(Gaurav Rohila) InfoSphere Optim Data Masking Solutions provide a way to convert extracted or archived data into CSV, XML, or enterprise content management (ECM) data formats, and can also mask data while converting to any of these file formats.
In trolling around reading up on different thing to do with database security, I came across a graphic (credit: checkmarx.com) that took what I thought was a surprising look at security and what was included in an overall secure model for data. There were limited items – Availability, Integrity, Confidentiality. I won’t go into a lot of specifics, I suspect […]
(Henrik Loeser) Ever wanted to build a Slackbot, a chatbot integrated into Slack, on your own? I am going to show you how easy it is to integrate Slack or Facebook Messenger with the IBM Watson Conversation service.
(Asma Khalid) Table view is one of the most important and basic forms of presenting data on a web page. However, adding action to each row is equally important simply because action for each row leads to different results.
(Steve Pitcher) There’s been a lot of talk about Spectre and Meltdown since Google developers first announced the vulnerabilities on January 3, 2018. Rightfully so, as this type of vulnerability is arguably the biggest security concern in the history of computing.
(Dustin Marx) In the debate over single vs. multiple returns when using Java Optionals, here are some tips to ensure your code is both functional and readable.
(Jagruti Jasleniya) The load-oriented wait events indicate that a delay in processing has occurred in the GCS, which is usually caused by high load, CPU saturation and would have to be solved by additional CPUs, load-balancing, off loading processing to different times or a new cluster node.
(Manoj) Cloud Computing is the delivery of computing services like servers, storage, databases, networking, software, analytics and more-over the Internet (“the cloud”).
(Anoop Kumar) Data security is always a matter of concern for organizations and application users. The key challenge for any developer or architect is to understand all the concerns and build a foolproof system to ensure data security
(Mahesh Sabnis) This article explains the mechanism of handling Model level error messages which occur in ASP.NET Web API action methods while responding to client applications.