Data Management

Next-Generation Storage: Low Cost Isn’t Enough

New vendors trumpet products with lower price tags, but if they lock you into a single source, what’s the point?

Protecting Remote-Site Data

EdgeSecure makes it easier to protect data stored in remote locations.

Management by Security Class

Sooner or later, technology to allow a true ILM was bound to come along.

Control Broker Technology: Enhanced Customer Service Through Direct Front-to-Back-End Integration

The advent of the Web marketplace has forced companies to reevaluate their approach to customer service strategies. Many organizations rely on customer relationship management software to provide a consistent experience for customers at all points of contact with the organization. But, this software does not provide access to back-end applications. A new class of software, control broker technology, could be the answer to bridging the gap.

Of Java and DB2: Using Java Database Connectivity and SQLJ

IBM has provided the OS/390 Java programmer with two access mechanisms to access DB2 data: Java Database Connectivity (JDBC) and SQLJ. Learn what will work best for you. Receive an overview of Java with DB2 in the OS/390 environment, view code snippets illustrating each access mechanism, and compare the strengths and weaknesses of JDBC versus SQLJ.

Come Into the Cold: Computer Output to Laser Disk System Saves 13,800 Hours in Access Time

Marsh & McLennan Companies Inc. needed to find a way to reduce the amount of time clerks spent searching through stored data in order to answer inquiries. The move from a microfiche-based storage system to a computer output to laser disk (COLD) system in 1996 saved the firm 13,800 hours per year in time, previously spent searching for payroll, benefits and human resources information.

Data Assets: Forecasting Large Data Warehouse Applications in a Banking Environment

The Bank of America knows that keeping a competative edge means continually analyzing customer needs. Its Enterprise Data Warehouse, a DB2 database used for data mining, helps them meet their business goals. Recently, the bank upgraded the CPU processor to support this important application. Learn what steps were taken, and the results of the process.

Wild West Tales of DR: Resiliency, and a Bit o’ Luck Help Avert Disasters

The "Wild West" days of disaster recovery planning were a simpler time for networks. The hardware was tough, businesses had greater tolerances to outages and IT managers rode the range confident the homestead was safe. Today, businesses rely on the uninterrupted performance of its IT structure. More than trust in the resilience of hardware is required to safeguard an organization's information assets.

Searching for Effective CRM: Customer Relation Management and E-Commerce Work Together to Achieve a Common Goal

Although many business processes are being rapidly Web-enabled, the current integration of e-commerce and customer relationship management (CRM) solutions is a logical match with a potentially dramatic impact on the bottom line. CRM software needs to be integrated with the Web simply because that's where the customers are.

Join the Club: DB2 Management Drives Productivity at Automobile Clubs

In today's OS/390 environment, hardware costs have declined substantially, while software costs are increasing dramatically to consume an ever-larger share of the IT budget. But, not all vendors price their products accordingly. A new tool for managing DB2 for OS/390 has entered the market, promising to save DB2 shops about $100,000 a year and allow for a more productive DB2 staff.

High-Speed Transaction Recovery

If your data is not available, your applications cannot run, and therefore, your company is losing business. Lost business translates into lower profitability and, perhaps, a lower stock valuation for your company. These are all detrimental to the business, so the DBA must do everything to ensure that databases are kept online and operational.

Architecture Anarchy and How to Survive It: God Save the Queen

We're still hearing raging debates about "top down" architectures versus "bottom up" construction approaches to building data warehouse and data mart systems. The charges and counter-charges fly back and forth, with both sides claiming that theirs is the one, true, single way to build an EDW. This article examines the alternative architectures available, some of the market forces that are shaping the current and future BI architecture environment, and factors to consider when choosing your architectural path.

Saving Major Data: Document Management "Firepower" Helps Watervliet Arsenal Win the Data Control Battle

Watervliet Arsenal, the nation's oldest manufacturing arsenal, has two types of firepower; high-tech, high-powered weaponry; and the firepower that resides in a new document management system that went live in May of last year - Process Innovator, the first totally Web-centric Product Data Management and Electronic Document Management (PDM/EDM) system.

Data on the Move – In Pursuit of a Competitive Advantage: Your Organization and Technology Are Ready for Success. What About Your Data?

By combining organizational and technical solutions, companies hope to create a streamlined, Web-enabled organization running on integrated information and powered by super information engines along the fast track to 21st century success. Will it work?

Pfizer’s Prescription for a Healthy Supply Chain: VIT SeeChain Helps Improve Sales and Corporate Productivity

When major pharmaceutical manufacturer Pfizer Inc. was looking for a way to deliver relevant, up-to-date sales and marketing information to its sales managers and representatives, it chose VIT's SeeChain for its portal and supply chain performance management applications.

Welcome to Wendy's, How May I Protect Your Server Data? Centralized Backup Management at Wendy's International

Fast-food giant Wendy's International Inc. implements Innovation Data Processing's FDR/UPSTREAM, enabling the company to further utilize existing automation tasks through established backup and recovery procedures.

Going Mobile: Mobile Agents Drive Home the Next Generation of Middleware?

By giving “wheels” to conventional middleware, mobile agents have created a new class of intelligent, self-directed agents able to remotely execute processors at the data source and feed information to users. Even better, they manage to do it while reducing network overhead.

Cross-Platform Information Sharing

Heralded as the “Holy Grail of IT,” cross-platform information sharing actually has more to do with the security, integration and transaction of the data and less to do with simply providing users with common access.

Database Recovery When Data Sharing

In a data sharing environment, where multiple DB2 subsystems read and update tables in shared mode, database recovery becomes more complex behind the scenes. Discover the major components involved in database recovery changes made in DB2 to support database recovery and some performance issues related to tecovery.