Insights, updates, and deep dives into cybersecurity, cloud technology, and AI innovation.
Having used Mathematica for years, I might be biased, but I just saw the latest articles about Wolfram|Alpha and I wonder: does it have the potential to be the next Google killer, or not? Frederic Lardinois says in Wolfram|Alpha: Our First Impressions that it isn’t going to be a Google killer, but I’m not convinced. […]
I just came across the following two articles that have some good pointers for using the native XML capabilities of DB2: Using DB2 XQuery to extract data mining results stored as PMML: this article is a great introduction to XQuery and Predictive Model Markup Language (PMML), a language to describe data mining models and to […]
DB2 Support for Data Migration When it is time to upgrade from DB2 on Intel to DB2 on Power for example, taking a backup/restore approach isn’t possible as DB2’s backups are platform dependent. The solution is to use a DB2 command called db2move. Basics of db2move db2move allows to export data from DB2 at different […]
Lotus Notes has four main functions: email, calendar, address book, and to-do. Of these functions, the address book is the only piece that is stored locally on whatever computer you added the entries. Thus, if you need to have access to your address book when you are at a different computer, or when you are […]
A secure certificate (aka SSL cert) allows a web site to secure the connection between the web server and the visitor. That allows the protection of the users’ privacy and the confidentiality of the data. A secure certificate technically does the following two things: Guarantee that the website you are looking at is truly the […]
If you are in SecOps, you probably have seen the threat of CryptoMiners running on compromised hosts. This article may not be for you, but if you would like to dive deeper inside of the working of crypto-mining you will find a few resources here to get you started. For the example I use the […]
When I tried to run databases on OpenBSD, I encountered an issue running out of a resource that I didn’t quite understand at the time. I asked the following question on the [email protected] list: > I get the “/bsd: WARNING: mclpool limit reached; increase NMBCLUSTERS” > messages “last message repeated 10 times” and then kernel […]
ExponentCMS is a popular web site management framework.  It has its own internal security system to protect against web site hacking.  As a result, on cPanel, which has its own system, the file uploads may not work.  Here is what to do when there are file upload issues: make sure suPHP is enabled in cPanel […]
These ideas are derived and quoted from “Best practices for tuning DB2 UDB v8.1 and its databases” CREATE INDEX has a number of options that allow for significant performance gains: Optimizing for SELECT: use PCTFREE 0 if index is on a read-only table. Optimizing for ascending or descending ordering: use ALLOW REVERSE SCANS to allow […]