In this article by Richard Seroter, you will learn about the new SOA capabilities in a BizTalk Server 2009, mainly the UDDI services. It seems that Microsoft is reinforcing BizTalk Server's role in a service-oriented architecture by moving their UDDI Services into the BizTalk Server 2009 product. In this article, we discuss what UDDI is, and how to use its capabilities in your environment. You will learn to add services to UDDI registry and also building subscription alerts for service changes.Read New SOA Capabilities in BizTalk Server 2009: UDDI Services in full
In this article by Richard Seroter, you will learn what's WCF SQL Adapter, how to go about executing composite transactions, polling for data, and using SQL Server Query notifications.Read New SOA Capabilities in BizTalk Server 2009: WCF SQL Server Adapter in full
Nginx is a free and open source software running under various operating systems—Linux-based, Mac OS, Windows operating systems, and many more. This article will try to answer some frequently asked questions about Nginx, such as:
- From where can one download and find resources related to Nginx?
- How can one Upgrade Nginx without loosing a single connection?
- How to authenticate users or restrict access to certain visitors?
It is a well-known fact that the market of web servers has a long-established leader: Apache. However recent surveys reveal the rise of a new competitor: Nginx, a lightweight HTTP server originating from Russia— pronounced "engine X". This article provides a first approach of the configuration architecture by studying the core module directives that have an impact on the overall server performance. We will understand the need for the various directives that will let you optimize your server for different traffic patterns and hardware setups.
In this article by Clément Nedelcu, author of the book Nginx HTTP Server, we will take a look at the base modules.Read Nginx HTTP Server: Base Module Directives in full
This article deals with the basics of Nginx configuration and implementation. By the end of it you should be able to compile Nginx on your machine and create virtual hosts.
In this article by Dipankar Sarkar, author of Nginx 1 Web Server Implementation Cookbook, we will cover:
- Installing new modules and compiling Nginx
- Running Nginx in debug mode
- Easy reloading of Nginx using the CLI
- Splitting configuration files for better management
- Setting up multiple virtual hosts
- Setting up a default catch-all virtual host
- Using wildcards in virtual hosts
In the previous article , we have covered how to glue tables and classes that hold our data in the application.
In this article by Aaron cure, author of Nhibernate 2 Beginner's Guide, we will discuss Mapping relationships and Fluent MappingRead NHibernate 2: Mapping relationships and Fluent Mapping in full
This article by Jason Dentler, author of NHibernate 3.0 Cookbook, introduces some techniques you can apply to quickly test your NHibernate applications and includes an introduction to NHibernate Profiler. Testing is a critical step in the development of any application. The recipes in this article are designed to ease the testing process and expose common issues.
In this article we will cover the following topics:
- Using NHibernate Profiler
- Testing with the SQLite in-memory database
- Preloading data with SQLite
For queries where the criteria are not known in advance, such as a website's advanced product search, ICriteria queries are more appropriate than named HQL queries. This article by Jason Dentler, author of NHibernate 3.0 Cookbook, shows how to use the same DAL infrastructure with ICriteria and QueryOver queries.
In an effort to avoid overwhelming the user, and increase application responsiveness, large result sets are commonly broken into smaller pages of results. This article also shows how we can easily add paging to a QueryOver query object in our DAL.Read NHibernate 3.0: Using ICriteria and Paged Queries in the Data Access Layer in full
With the completion of LINQ to NHibernate for NHibernate 3.0, we can easily implement the specification pattern. In this article by Jason Dentler, author of NHibernate 3.0 Cookbook, we will see how to set up and use the specification pattern with the NHibernate repository.Read NHibernate 3.0: Using LINQ Specifications in the data access layer in full
Named Queries encapsulated in query objects is a powerful combination. This article by Jason Dentler, author of NHibernate 3.0 Cookbook, shows you how to use Named Queries with your NHibernate data access layer.
The reader will benefit from the previous article, NHibernate 3.0: Working with the Data Access Layer.Read NHibernate 3.0: Using Named Queries in the Data Access Layer in full
This article series by Jason Dentler, author of NHibernate 3.0 Cookbook, shows how to build a flexible, extensible data access layer based on NHibernate and its many query APIs. There are two styles of data access layer common in today's applications. The first recipe shows the beginnings of a typical data access object. The remaining recipes show how to set up a repository-based data access layer with NHibernate's various APIs.
In these articles we will cover the following topics:
- Transaction Auto-wrapping for the data access layer
- Setting up an NHibernate repository
- Using Named Queries in the data access layer
- Using ICriteria in the data access layer
- Using Paged Queries in the data access layer
- Using LINQ specifications in the data access layer
Of these the first two are dealt with in this article.Read NHibernate 3.0: Working with the Data Access Layer in full
In this article we will see how easy it is to use NHibernate in a real world application. We will create, with minimal effort, a fully working sample that allows us to write to and subsequently, read data from a database.
In this article by Dr. Gabriel Nicolas Schenker, author of NHibernate 3 Beginner’s Guide, we shall:
- Prepare our system to enable development of applications using NHibernate
- Create a simple model of a problem domain
- Create a database and define a mapping between the model and the database
- Write and read data to and from the database
This article by Matthew Robbins, author of Application Testing with Capybara, helps us in using Capybara outside Cucumber in bespoke frameworks, within popular test frameworks such as RSpec and explores some alternatives to Capybara's built-in drivers.
It seems appropriate for us to look beyond the basic API and functionality that Capybara offers. You now have all the skills required to automate your application using Capybara, regardless of whether it is a Rails/Sinatra application or a web application written using any other framework.
This article will ensure that you are comfortable using Capybara outside of Cucumber. It will also show how you can access functionality in your chosen driver that is not mapped by Capybara's API and introduce you to some of the other drivers that you may not have encountered.
Specifically, we will cover:
- Using Capybara outside of Cucumber
- Advanced interactions and accessing the driver directly
- Advanced driver configuration
- The driver ecosystem—some alternative options
In this article, by Daniel Baharestani, the author of Mastering Ninject for Dependency Injection, we will learn how Ninject facilitates the implementation of Dependency Injection to solve common design problems of real-life applications in a simple and easy-to-understand format. It will teach you everything you need in order to implement Dependency Injection using Ninject in a real-life project.Read Ninject Patterns and Anti-patterns in full
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities.
In this article by Paulino Calderon Pale, author of Nmap 6: Network exploration and security auditing Cookbook, we will cover:
- Downloading Nmap from the official source code repository
- Compiling Nmap from source code
- Listing open ports on a remote host
- Fingerprinting services of a remote host
- Finding live hosts in your network
- Scanning using specific port ranges