Article Network

Disaster Recovery for Hyper-V

by Leandro Carvalho | January 2013 | Cookbooks Enterprise Articles Microsoft

The new Windows Server 2012 Hyper-V release from Microsoft comes with a myriad of improvements in areas such as mobility, high availability and elasticity, bringing everything you need to create, manage and build the core components of a Microsoft Private Cloud for virtualized workloads.

In this article by Leandro Cavalho, the author of Windows Server 2012 Hyper-V Cookbook, we will cover the following topics:

  • Backing up Hyper-V and virtual machines using Windows Server Backup

  • Restoring Hyper-V and virtual machines using Windows Server Backup

  • Confguring Hyper-V Replica between two Hyper-V hosts using HTTP authentication

  • Confguring Hyper-V Replica broker for a Failover Cluster

  • Confguring Hyper-V Replica to use certificate-based authentication using an Enterprise CA

  • Using snapshots in virtual machines

Read Disaster Recovery for Hyper-V in full

DirectX graphics diagnostic

by Pooya Eimandar | September 2013 | Games Open Source

In this article by Pooya Eimandar, author of DirectX 11.1 Game Programming, we will be introduced to DirectX graphics diagnostic.

Read DirectX graphics diagnostic in full

Digitally Signing and Verifying Messages in Web Services ( part 2 )

by Sitaraman Lakshminarayanan | April 2009 | BPEL SOA Web Services Oracle

This is the second part of the 2 series article by Sitaraman Lakshminarayanan on Digitally Signing and Verifying Messages in Web Services using Oracle.The article revolves around how to digitally sign and verify messages in web services using Oracle Web Services Manager.The first part explained concepts like digital signatures,their importance,their functional use with respect to web services, but mainly focussed on how Oracle Web Services Manager can help generate and verify signatures in web services.In the this part,he explain signature generation and signature verification along with an example. For all those who missed out the initial action just click onto : http://www.packtpub.com/article/digitally-signing-and-verifying-messages-web-services-part1

Read Digitally Signing and Verifying Messages in Web Services ( part 2 ) in full

Digitally Signing and Verifying Messages in Web Services ( part 1 )

by Sitaraman Lakshminarayanan | April 2009 | BPEL SOA Web Services Oracle

This is a two article series by Sitaraman Lakshminarayanan.The article revolves around how to digitally sign and verify messages in web services using Oracle Web Services Manager.The first part will explain concepts like digital signatures,their importance,their functional use with respect to web services, but will mainly focus on how Oracle Web Services Manager can help generate and verify signatures in web services.In the next part,he will explain signature generation and signature verification along with an example.

Read Digitally Signing and Verifying Messages in Web Services ( part 1 ) in full

Digging into Windows Azure Diagnostics

by Neil Mackenzie | August 2011 | Cookbooks Enterprise Articles Microsoft

A Windows Azure hosted service may comprise multiple instances of multiple roles. These instances all run in a remote Windows Azure data center—typically 24*7. The ability to monitor these instances non-intrusively is essential both in detecting failure and in capacity planning. This article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, shows how Windows Azure Diagnostics provides for the non-intrusive capture of diagnostic data and its subsequent persistence to the Windows Azure Storage Service. Windows Azure Diagnostics supports various standard sources, allowing for their extensibility where appropriate. The topics covered in this article include:

  • Using the Windows Azure Diagnostics trace listener
  • Performing an on-demand transfer
  • Implementing custom logging
  • Accessing data persisted to Windows Azure Storage
  • Using the Windows Azure Platform
  • PowerShell cmdlets to configure Windows Azure Diagnostics
Read Digging into Windows Azure Diagnostics in full

Digging into the Architecture

by Edward Callahan | July 2013 | RAW Open Source Web Development

In this article by Edward Callahan, author of Easy Web Development with WaveMaker, we will examine the WaveMaker application architecture. We will learn about the client, the server, how they are constructed, and some of the core features available to us in each. We'll examine the HTTP requests made to the server and examine the JSON request of a database read call. We'll also learn about typing in WaveMaker. We'll finish this article with a tour of the Studio WaveMaker application. By the end of this article, you will have learned about:

  • The client framework
  • The server architecture
  • Communications between client and server
  • Types
  • Application file structure
Read Digging into the Architecture in full

Different Ways of Running Squid Proxy Server

by Kulbir Saini | February 2011 | Open Source

This article will help us learn about the different ways of running Squid and the available options that can be passed to Squid from the command line. We will also learn about debugging the Squid configuration file.

In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will learn the following:

  • Various command line options for running Squid
  • Parsing the squid configuration file for syntax errors
  • Using an alternate squid configuration file for testing purposes
  • Different ways of starting Squid
  • Rotating log files generated by Squid
Read Different Ways of Running Squid Proxy Server in full

Different types of Mapping in Nhibernate 2

by Aaron Cure | May 2010 | Open Source

NHibernate is an open source object-relational mapper, or simply put, a way to rapidly retrieve data from your database into standard .NET objects.

In this article by Aaron B. Cure, Author of NHibernate 2 Beginner's Guide, we will learn how to glue tables and classes that hold our data in the application

Read Different types of Mapping in Nhibernate 2 in full

Different strategies to make responsive websites

by Cory Simmons | October 2013 | Web Development

In this article written by Cory Simmons, the author of the book Instant Responsive Web Design provides you with all the information you need to start building responsive, mobile-friendly websites today.

Since Ethan Marcotte coined the term "responsive web design", people have been looking for the best way to do it, which has cumulated into the Goldilocks approach versus the Fluid approach, and Desktop-first versus Mobile-first. The only right answer is to do what you're most comfortable with and, as always, avoid dogma. In this section we'll go over the differences between each approach and even sample them so your RWD tool belt is well equipped.

Read Different strategies to make responsive websites in full

Differences in style between Java and Scala code

by Thomas Alexandre | April 2014 | Open Source

In this article by Thomas Alexandre, the author of Scala for Java Developers, we discuss that if you are going to refactor or rewrite Java code into Scala code, there are a number of style differences that are useful to be aware of. Obviously, programming style is largely a matter of taste; however, a few guidelines generally acknowledged by the Scala community can help someone new to Scala to write easier-to-read and more maintainable code. This article is dedicated to showing some of the most common differences.

Read Differences in style between Java and Scala code in full

Dial Plans in sipXecs 4.0

by Michael W. Picher | July 2009 | Networking & Telephony

In this article by Michael W. Picher, we will discuss about dial plans in sipXecs 4.0 in detail.

Read Dial Plans in sipXecs 4.0 in full

Diagnostic leveraging of the Accelerated POC with the CRM Online service

by Chandru Shankar Nilesh Thakkar Vincent Bellefroid | January 2014 | Enterprise Articles

This article written by Chandru Shankar, Vincent Bellefroid, and Nilesh Thakkar, the authors of the book Customer Success with Microsoft Dynamics Sure Step discusses the activities and covers in detail the Decision Accelerator Offerings that help to accelerate the sales cycles and bring them to a close while also helping the customer with their due diligence process.

Read Diagnostic leveraging of the Accelerated POC with the CRM Online service in full

Device Management in Zenoss Core Network and System Monitoring: Part 1

by | November 2009 | Networking & Telephony Open Source

In this article by Michael Badger, we will go through the process of discovering and modeling devices to build an inventory of the network.

We'll start this article by fine tuning our device inventory through manually adding devices to our inventory. Then we'll take a look at the main device status view and perform some routine device administration tasks. The second half of the article demonstrates the available monitoring protocols that Zenoss uses to model the devices.

We'll continue to demonstrate features using the Mill Race network, but feel free to substitute your own devices in the examples given in this article. By the time we finish this article, we'll have a detailed model of our networks.

Read Device Management in Zenoss Core Network and System Monitoring: Part 1 in full

Development with Pluggable Authentication Modules (PAM)

by Kenneth Geisshirt | June 2008 | Linux Servers Networking & Telephony

The primary focus of Pluggable Authentication Module (PAM) is to authenticate your users. PAM lets you set up the environment that the users will work in. And when the users log out, PAM tears down the working environment in a controlled way. PAM and PAM-aware applications reduce the complexity of authentication. Application programmers can take advantage of PAM, rather than developing a complete set of authentication functions. In this article by Kenneth Geisshirt, we will see how an application uses PAM for authentication and how to develop our own PAM modules.

Read Development with Pluggable Authentication Modules (PAM) in full

Development of Windows Mobile Applications (Part 1)

by Prashant Thakkar | September 2009 | .NET Microsoft

A Windows Mobile is a Smart Phone with Windows Operating System. Windows OS in Windows Mobiles is the Compact Edition (CE) of the desktop Windows OS. This article will introduce you to writing Windows Mobile Applications using Visual C# and Microsoft Visual Studio 2008. This article by Prashant Thakkar will address:

  • Essential features of Microsoft Visual Studio 2008 IDE that help in writing Windows Mobile Application.
  • Writing your first Windows Mobile "Hello World" application and a "Quote of the Day" Application that uses Internet
  • Packaging, Deploying and running your Windows Mobile Applications
Read Development of Windows Mobile Applications (Part 1) in full

Development of Login Management Module and Comment Management Module

by A P Rajshekhar | April 2009 | Open Source

Ruby on Rails is an active component in the world of web application framework. Ruby is the language used and Ruby on Rails is the framework built upon Ruby. In this article by A.P.Rajshekhar, we will be learning how to develop the login management module and the comment management module .We will start off by creating a login page and then move to implementing the Authenticate method, set up the session, try out applying authorization. After this, we will learn generating the Scaffold, modifying the model, review the View, customizing the controller under the development of comment management module sub title.

Read Development of Login Management Module and Comment Management Module in full

Development of iPhone Applications

by Pawan Sachdeva | July 2009 |

In this article by Pawan Sachdeva, we will be introduced to the various features of the iPhone along with basic programming for its development. We will develop a "Hello World" program to highlight its ability to be programmed.

Read Development of iPhone Applications in full

Development of Ajax Web Widget

by Roshan Bhattarai | February 2009 | AJAX

This is a 5 part mini series by Roshan Bhattarai, covering basics of Widget, development of Wiki seek Widget, Pop-up Image Widget, RSS Web Widget, and Delicious Tagometer Widget.

The web is becoming more flexible and dynamic from day to day. The service and functionality provided by a particular website is not limited to itself. We can extend it to other websites by placing a few lines of code in their web pages called Widget.

In this article we will explore the technologies that go behind making a Widget and understand its working.

Read Development of Ajax Web Widget in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software