Article Network

All | June | May | April

Moving a Database from SQL Server 2005 to SQL Server 2008 in Three Steps

by Jayaram Krishnaswamy | February 2008 | .NET Microsoft

There are several options if one wishes to move a database from a SQL Server 2005 to SQL 2008 Server. First of all there is a 'Copy Database Wizard' in SQL 2008 Server which is meant for transferring a database from any version of SQL Server 2000 and above to 2008 version. In the other option the database will be copied using the SQL Server Management Program for which the source database need not be stopped. However this is slower than the previous method and would also require the SQL Server Agent since a package has to be run.

An option which works without too much hassles is manually detaching and attaching the database/log files. In this step-by-step (really two steps) tutorial by Jayaram Krishnaswamy, this simple procedure is described. If you are just interested in taking a small database from 2005 to 2008 server the author strongly recommends this procedure.

Read Moving a Database from SQL Server 2005 to SQL Server 2008 in Three Steps in full

The ASP.NET Repeater Control

by Joydip Kanjilal | January 2008 | .NET Microsoft

The Repeater control is a data-bound control that uses templates to display data. The Repeater control works by looping through the records in your data source and then repeating the rendering of one of its templates called the ItemTemplate, one that contains the records that the control needs to render. In this article by Joydip Kanjilal we will learn more about the Repeater control and some of its uses.

Read The ASP.NET Repeater Control in full

Microsoft SQL Server 2008 - Installation Made Easy

by Jayaram Krishnaswamy | January 2008 | .NET Microsoft

SQL 2008 server is the latest in the line of Microsoft database servers and this article by Dr. Jayaram Krishnaswamy discusses the challenges one may face in installing the Developer version of this product which was released in November 2007. On a virgin machine the software probably installs without a hitch but with a history of installs, especially of the earlier versions it is anything but a joy ride.

"It is almost always true for most of the software I have installed, not necessarily limited to Microsoft. However, most of Microsoft products need entry in the Window's registry and it is almost certain that one has to follow a certain protocol if one wishes to have a successful install. In fact the unsuccessful install flags out what went wrong while the initial steps do verify the requirements during installation. Despite this help and warnings one may face problems simply because it is not possible to foresee all possible combinations of hardware, software, user created error issues at launch time of the product. Again this article does not guarantee a successful install if one were to follow the steps delineated but gives you some guidance based on the author's experience."

Read Microsoft SQL Server 2008 - Installation Made Easy in full

Zen Gift of Education

by Mayank Sharma | January 2008 | Moodle Open Source

ZenEdu is a Live distribution that packs a whole bunch of educational tools on top of the Slackware-based light-weight and zippy Zenwalk Linux. Since learning is the core idea behind the distro, it goes beyond traditional curriculum subjects and also packs tools that'll teach students the basics of programming and music.

What sets ZenEdu apart from other educational distros is that it bundles other productivity tools as well. This includes general-purpose applications like the IceWeasel web browser, IceDove email client, Pidgin for instant messaging, Kompozer for authoring web pages, and OpenOffice.org for word processing.

Read Zen Gift of Education in full

Software Documentation with Trac

by David J Murphy | January 2008 | Open Source

Documentation—if there is one word that installs fear in most developers, it must be this one. No one in their right mind would argue the value of documentation, but it is the actual act of writing it that concerns developers so.

The secret of creating good documentation is to make the process of doing so as painless as possible, and if we are lucky maybe even attractive, to the developers. The only practical way to achieve that is to reduce friction. The last thing we need when we are in middle of fixing a bug is to wrestle with our word processor, or even worse try to find the right document to update.

David J Murphy illustrates in this article, how Trac can used for the purpose of documentation.

Read Software Documentation with Trac in full

Installing Drupal Themes

by Ric Shreves | January 2008 | MySQL Drupal PHP Web Development

You can find both design ideas and complete themes on the Web. You need to decide whether you want to work with an existing theme, or convert a design into a theme, or whether you want to start from scratch, unburdened by any preliminary constraints or alien code.

This article by Ric Shreves assumes you have a working Drupal installation, and that you have access to the files on your server and deals with finding, installing, and then uninstalling an existing and current Drupal theme.

Read Installing Drupal Themes in full

Article Marketing on CMS, Blogs, and Online Magazines to Improve Sales

by Vadym Gurevych | January 2008 | MySQL Content Management e-Commerce Open Source PHP

Article marketing means that you will write articles about your field of interest and distribute them for publication on other websites, blogs, and ezines with a link back to your site. Each time your article is published on a website you get a one-way link to your site.

By publishing articles in your own online store, you not only get better indexed by search engines, but what's more important provide useful information to your customers who may be seeking for it.

In this article by Vadym Gurevych, we will see how to use the articles for the purpose of marketing and improve the sales.

 

Read Article Marketing on CMS, Blogs, and Online Magazines to Improve Sales in full

Setting Up OpenVPN with X509 Certificates

by Markus Feilner | December 2007 | Linux Servers Networking & Telephony Open Source

In this article, author Markus Feilner shows how to create X509 server and client certificates for use with OpenVPN. We will learn to create a certificate authority, and sign and distribute new certificates. We will use easy-rsa, which comes with OpenVPN and exists both for Windows and Linux. This tool allows creation and administration of certificates that have to be transferred to the machines that are supposed to take part in the VPN.

Read Setting Up OpenVPN with X509 Certificates in full

Python LDAP Applications: Part 4 - LDAP Schema

by Matt Butcher | December 2007 | Architecture & Analysis Linux Servers Open Source

Welcome to the fourth and the last article in the Python LDAP applications series by Matt Butcher. In previous three articles we have seen the installation and configuration of Python-LDAP library, and the binding-unbinding operations, and changing of the LDAP password as well as LDAP operations, and LDAP URL library and some more LDAP operations.

 

In this article, we will take a brief look at what might be the most complex module in the Python-LDAP API, the ldap.schema module.

Read Python LDAP Applications: Part 4 - LDAP Schema in full

Joomla! and Database

by James Kennard | December 2007 | Joomla! MySQL Open Source PHP Web Development

Joomla! is currently designed to use the MySQL database. However, the architecture does allow for the implementation of other database drivers. There is some uncertainty surrounding the issue of supporting other databases, because of the usage of functions and syntax, in queries, which is specific to MySQL.

This article by James Kennard takes a look at the role of the database in Joomla!. It defines some standard rules we need to abide by.

Read Joomla! and Database in full

Catalyst Web Framework: Building Your Own Model

by Jonathan Rockway | December 2007 | Architecture & Analysis Open Source

As we know, DBIx::Class can provide a powerful interface to your data. Sometimes, however, DBIx::Class is not the right tool for the job. Situations often arise in which your application won't be able to access database tables directly and instead you'll need to access data through predefined stored procedures. In this case, DBIx::Class would be useless as you aren't able to read and modify objects with the usual SELECT, INSERT, UPDATE, and DELETE command set—everything must be done by calling a procedure and reading back the result. In other cases, your data won't be in a database at all. You might instead choose to store and retrieve information from files in a directory.

In this article, author Jonathan Rockway covers three common cases—mixing a procedural interface with a relational DBIx::Class interface, writing a database interface without DBIx:: Class, and building a custom Model that doesn't use a database at all.

Read Catalyst Web Framework: Building Your Own Model in full

Lotus Notes 8 — Productivity Tools

by Barry Max Rosen Bennie Gibson Brad Schauf David Byrd Dick McCarrick Joseph Anderson Stephen Hardison Tim Speed | December 2007 | Architecture & Analysis

With the Lotus Notes 8 client comes a new suite of productivity tools which support the OASIS Open Document Format (ODF). ODF is an international standard that provides support for multiple file formats for word processing, presentations, and spreadsheets. By adopting this format, IBM has allowed Notes users to read and save documents in the Microsoft Office format as well as read from IBM Lotus SmartSuite documents. Both can be saved as ODF documents or as PDF format documents.

The advantage of using the productivity tools with ODF is that you no longer have to purchase an application from a single vendor in order to share and save your documents. Using a non commercial ODF product, will allow you to avoid having to maintain licenses, and also allow you to stop worrying about your software reaching the end of its shelf life. These benefits can lead to a lower TCO for maintaining software for document-based data.

In this article, the authors provide an overview of the three productivity tools that are provided with the client:

Read Lotus Notes 8 — Productivity Tools in full

Python LDAP Applications: Part 3 - More LDAP Operations and the LDAP URL Library

by Matt Butcher | December 2007 | Architecture & Analysis Linux Servers Open Source

This is the third article in the article mini-series on Python LDAP applications by Matt Butcher. The first part deals with the installation and configuration of Python-LDAP library, and the binding-unbinding operations, and changing of the LDAP password. The second article takes a look at some of LDAP operations.

In this article we will see some more LDAP operations such as add operation, delete operation etc. Then we will take a look at LDAP URL Library.

Read Python LDAP Applications: Part 3 - More LDAP Operations and the LDAP URL Library in full

Photoshop Foundation - The Difference between Vector and Bitmap Graphics

by Jonny Allbut | December 2007 | MySQL Open Source PHP Web Graphics & Video

The aim of this Photoshop Foundation series is to give both beginners, and more experienced users, all the information they need to use Photoshop as efficiently as possible. This series aims to both, guide you through the more confusing aspects of Photoshop, and show you the very best ways to use this application.

In this first article, we are going to look at the difference between vector and bitmap graphics, which is one of the most important principles to understand when working with graphics on a computer, inside or outside of Photoshop.

Read Photoshop Foundation - The Difference between Vector and Bitmap Graphics in full

Securing XML Documents

by Frank Jennings Poornachandra Sarang Ramesh Loganathan | December 2007 | BPEL SOA Web Services

The web services model brings into the system unique security challenges because the business data in the form of XML documents may be required to travel across untrusted networks and has the chance of being manipulated by external systems.

Throughout the entire business transaction, different classes of users and systems need access to the entire business transaction. If any part of this chain is compromised, the whole business application deployed as a service will fail. Web services are inherently about how to share the process of computing across a distributed network of systems. Web services' communication channel being XML, messages are text-based, readable, and self describing.

In this article, authors Poornachandra Sarang, Frank Jennings, Matjaz Juric, and Ramesh Loganathan explain the XML security threats and the guidelines for securing your XML Documents.

Read Securing XML Documents in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software