As we know, DBIx::Class can provide a powerful interface to your data. Sometimes, however, DBIx::Class is not the right tool for the job. Situations often arise in which your application won't be able to access database tables directly and instead you'll need to access data through predefined stored procedures. In this case, DBIx::Class would be useless as you aren't able to read and modify objects with the usual SELECT, INSERT, UPDATE, and DELETE command set—everything must be done by calling a procedure and reading back the result. In other cases, your data won't be in a database at all. You might instead choose to store and retrieve information from files in a directory.
In this article, author Jonathan Rockway covers three common cases—mixing a procedural interface with a relational DBIx::Class interface, writing a database interface without DBIx:: Class, and building a custom Model that doesn't use a database at all.Read Catalyst Web Framework: Building Your Own Model in full
With the Lotus Notes 8 client comes a new suite of productivity tools which support the OASIS Open Document Format (ODF). ODF is an international standard that provides support for multiple file formats for word processing, presentations, and spreadsheets. By adopting this format, IBM has allowed Notes users to read and save documents in the Microsoft Office format as well as read from IBM Lotus SmartSuite documents. Both can be saved as ODF documents or as PDF format documents.
The advantage of using the productivity tools with ODF is that you no longer have to purchase an application from a single vendor in order to share and save your documents. Using a non commercial ODF product, will allow you to avoid having to maintain licenses, and also allow you to stop worrying about your software reaching the end of its shelf life. These benefits can lead to a lower TCO for maintaining software for document-based data.
In this article, the authors provide an overview of the three productivity tools that are provided with the client:Read Lotus Notes 8 — Productivity Tools in full
This is the third article in the article mini-series on Python LDAP applications by Matt Butcher. The first part deals with the installation and configuration of Python-LDAP library, and the binding-unbinding operations, and changing of the LDAP password. The second article takes a look at some of LDAP operations.
In this article we will see some more LDAP operations such as add operation, delete operation etc. Then we will take a look at LDAP URL Library.Read Python LDAP Applications: Part 3 - More LDAP Operations and the LDAP URL Library in full
The aim of this Photoshop Foundation series is to give both beginners, and more experienced users, all the information they need to use Photoshop as efficiently as possible. This series aims to both, guide you through the more confusing aspects of Photoshop, and show you the very best ways to use this application.
In this first article, we are going to look at the difference between vector and bitmap graphics, which is one of the most important principles to understand when working with graphics on a computer, inside or outside of Photoshop.Read Photoshop Foundation - The Difference between Vector and Bitmap Graphics in full
The web services model brings into the system unique security challenges because the business data in the form of XML documents may be required to travel across untrusted networks and has the chance of being manipulated by external systems.
Throughout the entire business transaction, different classes of users and systems need access to the entire business transaction. If any part of this chain is compromised, the whole business application deployed as a service will fail. Web services are inherently about how to share the process of computing across a distributed network of systems. Web services' communication channel being XML, messages are text-based, readable, and self describing.Read Securing XML Documents in full
This is the second article in the article mini-series on Python LDAP applications by Matt Butcher. For first part please visit this link.
In this article we will see some of the LDAP operations such as compare operation, search operation. We will also see how to change an LDAP password.Read Python LDAP Applications: Part 2 - LDAP Opearations in full
Planning is a key element of any IT implementation, but planning can only be accomplished with an understanding of the technical underpinnings of the proposed solution. In this article, authors Mitesh Desai and Dan Renfroe delve more deeply into the technical architecture of BES in order to provide you with an understanding of what’s under the hood. This article also covers the system requirements and pre-requisites for a BES implementation, including operating system, hardware, network, and database requirements.Read BlackBerry: BES Architecture and Implementation Planning in full
Python LDAP Applications: Part 1 - Installing and Configuring the Python-LDAP Library and Binding to an LDAP Directory
This article mini-series by Matt Butcher will look at the Python application programmers interface (API) for the LDAP libraries, and using this API, we will connect to our OpenLDAP server and manipulate the directory information tree. More specifically, we will cover the following in this article series:
- Installing and configuring the Python-LDAP library.
- Binding to an LDAP directory.
- Comparing attributes between the client and server.
- Performing searches on the directory.
- Modifying the directory information tree with add, delete, and modify operations.
- Modifying directory passwords.
- Working with LDAP schemas.
This first part will deal with installation and configuration of the Python-LDAP library. We will then see how the binding operation is performed.Read Python LDAP Applications: Part 1 - Installing and Configuring the Python-LDAP Library and Binding to an LDAP Directory in full
LINQ to Objects means that we can use LINQ to query objects in a collection. We can access the in-memory data structures using LINQ. We can query any type of object that implements the IEnumerable interface or IEnumerable
In this article, author N. Satheesh Kumar shows us how to query different objects using LINQ operators and avoid having to use the looping method to filter the values in a collection.Read LINQ to Objects in full
Objects confused me when I started to use CodeIgniter. I came to CodeIgniter via PHP 4, which is a procedural language, not really an Object-Oriented (OO) language. I duly looked up objects and methods, properties and inheritance, and encapsulation, but my early attempts to write CI code were plagued by the error message "Call to a member function on a non-object". I saw it so often that I was thinking of having it printed on a t-shirt: it has a mysteriously libertarian, anarchist tone, and I could see myself wearing it at a modern art exhibition.
This is the geek article. It describes the way CodeIgniter actually works, 'under the hood'. If you are new to CI, you may want to skip it. However, sooner or later, you may want to understand why things happen in certain ways—as opposed to just knowing that they do.Read CodeIgniter and Objects in full
Integration is a necessary evil using which we can interconnect systems, applications and services to facilitate seamless information flow within and across Organization boundaries. We have been using technologies like JSP, EJB, JMS, etc. in the Java world for building Enterprise Applications (EA). But if we have to interconnect such applications, we will need Enterprise Application Integration (EAI). Many a times we also use EA technologies and tools to do EAI. This will give a short term solution to our integration problems, which may not scale up when we want to perform integration at Enterprise (Customers, Vendors, Partners, ...) level. Java Business Integration (JBI) is the new specification trying to fill this gap of EAI in the Java world. So next time when you want to integrate, don't write a single line of Java code, instead plug and assemble JBI based integration libraries to control your message flow! Does it looks promising? Believe it or read the article below to get yourself convinced.
In this article by Binildas Christudas, we will look into Integration in general and to JBI and ESB in particular. We will then explain few functionalities usually done by integration components like protocol conversions, content transformations, etc., with some code snippets too.Read Aggregate Services in ServiceMix JBI ESB in full
Tables got a bad review in accessibility circles, because they used to create complex visual layouts. This was due to the limitations in the support for presentational specifications like CSS and using tables for layout was a hack—that worked in the real world—when you wanted to position something in a precise part of the web page.
Tables were designed to present data of all shapes and sizes, and that is really what they should be used for.
This article by Joshue O Connor, shows how to build a simple table using Joomla! and the features contained within the WYSIWYG editors that can make the table more accessible.Read Creating Accessible Tables in Joomla! in full
Microsoft Windows Mobile Platform is now fully supported with .NET technology. We can develop and deploy .NET-based applications directly on to smart devices enabled with Microsoft Windows Mobile operating system.This article by Jagadish Chatarji Pulakhandam and Sunitha Paruchuri shows an example of deploying such an application.Read Deploying .NET-based Applications on to Microsoft Windows CE Enabled Smart Devices in full
One of the most popular free-as-in-freedom Linux distribution, Fedora Linux, released its latest version, Fedora 8, earlier in November. In addition to being a fantastic release, Fedora's user and development community and a clear headed approach makes Fedora 8 much more than a Linux distribution.
Like most major Linux distros Fedora too has development goals for releases. Since many top Fedora leaders are employed by RedHat, the development priorities tend to intertwine with the company's RedHat Enterprise Linux.Read Fedora 8 — More than a Linux Distribution in full
Organizing content in a meaningful way is nothing new. We have been doing it for centuries in our libraries—the Dewey decimal system being a perfect example. So, why can't we take known approaches and apply them to the Web? The main reason is that a web page has more than two dimensions. A page on a book might have footnotes or refer to other pages, but the content only appears in one place. On a web page, content can directly link to other content and even show a summary of it.
In this article, author Martin Bauer explains the importance of having the right Content Model, and gives a step-by-step process to determine and create the desired model.Read Content Modeling in full