- Customizing Google Maps
In this article by Alexandru Serban, let's take a more realistic software development scenario. What I am going to build is a room-reservation system for the newly launched Orbital Hotel. As you well know, this is the very first space building, after the International Space Station, used for tourism, allowing people to enjoy a view of our blue planet and stars from their private rooms. OK, OK, the Orbital Hotel doesn't yet exist, but when it does, it must have a room reservation system anyway. Who knows, it might be this one.Read Visual SourceSafe:Creating a Service-Oriented Application in full
We should set up a user name for each person who will be using Zenoss, and all the users should log in using their user account, not as the admin user. Individual users can be granted the same privileges as the admin account. The security of the user accounts is important. Various roles and groups can be assigned to a user. In this article by Michael Badger, the following is discussed:
- How to add new users and edit the properties of their user accounts
- The various available roles and their privileges
- Administered objects such as devices and systems
- Creating and editing custom event views
- Attaching alerts to users or groups of users
- Creating alert escalations
- Customizing alert messages
- Setting a schedule for each alerting rule
- Adding and editing groups and assigning users to groups
"Technorati recently published its annual report, State of the Blogosphere 2008. As usual, it makes interesting reading, especially for those of us interested in business blogging.
The report shows that Technorati has indexed 133 million blogs since 2002. 1.5 million blogs have been updated in the last 7 days and 7.4 million in the last 120 days. These figures support my argument in the first chapter of my book, WordPress For Business Bloggers, that business bloggers should not be put off by the total number of blogs out there because, in fact, only a small proportion are active."Read Business Blogging On The Up - Technorati State of the Blogosphere 2008 in full
DWR (Direct Web Remoting), is an Open Source Java framework, licensed under commercial-friendly Apache Software License v2 for building AJAX applications. DWR's main idea is to hide AJAX implementation details such as XMLHttpRequest from developers. Developers can concentrate on developing the application and business objects and leave AJAX details behind the scenes where they belong.
In this article by Sami Salkosuo, we discuss a Chatroom application which demonstrates the use of DWR. The Chatroom sample application is a very typical multi-user chatroom. The functionalities of this sample include a list of online users, automatic refresh of chat text, and the ability to send messages to the chat room.Read Chatroom Application using DWR Java Framework in full
MySQL introduced cursor in its release 5. You create a cursor to define a set of rows from one or more table that you want to access row-by-row sequentially. If your need is really to access the rows one at a time then use cursor. But a lot of data processing is actually set processing, and set processing is what relational database is best for.
This article by Djoni Darmawikarta compares cursor approach and set approach using various examples.Read Comparing Cursor and Set Approaches in Processing Relational Data in full
Oracle SQL Developer Tool is a stand alone program that connects to Oracle as well as third-party databases which can be used to perform a variety of tasks from running simple queries to migration of databases from third party vendor products to Oracle. Please review the following articles on the earlier versions 1.1 and 1.2: MS Access Queries with Oracle SQL Developer 1.2 Tool and Migrating MS Access 2003 Data using the Oracle SQL Developer 1.2.
In the present article by Dr. Jayaram Krishnaswamy the latest version of this tool [Oracle SQL Developer 18.104.22.168, IDE Version: 22.214.171.124.22.49. 33] will be described and some details of how to use this tool with SQL Server 2005 will be discussed. While the default installation is ready to connect to Oracle and Access databases the other third-party products such as SQL Server 2005, MySQL and Sybase require additional JDBC drivers. This article describes how you may connect to SQL Server 2005 and SQLExpress servers using the JDBC drivers. The Scratch Editor interface which accepts an SQL Statement from a 3rd party and translates into PL/SQL code is described. This feature was also available in the earlier version.Read Oracle SQL Developer Tool 1.5 with SQL Server 2005 in full
Change is a constant companion in our daily routine. Most of what we do is changing (transforming) one work product into another or revising or updating it. We might be transforming requirements into design, design into a prototype, client brief into a story board, idea into a concept document, creating versions of a banner ad, or updating a project plan to reflect progress; the list goes on. In this introductory article by Gurudutt Talgery we will see how we can bring a change management discipline to our work products or personal – not just software – projects with two simple tools on Linux: Subversion and a GUI front-end called eSvn.Read Change Control for Personal Projects - Subversion Style in full
In this article by Aaron Winborn, we will see how to add third-party video on a site. This article talks about the advantages of third-party video hosting and how it can be achieved on websites by using Drupal. Its also gives a proper insight about the Third-Party Video providers and Embedded Media Field, which helps in hosting video from our own server.Read Third-Party Video Hosting on Drupal Websites in full
Active Directory (AD) failure, which includes corruption, is something that is dreaded by any administrator. Simply put, it means that the directory service can no longer read the Active Directory database that it has locally. This will prevent logon and authentication as well as any directory-dependent services. Essentially, it renders the domain controller (DC) useless. What's worse, though, is that several times, the replication keeps going so that the corrupted database spreads out to the other DCs.
In this article by Florian Rommel, we will look at the different options and approaches available to recover a DC that has a database corruption. In addition, this article outlines, symptoms, causes, and solutions for this scenario.Read How to Recover from an Active Directory Failure in full
So far, the general approach towards SOA has been that it is just a tidying-up of application integration. SOA, according to this approach, is not about building new a business functionality but about organizing existing systems. In this article by Michael Havey, we will see that, in reality, SOA is more than merely getting organized. Its principal mandate is to build something new; indeed, SOA is fundamentally about building new processes. We will consider an approach to SOA architecture that is, yes, methodical, but has the burden of actually designing new and challenging orchestration and ESB processes.
In this article, we will build examples of choreography and orchestration, study best practices for message handling in orchestration processes, and develop fundamental orchestration concepts, such as interaction, invisible hub, and deferred choice.Read Modeling Orchestration and Choreography in Service Oriented Architecture in full
In this article by Alex Buchner, you would learn how to customize the front page of your Moodle site. Before taking an insight into this, let's first take a general overview of Moodle's look and feel elements.Read Front Page Customization in Moodle in full
In this article by Ankur Shah, you will see how to manage multiple printers at a time. Unlike other printing systems, CUPS features a way to let you select a group of printers to print a job instead of selecting just one. In that way, if one printer is busy or down, another printer can be automatically selected to perform the job. Such groupings of printers are called printer classes.Read CUPS: How to Manage Multiple Printers in full
Security is a wide ranging topic which operates on many levels and covers many technologies. The technologies involved include networks, operating systems, database systems, and application servers as well as manual procedures.
Application level security in the context of Java EE applications is provided by web and EJB containers. This article by Michael Sikora will be mostly concerned with EJB container security. However, as EJBs are often invoked from the web-tier we will take a brief look at web container security later in this article.
We will cover the following topics:
- Java EE container security