In this article by Nirav Mehta,we will learn about Adapting and progressively enhancing POTR application using Wireless Abstraction Library and Evaluating tools that aid in adaption.Read Adapting to User Devices Using Mobile Web Technology in full
In this article by Santosh Sivarajan, author of Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to , we get a brief idea about the details of Active Directory migration prerequisites, schema upgrade procedure, verifying the schema version, and installing the Windows Server 2012 Domain Controller in the existing Windows Server 2008 and Server 2008 R2 domain. We will start with the Active Directory migration.Read Active Directory migration in full
In the previous part of this article by Florian Rommel, we covered Active Directory elements, domain designs, and Lag Replication Site(LRS). In this part, we will cover designing your Active Directory and keeping it up-to-date and safe.Read Active Directory Design Principles: Part 2 in full
In order to design a proper Active Directory infrastructure, knowledge of its workings, and what it is based on, is essential. The basis for Active Directory is the Lightweight Directory Access Protocol (LDAP), which is an X.500 standard (to read more about the X.500 standard please visit: http://en.wikipedia.org/wiki/X.500). LDAP defines that a directory is a tree of entries, with each entry containing a set of attributes. Each entry has a unique identifier and therefore cannot be duplicated. This way everything is an object in an LDAP-based directory.
There are many great books available for Active Directory design and some of them go into great detail. Compressing all this into a single article is just not possible, so in this two-part article by Florian Rommel, we will stick to the basics and a high-level view, instead of too much detail. This will provide a good overview of how to design a proper Active Directory, with different strategies in mind, and tailor it best for your organization.
In the first part, we will cover Active Directory elements, domain designs, and Lag Replication Site(LRS).Read Active Directory Design Principles: Part 1 in full
You have a few options when it comes to themes. You can activate the default BuddyPress theme, install a different compatible theme, or upgrade your existing theme so that it can be used with BuddyPress. It's easiest to keep things simple, so begin with the default BuddyPress theme. Later on, you can change to a new theme after you've finished installing and configuring everything. In this article by Heather R. Wallace, author of the book WordPress 3 Site Blueprints, we'll discuss the BuddyPress Default Theme.Read Activating the BuddyPress Default Theme and Setting up and Configuring BuddyPress in full
This article written by Usama Dar, the author of Nginx Module Extension, is a reference to the standard and optional HTTP modules, their synopsis, directives as well as practical configuration examples.
Read Acting as a proxy (HttpProxyModule) in full
This article by Nuno Mota, the author of the book Microsoft Exchange Server 2013 High Availability, describes site resilience for the Mailbox server by covering the following topics:
- Scenario 1 – active/passive
- Scenario 2 – active/active
- Scenario 3 – third datacenter
- Using Datacenter Activation Coordination (DAC)
- Deciding where to place witness servers
Stanbol describes the annotations on the data it extracts using the Resource Description Format (RDF). RDF is a standard that provides the highly generic and flexible data model, which is the foundation for the Semantic Web.
In this article by Reto Bachmann-Gmür, the author of Instant Apache Stanbol [Instant], will read the data returned by Stanbol as RDF and store and query this data.Read Accessing and using the RDF data in Stanbol in full
In Part 1, we had a look at the Discussion and Considerations of highly flexible role-based access control system (RBAC). In this part of the article by Martin Brampton, we will look at the database implementation. Also we will discuss the code for administering RBAC, and consider in outline how questions about access can be answered.Read Access Control in PHP5 CMS - Part 2 in full
Many websites will want to control who has access to what. Once embarked on this route, it turns out there are many situations where access control is appropriate, and they can easily become very complex. So in this two part article by Martin Brampton, we look at the most highly regarded model–role-based access control (RBAC)–and find ways to implement it. The aim is to achieve a flexible and efficient implementation that can be exploited by increasingly sophisticated software. To show what is going on, the example of a file repository extension is used.Read Access Control in PHP5 CMS - Part 1 in full
In this article, by Rawane Madi, the author of Learning Software Testing with Test Studio, discusses some of the reasons why you would want to achieve software quality. The reasons are to make sure that the system does what it's supposed to do, uncover errors and/or to provide assurance for your software user. This article will explore some general terminologies and processes in software testing and briefly introduce the tool automation features.Read About Test Studio in full
This article by Nishant Neeraj, author of Mastering Apache Cassandra, will describe Cassandra to be distributed, decentralized, fault tolerant, eventually consistent, linearly scalable, and a column-oriented data store. This means Cassandra is made to easily deploy over a cluster of machines located at geographically different places. There is no central master server, so no single point of failure, no bottleneck, data is replicated, and a faulty node can be replaced without any downtime. It's eventually consistent. It is linearly scalable, which means with a greater number of nodes, the requests served per second per node would not go down. Also, the total throughput of the system will increase with each node being added. And finally, it's column oriented, much like a map (or better, a map of sorted maps) or a table with flexible columns where each column is essentially a key-value pair. So, you can add columns as you go, and each row can have a different set of columns (key-value pairs). It does not provide any relational integrity. It is up to the application developer to perform relation management.Read About Cassandra in full
In this article by Eric Rochester, author of Mastering Clojure Data Analysis, we will learn to define, conduct, and analyze A/B testingRead A/B Testing – Statistical Experiments for the Web in full
This article by Wasim Ahmed, the author of the book Mastering Proxmox, covers advanced virtual machine configurations such as enabling sound, USB devices, and so on.
In this article, we are going to look at the following topics:
- Advanced configuration options for virtual machines
- Nested virtual environment
- Proxmox backup/restore system
- Virtual machine snapshots
- Command-line backup
In this article by Fazreil Amreen author of Instant GIMP Starter [Instant],Let's take a tour around GIMP for a start. This tour will give you an exposure to basic tasks to do with GIMP. Along the way, we will introduced to the GIMP conceptual idea that makes it different than some of the other image manipulation programs.Read A Tour Around GIMP in full
This article by Dr. Jayaram Krishnaswamy teaches how you may create a .NET Compact Framework (CF) 2.0 forms application. This can be used with Pocket PC 2003, or later devices. In the absence of a device being available for testing, the emulator is the next best thing. The application will be tested on one of the many emulators available in Visual Studio 2005. You may try other devices as well just by choosing the item in the Device Emulation Manager described in the article.Read A Simple Pocket PC Application using Visual Studio 2005 in full