Article Network

Avro Source Sink

by Steve Hoffman | July 2013 | Open Source

In this article by Steve Hoffman, author of Apache Flume: Distributed Log Collection for Hadoop, we'll put Avro to use in communication between Flume agents.

Read Avro Source Sink in full

Availability Management

by Konstantin Kuminsky | October 2013 | Enterprise Articles

In this article written by Konstantin Kuminsky, the author of the book Implementing VMware vCenter Server, describes the features in vCenter that allow you to reduce downtime and make sure your services are available for end users most of the time. The features are vSphere High Availability, Fault Tolerance including host and VM monitoring, datastore heartbeating, and Dynamic Resource Scheduler (DRS).

We will discuss the different aspects of vSphere's High Availability (HA) and Fault Tolerance (FT), including host and VM monitoring, datastore heartbeating, and Distributed Resource Scheduler (DRS).

In this article we will cover the following topics:

  • Reducing planned and unplanned downtime
  • Creating a vSphere HA cluster
  • HA security, logging, and admission control
  • Preparing hosts and configuring FT
Read Availability Management in full

Autoscaling with the Windows Azure Service Management REST API

by Neil Mackenzie | August 2011 | Cookbooks Enterprise Articles Microsoft

One of the attractions of cloud computing is the financial saving gained through the elastic provision of compute services, that is, the ability to scale up and down the number of instances of a hosted service.

In this article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, we will see how the Windows Azure Service Management REST API can be used to autoscale a hosted service, so that it can handle the current and predicted load depending on the day of the week. By autoscale we mean the ability of a hosted service to scale itself elastically by modifying automatically the number of running instances.

Read Autoscaling with the Windows Azure Service Management REST API in full

Autoproxy in Spring Aspect-Oriented Programming (AOP)

by Massimiliano Dessì | February 2009 | Java Open Source Web Development

Spring allows us to use "autoproxy" bean definitions, which can automatically proxy selected bean definitions. There are three kind of autoproxies provided for automatic creation of beans. In this article by Massimiliano Dessi, we will look at this in detail.

Read Autoproxy in Spring Aspect-Oriented Programming (AOP) in full

Automation with Python and STAF/STAX

by Javier Collado | September 2008 | Open Source

The aim of this article by Javier Collado is to show how tasks may be automated using Python together with STAF (Software Testing Automation Framework) by means of an example. We will first see a problem and then derive its solution using classical Python-only as well as Python+STAF. The implementation of the solution will evolve in different stages. This will help us in comparing both the solution in terms of simplicity and efficiency.

Read Automation with Python and STAF/STAX in full

Automating Your System Administration and Deployment Tasks Over SSH

by Dr. M. O. Faruque Sarker | March 2014 | Cookbooks Networking & Telephony

In this article, by Dr. M. O. Faruque Sarker, author of Python Network Programming Cookbook, we will cover the following recipes:

  • Executing a remote shell command using telnet
  • Copying a file to a remote machine by SFTP
  • Printing a remote machine's CPU information
  • Installing a Python package remotely
  • Running a MySQL command remotely

This article promotes some interesting Python libraries. The recipes are presented aiming at the system administrators and advanced Python programmers who like to write code that connects to remote systems and executes commands. The article begins with lightweight recipes with a built-in Python library, telnetlib. It then brings Paramiko, a well-known remote access library. Finally, the powerful remote system administration library, fabric, is presented. The fabric library is loved by developers who regularly script for automatic deployments, for example, deploying web applications or building custom application binaries.

Read Automating Your System Administration and Deployment Tasks Over SSH in full

Automating the Audio Parameters – How it Works

by Chris Khoo | September 2013 | Open Source Web Development

In this article by Chris Khoo, the author of Instant Audio Processing with Web Audio, we will see how automating the audio parametes is carried out. There are several key rules in regards to scheduling the automation events:

  • If an event is added at a time when there is already an event of the exact same type, the new event replaces the old one.

  • If an event is added at a time when there is already an event of a different type, it is scheduled to occur immediately after it.

  • Events may not overlap – some events occur over time, such as the linearRampToValueAtTime() automation behavior. No events may be scheduled in the time when such events are active, otherwise Web Audio will throw a runtime exception.

Read Automating the Audio Parameters – How it Works in full

Automating performance analysis with YSlow and PhantomJS

by Rob Friesel | June 2014 | Cookbooks Open Source Web Development

This article by Rob Friesel, author of the PhantomJS Cookbook, demonstrates how to set up an automated performance analysis task on a continuous integration server (for example, Jenkins CI) using PhantomJS and the YSlow library.

Read Automating performance analysis with YSlow and PhantomJS in full

Automated testing using Robotium

by Hrushikesh Zadgaonkar | November 2013 | Open Source

Automated testing helps us to maintain high software quality and provides a facility to capture if any code changes affect the actual use case. This article by Hrushikesh Zadgaonkar, the author of Robotium Automated Testing for Android, introduces the Robotium framework, its different features, its benefits in the world of automated testing, the API set of the Robotium Framework, and how to implement the Robotium Remote Control using SAFS.

Read Automated testing using Robotium in full

Authorizing User Access to BPEL Process

by Matjaz B. Juric | October 2010 | Enterprise Articles Web Development

In the previous article, Securing a BPEL process, we saw the principles of securing BPEL processes.

In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will look at how to secure BPEL processes, so that they can be accessed only by authenticated users. In a nutshell, we will:

  • Configure the web service export of a BPEL process to propagate user identity to the process, so that a process instance ownership can be claimed in that user's name
  • Protect a BPEL process at SCA level as a component to implement access to the process for authorized users only
Read Authorizing User Access to BPEL Process in full

Authorizations in SAP HANA

by Mark Walker | July 2013 | Enterprise Articles SAP

In this article by Mark Walker, author of Software Development on the SAP HANA Platform, we will examined the fact that some of your users might not be allowed to have access to all the data in the system, or might have specific rights, maybe to create data but not to see the data that is currently in the system. We'll see concrete example of access restrictions on both objects and their content in this article.

SAP HANA provides several different layers of security from which you can benefit, and in this article we'll be looking at each of them. We'll examine how we can create each type of object, how they interact with each other, and how we can use them.

The authorization concept in SAP HANA is comprised of different notions:

  • Roles

  • SQL privileges

  • Analytic privileges

  • System privileges

  • Package privileges

  • Users

     

We will take a look at each of these concepts in turn.

Read Authorizations in SAP HANA in full

Authorizations in SAP HANA

by Mark Walker | July 2013 | Enterprise Articles SAP

In this article by Mark Walker, author of Software Development on the SAP HANA Platform, we will examined the fact that some of your users might not be allowed to have access to all the data in the system, or might have specific rights, maybe to create data but not to see the data that is currently in the system. We'll see concrete example of access restrictions on both objects and their content in this article.

SAP HANA provides several different layers of security from which you can benefit, and in this article we'll be looking at each of them. We'll examine how we can create each type of object, how they interact with each other, and how we can use them.

The authorization concept in SAP HANA is comprised of different notions:

  • Roles

  • SQL privileges

  • Analytic privileges

  • System privileges

  • Package privileges

  • Users

     

We will take a look at each of these concepts in turn.

Read Authorizations in SAP HANA in full

Authorization with Zend_Acl in Zend Framework 1.8

by | October 2009 | MySQL Open Source PHP Web Development

In this article by Keith Pope, we will focus on how we can control access to parts of the application and how users can log in to use the services provided by the Storefront.

We will cover the following topics:

  • Using Zend_Acl
  • Integrating the ACL into our Models

Read Authentication with Zend_Auth in Zend Framework 1.8 to learn authentication in Zend Framework.

Read Authorization with Zend_Acl in Zend Framework 1.8 in full

Authoring an EnterpriseDB report with Report Builder 2.0

by Jayaram Krishnaswamy | June 2009 | Open Source

This article by Dr. Jayaram Krishnaswamy shows step-by-step how you may retrieve data from a database on a Postgres Plus server and display the results in a report generated using Report Builder 2.0. Report Builder 2.0 is a report building and maintaining tool provided with SQL Server 2008. The evaluation version of SQL Server 2008 Enterprise edition was used in this tutorial. Report data is obtained via an ODBC DSN. The connection uses an EnterpriseDB ODBC driver that gets installed on the computer when EnterpriseDB is installed.

Read Authoring an EnterpriseDB report with Report Builder 2.0 in full

Author Podcast - Ronald Rood discusses the birth of Oracle Scheduler

by Ronald Rood | August 2010 | Enterprise Articles Oracle

Ronald Rood, author of Mastering Oracle Scheduler in Oracle 11g Databases, discusses Oracle Scheduler, and its busienss benefits in scheduling, managing and executing jobs to help automate business processes.

Read Author Podcast - Ronald Rood discusses the birth of Oracle Scheduler in full

Author Podcast - Bob Griesemer on Oracle Warehouse Builder 11g

by Bob Griesemer | April 2010 | Enterprise Articles Oracle

Listen to Bob Griesemer, author of Oracle Warehouse Builder 11g: Getting Started, speaking with Dain Hansen, Director of Product Marketing for Oracle Fusion Middleware, about his book, data integration, and the benefits of Oracle Warehouse Builder 11g in data warehouses.

Read Author Podcast - Bob Griesemer on Oracle Warehouse Builder 11g in full

Author Podcast - Aleksander Seovic Talks About Oracle Coherence 3.5

by Aleksandar Seovic | February 2010 | Enterprise Articles Oracle

Listen to Aleksander Seovic, author of Oracle Coherence 3.5, be interviewed by Cameron Purdy, Vice President of Development at Oracle.

Read Author Podcast - Aleksander Seovic Talks About Oracle Coherence 3.5 in full

Authentication with Zend_Auth in Zend Framework 1.8

by Keith Pope | October 2009 | MySQL Open Source PHP Web Development

In this article by Keith Pope, we will focus on how we can control access to parts of the application—Storefront and how users can log in to use the services provided by the it.

We will learn how to implement authentication in Zend Framework 1.8.

We will cover the following topics in this article:

  • Authentication versus Authorization
  • Using Zend_Auth
Read Authentication with Zend_Auth in Zend Framework 1.8 in full

Authentication and Authorization in MODx

by Antano Solar John | July 2009 | Content Management Open Source

Authentication is the process of verifying that users are who they claim to be. Authorization is the process of granting access to the authenticated users—based on their role—to perform operations such as view, edit, or delete on resources. In this article by Antano Solar John, you will learn how MODx facilitates authentication and authorization. You will build your site to include user registrations, logins, user types, and set rules on who can do what.

As you read this article, it is important that you keep in mind that MODx has two user types.

  • Web Users—users who use the web site
  • Manager Users—users who are allowed to log in to the Manager interface
Read Authentication and Authorization in MODx in full

Authenticating Your Application with Devise

by Giovanni Sakti Hafiz Badrie Lubis Nia Mutiara | October 2013 | Open Source

A "state of the art" application sometimes requires more customizations from Devise, such as customization for signing in, updating accounts, or resetting a user's password. When you first install Devise with its default settings, you will not get these features. That's why you will need to dig deeper to have a more comprehensive understanding about Devise, and this article by Hafiz, Nia Mutiara, and Giovanni Sakti, authors of Learning Devise for Rails, will help you do just that.

Read Authenticating Your Application with Devise in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software