Documentation—if there is one word that installs fear in most developers, it must be this one. No one in their right mind would argue the value of documentation, but it is the actual act of writing it that concerns developers so.
The secret of creating good documentation is to make the process of doing so as painless as possible, and if we are lucky maybe even attractive, to the developers. The only practical way to achieve that is to reduce friction. The last thing we need when we are in middle of fixing a bug is to wrestle with our word processor, or even worse try to find the right document to update.
David J Murphy illustrates in this article, how Trac can used for the purpose of documentation.Read Software Documentation with Trac in full
The launch of Windows XP in 2001 heralded the long-awaited transition of consumer-orientated editions of Windows to the NT codebase. Microsoft designed the Windows Application Compatibility Infrastructure as part of Windows XP to help system administrators and home users solve compatibility problems with applications that were designed to run in Windows 98 or earlier versions of the 9x range.
In this article by Russell Smith, author of Least Privilege Security for Windows 7, Vista and XP, we will learn:
- How the Application Compatibility Infrastructure uses shims to modify incompatible applications on the fly
- Why using shims provides the best balance between compatibility and security
- How to create shims using Application Compatibility Toolkit 5.5
- Distributing compatibility databases to devices across the enterprise
This article by Russell Smith, author of Least Privilege Security for Windows 7, Vista and XP, includes information about tools and techniques that can be used to solve Least Privilege Security problems. Specifically, we will use third-party solution to configure administrative privileges for applications and Windows processes on-the-fly. Privilege Guard is a third-party solution, from Microsoft Gold Partner Avecto, that allows system administrators to dynamically add or remove privileges by modifying the logged in user's access token as it's assigned to new processes.Read Solving LUA Problems with Avecto Privilege Guard in full
Modeling book sales is not a big deal, you just need a sales fact and a book dimension, and other dimensions, such as date dimension. From this model, you can analyze daily book sales.
But, what if a book is written by more than one writer and an individual writer writes more than one book, i.e. relationship of book to writer is many to many? How would you enhance the existing book sales dimensional model, which has book granularity, to also handle sales analysis by individual writer, i.e. analysis at writer granularity?
In this article by Djoni Darmawikarta, we will discuss the two possible dimensional modeling solutions to handle many-to-many relationship.Read Solving Many-to-Many Relationship in Dimensional Modeling in full
To celebrate the recent publication of the Microsoft Dynamics GP 2010 Reporting book, Packt is pleased to announce a series of attractive discounts on our wide range of Dynamics books. For more information click here.
Dynamics GP offers a great deal of options and additional modules surrounding the core distribution modules, using which some advanced workflow and functionality can be achieved when needed. Inventory, Sales Order Processing, and Purchase Order Processing are commonly referred to as the Distribution Modules. These modules integrate with each other and with the other modules in Dynamics GP and are the modules where the transactions pertaining to inventory quantities and costs, purchases, sales, and transfers are entered.
In this article by Victoria Yudin, author of Microsoft Dynamics GP 2010 Implementation, we will cover basic setup for the Sales Order Processing (SOP) module.Read SOP Module Setup in Microsoft Dynamics GP in full
In this article by Artan Sinani, author of the book Learning Bing Maps API, iwe will learn geocoding setting up automated jobs on the Bing Maps servers. We will also learn the techniques of monitoring the jobs, and on their completion, parsing the response.
The topics covered in this article are as follows:
- Geocoding dataflow input data
- The job
- Getting job status
This article by Brett Lantz, author of Machine Learning with R, covers techniques that may not apply to every machine learning project, but could prove useful for certain types of work.Read Specialized Machine Learning Topics in full
Search is by far the most important feature of an application where data is stored and retrieved. If it hadn't been for search, Google wouldn't exist, so we can imagine the importance of search in the computing world. In today's world, search is an integral part of any application; a reliable search engine like Sphinx Search can be the difference between running a successful and unsuccessful business.
This article covers some of the most frequently asked questions on Sphinx Search.Read Sphinx Search FAQs in full
Search is by far the most important feature of an application where data is stored and retrieved. If it hadn't been for search, Google wouldn't exist, so we can imagine the importance of search in the computing world. A reliable search engine like Sphinx Search can be the difference between running a successful and unsuccessful business.
In this article by Abbas Ali, author of Sphinx Search Beginner's Guide, we will learn how to use the Sphinx API to issue search queries from your PHP applications. We will examine different query syntaxes and learn about weighting, sorting, and grouping our search results.Read Sphinx: Index Searching in full
This article by Alfonso Romero, teaches you about all the different tools available on the Internet that can help you build a very attractive weblog for your visitors. You'll learn how to upload files to your blog and use the Rich Text Editor to insert images.Read Spicing Up Your Blog: Uploading Files and Images to your Weblog using Apache Roller in full
In the previous discussion, the focus was on understanding the Model, View and Controller components of the application using Spring MVC framework. However, the developed components do not have knowledge of each other. Model is passed through Controller to the View using Logical View name. We have yet to map Logical View to the physical file. Also, to deploy the application, the application itself needs to be configured so that the Application Server knows to which component it should the route the requests. In this article by A. P. Rajshekhar, the focus will be on these two steps – configuring the components as well as configuring and deploying the application.Read Spring MVC - Configuring and Deploying the Application in full
Spring Roo is an easy-to-use tool for rapidly developing Java enterprise applications using well-recognized frameworks such as Spring, Hibernate, AspectJ, Spring Web Flow, Spring Security, GWT, Flex, and so on. Spring Roo takes care of creating project structure for your enterprise application, adding support to use Maven for building and deploying the application, creating application architecture based on your choice of technologies, creating unit and integration tests based on your choice of testing framework, and so on.
In this article by Ashish Sarin, author of Spring Roo 1.1 Cookbook, we'll look at how Spring Roo simplifies developing the web layer of an enterprise application using Spring Web MVC. We'll also look at how Spring Roo lets us quickly test our web application locally.Read Spring Roo 1.1: Working with Roo-generated Web Applications in full
Spring Security exists to fill a gap in the universe of Java third-party libraries, much as the Spring Framework originally did when it was first introduced. Standards such as Java Authentication and Authorization Service (JAAS) or Java EE Security do offer some ways of performing some of the same authentication and authorization functions, but Spring Security is a winner because it packages up everything you need to implement a top-to-bottom application security solution in a concise and sensible way. Additionally, Spring Security appeals to many because it offers out of the box integration with many common enterprise authentication systems; so it's adaptable to most situations with little effort (beyond configuration) on the part of the developer.
This article will provide you with a few tips and tricks on Spring Security.Read Spring Security 3: Tips and Tricks in full
This article by Peter Mularien is an excerpt from the book Spring Security 3.
In this article, we will:
- Examine different methods of configuring password encoding
- Understand the password salting technique of providing additional security to stored passwords
This article discusses the basic concepts and knowledge needed to use SQL query in SAP Business One. You will learn a clear definition of SQL query, the data dictionary, and table links.
In this article by Gordon Du, author of Mastering SQL Queries for SAP Business One, we will begin by identifying the target audience, and will then go on to discuss the basic concepts and knowledge needed to use SQL query in SAP Business One. In the first section, you will be given a clear definition of the specific scope of the SQL and Query. The following section discusses the Data Dictionary and table links such as base tables versus target tables. The last section gives you a key concept to remember for building a good query by keeping it simple.Read SQL Query Basics in SAP Business One in full
SQL Server 2008 R2 improves the ability to manage multiple servers centrally with Utility Control Point (UCP). In order to manage multiple instances efficiently, there are certain settings available within the Utility Explorer tool. In this recipe by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, we will focus on how to manage multiple instances using Utility Explorer by setting global policies for data-tier applications (DAC), and managed instances.Read SQL Server 2008 R2: Multiserver Management Using Utility Explorer in full
This article by Donabel Santos author of SQL Server 2012 with PowerShell V3 Cookbook, demonstrates scripts and snippets of code that accomplish some basic SQL Server tasks, using PowerShell. We will start with simple tasks, such as listing SQL Server instances and creating objects such as tables, indexes, stored procedures, and functions, to get you comfortable with working with SQL Server programmatically.
You will find that many of the recipes can be accomplished using PowerShell and SQL Management Objects ( SMO). SMO is a library that exposes SQL Server classes, which allows for programmatic manipulation and automation of many database tasks. For some recipes, we will also explore alternative ways of accomplishing the same tasks, using different native PowerShell cmdlets.
Even though we are exploring how to create some common database objects using PowerShell, I would like to note that PowerShell is not always the best tool for the task. There will be tasks that are best left accomplished using T-SQL. Even so, it is still good to know what is possible with PowerShell and how to do it, so that you know you have alternatives depending on your requirements or situation.Read SQL Server and PowerShell Basic Tasks in full
In this article by Debarchan Sarkar, the author of Microsoft SQL Server 2012 with Hadoop, we will learn how to create an SQL Server Integration Services package to move data from Hadoop to SQL Server using the Hive ODBC driver.
Microsoft SQL Server is a complete suite of tools that include an RDBMS system, a multidimensional OLAP and tabular database engines, as well as other services, for example a broker service, a scheduling service (SQL Agent), and many more. As discussed it has become extremely important these days to integrate data between different sources. SQL Server also offers a powerful business intelligence stack, which provides rich features for data mining and interactive reporting. One of these BI components is an extract, transform, and load (ETL) tool called SQL Server Integration Services (SSIS). SSIS offers the ability to merge structured and un-structured data by importing Hive data into SQL Server and apply powerful analytics on the integrated data. Throughout the rest of this article, we will get a basic understanding on how SSIS works and create a simple SSIS package to import data from Hive to SQL Server.Read SQL Server Integration Services (SSIS) in full
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will have a look at how proxy servers and web caching works in general. We will proceed to download the correct Squid package for our operating system, based on the system requirements that we learned about in the Preface. We will learn how to compile and build additional Squid features. We will also learn the advantages of compiling Squid manually from the source over using a pre-compiled binary package.
In the final section, we will learn how to install Squid from a compiled source binary package, using popular package managers. Installation is a crucial part in getting started with Squid. Sometimes, we need to compile Squid with custom flags, depending on the environment requirements.Read Squid Proxy Server 3: Getting Started in full
Squid proxy server enables you to cache your web content and return it quickly on subsequent requests. Though we may take utmost care while configuring Squid and testing everything before deploying changes in production mode, sometimes we may face issues which can affect our clients. The issues may be a result of configuration glitches, Squid bugs, operating system limitations, or even because of the network issues.
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will discuss some debugging problems which we may come across while configuring or running Squid.Read Squid Proxy Server: Debugging Problems in full