Article Network

Tracking SQL Queries for a Request using Django

by Karen M. Tracey | April 2010 | Content Management Open Source Web Development

Packt is due to launch a new Open Source brand, into which future VirtualBox titles will be published. For more information on that launch, look here

In this article by Karen M. Tracey, author of the book Django 1.1 Testing and Debugging, we will develop a template code that can be used to include information about all of the SQL queries needed to render a page in the page itself.

Read Tracking SQL Queries for a Request using Django in full

Training, Tools, and Next Steps

by Victoria Yudin | September 2013 | Enterprise Articles

Microsoft Dynamics GP 2013 is a sophisticated Enterprise Resource Planning system used throughout the world. Implementing Dynamics GP for an organization can be a daunting task, requiring thorough planning and understanding of the available features and options. This article provides guidance for the planning, installation, and setup of Microsoft Dynamics GP 2013 with examples, advice, step-by-step guides, illustrations, and links to useful resources.

Most likely, you have already started training users. For many companies training is an ongoing process. In this article by Victoria Yudin, the author of Microsoft Dynamics GP 2013 Implementation, you will go over some ideas for planning your initial, as well as ongoing, training. We will also discuss tools available from Microsoft for your Dynamics GP system. Finally, some troubleshooting tips and additional resources will be listed to help you maintain and get the most out of Dynamics GP.

Read Training, Tools, and Next Steps in full

Transferring Data from MS Access 2003 to SQL Server 2008

by Dr. Jayaram Krishnaswamy | July 2009 | Microsoft

The Export and Import Wizard is an extremely useful tool for transferring data. In fact it is the simplest tool to copy over data from one database to another and to create data transfer packages that can be persisted. Data can be transferred between SQL Servers (between versions of SQL Servers for example) as well as between even two non-Microsoft databases. Both Microsoft and proprietary data source providers are available to connect to many different database products.

In this article by Dr. Jayaram Krishnaswamy, we will be transferring data from an MS Access database to a database on SQLServer 2008. Both the source of data and the destination database are on the same machine, in this case a computer box running Windows XP Pro. There are two versions of the Import and Export Wizard and in this example the 32 bit version is used.

Read Transferring Data from MS Access 2003 to SQL Server 2008 in full

Transformation

by Jakub Korab Scott Cranton | December 2013 | Cookbooks Java

This article by Scott Cranton and Jakub Korab, the authors of Apache Camel Developer's Cookbook, introduces various ways in which Camel allows us to transform or convert between and manipulate common message formats such as Java objects, XML, and JSON. The following ways are discussed in this article:

  • Transforming using a Simple Expression
  • Transforming inline with XQuery
  • Transforming with XSLT
  • Transforming from Java to XML with JAXB
  • Transforming from Java to JSON
  • Transforming from XML to JSON
Read Transformation in full

Transforming Data

by Michal Bali | August 2013 | JBoss Open Source

In this article by Michal Bali, the author of Drools JBoss Rules 5.X Developer's Guide, we will look at Almost any rewrite of an existing legacy system needs to do some kind of data transformation with the old legacy data before it can be used in the new system. It needs to load the data and transform them so that they meet the requirements of the new system and finally store them. This is just one example of where data transformation is needed.

Drools can help us with this data transformation task as well. Depending on our requirements it might be a good idea to isolate this transformation process in the form of rules. The rules can be reused later, maybe when our business will expand and we'll be converting data from a different third-party system. Of course, other advantages of using rules apply.

If performance is the most important requirement (for example, all data has to be converted within a specified time frame), rules may not be the ideal approach. Probably, the biggest disadvantage of using rules is that they need the legacy data in memory, so they are best suited to more complex data transformation tasks.

However, consider carefully if your data transformation will grow in complexity as more requirements are added.When writing these transformation rules, care should be taken not to confuse them with validation rules. In a nutshell, if a rule can be written working just with the domain model, it is most likely a validation rule. If it uses concepts that cannot be represented with our domain model, it is probably a transformation rule.

Read Transforming Data in full

Transition to Readshift

by Stefan Bauer | July 2013 | Enterprise Articles

This article created by Stefan Bauer author of Getting Started with Amazon Redshift, gets into some of the specifics and details you will need to get up and running with . As with most of the Amazon products you have used in the past, there are just a few preliminary things to take care of. You need to have signed up for the Redshift service on the Amazon account you will be using. Although these keys are not specific to Redshift, be sure to hang on to both your public and secret key strings from your user account. Those keys will be labeled Access Key and Secret Key. You can view the Access Key public portion from the user security credentials on the Security Credentials tab. However, if you do not capture the secret key when you create the keys, it cannot be recovered and you will need to generate a new key pair. You will need these when we start talking about loading data and configuring the command-line tools. Once you have the permissions for your account, the process to create the cluster is a wizard-driven process that you can launch from your Amazon Redshift management console.

Read Transition to Readshift in full

Translating a file in SDL Trados Studio

by Andy Walker | February 2014 | Open Source

This article by Andy Walker, author of SDL Trados Studio – A Practical Guide, describes the basic process of opening a document in SDL Trados Studio and translating it.

Read Translating a file in SDL Trados Studio in full

Translations in Drupal 6

by Matt Butcher | February 2009 | AJAX Content Management Drupal Open Source

Drupal offers some enticing JavaScript tools, one of which is jQuery. The theming and behavior capabilities provided by drupal.js are other examples. Along with those cool tools comes a feature that has had a remarkable influence on the success of Drupal, but which provides far less glitz and glamour.

This tragic hero is the translation engine, which will be the subject of this article written by Matt Butcher.

Translations are important—one might even say vital—to the success of Drupal. Consequently, it is imperative that all Drupal developers become familiar with these tools. JavaScript written in Drupal 6 (and in later versions) should be translation-aware.

Here are the things we will cover in this article:

  • Get our bearings in the drupal.js library
  • Enable multi-language capabilities in Drupal
  • Learn the translation functions
Read Translations in Drupal 6 in full

Trapping Errors by Using Built-In Objects in JavaScript Testing

by Yuxian Eugene Liang | August 2010 | Beginner's Guides Open Source

In this article, by Liang Yuxian Eugene, author of JavaScript Testing Beginner's Guide, we'll briefly describe what each type of built-in object is, along with its syntax, before we show some examples of how each of the built-in objects work. Do take note that the alert messages, which we will be using sparingly in the examples, are based on the Firefox browser. If you try the code on Internet Explorer, you might see different error messages.

In this article we will be specifically covering:

  • The Error object
  • The RangeError object
  • The ReferenceError object
  • The TypeError object
  • The SyntaxError object
  • The URIError object
  • The EvalError object
Read Trapping Errors by Using Built-In Objects in JavaScript Testing in full

Triggers in Zabbix 1.8

by Rihards Olups | March 2010 | Networking & Telephony Open Source

In this article by Rihards Olups, author of Zabbix 1.8 Network Monitoring, we will discuss triggers in detail which will include Trigger dependencies, Constructing trigger expressions, Event details, and Event generation and hysteresis.

Read Triggers in Zabbix 1.8 in full

trixbox CE Functions and Features

by Kerry Garrison | February 2009 | Linux Servers Networking & Telephony Open Source

Every commercial PBX system has its own set of advanced features that are activated by key commands, also known as vertical service activation codes. In this article by Kerry Garrison, we will look at the standard and advanced features of trixbox CE. We will even look at how to add our own custom features to the system.

Read trixbox CE Functions and Features in full

Troubleshooting

by Fabrizio Volpe Rosato Fabbri | November 2013 | Enterprise Articles

In this article by Rosato Fabbri and Fabrizio Volpe, the authors of Getting Started with FortiGate, we will focus on diagnostic tools that are (for the most part) based on the CLI. We will start from a group of tools dedicated to hardware diagnostics, and then we will see a group of commands to identify errors related to layers 2 and 3 of the TCP/IP stack

Read Troubleshooting in full

Troubleshooting

by Cody Bunch Kevin Jackson | October 2013 | Cookbooks Linux Servers Open Source

In this Article by Cody Bunch and Kevin Jackson author of the book OpenStack Could Computing Cookbook Second Edition explain how OpenStack like all software can have bugs that we are not able to solve ourselves.

Read Troubleshooting in full

Troubleshooting

by Fabrizio Volpe Rosato Fabbri | November 2013 | Enterprise Articles

In this article by Rosato Fabbri and Fabrizio Volpe, the authors of Getting Started with FortiGate, we will focus on diagnostic tools that are (for the most part) based on the CLI. We will start from a group of tools dedicated to hardware diagnostics, and then we will see a group of commands to identify errors related to layers 2 and 3 of the TCP/IP stack

Read Troubleshooting in full

Troubleshooting and Gotchas in Oracle VM Manager 2.1.2

by Tarry Singh | July 2009 | Oracle

The journey with Oracle VM Manager is not free of troubles and errors. In this article, Tarry Singh will attempt to address the ones that are bound to bother you the most as far as Oracle VM Manager is concerned.

What will we cover in troubleshooting?

While we tackle the following issues in troubleshooting VM Manager. We are assuming that you are using the latest version of Oracle VM Manager and the Oracle VM Server version is 2.1.x:

  • Oracle VM Manager login takes too much time
  • VM guest creation fails
  • Not enough disk space available for ISOs and Templates
  • Cannot login to the VM remotely

 

Read Troubleshooting and Gotchas in Oracle VM Manager 2.1.2 in full

Troubleshooting FreeNAS server

by Gary Sims | March 2009 | Networking & Telephony Open Source

It is a common experience amongst all of us that from time to time our computers don't always work as we expect and we need to hunt down and resolve problems with them. Troubleshooting can be time consuming especially if you have limited experience with the software or system you are using. This article by Gary Sims, is a guide on how to solve problems with your FreeNAS server. It covers where to look for information about the problem as well as how to hunt down problems by being methodical. It also looks at the common problems people have with their FreeNAS servers including networking problems and problems with RAID.

Read Troubleshooting FreeNAS server in full

Troubleshooting in OpenStack Cloud Computing

by Kevin Jackson | October 2012 | Cookbooks Open Source

OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today

In this article by Kevin Jackson, author of OpenStack Cloud Computing Cookbook, we will cover:

  • Checking OpenStack Compute Services
  • Understanding logging
  • Troubleshooting OpenStack Compute Services
  • Troubleshooting OpenStack Storage Service
  • Troubleshooting OpenStack Authentication
Read Troubleshooting in OpenStack Cloud Computing in full

Troubleshooting Lotus Notes/Domino 7 applications

by Dick McCarrick,Stephen Cooke,Timothy Speed,Raphael Savir | June 2008 | Architecture & Analysis Web Development

Troubleshooting the problems are always a part of any system. In this article by Dick McCarrick, Stephen Cooke, Timothy Speed, and Raphael Savir, we will see how to identify and correct problems in our Lotus Notes/Domino 7 applications. This article includes troubleshooting issues that affect performance and also talks about Domino Domain Monitoring (DDM) and what it can do in terms of troubleshooting applications. A brief overview of Agent Profiler is given at the end of this article.

Read Troubleshooting Lotus Notes/Domino 7 applications in full

Troubleshooting Nagios 3.0

by Wojciech Bancer | April 2009 | Linux Servers Networking & Telephony Open Source

In this article by Wojciech Kocjan, we will learn about troubleshooting Nagios 3.0 which includes troubleshooting the web interface, passive checks, SSH-Based checks, and NRPE.The article includes various possible errors along with their solutions and detailed explanations for each error listed out.

Read Troubleshooting Nagios 3.0 in full

Troubleshooting OpenVPN 2: Configurations

by Jan Just Keijser | February 2011 | Cookbooks Networking & Telephony Open Source

Routing gives an insight into troubleshooting routing problems when setting up a VPN using OpenVPN. You will learn how to detect, diagnose, and repair common routing issues.

In this article by Jan Just Keijser, author of OpenVPN 2 Cookbook, we will cover:

  • Cipher mismatches
  • TUN versus TAP mismatches
  • Compression mismatches
  • Key mismatches
  • Troubleshooting MTU and tun-mtu issues
  • Troubleshooting network connectivity
  • Troubleshooting client-config-dir issues
  • How to read the OpenVPN log files
Read Troubleshooting OpenVPN 2: Configurations in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software