Data Connectivity & Mainframe Inegration

Data Services Journal

Subscribe to Data Services Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Data Services Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

During the 2016 election season, we’ve seen considerable media coverage on big data and predictive analytics.  The access to massive quantities of data has played an increasingly important role not only for predicting the election winner, but also for driving candidates’ campaigns. During the 2012 election we saw political data science and big data leveraged by campaign managers to tap into the public opinions of the candidates. The information garnered from those data points led to decisions that shaped campaign strategies. Since 2012, we’ve seen substantial advancements in political data analytics. A recent Forbes article explains this well, “In recent years, political data analytics has advanced from simple micro targeting to true predictive data science, and the track record is good. Some of the brightest minds in the field are using massive amounts of data, c... (more)

Shift in IIoT #Monitoring | @ThingsExpo #IoT #IIoT #DigitalTransformation

There's been a seismic shift in monitoring earthquakes via the  Industrial Internet of Things (IIoT) with advanced Machine-to-Machine (M2M) technology having reshaped the industrial communication industry. Every device or machine along the network, even at the outermost edge, now has the opportunity to be fully-connected for automated collection and delivery of information. As Sensor-2-Server (S2S) communication technology evolves to keep up with the demand for this connectivity paradigm, new efficiencies are created and Big Data is available to drive actionable intelligence. Seismic Shift Data that Saves Lives The sheer quantity of available data, combined with the speed of automation, can support mission-critical applications that are designed to save lives. Research centers can leverage IoT networks to relay critical data in real-time from areas where earthquakes ... (more)

IoT and ML | @ThingsExpo #BigData #MachineLearning #CognitiveComputing

Machine-to-machine (M2M) learning is an integral apart of the expanding world of Industrial IoT. Over the past few months we have given attention to manufacturing and its current digital disruption, but have failed to show the direct impact smart M2M and IoT technology is having on the industry. So, this week we are diving deeper into the term machine learning and how it connects to manufacturing both today and in the future. Before we get to our news round up let's start by re-defining M2M, to ensure we are all on the same page with its purpose and meaning. Gartner has defined machine-2-machine communications as "something used for automated data transmission and measurement between mechanical or electronic devices." Now, that we have defined M2M, its time to check out our top news round up for the week on how M2M applies to both manufacturing and IoT. 10 ways machi... (more)

Vopium to Provide Mobile VoIP and Messaging Platform to Convergia

Vopium, the Danish based mobile communications company, has announced that it has entered a long-term agreement with Canadian based Convergia Networks Inc. to supply Convergia with Vopium's mobile VoIP and messaging platform. The agreement will allow Convergia to offer the entire Vopium portfolio of advanced mobile and web-based communication services, including mobile VoIP, SMS, Instant Messaging, contact back-up, web-calling etc across North and South America under the Convergia Brand. "Vopium has been developing and testing our white label platform over the last year, and we are excited to announce our first international partner today", says Vopium CEO Tanveer Sharif. "Convergia is an ideal partner for Vopium, combining Vopium's advanced mobile VoIP technology with Convergia's strong Pan-American network infrastructure, expertise and marketing capabilities." "C... (more)

IIoT Top News: CES 2016 and the Fate of IoT | @ThingsExpo #IoT #M2M

All eyes appeared to be on the Consumer Electronics Show (CES) 2016 in Las Vegas since last week, as more than 3,600 companies unveiled the IoT and IIoT innovations we can all expect to see in the coming year. This year's CES showcased plans to make the car a complete mobile office-with technology in place to allow Skype calls and the use of Microsoft 365 from the car. The other hot theme at CES was drones - not a surprise since these unmanned crafts have pulled us in like a tracker-beam to the mother ship. The autonomous ‘copter drone was one of the most impressive releases with the reality that the businessman of tomorrow doesn't need a private jet, just a ‘copter drone and a smart phone. Now, as we watched all the products rolled out for their various purposes, it seems we have more connected things to add to an already expansive connected world. How will IoT co... (more)

M2M and #MachineLearning | @ThingsExpo #IoT #M2M #IIoT #API #BigData

Time and again, those keeping a pulse on the Internet of Things (IoT) space frequently hear about the "rise of the machines." Humanity is not only discovering fascinating ways to integrate machines into our daily lives, but also finding new uses for machines as well. How? Machines are now "internet-connected" just like the smartphones we carry around in our pockets. And this isn't just on the commercial side with the likes of smart thermostats or connected vehicles - even tractors and oil and gas machinery are industrial examples of where new "things" are now on the digital network. In fact, there are more M2M or 'machine-to-machine' communication devices on this planet than humans. As GSMA Intelligence reported in 2014, there are 7.2bn M2M devices versus 7.19bn humans. Stuart Taylor from Cisco also wrote a prediction that "The Internet of Things (IoT) is a world w... (more)

IoT Challenge and #FogComputing | @ThingsExpo #IoT #M2M #BigData

Fog Computing is being touted as the data communication solution our Internet of Things (IoT) devices are asking for by bringing the power of cloud computing closer to the end user. The fact is, the number of connected devices is going to continue to grow exponentionally. In fact, Gartner predicts that by 2020 IoT will include 26 billion connected things. Consider the impact that amount of data collected and processed will have.The Challenge Naturally, with billions of devices all connected to the cloud for manufacturing, oil and gas, utilities, municipalities and enterprise, to name a few, the data transmission and processing rate is bound to slow down - especially if the current cloud architecture is upheld. Some IoT devices use the cloud to store data long term, where other connected things send data to the cloud to be analyzed and sent back to the device with... (more)

DataDirect First Vendor to Implement Windows Authentication for Pure Java Access to MS SQL Server

(July 17, 2003) - DataDirect Technologies' DataDirect Connect® for JDBC® 3.3, is the first set of Type 4 JDBC drivers to support Windows authentication. Through an innovation thought impossible by many in the industry, DataDirect Technologies has implemented Windows authentication within their Type 4 JDBC components used for connecting Java applications to Microsoft SQL Server data. DataDirect Technologies has a patent pending on this new technology. Windows authentication is also called "integrated security" and "trusted connections," primarily because it is an integral part of the operating system and relies on the user being authenticated or "trusted" by the OS. It eliminates the need for users to login separately to multiple applications: the security credentials established for the user at logon time are used to authenticate the user when connecting to SQL Serv... (more)

Are you Application vAvailable?

At Marathon Technologies, we service a range of industries that must have their applications up and running at all times, or as we call it: vAvailable. vAvailable is the integration of virtualization and high availability technologies to create a cost-effective solution that ensures applications won’t go down. With virtualization technologies, high availability has now launched well between today’s alternative solutions such as clustering. This session will define vAvailable and this is a huge step between today’s alternatives. Mr. Melnick will discuss a new standard for application availability using virtualization technology that embraces Windows and business process applications. Speaker Bio: Jerry has held positions at PPGx, Inc., Belmont Research and Digital Equipment Corporation, where he led a variety of system and product development efforts in areas of OS, net... (more)

3rd International Virtualization Conference & Expo in NYC to Present a World Class Faculty

What does the former CTO of XenSource - now CTO of the virtualization and management division at Citrix - have in common with the founder and CEO of PlateSpin, now VP of Business Development at Novell? And what do both have in common with the CTO of VMware? The answer is that all three are speaking in June at the 3rd International Virtualization Conference & Expo in New York City, along with the CTO of Egenera, the Technical Director and Chief Technologist at Sun, the VP& CTO of Hitachi Data Systems, the CTO of BMC Software, the VP & CTO of EMC, the co-founder & CTO of Neocleus, the CTO of Xsigo Systems, the CTO of Brocade, the Chairman and CEO of SIMtone, the Founder & CEO of ScaleMP, the founder and CTO of VirtualLogix, the Chief Strategist of Appistry, the CTO of Marathon Technologies, the CTO & Co-Founder of Reflex Security, the VP of Research and Development at... (more)

SQL Anywhere Server and AJAX

AJAX has dominated the web space so extensively that it needs no introduction. Connecting to a server via XMLHttpRequest and making a partial page refresh is what makes this technique so attractive. However, use of these AJAX requests, although very attractive, can pose dangers as well. JavaScript acts as a vector to infect websites with worms, such as SAMY, using cross-site scripting, also known as CSS or XSS. In a previous article - "Enabling Server data with native web service" - I explain how a web service of type HTML is created on the SQL Anywhere server, which can serve HTML pages, and that to make an AJAX call for this page from your browser, you need to make a call to the hosting domain, the SQL Anywhere Web Server. Details of the AJAX Accessed Resource In the cited previous article, the resource is accessed on the localhost at port 8082, or any port chosen... (more)