Your application and its database certainly deal with things of significance to your organization that you care to computerize, automate some of their aspects, and to store data about them. Product and services are examples of these things—the fundamental aspects that any organization must take care of.
This article by Djoni Darmawikarta introduces three patterns for modeling: Type, Subtype, and Category. These three logical data modeling patterns are common structures applicable to any kind of organization.Read Type, Subtype, and Category Patterns in Logical Data Modeling in full
Here at Packt, we've decided to do something quite funky. Rather than paying for a book, we figured, 'why not just ask for a tweet instead?'
So, hit the 'Pay with a tweet' button above, and we’ll give you a code that entitles you to a FREE eBook from our LITE series. Any LITE book you like. Want to know more about Oracle Database Utilities? How about a bit of Unity game development? It's up to you!
Moving to Prezi doesn't have to mean abandoning all the hard work you've put into perfecting your PowerPoint slides. That work is still useful, as you can import your PowerPoint into Prezi. This is a good starting point as it allows you to rework your familiar content.
This article by Domi Sinclair, author of Instant Prezi for Education How-to takes you through the steps to creating more engaging presentations using Prezi.Read Turning your PowerPoint presentation into a Prezi in full
The generic term "tuning security … " some say, it's an oxymoron. Why so? Well, in many cases, tightening up security is normally reflected in poor performance. So, if a portion of your environment is performing poorly, it may need a review of the security configuration in order to see if loosening it a bit does not compromise the environment itself. This article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, briefly describes tuning in three major areas:
- General security configuration
- CSIv2 connectivity
- LDAP and Web authentication
The performance of any application running on the application server is the result of a complex interaction of many aspects. In this article, we have shown some of the most important factors that influence the performance of the application server and ultimately of the applications running on the top of it.
Performance tuning is not, however, a one-time task, but a continuous activity that needs to be performed at various stages in the software production process. Once you have learnt how to carry out the tuning strategies on the application server main components (in particular, the server pools configured in it, the logging policies, and data caching) and the JVM environment, then JBoss AS 7 can provide superior application performance and add important value to your business.Read Tuning jBoss AS 7 Performance in full
If you have a working phone system with extensions, voicemail, digital receptionists, call queues, and several other features and you want to call home or have a customer call you, what will you do? For that, you need to connect 3CX outside your internal network. This connection is called as trunk. In this article by Matthew M. Landis and Robert Lloyd, authors of The 3CX IP PBX Tutorial, we will cover:
- PSTN trunks
- SIP trunks
- Introduction to dial plans
- Hardware needed for analog lines
In this article by Alex Robar, we will learn about trunks in FreePBX. We will discuss the following:
- Various types of trunks allowed by FreePBX
- Methods for setting up each type of trunk
This article by Richard J. Reese, author of the book Troux Enterprise Architecture Solutions, explores an aspect of Enterprise Architecture that is not written about a great deal. There are as many models for running the EA function as there are opinions about the topic. This article provides a brief introduction to the following topics:
- Setting the EA charter
- Staffing the function
- Sample job descriptions
- Management metrics
These topics are provided as representative samples of how the EA function can be managed within a business or agency. There is no "best way" to organize the EA function. There are, however, some management principles that have worked well for many organizations, and these are presented next.Read Troux Enterprise Architecture: Managing the EA function in full
In a typical business flow in BAM, business data moves from various upstream data sources to Oracle BAM, which internally processes and pushes the data to IE browsers for report rendering. As different technologies and BAM Server components are involved, it could be time-consuming and challenging to identify and solve the problem if anything goes wrong in this flow.
In this article by Pete Wang , author of Oracle BAM 11gR1 Handbook, we will cover:
- Methodologies for troubleshooting Oracle BAM
- Troubleshooting Active Data processing
- Troubleshooting BAM HA issues
It is not uncommon to run into issues when global security is first enabled in a WebSphere environment. Some of those situations may occur due to performing tasks out of order. Other problematic conditions related to security configuration may take place due to inadvertently omitting one or more steps in a set up process. Moreover, a third category of errors that may happen due to security configuration is caused by using the wrong values to one or more parameters.
In the previous article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, we took a look at tuning websphere security. In this article we will be presented by a set of some conditions that may appear in a WebSphere Application Server ND version 7 (WAS ND7) when global security is first enabled. The first subsection covers circumstances that may come about during the configuration phase. Next, a subsection is included that presents circumstances that may happen at runtime.Read Troubleshooting WebSphere Security-related Issues in full
Routing gives an insight into troubleshooting routing problems when setting up a VPN using OpenVPN. You will learn how to detect, diagnose, and repair common routing issues.
In this article by Jan Just Keijser, author of OpenVPN 2 Cookbook, we will cover:
- Cipher mismatches
- TUN versus TAP mismatches
- Compression mismatches
- Key mismatches
- Troubleshooting MTU and tun-mtu issues
- Troubleshooting network connectivity
- Troubleshooting client-config-dir issues
- How to read the OpenVPN log files
In this article by Wojciech Kocjan, we will learn about troubleshooting Nagios 3.0 which includes troubleshooting the web interface, passive checks, SSH-Based checks, and NRPE.The article includes various possible errors along with their solutions and detailed explanations for each error listed out.Read Troubleshooting Nagios 3.0 in full
Troubleshooting the problems are always a part of any system. In this article by Dick McCarrick, Stephen Cooke, Timothy Speed, and Raphael Savir, we will see how to identify and correct problems in our Lotus Notes/Domino 7 applications. This article includes troubleshooting issues that affect performance and also talks about Domino Domain Monitoring (DDM) and what it can do in terms of troubleshooting applications. A brief overview of Agent Profiler is given at the end of this article.Read Troubleshooting Lotus Notes/Domino 7 applications in full
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today
In this article by Kevin Jackson, author of OpenStack Cloud Computing Cookbook, we will cover:
- Checking OpenStack Compute Services
- Understanding logging
- Troubleshooting OpenStack Compute Services
- Troubleshooting OpenStack Storage Service
- Troubleshooting OpenStack Authentication
It is a common experience amongst all of us that from time to time our computers don't always work as we expect and we need to hunt down and resolve problems with them. Troubleshooting can be time consuming especially if you have limited experience with the software or system you are using. This article by Gary Sims, is a guide on how to solve problems with your FreeNAS server. It covers where to look for information about the problem as well as how to hunt down problems by being methodical. It also looks at the common problems people have with their FreeNAS servers including networking problems and problems with RAID.Read Troubleshooting FreeNAS server in full
The journey with Oracle VM Manager is not free of troubles and errors. In this article, Tarry Singh will attempt to address the ones that are bound to bother you the most as far as Oracle VM Manager is concerned.
What will we cover in troubleshooting?
While we tackle the following issues in troubleshooting VM Manager. We are assuming that you are using the latest version of Oracle VM Manager and the Oracle VM Server version is 2.1.x:
- Oracle VM Manager login takes too much time
- VM guest creation fails
- Not enough disk space available for ISOs and Templates
- Cannot login to the VM remotely
Read Troubleshooting and Gotchas in Oracle VM Manager 2.1.2 in full
Every commercial PBX system has its own set of advanced features that are activated by key commands, also known as vertical service activation codes. In this article by Kerry Garrison, we will look at the standard and advanced features of trixbox CE. We will even look at how to add our own custom features to the system.Read trixbox CE Functions and Features in full
In this article by Rihards Olups, author of Zabbix 1.8 Network Monitoring, we will discuss triggers in detail which will include Trigger dependencies, Constructing trigger expressions, Event details, and Event generation and hysteresis.Read Triggers in Zabbix 1.8 in full
In this article we will be specifically covering:
- The Error object
- The RangeError object
- The ReferenceError object
- The TypeError object
- The SyntaxError object
- The URIError object
- The EvalError object