In this article by Christer Edwards, you'll learn a number of different ways to upgrade an existing Ubuntu installation. Whether it is a Desktop, Laptop or Server, you'll find instructions below. These methods have been tested by volunteers around the world and should prove to be simple and problem free for you as well.Read Ubuntu 9.10: How To Upgrade in full
In this article by Dan Osipov, we will see how external services specifically Flickr and YouTube, can be leveraged to expand the system. We pull in files from YouTube and Flickr.Read TYPO3 for Connecting External APIs: Flicker and Youtube in full
Microsoft Dynamics AX 2012 already provides a number of services out-of-the-box. These services together with additional services that can be developed can be divided into three types. Each of the service types has its own characteristics and a different approach to create them.
This article by Klaas Deforche and Kenny Saelen authors of Microsoft Dynamics AX 2012 Services discusses about these services in detail.Read Types of services in Microsoft Dynamics AX 2012 in full
Your application and its database certainly deal with things of significance to your organization that you care to computerize, automate some of their aspects, and to store data about them. Product and services are examples of these things—the fundamental aspects that any organization must take care of.
This article by Djoni Darmawikarta introduces three patterns for modeling: Type, Subtype, and Category. These three logical data modeling patterns are common structures applicable to any kind of organization.Read Type, Subtype, and Category Patterns in Logical Data Modeling in full
Here at Packt, we've decided to do something quite funky. Rather than paying for a book, we figured, 'why not just ask for a tweet instead?'
So, hit the 'Pay with a tweet' button above, and we’ll give you a code that entitles you to a FREE eBook from our LITE series. Any LITE book you like. Want to know more about Oracle Database Utilities? How about a bit of Unity game development? It's up to you!
Moving to Prezi doesn't have to mean abandoning all the hard work you've put into perfecting your PowerPoint slides. That work is still useful, as you can import your PowerPoint into Prezi. This is a good starting point as it allows you to rework your familiar content.
This article by Domi Sinclair, author of Instant Prezi for Education How-to takes you through the steps to creating more engaging presentations using Prezi.Read Turning your PowerPoint presentation into a Prezi in full
The generic term "tuning security … " some say, it's an oxymoron. Why so? Well, in many cases, tightening up security is normally reflected in poor performance. So, if a portion of your environment is performing poorly, it may need a review of the security configuration in order to see if loosening it a bit does not compromise the environment itself. This article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, briefly describes tuning in three major areas:
- General security configuration
- CSIv2 connectivity
- LDAP and Web authentication
In this article, written by Hrishikesh Vijay Karambelkar, the author of the book Scaling Apache Solr, we will learn about Apache Solr which runs on the underlying JVM in the J2EE container. While scaling Solr for processing more requests and indexing data, it becomes important that the underlying JVM is capable of scaling and is optimized well. Choosing the right JVM is an important factor. There are many JVMs available in the market today that can be considered such as Oracle Java HotSpot, BEA JRockit, and Open JDK (the list is available at http://en.wikipedia.org/wiki/List_of_Java_virtual_machines).Read Tuning Solr JVM and Container in full
The performance of any application running on the application server is the result of a complex interaction of many aspects. In this article, we have shown some of the most important factors that influence the performance of the application server and ultimately of the applications running on the top of it.
Performance tuning is not, however, a one-time task, but a continuous activity that needs to be performed at various stages in the software production process. Once you have learnt how to carry out the tuning strategies on the application server main components (in particular, the server pools configured in it, the logging policies, and data caching) and the JVM environment, then JBoss AS 7 can provide superior application performance and add important value to your business.Read Tuning jBoss AS 7 Performance in full
If you have a working phone system with extensions, voicemail, digital receptionists, call queues, and several other features and you want to call home or have a customer call you, what will you do? For that, you need to connect 3CX outside your internal network. This connection is called as trunk. In this article by Matthew M. Landis and Robert Lloyd, authors of The 3CX IP PBX Tutorial, we will cover:
- PSTN trunks
- SIP trunks
- Introduction to dial plans
- Hardware needed for analog lines
In this article by Alex Robar, we will learn about trunks in FreePBX. We will discuss the following:
- Various types of trunks allowed by FreePBX
- Methods for setting up each type of trunk
This article by Richard J. Reese, author of the book Troux Enterprise Architecture Solutions, explores an aspect of Enterprise Architecture that is not written about a great deal. There are as many models for running the EA function as there are opinions about the topic. This article provides a brief introduction to the following topics:
- Setting the EA charter
- Staffing the function
- Sample job descriptions
- Management metrics
These topics are provided as representative samples of how the EA function can be managed within a business or agency. There is no "best way" to organize the EA function. There are, however, some management principles that have worked well for many organizations, and these are presented next.Read Troux Enterprise Architecture: Managing the EA function in full
In a typical business flow in BAM, business data moves from various upstream data sources to Oracle BAM, which internally processes and pushes the data to IE browsers for report rendering. As different technologies and BAM Server components are involved, it could be time-consuming and challenging to identify and solve the problem if anything goes wrong in this flow.
In this article by Pete Wang , author of Oracle BAM 11gR1 Handbook, we will cover:
- Methodologies for troubleshooting Oracle BAM
- Troubleshooting Active Data processing
- Troubleshooting BAM HA issues
It is not uncommon to run into issues when global security is first enabled in a WebSphere environment. Some of those situations may occur due to performing tasks out of order. Other problematic conditions related to security configuration may take place due to inadvertently omitting one or more steps in a set up process. Moreover, a third category of errors that may happen due to security configuration is caused by using the wrong values to one or more parameters.
In the previous article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, we took a look at tuning websphere security. In this article we will be presented by a set of some conditions that may appear in a WebSphere Application Server ND version 7 (WAS ND7) when global security is first enabled. The first subsection covers circumstances that may come about during the configuration phase. Next, a subsection is included that presents circumstances that may happen at runtime.Read Troubleshooting WebSphere Security-related Issues in full
Routing gives an insight into troubleshooting routing problems when setting up a VPN using OpenVPN. You will learn how to detect, diagnose, and repair common routing issues.
In this article by Jan Just Keijser, author of OpenVPN 2 Cookbook, we will cover:
- Cipher mismatches
- TUN versus TAP mismatches
- Compression mismatches
- Key mismatches
- Troubleshooting MTU and tun-mtu issues
- Troubleshooting network connectivity
- Troubleshooting client-config-dir issues
- How to read the OpenVPN log files
In this article by Wojciech Kocjan, we will learn about troubleshooting Nagios 3.0 which includes troubleshooting the web interface, passive checks, SSH-Based checks, and NRPE.The article includes various possible errors along with their solutions and detailed explanations for each error listed out.Read Troubleshooting Nagios 3.0 in full
Troubleshooting the problems are always a part of any system. In this article by Dick McCarrick, Stephen Cooke, Timothy Speed, and Raphael Savir, we will see how to identify and correct problems in our Lotus Notes/Domino 7 applications. This article includes troubleshooting issues that affect performance and also talks about Domino Domain Monitoring (DDM) and what it can do in terms of troubleshooting applications. A brief overview of Agent Profiler is given at the end of this article.Read Troubleshooting Lotus Notes/Domino 7 applications in full
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today
In this article by Kevin Jackson, author of OpenStack Cloud Computing Cookbook, we will cover:
- Checking OpenStack Compute Services
- Understanding logging
- Troubleshooting OpenStack Compute Services
- Troubleshooting OpenStack Storage Service
- Troubleshooting OpenStack Authentication