One of the greatest things about a Linux based Desktop environment is the ability to customize nearly everything you see. In this article by Christer Edwards, we will see how to find hidden UI options as well as save all of your customizations for easy replication. By the end of this article you'll know how to automate (script) the customization of your desktop down to the very last detail.Read Ubuntu User Interface Tweaks in full
This article by Christer Edwards outlines how to install Ubuntu Server from scratch, install and configure the LAMP (Linux Apache MySQL PHP) packages and get the Wordpress blogging software installed and configured in under 15 minutes. It may take more than that time to initially read the article, but after you've given it a once-over and have the required components ready, you'll be able to install a machine from scratch and have your own blog up and running in 15 minutes!Read Ubuntu Server and WordPress in 15 Minutes Flat in full
In this article, by Christer Edwards, the author of Instant Ubuntu, we learn about different features you need to know about that helps you discover much of the software Ubuntu provides and learn how to use it. You will learn about different accessories of Ubuntu, how to customize Ubuntu, and also about some games you can play in Ubuntu.Read Ubuntu Features in full
In this article by Christer Edwards, you'll learn a number of different ways to upgrade an existing Ubuntu installation. Whether it is a Desktop, Laptop or Server, you'll find instructions below. These methods have been tested by volunteers around the world and should prove to be simple and problem free for you as well.Read Ubuntu 9.10: How To Upgrade in full
In this article by Dan Osipov, we will see how external services specifically Flickr and YouTube, can be leveraged to expand the system. We pull in files from YouTube and Flickr.Read TYPO3 for Connecting External APIs: Flicker and Youtube in full
Microsoft Dynamics AX 2012 already provides a number of services out-of-the-box. These services together with additional services that can be developed can be divided into three types. Each of the service types has its own characteristics and a different approach to create them.
This article by Klaas Deforche and Kenny Saelen authors of Microsoft Dynamics AX 2012 Services discusses about these services in detail.Read Types of services in Microsoft Dynamics AX 2012 in full
Your application and its database certainly deal with things of significance to your organization that you care to computerize, automate some of their aspects, and to store data about them. Product and services are examples of these things—the fundamental aspects that any organization must take care of.
This article by Djoni Darmawikarta introduces three patterns for modeling: Type, Subtype, and Category. These three logical data modeling patterns are common structures applicable to any kind of organization.Read Type, Subtype, and Category Patterns in Logical Data Modeling in full
Here at Packt, we've decided to do something quite funky. Rather than paying for a book, we figured, 'why not just ask for a tweet instead?'
So, hit the 'Pay with a tweet' button above, and we’ll give you a code that entitles you to a FREE eBook from our LITE series. Any LITE book you like. Want to know more about Oracle Database Utilities? How about a bit of Unity game development? It's up to you!
Moving to Prezi doesn't have to mean abandoning all the hard work you've put into perfecting your PowerPoint slides. That work is still useful, as you can import your PowerPoint into Prezi. This is a good starting point as it allows you to rework your familiar content.
This article by Domi Sinclair, author of Instant Prezi for Education How-to takes you through the steps to creating more engaging presentations using Prezi.Read Turning your PowerPoint presentation into a Prezi in full
The generic term "tuning security … " some say, it's an oxymoron. Why so? Well, in many cases, tightening up security is normally reflected in poor performance. So, if a portion of your environment is performing poorly, it may need a review of the security configuration in order to see if loosening it a bit does not compromise the environment itself. This article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, briefly describes tuning in three major areas:
- General security configuration
- CSIv2 connectivity
- LDAP and Web authentication
The performance of any application running on the application server is the result of a complex interaction of many aspects. In this article, we have shown some of the most important factors that influence the performance of the application server and ultimately of the applications running on the top of it.
Performance tuning is not, however, a one-time task, but a continuous activity that needs to be performed at various stages in the software production process. Once you have learnt how to carry out the tuning strategies on the application server main components (in particular, the server pools configured in it, the logging policies, and data caching) and the JVM environment, then JBoss AS 7 can provide superior application performance and add important value to your business.Read Tuning jBoss AS 7 Performance in full
If you have a working phone system with extensions, voicemail, digital receptionists, call queues, and several other features and you want to call home or have a customer call you, what will you do? For that, you need to connect 3CX outside your internal network. This connection is called as trunk. In this article by Matthew M. Landis and Robert Lloyd, authors of The 3CX IP PBX Tutorial, we will cover:
- PSTN trunks
- SIP trunks
- Introduction to dial plans
- Hardware needed for analog lines
In this article by Alex Robar, we will learn about trunks in FreePBX. We will discuss the following:
- Various types of trunks allowed by FreePBX
- Methods for setting up each type of trunk
This article by Richard J. Reese, author of the book Troux Enterprise Architecture Solutions, explores an aspect of Enterprise Architecture that is not written about a great deal. There are as many models for running the EA function as there are opinions about the topic. This article provides a brief introduction to the following topics:
- Setting the EA charter
- Staffing the function
- Sample job descriptions
- Management metrics
These topics are provided as representative samples of how the EA function can be managed within a business or agency. There is no "best way" to organize the EA function. There are, however, some management principles that have worked well for many organizations, and these are presented next.Read Troux Enterprise Architecture: Managing the EA function in full
In a typical business flow in BAM, business data moves from various upstream data sources to Oracle BAM, which internally processes and pushes the data to IE browsers for report rendering. As different technologies and BAM Server components are involved, it could be time-consuming and challenging to identify and solve the problem if anything goes wrong in this flow.
In this article by Pete Wang , author of Oracle BAM 11gR1 Handbook, we will cover:
- Methodologies for troubleshooting Oracle BAM
- Troubleshooting Active Data processing
- Troubleshooting BAM HA issues
It is not uncommon to run into issues when global security is first enabled in a WebSphere environment. Some of those situations may occur due to performing tasks out of order. Other problematic conditions related to security configuration may take place due to inadvertently omitting one or more steps in a set up process. Moreover, a third category of errors that may happen due to security configuration is caused by using the wrong values to one or more parameters.
In the previous article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, we took a look at tuning websphere security. In this article we will be presented by a set of some conditions that may appear in a WebSphere Application Server ND version 7 (WAS ND7) when global security is first enabled. The first subsection covers circumstances that may come about during the configuration phase. Next, a subsection is included that presents circumstances that may happen at runtime.Read Troubleshooting WebSphere Security-related Issues in full
Routing gives an insight into troubleshooting routing problems when setting up a VPN using OpenVPN. You will learn how to detect, diagnose, and repair common routing issues.
In this article by Jan Just Keijser, author of OpenVPN 2 Cookbook, we will cover:
- Cipher mismatches
- TUN versus TAP mismatches
- Compression mismatches
- Key mismatches
- Troubleshooting MTU and tun-mtu issues
- Troubleshooting network connectivity
- Troubleshooting client-config-dir issues
- How to read the OpenVPN log files