After installing an application server, we would want to deploy applications. Applications can be installed manually or in an automated fashion using scripts. In this two-part article by Steven Charles Robinson, we will cover how to manually deploy a J2EE (Enterprise Edition) application. As we walk through this article, we will show you how to deploy two applications. One application does not require database connectivity; the second is a database aware application which requires some WebSphere configuration to provide database connectivity to the application.
In this article, we will cover the following topics:
- Application server internals
- The web container
- Virtual hosts
- WebSphere ports
- Data sources
- Java Naming and Directory Interface (JNDI)
- Application deployment
- J2EE applications
- Enterprise Archive (EAR)
- Web Archive (WAR)
- Java Archive (JAR)
The idea of this two-part article by Colman Carpenter, David Duffett, Ian Plain, and Nik Middleton is to give an introduction to the area of wireless technologies by asking, "Why integrate Asterisk with wireless technologies?"
After answering that question, we will look at the wireless device and wireless network options that exist, and consider the advantages and disadvantages for each. We will also look at some configurations for one or two devices and the settings we need to make in Asterisk, before rounding off the article with some example deployment scenarios, for which we will choose the best wireless options.Read Integrating Asterisk with Wireless Technologies: Part 1 in full
In the previous part of the article by David Heffelfinger, we briefed you about an overview of iReport, obtaining and setting up the right iReport for your machine environment, and creating a simple report using iReport. In this second part of the article, we will learn to create more elaborate reports by using iReport's graphical user interface to set report attributes.Read Graphical Report Design with iReport: Part 2 in full
In this article by David Heffelfinger, we will explore how to create a report from the data obtained from a database using JasperReports 3.5. In this article, we will cover the following topics:
- How to embed SQL queries into a report template
- How to pass rows returned by an SQL query to a report through a datasource
- How to use report fields to display data obtained from a database
- How to display database data in a report by using the
In the previous article by Colman Carpenter, David Duffett, Ian Plain, and Nik Middleton, we covered tones, time, date, and changing the language of system prompts. This article will tell us about:
- What needs to be changed in terms of telephony interfaces
- Where to change the method of caller ID signaling used
- Some ways to secure your Asterisk against unauthorized use by internal and external callers
This is a two-part article by Colman Carpenter, David Duffett, Ian Plain, and Nik Middleton. In this part, we will cover the following:
- How to change the tones generated and recognized by Asterisk
- Where and how to affect the way times, dates, and so on are announced
- How to change the language of system prompts
In the previous part of this artice by Florian Rommel, we discussed software toolkits for your DCs and administration and diagnosing AD problems. In this part, things included are monitroing your AD with two utilities: Sonar and Ultrasound.Read Common Recovery Tools in Active Directory: Part 2 in full
sipXecs has several server-side features that provide additional functionality. These functionalities are not otherwise available in the phones themselves. Many of the basic features will be covered in this article. This ever-increasing list of system features helps set sipXecs apart from its competition. As you will discover in this article, the features are easy to configure and they are easy for the end user to utilize. In this article by Michael W. Picher, we will cover configuration of the following services:
- Auto attendant
- Paging Groups
- Call Park Orbits
- Music on Hold
Read Configuring sipXecs Server Features in full
Some of the things we will go through in this two-part article by Florian Rommel maybe not exactly be a requirement for the recovery process, but would still be useful to know and easier to understand when referenced.
In this part, things include what specific toolkits you should have installed, or at least have ready to be installed, on your DCs. We will also look at some tools for diagnosing problems, such as DcDiag.exe and NetDiag.exe to how you can use them to try and fix small issues.
We will first start with the software toolkits.Read Common Recovery Tools in Active Directory: Part 1 in full
In order to design a proper Active Directory infrastructure, knowledge of its workings, and what it is based on, is essential. The basis for Active Directory is the Lightweight Directory Access Protocol (LDAP), which is an X.500 standard (to read more about the X.500 standard please visit: http://en.wikipedia.org/wiki/X.500). LDAP defines that a directory is a tree of entries, with each entry containing a set of attributes. Each entry has a unique identifier and therefore cannot be duplicated. This way everything is an object in an LDAP-based directory.
There are many great books available for Active Directory design and some of them go into great detail. Compressing all this into a single article is just not possible, so in this two-part article by Florian Rommel, we will stick to the basics and a high-level view, instead of too much detail. This will provide a good overview of how to design a proper Active Directory, with different strategies in mind, and tailor it best for your organization.
In the first part, we will cover Active Directory elements, domain designs, and Lag Replication Site(LRS).Read Active Directory Design Principles: Part 1 in full
In the previous part of this article by Florian Rommel, we covered Active Directory elements, domain designs, and Lag Replication Site(LRS). In this part, we will cover designing your Active Directory and keeping it up-to-date and safe.Read Active Directory Design Principles: Part 2 in full
One of the greatest things about a Linux based Desktop environment is the ability to customize nearly everything you see. In this article by Christer Edwards, we will see how to find hidden UI options as well as save all of your customizations for easy replication. By the end of this article you'll know how to automate (script) the customization of your desktop down to the very last detail.Read Ubuntu User Interface Tweaks in full