.
Other news This Week On developerWorks
Lalatendu Patro is a software deveoper at IBM who's just published an article on the Net Search Extender verification tool to make sure your full text searches on DB2 databases are as accurate as possible.
Timi Ogunjobi is a software engineer and author at Xceedia Limited who is an expert at setting up Drupal multisite installs. His article will show you step by step instructions for installing Drupal so that you can run and manage multiple independent Drupal-based web sites from a single install.
Nader Nassar, an integral part of the CIO Innovation for Security team, joins me to talk about how IBM can help you with your dynamic testing of mobile apps. You can dive deeper into mobile application dynamic testing by reading Nader's (and Carlos Hoyos and Daniel Anderson's) article Secure Your Mobile applications.
Also among this week's valuable bits of knowledge: