Article Network

Ubuntu 9.10: How To Upgrade

by Christer Edwards | November 2009 | Linux Servers Open Source

In this article by Christer Edwards, you'll learn a number of different ways to upgrade an existing Ubuntu installation. Whether it is a Desktop, Laptop or Server, you'll find instructions below. These methods have been tested by volunteers around the world and should prove to be simple and problem free for you as well.

Read Ubuntu 9.10: How To Upgrade in full

TYPO3 for Connecting External APIs: Flicker and Youtube

by Dan Osipov | January 2010 | MySQL Content Management Open Source PHP

In this article by Dan Osipov, we will see how external services specifically Flickr and YouTube, can be leveraged to expand the system. We pull in files from YouTube and Flickr.

Read TYPO3 for Connecting External APIs: Flicker and Youtube in full

Types of services in Microsoft Dynamics AX 2012

by Kenny Saelen Klaas Deforche | February 2013 | Enterprise Articles Microsoft

Microsoft Dynamics AX 2012 already provides a number of services out-of-the-box. These services together with additional services that can be developed can be divided into three types. Each of the service types has its own characteristics and a different approach to create them.

This article by Klaas Deforche and Kenny Saelen authors of Microsoft Dynamics AX 2012 Services discusses about these services in detail.

Read Types of services in Microsoft Dynamics AX 2012 in full

Type, Subtype, and Category Patterns in Logical Data Modeling

by Djoni Darmawikarta | December 2008 | Architecture & Analysis

Your application and its database certainly deal with things of significance to your organization that you care to computerize, automate some of their aspects, and to store data about them. Product and services are examples of these things—the fundamental aspects that any organization must take care of.

This article by Djoni Darmawikarta introduces three patterns for modeling: Type, Subtype, and Category. These three logical data modeling patterns are common structures applicable to any kind of organization.

Read Type, Subtype, and Category Patterns in Logical Data Modeling in full

Tweet for your free LITE eBook

by | January 2012 | Enterprise Articles Open Source

Here at Packt, we've decided to do something quite funky. Rather than paying for a book, we figured, 'why not just ask for a tweet instead?'

So, hit the 'Pay with a tweet' button above, and we’ll give you a code that entitles you to a FREE eBook from our LITE series. Any LITE book you like. Want to know more about Oracle Database Utilities? How about a bit of Unity game development? It's up to you!

 

Read Tweet for your free LITE eBook in full

Turning your PowerPoint presentation into a Prezi

by Domi Sinclair | April 2013 | e-Learning Open Source

Moving to Prezi doesn't have to mean abandoning all the hard work you've put into perfecting your PowerPoint slides. That work is still useful, as you can import your PowerPoint into Prezi. This is a good starting point as it allows you to rework your familiar content.

This article by Domi Sinclair, author of Instant Prezi for Education How-to takes you through the steps to creating more engaging presentations using Prezi.

Read Turning your PowerPoint presentation into a Prezi in full

Tuning WebSphere Security

by Omar Siliceo | August 2011 | Enterprise Articles IBM

The generic term "tuning security … " some say, it's an oxymoron. Why so? Well, in many cases, tightening up security is normally reflected in poor performance. So, if a portion of your environment is performing poorly, it may need a review of the security configuration in order to see if loosening it a bit does not compromise the environment itself. This article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, briefly describes tuning in three major areas:

  • General security configuration
  • CSIv2 connectivity
  • LDAP and Web authentication
Read Tuning WebSphere Security in full

Tuning Solr JVM and Container

by Hrishikesh Vijay Karambelkar | July 2014 | Open Source

In this article, written by Hrishikesh Vijay Karambelkar, the author of the book Scaling Apache Solr, we will learn about Apache Solr which runs on the underlying JVM in the J2EE container. While scaling Solr for processing more requests and indexing data, it becomes important that the underlying JVM is capable of scaling and is optimized well. Choosing the right JVM is an important factor. There are many JVMs available in the market today that can be considered such as Oracle Java HotSpot, BEA JRockit, and Open JDK (the list is available at http://en.wikipedia.org/wiki/List_of_Java_virtual_machines).

Read Tuning Solr JVM and Container in full

Trunks using 3CX: Part 2

by Matthew M. Landis Robert Lloyd | February 2010 | Networking & Telephony

Read Part One of Trunks using 3CX here.

Read Trunks using 3CX: Part 2 in full

Trunks using 3CX: Part 1

by Matthew M. Landis Robert Lloyd | February 2010 | Networking & Telephony

If you have a working phone system with extensions, voicemail, digital receptionists, call queues, and several other features and you want to call home or have a customer call you, what will you do? For that, you need to connect 3CX outside your internal network. This connection is called as trunk. In this article by Matthew M. Landis and Robert Lloyd, authors of The 3CX IP PBX Tutorial, we will cover:

  • PSTN trunks
  • SIP trunks
  • Introduction to dial plans
  • Hardware needed for analog lines
Read Trunks using 3CX: Part 1 in full

Trunks in FreePBX 2.5

by Alex Robar | September 2009 | Linux Servers Networking & Telephony Open Source

In this article by Alex Robar, we will learn about trunks in FreePBX. We will discuss the following:

  • Various types of trunks allowed by FreePBX
  • Methods for setting up each type of trunk
Read Trunks in FreePBX 2.5 in full

Troux Enterprise Architecture: Managing the EA function

by Richard J. Reese | August 2010 | Architecture & Analysis Enterprise Articles

This article by Richard J. Reese, author of the book Troux Enterprise Architecture Solutions, explores an aspect of Enterprise Architecture that is not written about a great deal. There are as many models for running the EA function as there are opinions about the topic. This article provides a brief introduction to the following topics:

  • Setting the EA charter
  • Staffing the function
  • Sample job descriptions
  • Management metrics

These topics are provided as representative samples of how the EA function can be managed within a business or agency. There is no "best way" to organize the EA function. There are, however, some management principles that have worked well for many organizations, and these are presented next.

Read Troux Enterprise Architecture: Managing the EA function in full

Troubleshooting your BAM Applications

by Pete Wang | November 2012 | SOA Oracle

In a typical business flow in BAM, business data moves from various upstream data sources to Oracle BAM, which internally processes and pushes the data to IE browsers for report rendering. As different technologies and BAM Server components are involved, it could be time-consuming and challenging to identify and solve the problem if anything goes wrong in this flow.

In this article by Pete Wang , author of Oracle BAM 11gR1 Handbook, we will cover:

  • Methodologies for troubleshooting Oracle BAM
  • Troubleshooting Active Data processing
  • Troubleshooting BAM HA issues
Read Troubleshooting your BAM Applications in full

Troubleshooting WebSphere Security-related Issues

by Omar Siliceo | August 2011 | Enterprise Articles IBM

It is not uncommon to run into issues when global security is first enabled in a WebSphere environment. Some of those situations may occur due to performing tasks out of order. Other problematic conditions related to security configuration may take place due to inadvertently omitting one or more steps in a set up process. Moreover, a third category of errors that may happen due to security configuration is caused by using the wrong values to one or more parameters.

In the previous article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, we took a look at tuning websphere security. In this article we will be presented by a set of some conditions that may appear in a WebSphere Application Server ND version 7 (WAS ND7) when global security is first enabled. The first subsection covers circumstances that may come about during the configuration phase. Next, a subsection is included that presents circumstances that may happen at runtime.

Read Troubleshooting WebSphere Security-related Issues in full

Troubleshooting Storage Contention

by Mike Preston | November 2013 | Enterprise Articles

This article written by Mike Preston, the author of the book Troubleshooting vSphere Storage, identifies storage contention and performance issues.

Read Troubleshooting Storage Contention in full

Troubleshooting OpenVPN 2: Configurations

by Jan Just Keijser | February 2011 | Cookbooks Networking & Telephony Open Source

Routing gives an insight into troubleshooting routing problems when setting up a VPN using OpenVPN. You will learn how to detect, diagnose, and repair common routing issues.

In this article by Jan Just Keijser, author of OpenVPN 2 Cookbook, we will cover:

  • Cipher mismatches
  • TUN versus TAP mismatches
  • Compression mismatches
  • Key mismatches
  • Troubleshooting MTU and tun-mtu issues
  • Troubleshooting network connectivity
  • Troubleshooting client-config-dir issues
  • How to read the OpenVPN log files
Read Troubleshooting OpenVPN 2: Configurations in full

Troubleshooting Nagios 3.0

by Wojciech Bancer | April 2009 | Linux Servers Networking & Telephony Open Source

In this article by Wojciech Kocjan, we will learn about troubleshooting Nagios 3.0 which includes troubleshooting the web interface, passive checks, SSH-Based checks, and NRPE.The article includes various possible errors along with their solutions and detailed explanations for each error listed out.

Read Troubleshooting Nagios 3.0 in full

Troubleshooting Lotus Notes/Domino 7 applications

by Dick McCarrick,Stephen Cooke,Timothy Speed,Raphael Savir | June 2008 | Architecture & Analysis Web Development

Troubleshooting the problems are always a part of any system. In this article by Dick McCarrick, Stephen Cooke, Timothy Speed, and Raphael Savir, we will see how to identify and correct problems in our Lotus Notes/Domino 7 applications. This article includes troubleshooting issues that affect performance and also talks about Domino Domain Monitoring (DDM) and what it can do in terms of troubleshooting applications. A brief overview of Agent Profiler is given at the end of this article.

Read Troubleshooting Lotus Notes/Domino 7 applications in full

Troubleshooting in OpenStack Cloud Computing

by Kevin Jackson | October 2012 | Cookbooks Open Source

OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today

In this article by Kevin Jackson, author of OpenStack Cloud Computing Cookbook, we will cover:

  • Checking OpenStack Compute Services
  • Understanding logging
  • Troubleshooting OpenStack Compute Services
  • Troubleshooting OpenStack Storage Service
  • Troubleshooting OpenStack Authentication
Read Troubleshooting in OpenStack Cloud Computing in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software