Article Network

Oracle SQL Developer Tool 1.5 with SQL Server 2005

by Jayaram Krishnaswamy | October 2008 | .NET

Oracle SQL Developer Tool is a stand alone program that connects to Oracle as well as third-party databases which can be used to perform a variety of tasks from running simple queries to migration of databases from third party vendor products to Oracle. Please review the following articles on the earlier versions 1.1 and 1.2: MS Access Queries with Oracle SQL Developer 1.2 Tool and Migrating MS Access 2003 Data using the Oracle SQL Developer 1.2.

In the present article by Dr. Jayaram Krishnaswamy the latest version of this tool [Oracle SQL Developer 1.5.0.53, IDE Version: 11.1.1.0.22.49. 33] will be described and some details of how to use this tool with SQL Server 2005 will be discussed. While the default installation is ready to connect to Oracle and Access databases the other third-party products such as SQL Server 2005, MySQL and Sybase require additional JDBC drivers. This article describes how you may connect to SQL Server 2005 and SQLExpress servers using the JDBC drivers. The Scratch Editor interface which accepts an SQL Statement from a 3rd party and translates into PL/SQL code is described. This feature was also available in the earlier version.

Read Oracle SQL Developer Tool 1.5 with SQL Server 2005 in full

Change Control for Personal Projects - Subversion Style

by Gurudutt Talgery | October 2008 | Open Source

Change is a constant companion in our daily routine. Most of what we do is changing (transforming) one work product into another or revising or updating it. We might be transforming requirements into design, design into a prototype, client brief into a story board, idea into a concept document, creating versions of a banner ad, or updating a project plan to reflect progress; the list goes on. In this introductory article by Gurudutt Talgery we will see how we can bring a change management discipline to our work products or personal – not just software – projects with two simple tools on Linux: Subversion and a GUI front-end called eSvn.

Read Change Control for Personal Projects - Subversion Style in full

Third-Party Video Hosting on Drupal Websites

by Aaron Winborn | October 2008 | Drupal Open Source Web Graphics & Video

In this article by Aaron Winborn, we will see how to add third-party video on a site. This article talks about the advantages of third-party video hosting and how it can be achieved on websites by using Drupal. Its also gives a proper insight about the Third-Party Video providers and Embedded Media Field, which helps in hosting video from our own server.

Read Third-Party Video Hosting on Drupal Websites in full

Class-less Objects in JavaScript

by Stoyan Stefanov | October 2008 | AJAX Web Development

Java and JavaScript are very different languages, although the similarity in the names and the similar C-like syntax can confuse people sometimes. In this article by Stoyan Stefanov, let's take a look at one pretty major difference - how objects are created. In Java, you have classes. Then objects, a.k.a. instances, are created based on those classes. In JavaScript, there are no classes and objects are more like hash tables of key-value pairs. Then what about inheritance? OK, one step at a time.

Read Class-less Objects in JavaScript in full

How to Recover from an Active Directory Failure

by Florian Rommel | October 2008 | .NET Architecture & Analysis Microsoft Networking & Telephony

Active Directory (AD) failure, which includes corruption, is something that is dreaded by any administrator. Simply put, it means that the directory service can no longer read the Active Directory database that it has locally. This will prevent logon and authentication as well as any directory-dependent services. Essentially, it renders the domain controller (DC) useless. What's worse, though, is that several times, the replication keeps going so that the corrupted database spreads out to the other DCs.

In this article by Florian Rommel, we will look at the different options and approaches available to recover a DC that has a database corruption. In addition, this article outlines, symptoms, causes, and solutions for this scenario.

Read How to Recover from an Active Directory Failure in full

Modeling Orchestration and Choreography in Service Oriented Architecture

by Michael Havey | October 2008 | Architecture & Analysis BPEL Cookbooks SOA Web Services Java Oracle

So far, the general approach towards SOA has been that it is just a tidying-up of application integration. SOA, according to this approach, is not about building new a business functionality but about organizing existing systems. In this article by Michael Havey, we will see that, in reality, SOA is more than merely getting organized. Its principal mandate is to build something new; indeed, SOA is fundamentally about building new processes. We will consider an approach to SOA architecture that is, yes, methodical, but has the burden of actually designing new and challenging orchestration and ESB processes.

In this article, we will build examples of choreography and orchestration, study best practices for message handling in orchestration processes, and develop fundamental orchestration concepts, such as interaction, invisible hub, and deferred choice.

Read Modeling Orchestration and Choreography in Service Oriented Architecture in full

Front Page Customization in Moodle

by Alex Büchner | September 2008 | Moodle Content Management Open Source

In this article by Alex Buchner, you would learn how to customize the front page of your Moodle site. Before taking an insight into this, let's first take a general overview of Moodle's look and feel elements.

Read Front Page Customization in Moodle in full

CUPS: How to Manage Multiple Printers

by Ankur Shah | September 2008 | Open Source

In this article by Ankur Shah, you will see how to manage multiple printers at a time. Unlike other printing systems, CUPS features a way to let you select a group of printers to print a job instead of selecting just one. In that way, if one printer is busy or down, another printer can be automatically selected to perform the job. Such groupings of printers are called printer classes.

Read CUPS: How to Manage Multiple Printers in full

EJB 3 Security

by Michael Sikora | September 2008 | Architecture & Analysis Java Open Source

Security is a wide ranging topic which operates on many levels and covers many technologies. The technologies involved include networks, operating systems, database systems, and application servers as well as manual procedures.

Application level security in the context of Java EE applications is provided by web and EJB containers. This article by Michael Sikora will be mostly concerned with EJB container security. However, as EJBs are often invoked from the web-tier we will take a brief look at web container security later in this article.

We will cover the following topics:

  • Java EE container security
Read EJB 3 Security in full

Automation with Python and STAF/STAX

by Javier Collado | September 2008 | Open Source

The aim of this article by Javier Collado is to show how tasks may be automated using Python together with STAF (Software Testing Automation Framework) by means of an example. We will first see a problem and then derive its solution using classical Python-only as well as Python+STAF. The implementation of the solution will evolve in different stages. This will help us in comparing both the solution in terms of simplicity and efficiency.

Read Automation with Python and STAF/STAX in full

Writing a Package in Python

by Tarek Ziadé | September 2008 | Open Source

This article by Tarek Ziadé focuses on a repeatable process to write and release Python packages. We will focus on how to install, uninstall, develop, test, register, and upload a package.

Read Writing a Package in Python in full

Introduction to Re-Host based Modernization Using Tuxedo

by Jason Williamson,Tom Laszewski,Mark Rakhmilevich | September 2008 | Architecture & Analysis BPEL SOA Web Services Java Oracle

The re-architecture approach reduces the mainframe costs and legacy risks by migrating the application off the mainframe and re-structuring it using all the modern software tools and capabilities at our disposal. However, this very process of re-structuring the application, and essentially re-building it using knowledge and business rules mined from existing code, introduces certain risks. How can we ensure that the new application maintains functional equivalence, and operational characteristics of the original? Can we meet the performance and scalability requirements not only of the current environment, but future growth needs as well? Can we deliver the new application within the time and budget constraints agreed to at the beginning of the project? The older the application, the larger its scope and volume of code, and the fewer original developers available, the higher these risks may be.

This article by Jason Williamson, Tom Laszewski and Mark Rakhmilevich, takes a look at an alternative approach that attempts to balance these risks in a different way. Re-host-based modernization approach is focused on migrating the application off the mainframe to a compatible software stack on an open-systems platform, preserving the language and middleware services on which the application has been built. It protects legacy investment by relying on a mainframe-compatible software stack to minimize any changes in the core application, and preserve the application's business logic intact, while running it on an open-system platform using more flexible and less expensive system infrastructure. It keeps open the customer's options for SOA enablement and re-architecture, by using an SOA-ready middleware stack to support Web services and ESB interfaces for re-hosted components. And using an extensible platform with transparent integration to J2EE components, BPM-based processes, and other key tools of the re-architecture approach means you can start to re-architect selected components at will, without requiring changes to the re-hosted services running the remainder of the business logic.

Read Introduction to Re-Host based Modernization Using Tuxedo in full

Preventing SQL Injection Attacks on your Joomla Websites

by Tom Canavan | September 2008 | Joomla! Open Source

Joomla!, a very popular content management system (CMS) is as you may know an easy-to-deploy-and-use content management system. This ease of use has lent itself to rapid growth of both the CMS and extensions for it. You can install it on almost any host, running Linux or Windows. This highly versatile software has found itself in such lofty places as large corporate web portals, and humble places such as the simple blog.

Joomla! itself is inherently safe, but misconfigurations of the CMS, vulnerable components, hosts that are poorly configured, and weak passwords can all contribute to the downfall of your site. Hence, it's always better to ensure the security of your site.

In this article by Tom Canavan, we will take a look at how SQL injection attacks can occur to your Joomla website, how we can test for SQL injection attacks, and how to stop SQL injection.

 

Read Preventing SQL Injection Attacks on your Joomla Websites in full

Integrating Zen Cart with Content Management Systems

by Suhreed Sarkar | September 2008 | e-Commerce Open Source

There are various types of Content Management Systems (CMS) which are widely used for building and managing a website. Although Zen Cart is very good for running an online shop, it cannot be used for building a company website. Your organization may have a website running a CMS, and as you are going to open an online shop, you may need to integrate Zen Cart with that existing CMS. In this article by Suhreed Sarkar, we will see how we can integrate Zen Cart with some of the existing Content Management Systems

Read Integrating Zen Cart with Content Management Systems in full

Using the Data Pager Control in Visual Studio 2008

by Jayaram Krishnaswamy | September 2008 | .NET Microsoft

When query results exceed the display area then you resort to scrolling and wish you had some way to limit the number of results displayed and comfortable to view without scrolling. Paging functionality which provides an answer to this is therefore a much desired feature. The Data Pager Control in Visual Studio 2008 provides this functionality when you create an ASP.NET web form under .NET Framework 3.5. It can be configured automatically using the GUI, or it can be installed manually after installing the ListView. In this article both of them are described. While the number of items displayed in a list can be declaratively coded, it is possible to set it at page load time as well.

This article by Dr. Jayaram Krishnaswamy describes how you may connect to SQL Server 2008 and display the retrieved data in a ListView Control on a web page. The ListView Control is the only control in ASP.NET that supports the new ASP.NET control, the Data Pager Control. This article shows how the data from a table in SQL Server 2008 is displayed in the ListView and how the Data Pager is configured to cycle the List View items.

Read Using the Data Pager Control in Visual Studio 2008 in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software