![]() |
![]() |
![]() |
IN THIS ISSUE:
>
Featured Topic: Software pricing
>
IT pros bare souls on job woes
>
Red Hat hoax: No smoking gun for Linux security
>
More news
>
Three trusty rules for DB2 triggers
>
Upgrading challenges and surprises
>
The Missing Link: Camera phone gadget undresses with its eye
SPONSORED BY:
Search390.com Product and Vendor Guide
![]()
Simplify the process of finding mainframe-specific products and solutions. Search390.com's Product and Vendor Guide allows you to search listings alphabetically, and by industry or across such topics as Web and application development, systems management and more. Visit our easy-to-use guide now:
![]()
Click Here!
|
![Headlines]()
![]()
Featured Topic: Software pricing
[Search390.com]
Few things make a mainframe manager's blood boil faster than software pricing. The complexity of how it's priced can be frustrating to say the least. This week, the editors of Search390.com have collected all our best links on software pricing. To check it out, click here.
IT pros bare souls on job woes
[SearchWin2000.com]
In a recent salary survey, 45% of administrators and other IT professionals said they were less satisfied with their work now than they were a year ago. A flood of feedback on the issue indicates that the problem is about more than just low pay. To read the story, click here.
Red Hat hoax: No smoking gun for Linux security
[SearchEnterpriseLinux.com]
Yesterday's Red Hat security hiccup yesterday may have been a little overblown, with one consultant calling the phishing scam so unauthentic that it was "obviously un-Red Hat." To read the story, click here.
More news
[Search390.com]
SNW '04: Eyeing on-demand storage, IBM refreshes software (SearchStorage.com)
SAP report card: Satisfaction with support down (SearchSAP.com)
To read these and other news stories, check out our news page here.
![Also on Search390.com]()
![]()
TIP:
Three trusty rules for DB2 triggers
Triggers are very handy. In this tip, Craig Mullins, our DB2 and database expert, lays our his general rules of thumb for triggers. To see the tip, click here.
ADVICE:
Upgrading challenges and surprises
A Search390.com user asked Jim Schesvold, our z/OS expert:
We are upgrading from OS/390 V2.10 to Z/OS V1.4 and I would like to know what changes or surprises to look for in the applications side -- recompiling, upgrading, -- in COBOL, PL/I, LE, CICS, TSO, etc.
To read Jim's response, click here.
WEBCAST:
The Expert Answer Center's IT Visions Webcast Series
The Expert Answer Center's IT Visions Webcast Series features monthly webcasts for IT executives that spotlight strategic issues. Past speakers have included Dan Geer and Jason Jennings speaking on security information as it relates to economics and five secrets to increase your productivity, respectively. Come see what this month's spotlighted webcast is and what it has to teach you about guiding and improving your IT
department.
![The Missing Link]()
![]()
Camera phone gadget undresses with its eye
[CNET News.com]
Remember the ads for X-Ray Specs in the back of comic books (right next to the sea monkeys and above Grit magazine)? Those specs always seemed suspect -- both scientifically and legally. Well, now it looks like the genuine article has finally hit the market, albeit by accident. When a developer in Japan created an add-on to allow cell phones to take pictures in the dark, little did he know his gadget was so Superman-good, it
could see right through people's clothes! And of all the garments, dark bikinis seem to offer the best view. You can't get the peeping gizmo outside of Japan, and you've got to think the government won't turn a blind eye to the camera with the "overexposure" problem.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
|
![]() |
|
![]() |
|