Enterprise Articles

EJB 3.1: Controlling Security Programmatically Using JAAS

by Richard M. Reese | June 2011 | Cookbooks Enterprise Articles Java

This article by Richard Reese, author of EJB 3.1 Cookbook, covers programmatic EJB security based upon the Java Authentication and Authorization Service (JAAS) API. It should be used when declarative annotation is not adequate to affect the level of security desired. This can occur when access is time-based. For example, a user may only be allowed to access certain services during normal business hours such as when the stock market is open.

Read EJB 3.1: Controlling Security Programmatically Using JAAS in full

Designing a XenApp 6 Farm

by Guillermo Musumeci | June 2011 | Enterprise Articles

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure applications quickly to thousands of users.

The most important step before any Citrix deployment is to understand the features of the product and design the architecture before the servers are set up.

In this article by Guillermo Musumeci, author of Getting Started with Citrix XenApp 6, we will cover the following topics:

  • Learning Citrix farm terminology and concepts
  • Designing a basic XenApp architecture
  • Designing a basic pilot plan
  • Creating a list of applications to publish in our Citrix farm
  • Reviewing a list of applications and deciding the best method to deliver them
Read Designing a XenApp 6 Farm in full

Hands-on Tutorial on EJB 3.1 Security

by Richard M. Reese | June 2011 | Cookbooks Enterprise Articles Java

This article by Richard Reese, author of EJB 3.1 Cookbook, covers the process of handling security using annotations. The relationship between the support provided by the server and the roles used by an application is also examined. By the end of this article we will be:

  • Creating the SecurityApplication
  • Configuring the server to handle security
  • Understanding and declaring roles
  • Controlling security using declarations
  • Propagating identity
Read Hands-on Tutorial on EJB 3.1 Security in full

Customization using ADF Meta Data Services

by | June 2011 | Enterprise Articles Oracle

You know that you can change the way your application looks—and that you can deploy the same application to different users with different visual appearance. But your boss at DMC Solutions would like to be able to sell the XDM application to different customers, offering each of them a slightly different functionality.

Fortunately, ADF makes that easy through a feature known as customization.

This article by Sten E. Vesterli, author of Oracle ADF Enterprise Application Development—Made Simple, explains how to set up an application for customization using ADF Meta Data Services and how to use the special JDeveloper "customization" role to perform the actual customization.

Read Customization using ADF Meta Data Services in full

Securing your JIRA 4

by Patrick Li | June 2011 | Enterprise Articles Java

As an information system, JIRA is all about data. It should come as no surprise to you that security plays a big role in JIRA not only to ensure that only the right people get access to the data, but also to maintain data integrity by preventing accidental changes.

By the end of the article by Patrick Li, author of JIRA 4 Essentials, you will have learned:

  • How to utilize user management features in JIRA
  • About JIRA's permission hierarchy
  • About general access control in JIRA
  • How to manage fine-grained permission settings
Read Securing your JIRA 4 in full

The ADF Proof of Concept

by Sten E. Vesterli | June 2011 | Enterprise Articles Oracle

Your organization has decided that ADF might be the right tool to build your next enterprise application—now you need to set up an experiment to prove that your assumption is correct.

In this article by Sten E. Vesterli, author of Oracle ADF Enterprise Application Development—Made Simple, we will see what a Proof of Concept is, and why we need it. We will also take a look at the ADF architecture.

Read The ADF Proof of Concept in full

Getting Started with Microsoft SQL Server 2008 R2

by Satya Shyam K Jayanty | June 2011 | Cookbooks Enterprise Articles Microsoft

This article by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, begins with SQL Server 2008 R2 version's new features and enhancements such as master data services, data-tier applications, and adding the service pack features using Slipstream technology. We will run through the designing best practice approach in upgrading to SQL Server 2008 R2 and take advantage of federated servers enhancements.

In this article, we will cover:

  • Adding SQL Server R2 Service Pack features using Slipstream Technology
  • Designing a best practice approach in upgrading to SQL Server 2008 R2
  • Working with Data-Tier applications
  • Designing and adopting SQL Server 2008 R2 solutions
  • Designing applications to use federated servers
Read Getting Started with Microsoft SQL Server 2008 R2 in full

How to Build a RSS Reader for Windows Phone 7

by Todd Spatafore | June 2011 | Enterprise Articles Microsoft

This article will introduce programming Windows Phone 7 applications. We will use RSS feeds that are provided from lists in SharePoint to display information to the Windows Phone 7 user. Throughout the article, we will build a simple RSS Reader application for Windows Phone 7 and add complexity to it as we go along.

In this article by Todd Spatafore, author of Microsoft SharePoint 2010 Enterprise Applications on Windows Phone 7, we will cover the following:

  • Security in SharePoint 2010
  • Using WebClient to get data from the web
  • RSS feeds available from SharePoint
  • Parsing XML in Windows Phone 7
Read How to Build a RSS Reader for Windows Phone 7 in full

Working with User Defined Values in SAP Business One

by Gordon Du | June 2011 | Enterprise Articles SAP

The User-Defined Values function enables SAP Business One users to enter values, originated by a predefined search process, for any field in the system (including user-defined fields). This function enables the user to enter data more efficiently and – perhaps most importantly – more accurately. In fact, the concept is sort of a "Workflow Light" implementation. It can both save user time and reduce data double entries.

In this article by Gordon Du, author of Mastering SQL Queries for SAP Business One, we will see how to work with User-Defined Values.

Read Working with User Defined Values in SAP Business One in full

Customizing SharePoint Communities for Windows Phone 7

by Todd Spatafore | June 2011 | Enterprise Articles Microsoft

SharePoint is a powerful enterprise content management system. It has an impressive ability to bend to the needs of just about any use case imaginable in an enterprise. That list of use cases also includes several social aspects. When employees are sharing information across multiple departments, it can make a 90,000 employee enterprise feel like a 100 person small company.

This article focuses on customizing the SharePoint communities for use on Windows Phone 7. We will investigate the web-based output of the communities, and customize this output using Visual Studio 2010. This article by Todd Spatafore, author of Microsoft SharePoint 2010 Enterprise Applications on Windows Phone 7, will cover the following topics:

  • Blogs
  • Wiki
Read Customizing SharePoint Communities for Windows Phone 7 in full
Syndicate content
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software