Article Network

All | June | May | April

Building Queries Visually in MySQL Query Browser

by Djoni Darmawikarta | April 2008 | MySQL PHP

MySQL Query Browser, one of the open source MySQL GUI tools from MySQL AB, is used for building MySQL database queries visually. In MySQL Query Browser, you build database queries using just your mouse—click, drag and drop!

MySQL Query Browser has plenty of visual query building functions and features. This article Djoni Darmawikarta shows two examples, building Join and Master-detail queries. These examples will demonstrate some of these functions and features.

Read Building Queries Visually in MySQL Query Browser in full

Password Strength Checker in Google Web Toolkit and AJAX

by Prabhakar Chaganti | April 2008 | AJAX Java Web Development

The Google Web Toolkit (GWT) is a revolutionary way to build Asynchronous JavaScript and XML (AJAX) applications that are comparable in responsiveness and look and feel to desktop applications. In this article by Prabhakar Chaganti, we will learn to create a password strength checker, which utilizes Google Web Toolkit and AJAX to provide a much smoother user experience when using web‑based user interfaces.

Read Password Strength Checker in Google Web Toolkit and AJAX in full

Network Configuration—Tunneling with Free BSD

by Babak Farrokhi | April 2008 | Open Source

When talking about tunneling, different definitions come to people's minds. Basically, tunneling is transmitting data that is encapsulated into a pipe, over a public network (for example, the Internet). However, there are different methods to tunnel data over a public network for different approaches. For example, when security is a concern, tunnel protocols with cryptography are more favorable. But when performance has higher priority, protocols with lower packet overheads will be chosen. FreeBSD 7 has a built-in support for a number of important tunneling protocols, although there are also many third-party applications in FreeBSD packages that support more tunneling protocols.

This article by Babak Farrokhi, introduces the manipulation of tunnel interfaces in the FreeBSD 7 operating system. Let's have a look into the following:

  • GRE
  • IPSEC
Read Network Configuration—Tunneling with Free BSD in full

Table and Database Operations in PHP

by Marc Delisle | April 2008 | MySQL PHP

In this article by Marc Delisle, we will learn how to perform some operations that influence tables or databases as a whole. We will cover table attributes and how to modify them, and also discuss multi-table operations.

Read Table and Database Operations in PHP in full

Fundamentals of XHTML MP in Mobile Web Development

by Nirav Mehta | April 2008 | MySQL Open Source PHP

XHTML Mobile Profile (XHTML MP) is the standard language for mobile web development. XHTML MP is an XHTML variant. It offers richer presentation and is very similar to HTML. XHTML MP is built on top of XHTML Basic. In this article by Nirav Mehta, we will have a look at the fundamentals of XHTML MP and the grammar which must be followed for development in it.

Read Fundamentals of XHTML MP in Mobile Web Development in full

User Access Control in Drupal 6

by David Mercer | April 2008 | Content Management Drupal Open Source

In this article by David Mercer, we will look at an entirely different aspect of running a Drupal website. Once we have added the functionality to the site, we now have to give some thoughts about how this functionality is to be accessed, or by whom. As the site grows, you will most likely feel the need to delegate certain responsibilities to various people. Alternatively, you might organize a team of people to work on specific aspects of the site. Whatever is required, at some stage you will have to make decisions about who can do what, and Drupal makes sure that it is possible to do precisely this.

Having Drupal simplify the implementation of your access control policies does not mean that the task is a trivial one. There is still much thought that needs to go on behind the scenes in order to create a sophisticated, and above all, effective policy for controlling access to the site. Because of this, we will spend a bit of time exploring the ramifications of the various choices available, instead of simply listing them. Taking a holistic approach to implementing an access control policy will ensure you don't end up with any nasty surprises down the line.

Specifically, this article will look at Planning an access policy, Roles, Users, and Access rules.

Read User Access Control in Drupal 6 in full

Users, Profiles, and Connections in Elgg

by Mayank Sharma | April 2008 | MySQL Open Source PHP

Ever been to a night club on a Monday morning? There's you, there are chairs, and the potential to host a party on the weekend. There are lots of buttons, lots of potential, but no one there except you. Unlike a night club, you don't have to wait for the weekend to host your friends on Elgg. Invite them as soon as you're done setting up the software. Elgg is designed to make it easier for you to invite people. If you've ever setup a blog or rolled out your own website, how long did it take before you could invite your friends over? You had to put up all sorts of content to indulge them, and also fiddle around decorating the portal so that it doesn't look dull.

That's where a social network is different from a regular website. Websites follow a two-way, one-to-many style of interaction, where the owner of the website, or blog, talks to all his visitors who respond with their comments, either on the website, or via e-mail. In this article by Mayank Sharma, we discuss about social networking software that follows a many-to-many style of interaction. Members interact with each other, and create their own content, which is then shared with all. This is then discussed and commented on by everyone. The owner of the site is like the perfect host. They mingle, discuss with everyone, but don't stamp their authority, unless you're naughty. They're like every other member, except for the fact that they own the place. Sounds familiar? So, you don't have to worry about content before inviting your friends. Your friends bring their own content.

Read Users, Profiles, and Connections in Elgg in full

Implementing a Calendar Control in the Yahoo User Interface (YUI)

by Dan Wellman | April 2008 | AJAX Open Source Web Development

The Yahoo User Interface (YUI) Calendar control, allows you to easily create a variety of attractive and highly functional calendar interfaces which can allow your visitors to quickly and easily select single dates, or range of dates. There is also a range of different formats of Calendar that we can create; there's the basic, single-select, and one-page calendar control which displays one month at a time, or there's a larger, multi-page calendar which allows multiple months to be displayed at once. Multi-select calendars can come in either single or multiple month display formats. In this article by Dan Wellman, we will see how to implement a calendar control in the YUI.

Read Implementing a Calendar Control in the Yahoo User Interface (YUI) in full

Designing and Creating Database Tables in Ruby on Rails

by A P Rajshekhar | April 2008 | Open Source

Ruby on Rails is a recent entrant in the world of web application framework. Ruby is the language used and Ruby on Rails is the framework built upon Ruby. In this article by A.P. Rajshekhar, we will be designing and creating database tables for a User Management Module (UMM). The UMM is responsible for Registering users, Modifying user information, Assigning roles or privileges, Viewing the user, and Deleting the user. Let us go forward and look at the background information required for designing and creating the database tables used for this module.

Read Designing and Creating Database Tables in Ruby on Rails in full

Routing Rules in AsteriskNOW - The Calling Rules Tables

by Nir Simionovich | April 2008 | Linux Servers Networking & Telephony Open Source

Philosophy: A route of many roads leading from nowhere to nothing.
—Ambrose Bierce

While it appears that Ambrose Bierce has a little respect for Philosophy in general, he would surely refer to calling routing as—roads leading from a single point to multiple points, or something similar. The purpose of the "Calling Rules" is to define the methodology by which calls are routed from the PBX to the outbound world.

This article by Nir Simionovich deals with the routing rules in AsteriskNOW and the Calling Rules tables.

Read Routing Rules in AsteriskNOW - The Calling Rules Tables in full

Customizing the Menus Menu in Joomla!

by Hagen Graf | April 2008 | Joomla! MySQL Content Management Open Source PHP

There are numerous menus in the front end of every application. They are often displayed as standalone boxes. The menu items are generally arranged one below the other. Menus can also be integrated into the design horizontally so that at first sight they aren't even recognizable as cohesive menus. CSS menus, which can even be transparent, are very cool.

These menus and the menu links are dynamically administered in Joomla! from database content in the Menus work area. Joomla! has six different menus in the sample data. (main menu, top menu, other menu, user menu, example pages, and key concepts) In this article by Hagen Graf, we will discuss administering, creating and managing menus in Joomla!

Read Customizing the Menus Menu in Joomla! in full

Technical Best Practices for Dynamics AX - Shared and AOT Object Standards

by Anil Kumar Gupta | March 2008 | .NET Microsoft

Most of the qualities of an ideal ERP system such as, Total Cost of Ownership, Flexibility, Usability, Integration and many more are implemented by conformance to the technical best practices discussed in this two part article by Anil Kumar Gupta. The Dynamics AX best practice can be grouped into three categories i.e. application design standards, shared standards, and AOT object standards.

The previous article discussed the Application Design Standards. This article will focus on Shared and AOT Objects Standards in Dynamics AX.

Read Technical Best Practices for Dynamics AX - Shared and AOT Object Standards in full

Technical Best Practices for Dynamics AX - Application Design Standards

by Anil Kumar Gupta | March 2008 | .NET Microsoft

Most of the qualities of an ideal ERP system such as, Total Cost of Ownership, Flexibility, Usability, Integration and many more are implemented by conformance to the technical best practices discussed in this two part article by Anil Kumar Gupta. The Dynamics AX best practice can be grouped into three categories i.e. application design standards, shared standards, and AOT object standards.

The first part of this article will discuss Application Design Standards.

Read Technical Best Practices for Dynamics AX - Application Design Standards in full

Creating a Simple Report using BIRT

by John Ward | March 2008 | Java Open Source

BIRT, which stands for Business Intelligence and Reporting Tools, is an Eclipse-based open-source reporting system for Java and J2EE-based web applications. Including the word "Tools" in the acronym is appropriate, since BIRT is in fact a collection of development tools and technologies used for developing reports utilizing the BIRT runtime framework component on your application server. BIRT isn't essentially a product, but a series of core technologies on top of which products and solutions are built, similar in fashion to the Eclipse framework.

The BIRT Report Designer, which is the most visible and familiar product built with the BIRT framework, is an Eclipse plug-in that utilizes BIRT technologies to allow users to design reports in the BIRT document format.

In this article by John Ward we will create a simple report by first setting up a simple project.

Read Creating a Simple Report using BIRT in full

Term Extraction Tasks in SQL Server Integration Services

by Dr.Jay Krishnaswamy | March 2008 | .NET Microsoft

Microsoft SQL Server's SQL Server Integration Services is a comprehensive, full featured tool for processing data in the back-end storage locations. Extraction of attributes in a body of text is an important task while mining data and the SSIS provides just the required transformation - Term Extraction, to accomplish this task. SSIS looks through the presented text document and sorts out terms. By terms are meant specifically nouns, noun phrases, and both nouns and noun phrases. You also have the flexibility of limiting extracted terms based on their frequency of occurrence. For example you could configure the task in such a way that you can capture terms that are repeated in the body of text a certain number of times.

This tutorial by Jayaram Krishnaswamy shows a simple example of extracting terms from a body of text.

Read Term Extraction Tasks in SQL Server Integration Services in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software