Many critical business applications now execute in an environment separate from that of the enterprise database server. The database administrator often finds monitoring and performance tuning of these "distributed" applications to be especially difficult. This article looks at common performance issues of distributed applications and presents advice to assist the IBM DB2 database administrator in mitigating performance problems.
<b>Linux Pro Magazine:</b> "The Dé Dup backup utility may not be the most powerful or flexible backup tool out there, but it does have its advantages. Its straightforward interface makes it dead-easy to configure backups, while the support for the Amazon S3 storage back-end is a boon for users looking for unlimited backup storage on the cheap."
<b>Geek Ride:</b> "Everyone is not as lucky as having a full fletched email client like thunderbird or kmail to send mails. There is one unlucky group known as system administrators who have to send the mails either through the command line or a script running on the remote server."
<b>Linux Operating System:</b> "Jan Mette (funkyou) passed away of as-yet unknown causes. Jan was a major contributor to the Arch Linux community, the creator of KDEmod and a founding member of the Chakra team."
<b>Click:</b> "I turned on my laptop running the Ubuntu 10.04 Lucid beta (I think we're still technically on "beta 2") and found more than 100 updates ready for me."
New virtualization technology offerings and marketing promotions help Microsoft and partner Citrix kick off a 100-city tour to convince customers that flexibility in virtualization is the winning strategy.
<b>Cyber Cynic:</b> "I've given up on predicting when the zombie movie series staring the undead SCO monster is finally going to stay quietly in its grave Still, this week a jury is deciding whether SCO or Novell owns Unix's intellectual property rights."
Is that a paperweight on your desk? Oops, sorry, it's a PC -- a space- and energy-saving desktop hardly bigger than a VHS cassette, priced at just $449, but with a dual-core Intel Atom CPU and all the power that office productivity workers need.
Using profiles for password management is an effective way to restrict unsolicited database usage. Every DBA should verify the password restrictions and setup an appropriate number of profiles for the groups or types of users within the database.
<b>The Volokh Conspiracy:</b> "Under this new decision, if the government wants get your e-mails, the Fourth Amendment lets the government go to your ISP, wait the seconds it normally takes for the e-mail to be delivered, and then run off copies of your messages."
Don’t be fooled by a netbook configuration that sounds, well, run-of the-mill. The HP Mini 5102 tops the company's high-end netbook computers, with a price tag to prove it. Is it worth the price?
<b>The ERACC Web Log:</b> "This is part one of a two part article about a “real life” control system that is a candidate for moving to a VM on Linux. This control system is being used right now in a real manufacturing facility."
<b>Netstat -vat:</b> "A year and a half ago, I was among those that celebrated the release of Songbird 1.0 -- a Mozilla based open source music challenger to iTunes."
The iPad might be dominating the headlines this week, but the security folks at Apple have been busy, too, releasing an update to the QuickTime software that patches 16 vulnerabilities.
Following months of testing and a long history of security vulnerabilities with its popular Reader and Acrobat products, Adobe is planning to debut its new software update system next week.
Bringing two networks together is not always a simple matter. Enterprises that approach it from a purely technical perspective are in for a more complex integration.