Article Network

All | June | May | April

Visual ETL Development With IBM DataStage

by Djoni Darmawikarta | May 2008 | Architecture & Analysis

ETL (Extract Transform Load) is the most resource consuming part of data warehouse development and maintenance. An ETL tool, particularly one that is GUI-based, can leverage the productivity and quality of ETL development and maintenance.

WebSphere DataStage from IBM is an ETL tool. In DataStage you build and execute ETL jobs visually on its GUI clients. This article by Djoni Darmawikarta shows how to build and execute an ETL job with DataStage. Specifically, we’ll build a job that loads a Customer Dimension table from an input sequential file (implementing an SCD1, Slowly Changing Dimension Type1; a well-known technique from Dimensional Data Warehouse methodology).

Read Visual ETL Development With IBM DataStage in full

Making the World Wide Web an Easier Place to Talk About

by Tim Walton | May 2008 | Beginner's Guides MySQL Content Management Open Source PHP

If you were tasked with finding the letter that when spoken out loud repeatedly was more awkward than any other, you would come up with the W. Every other letter in the English alphabet is pronounced with a single syllable, yet the W is unique in requiring an impressive three syllables to utter.

This campaign is to encourage people to forget that WWW ever existed. Don’t type it, don’t speak it, and complain to every website that still requires it.

Read Making the World Wide Web an Easier Place to Talk About in full

Creating a Simple Report with Visual Studio 2008

by Jayaram Krishnaswamy | May 2008 | .NET Microsoft

Report Services, Analysis Services, and Integration Services are the three pillars of Business Intelligence in Microsoft's vision that continues to evolve. Reporting is a basic activity, albeit one of the most important activities of an organization because it provides a specialized and customized view of the data of various forms (relational, text, xml etc) that live in data stores. The report is useful in making business decisions, scheduling business campaigns, or assessing the competition. The report itself may be required in hard copy in several document formats such as DOC, HTML, PDF, etc. Many times it is also required to be retrieved in an interactive form from the data store and viewed on a suitable interface, including a web browser. The Microsoft SQL Server 2005 Reporting Services, popularly known by its acronym SSRS, provides all that is necessary to create and manage reports and deploy them on a report server with output available in several document formats. The reader will greatly benefit from reading the several articles detailed in the author's Hodentek Blog. The content for the articles were developed using VS 2003, VS 2005, SQL 2000 and SQL 2005.

Read Creating a Simple Report with Visual Studio 2008 in full

Downloading evolved with Metalink

by Mayank Sharma | May 2008 | Open Source

Anyone who has tried downloading a popular software or Linux distribution on or just after release day, knows of the pain of the phrase "connection timed out". Getting the software can be quite a struggle, despite all the mirrors and BitTorrent Samaritans. Anthony Bryan's Metalink is an open standard that makes downloading easier, faster, and more reliable by helping users extract the last drop of juice out of their connection.

I emailed a set of questions to Bryan to understand what separates Metalink from other run-of-the-mill download accelerators and listen in awe as he explains how Metalink combines traditional HTTP and FTP methods of downloading files along with BitTorrent.

Read more about this in Mayank's interview with Anthony Bryan.

Read Downloading evolved with Metalink in full

Copying a Database from SQL Server 2005 to SQL Server 2008 using the Copy Database Wizard

by Jayaram Krishnaswamy | April 2008 | .NET Microsoft

This article by Jayaram Krishnaswamy shows how to migrate a database from SQL Server 2005 (should work for 2000 as well) to SQL Server 2008 using the Copy Database tool in SQL Server 2008. In an earlier article we saw how this can be done manually by detaching the database from the SQL 2005 and then attaching it to the SQL 2008 server using the SQL Server Management Studio.

Read Copying a Database from SQL Server 2005 to SQL Server 2008 using the Copy Database Wizard in full

Service Oriented Java Business Integration - What's & Why's

by Binildas A. Christudas | April 2008 | BPEL SOA Web Services Java Open Source

Many of you as (Java) programmers generate business purpose code, like "confirming an order" or "find available products". At times, you may also want to connect to external systems and services, since your application in isolation alone will not provide you the required functionality. When the number of such connections increases, you would be generating more and more of "integration code", mixed along with your business code.

In this short article, Binildas A. Christudas introduces the Java Business Integration (JBI) specification and discusses how it is covered in his new book, Service Oriented Java Business Integration

Read Service Oriented Java Business Integration - What's & Why's in full

Customizing the Default Theme in Drupal

by Michael Peacock | April 2008 | Drupal e-Commerce Open Source

You have a Drupal website and an online store; your product catalog is online and you have set up customer and staff users on the site; the only complaint so far is how the website looks. You like the default design, but do not think it is appropriate for your site or your store; you want something more tailored to your business.

In this article by Michael Peacock we will learn how to customize the default theme in Drupal.

Read Customizing the Default Theme in Drupal in full

Creating a Web Page for Displaying Data from SQL Server 2008

by Dr.Jay Krishnaswamy | April 2008 | .NET Microsoft

This article by Jayaram Krishnaswamy describes how you may connect to SQL Server 2008 and display the retrieved data in a GridView Control on a web page. Trying to establish a connection to the SQL Server 2008 is not possible in Visual Studio 2008 as you will see soon in the tutorial. One way to get around this, as shown in this tutorial, is to create an ODBC connection to the SQL Server and then using the ODBC connection to retrieve the data.

Visual Studio 2008 Version: 9.0.21022.8 RTM, Microsoft Windows XP Professional Media Center Edition, and SQL Server 'Katmai' were used for this tutorial.

Read Creating a Web Page for Displaying Data from SQL Server 2008 in full

Building Queries Visually in MySQL Query Browser

by Djoni Darmawikarta | April 2008 | MySQL PHP

MySQL Query Browser, one of the open source MySQL GUI tools from MySQL AB, is used for building MySQL database queries visually. In MySQL Query Browser, you build database queries using just your mouse—click, drag and drop!

MySQL Query Browser has plenty of visual query building functions and features. This article Djoni Darmawikarta shows two examples, building Join and Master-detail queries. These examples will demonstrate some of these functions and features.

Read Building Queries Visually in MySQL Query Browser in full

Password Strength Checker in Google Web Toolkit and AJAX

by Prabhakar Chaganti | April 2008 | AJAX Java Web Development

The Google Web Toolkit (GWT) is a revolutionary way to build Asynchronous JavaScript and XML (AJAX) applications that are comparable in responsiveness and look and feel to desktop applications. In this article by Prabhakar Chaganti, we will learn to create a password strength checker, which utilizes Google Web Toolkit and AJAX to provide a much smoother user experience when using web‑based user interfaces.

Read Password Strength Checker in Google Web Toolkit and AJAX in full

Network Configuration—Tunneling with Free BSD

by Babak Farrokhi | April 2008 | Open Source

When talking about tunneling, different definitions come to people's minds. Basically, tunneling is transmitting data that is encapsulated into a pipe, over a public network (for example, the Internet). However, there are different methods to tunnel data over a public network for different approaches. For example, when security is a concern, tunnel protocols with cryptography are more favorable. But when performance has higher priority, protocols with lower packet overheads will be chosen. FreeBSD 7 has a built-in support for a number of important tunneling protocols, although there are also many third-party applications in FreeBSD packages that support more tunneling protocols.

This article by Babak Farrokhi, introduces the manipulation of tunnel interfaces in the FreeBSD 7 operating system. Let's have a look into the following:

  • GRE
  • IPSEC
Read Network Configuration—Tunneling with Free BSD in full

Table and Database Operations in PHP

by Marc Delisle | April 2008 | MySQL PHP

In this article by Marc Delisle, we will learn how to perform some operations that influence tables or databases as a whole. We will cover table attributes and how to modify them, and also discuss multi-table operations.

Read Table and Database Operations in PHP in full

Fundamentals of XHTML MP in Mobile Web Development

by Nirav Mehta | April 2008 | MySQL Open Source PHP

XHTML Mobile Profile (XHTML MP) is the standard language for mobile web development. XHTML MP is an XHTML variant. It offers richer presentation and is very similar to HTML. XHTML MP is built on top of XHTML Basic. In this article by Nirav Mehta, we will have a look at the fundamentals of XHTML MP and the grammar which must be followed for development in it.

Read Fundamentals of XHTML MP in Mobile Web Development in full

User Access Control in Drupal 6

by David Mercer | April 2008 | Content Management Drupal Open Source

In this article by David Mercer, we will look at an entirely different aspect of running a Drupal website. Once we have added the functionality to the site, we now have to give some thoughts about how this functionality is to be accessed, or by whom. As the site grows, you will most likely feel the need to delegate certain responsibilities to various people. Alternatively, you might organize a team of people to work on specific aspects of the site. Whatever is required, at some stage you will have to make decisions about who can do what, and Drupal makes sure that it is possible to do precisely this.

Having Drupal simplify the implementation of your access control policies does not mean that the task is a trivial one. There is still much thought that needs to go on behind the scenes in order to create a sophisticated, and above all, effective policy for controlling access to the site. Because of this, we will spend a bit of time exploring the ramifications of the various choices available, instead of simply listing them. Taking a holistic approach to implementing an access control policy will ensure you don't end up with any nasty surprises down the line.

Specifically, this article will look at Planning an access policy, Roles, Users, and Access rules.

Read User Access Control in Drupal 6 in full

Users, Profiles, and Connections in Elgg

by Mayank Sharma | April 2008 | MySQL Open Source PHP

Ever been to a night club on a Monday morning? There's you, there are chairs, and the potential to host a party on the weekend. There are lots of buttons, lots of potential, but no one there except you. Unlike a night club, you don't have to wait for the weekend to host your friends on Elgg. Invite them as soon as you're done setting up the software. Elgg is designed to make it easier for you to invite people. If you've ever setup a blog or rolled out your own website, how long did it take before you could invite your friends over? You had to put up all sorts of content to indulge them, and also fiddle around decorating the portal so that it doesn't look dull.

That's where a social network is different from a regular website. Websites follow a two-way, one-to-many style of interaction, where the owner of the website, or blog, talks to all his visitors who respond with their comments, either on the website, or via e-mail. In this article by Mayank Sharma, we discuss about social networking software that follows a many-to-many style of interaction. Members interact with each other, and create their own content, which is then shared with all. This is then discussed and commented on by everyone. The owner of the site is like the perfect host. They mingle, discuss with everyone, but don't stamp their authority, unless you're naughty. They're like every other member, except for the fact that they own the place. Sounds familiar? So, you don't have to worry about content before inviting your friends. Your friends bring their own content.

Read Users, Profiles, and Connections in Elgg in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software