Anyone who has tried downloading a popular software or Linux distribution on or just after release day, knows of the pain of the phrase "connection timed out". Getting the software can be quite a struggle, despite all the mirrors and BitTorrent Samaritans. Anthony Bryan's Metalink is an open standard that makes downloading easier, faster, and more reliable by helping users extract the last drop of juice out of their connection.
I emailed a set of questions to Bryan to understand what separates Metalink from other run-of-the-mill download accelerators and listen in awe as he explains how Metalink combines traditional HTTP and FTP methods of downloading files along with BitTorrent.
Read more about this in Mayank's interview with Anthony Bryan.Read Downloading evolved with Metalink in full
This article by Jayaram Krishnaswamy shows how to migrate a database from SQL Server 2005 (should work for 2000 as well) to SQL Server 2008 using the Copy Database tool in SQL Server 2008. In an earlier article we saw how this can be done manually by detaching the database from the SQL 2005 and then attaching it to the SQL 2008 server using the SQL Server Management Studio.Read Copying a Database from SQL Server 2005 to SQL Server 2008 using the Copy Database Wizard in full
Many of you as (Java) programmers generate business purpose code, like "confirming an order" or "find available products". At times, you may also want to connect to external systems and services, since your application in isolation alone will not provide you the required functionality. When the number of such connections increases, you would be generating more and more of "integration code", mixed along with your business code.
In this short article, Binildas A. Christudas introduces the Java Business Integration (JBI) specification and discusses how it is covered in his new book, Service Oriented Java Business IntegrationRead Service Oriented Java Business Integration - What's & Why's in full
You have a Drupal website and an online store; your product catalog is online and you have set up customer and staff users on the site; the only complaint so far is how the website looks. You like the default design, but do not think it is appropriate for your site or your store; you want something more tailored to your business.
In this article by Michael Peacock we will learn how to customize the default theme in Drupal.Read Customizing the Default Theme in Drupal in full
This article by Jayaram Krishnaswamy describes how you may connect to SQL Server 2008 and display the retrieved data in a GridView Control on a web page. Trying to establish a connection to the SQL Server 2008 is not possible in Visual Studio 2008 as you will see soon in the tutorial. One way to get around this, as shown in this tutorial, is to create an ODBC connection to the SQL Server and then using the ODBC connection to retrieve the data.
Visual Studio 2008 Version: 9.0.21022.8 RTM, Microsoft Windows XP Professional Media Center Edition, and SQL Server 'Katmai' were used for this tutorial.Read Creating a Web Page for Displaying Data from SQL Server 2008 in full
MySQL Query Browser, one of the open source MySQL GUI tools from MySQL AB, is used for building MySQL database queries visually. In MySQL Query Browser, you build database queries using just your mouse—click, drag and drop!
MySQL Query Browser has plenty of visual query building functions and features. This article Djoni Darmawikarta shows two examples, building Join and Master-detail queries. These examples will demonstrate some of these functions and features.Read Building Queries Visually in MySQL Query Browser in full
When talking about tunneling, different definitions come to people's minds. Basically, tunneling is transmitting data that is encapsulated into a pipe, over a public network (for example, the Internet). However, there are different methods to tunnel data over a public network for different approaches. For example, when security is a concern, tunnel protocols with cryptography are more favorable. But when performance has higher priority, protocols with lower packet overheads will be chosen. FreeBSD 7 has a built-in support for a number of important tunneling protocols, although there are also many third-party applications in FreeBSD packages that support more tunneling protocols.
This article by Babak Farrokhi, introduces the manipulation of tunnel interfaces in the FreeBSD 7 operating system. Let's have a look into the following:
In this article by Marc Delisle, we will learn how to perform some operations that influence tables or databases as a whole. We will cover table attributes and how to modify them, and also discuss multi-table operations.Read Table and Database Operations in PHP in full
XHTML Mobile Profile (XHTML MP) is the standard language for mobile web development. XHTML MP is an XHTML variant. It offers richer presentation and is very similar to HTML. XHTML MP is built on top of XHTML Basic. In this article by Nirav Mehta, we will have a look at the fundamentals of XHTML MP and the grammar which must be followed for development in it.Read Fundamentals of XHTML MP in Mobile Web Development in full
In this article by David Mercer, we will look at an entirely different aspect of running a Drupal website. Once we have added the functionality to the site, we now have to give some thoughts about how this functionality is to be accessed, or by whom. As the site grows, you will most likely feel the need to delegate certain responsibilities to various people. Alternatively, you might organize a team of people to work on specific aspects of the site. Whatever is required, at some stage you will have to make decisions about who can do what, and Drupal makes sure that it is possible to do precisely this.
Having Drupal simplify the implementation of your access control policies does not mean that the task is a trivial one. There is still much thought that needs to go on behind the scenes in order to create a sophisticated, and above all, effective policy for controlling access to the site. Because of this, we will spend a bit of time exploring the ramifications of the various choices available, instead of simply listing them. Taking a holistic approach to implementing an access control policy will ensure you don't end up with any nasty surprises down the line.
Specifically, this article will look at Planning an access policy, Roles, Users, and Access rules.Read User Access Control in Drupal 6 in full
Ever been to a night club on a Monday morning? There's you, there are chairs, and the potential to host a party on the weekend. There are lots of buttons, lots of potential, but no one there except you. Unlike a night club, you don't have to wait for the weekend to host your friends on Elgg. Invite them as soon as you're done setting up the software. Elgg is designed to make it easier for you to invite people. If you've ever setup a blog or rolled out your own website, how long did it take before you could invite your friends over? You had to put up all sorts of content to indulge them, and also fiddle around decorating the portal so that it doesn't look dull.
That's where a social network is different from a regular website. Websites follow a two-way, one-to-many style of interaction, where the owner of the website, or blog, talks to all his visitors who respond with their comments, either on the website, or via e-mail. In this article by Mayank Sharma, we discuss about social networking software that follows a many-to-many style of interaction. Members interact with each other, and create their own content, which is then shared with all. This is then discussed and commented on by everyone. The owner of the site is like the perfect host. They mingle, discuss with everyone, but don't stamp their authority, unless you're naughty. They're like every other member, except for the fact that they own the place. Sounds familiar? So, you don't have to worry about content before inviting your friends. Your friends bring their own content.Read Users, Profiles, and Connections in Elgg in full
The Yahoo User Interface (YUI) Calendar control, allows you to easily create a variety of attractive and highly functional calendar interfaces which can allow your visitors to quickly and easily select single dates, or range of dates. There is also a range of different formats of Calendar that we can create; there's the basic, single-select, and one-page calendar control which displays one month at a time, or there's a larger, multi-page calendar which allows multiple months to be displayed at once. Multi-select calendars can come in either single or multiple month display formats. In this article by Dan Wellman, we will see how to implement a calendar control in the YUI.Read Implementing a Calendar Control in the Yahoo User Interface (YUI) in full
Ruby on Rails is a recent entrant in the world of web application framework. Ruby is the language used and Ruby on Rails is the framework built upon Ruby. In this article by A.P. Rajshekhar, we will be designing and creating database tables for a User Management Module (UMM). The UMM is responsible for Registering users, Modifying user information, Assigning roles or privileges, Viewing the user, and Deleting the user. Let us go forward and look at the background information required for designing and creating the database tables used for this module.Read Designing and Creating Database Tables in Ruby on Rails in full
Philosophy: A route of many roads leading from nowhere to nothing.
While it appears that Ambrose Bierce has a little respect for Philosophy in general, he would surely refer to calling routing as—roads leading from a single point to multiple points, or something similar. The purpose of the "Calling Rules" is to define the methodology by which calls are routed from the PBX to the outbound world.
This article by Nir Simionovich deals with the routing rules in AsteriskNOW and the Calling Rules tables.Read Routing Rules in AsteriskNOW - The Calling Rules Tables in full