Axis2 has extensive support for clustering. State replication amongst members in the same group as well as cluster management is supported in Axis2. Cluster management refers to managing a single group or several groups of Axis2 nodes. It is also noteworthy that third-party software such as Apache Synapse, which builds on Apache Axis2, also automatically benefits from Axis2 clustering capabilities.
In this article by Deepal Jayasinghe and Afkham Azeez, authors of Apache Axis2 Web Services, 2nd Edition, we will be covering the following areas:
- Axis2 cluster configuration language
- Membership management schemes
- Cluster management
By the end of this article, you will learn the finer details of configuring an Axis2 cluster in a production deployment.Read Enabling Apache Axis2 Clustering in full
This article by Justin M. Brant, the author of SolarWinds Server & Application Monitor: Deployment and Administration, covers enabling and configuring SNMP on Windows.Read Enabling and configuring SNMP on Windows in full
In this article by Daniel Arbuckle, we shall:
- Write doctests embedded in Python docstrings
- Consider real-world specification for the AVL tree
Before you begin with coding, there are a few files and folders that have to be created, as well as a query that has to be run. This will not only allow you to build Joomla! components, but will also help you try different features without extensive configuration. The component in this article will be called restaurants.
After installing your basic Joomla! component and making the website ready, there are a few additional features that you can include. One of them came up with the idea of allowing visitors to send reviews to their friends through email. Another could be adding audio reviews in addition to text. We can also begin to look into ways of expanding the market for the software. Internationalizing the component now will make it easy to translate the user interface later.
In the following article by Joseph L. LeBlanc, we will be taking a look at including the following additional features :
- Sending emails
- Managing languages
- Creating translations
- Handling file uploads
In this article by Shawn McCool, the author of Laravel Starter , we will discuss Eloquent relationships. Eloquent is Laravel's native ActiveRecord implementation. It is built upon Laravel's Fluent Query Builder. Due to the way in which Eloquent operates with Fluent, complex queries and relationships are easy to describe and understand.Read Eloquent relationships in full
In addition to its impressive feature list, Elgg is an admin's dolly. In this tutorial by Mayank Sharma, we will see how Elgg can be installed in popular Linux web application rollout stack of Linux, Apache, MySQL, and PHP, fondly referred to as LAMP. As MySQL and PHP can run under Windows operating system as well, you can set up Elgg to serve your purpose for such an environment.Read Elgg Social Networking - Installation in full
The use of interceptors provides a way of adding functionality to a business method without modifying the business method itself. The added functionality is not intermeshed with the business logic resulting in a cleaner and easier to maintain application. In the previous article we saw how the interceptors provide a means of moving code that is not central to a business method outside of the method. Here, we learn how to use interceptors to handle a number of different concerns including security and transactions.
In this article by Richard Reese, author of EJB 3.1 Cookbook, we will cover:
- Using interceptors to enforce security
- Using interceptors to handle transactions
- Using interceptors to handle application statistics
- Using lifecycle methods in interceptors
Interceptors provide a way to achieve cross-cutting activities like logging, managing transactions, security, and other aspects of an application. This article by Richard Reese, author of EJB 3.1 Cookbook, explains how the interceptors provide a means of moving code that is not central to a business method outside of the method. Later we will learn how to use interceptors to handle a number of different concerns including security and transactions in the next article.
In this article, we will cover:
- Creating the Registration Application
- Defining and using interceptors
- Using the InvocationContext to verify parameters
This article by Richard Reese, author of EJB 3.1 Cookbook, covers programmatic EJB security based upon the Java Authentication and Authorization Service (JAAS) API. It should be used when declarative annotation is not adequate to affect the level of security desired. This can occur when access is time-based. For example, a user may only be allowed to access certain services during normal business hours such as when the stock market is open.Read EJB 3.1: Controlling Security Programmatically Using JAAS in full
Security is a wide ranging topic which operates on many levels and covers many technologies. The technologies involved include networks, operating systems, database systems, and application servers as well as manual procedures.
Application level security in the context of Java EE applications is provided by web and EJB containers. This article by Michael Sikora will be mostly concerned with EJB container security. However, as EJBs are often invoked from the web-tier we will take a brief look at web container security later in this article.
We will cover the following topics:
- Java EE container security
Entities are classes that need to be persisted; their state is stored outside the application, typically in a relational database. Unlike session beans, entities do not have business logic other than validation. As well as storing such entities, we want to query, update, and delete them. In this article by Michael Sikora, we will cover the following topics:
- EJB 3 entities
- Java persistence API
- Mapping an entity to a database table
- Metadata defaults
- Introduction to the entity manager
- Packaging and deploying entities
- Generating primary keys
- Overriding metadata defaults
The DataGrid is a commonly used component when creating applications in Flex. The component can represent columnar data with ease when connected to a dataProvider. There is a method of editing the data in the DataGrid without using an itemEditor. Of course, there is nothing wrong with using an itemEditor, but this alternative method of using a PopUp window deserves some consideration when implementing applications. This article by Keith Lee describes how to create a DataGrid, display a popup for each row of the DataGrid and add, edit or remove data from the DataGrid using the PopUp.Read Editing DataGrids with Popup Windows in Flex in full
In this article by Anita Graser, author of the book Learning QGIS 2.0, we will explain how to edit the attributes in QGIS. Quantum GIS (often abbreviated QGIS) is a cross-platform free and open source desktop geographic information system (GIS) application that provides data viewing, editing, and analysis capabilities.Read Editing attributes in full
In this article by John Torjo, author of Boost.Asio C++ Network Programming, we'll implement a small client/server application, which is probably the easiest client/server application you will ever write. This is the Echo application, a server that echoes back anything a client writes, and then closes the client's connection. The server can handle any number of clients. As each client connects, it sends a message. The server receives the full message and sends it back. After that, it closes the connection.
Therefore, each Echo client connects to the server, sends a message, and reads what the server replies, making sure it's the same message it sent and finishes talking to the server.Read Echo Server/Clients in full
WCF short for Windows Communication Foundation, the latest Microsoft programming architecture has superseded earlier technologies like COM, DCOM, etc. WCF is the Microsoft programming model for building distributed applications for .NET. Visual Studio suite of products provides an easy to use interface for developing WCF applications. Using these IDEs a number of different types of WCF applications can be built.
The emphasis of this article by Dr. Jayaram Krishnaswamy is to show to the user how to leverage the IDE for understanding the ins and outs of a WCF application and learn about the available development tools. Visual Studio 2008 SP1 makes it very easy to create WCF projects. The Visual Studio 2010 Express which is a free program can also be used similar to the way described for Visual Studio 2008 SP1 in this article. In understanding basic WCF you need to go no further than the Visual Studio IDE.
This article describes the default template available in VS 2008 (also works the same in VS2010 Express) to create a WCF application and to understand the out of the box WCF development tools namely the WCF Service Host and WCF Test Client. Along with modifying the service and service contract, publishing the service to the Internet Information Services is also described where in the local host is an IIS7 web server.Read Easy guide to understand WCF in Visual Studio 2008 SP1 and Visual Studio 2010 Express in full
Spring Python takes the concepts of the Spring Framework and Spring Security, and brings them to the world of Python. It isn't a simple line-by-line port of the code. Instead, it takes some powerful ideas that were discovered in the realm of Java, and pragmatically applies them in the world of Python.
Spring (Java) provides many simple, easy-to-use functional parts to assemble applications instead of a monolithic framework to extend. Spring Python uses this same approach. This means we can use as little or as much Spring Python as we need to get the job done for each Python application.
In this article by Greg Lee Turnquist, Author of Spring Python 1.1, we will show you how to rapidly write pure SQL queries without dealing with mind-numbing boilerplate code. It also shows how Spring Python works nicely with ORM-based persistence.Read Easily Writing SQL Queries with Spring Python in full
In addition to rendering the output of our extensions, we will often find it beneficial or even necessary to alter the normal flow by redirecting the browser to another page, or by customizing the generated document or page. Using a number of classes and libraries that Joomla! provides we can significantly enhance the user experience.
In this article by,Chuck Lanham and James Kennard, author of Mastering Joomla! 1.5 Extension and Framework Development,we will cover:
- The application message queue and redirecting the browser
- Session-level input validation
- Modifying document properties specifically for our extensions
This article by Porus Homi Havewala (OCM), author of Oracle Enterprise Manager Cloud Control 12c: Managing Data Center Chaos , demonstrates how Cloud Control 12c allows automated patching of Oracle databases in the data center, thus making it possible to easily apply critical patch updates or patch set updates on a quarterly basis. The Patching Designer selects from a list of recommended patches, creates a patch plan template, and publishes it to the Patching Operator, who then creates a patch plan to apply the patch to target databases. After the initial selection, the download, validation and deployment of the patch (single or multiple) is fully automated, thus enabling mass deployment of patches to multiple database homes at prescheduled times. The new feature of out-of-place patching is explained in this article, as is the patch plan templates.Read Ease the Chaos with Automated Patching in full
The most effective gold makers think about gold-making in every aspect of their gameplay and that is how they get the most out of their gold-making endeavors.
This article by Eric Dekker, author of World of Warcraft Gold Strategy Guide, will get you used to the idea of gold-making and how to work it into your daily game life. You will learn about:
- Why you need starting capital
- Selling out-of-the-way items to players who are too lazy to get the items themselves
- Saving gold by reducing unnecessary expenses
- Earning gold for every activity you carry out in the game