NNMi provides a list of URLs that can be used for accessing most NNMi console objects. This standardized list of URLs and their syntax helps us build the right URL, in order to get the right data object integrated in our selected third-party application.
In this article by Marius Vilemaitis, author of HP Network Node Manager 9: Getting Started, we will cover:
- Generic URLs.
- Workspace-related URLs.
- Form-related URLs.
- Menu item-related URLs.
Software testing is one of the most important phases of the Software Development Life Cycle (SDLC). The delivery of the end product is based on better design, better coding, better testing, and meeting the requirements. The quality of the product is measured by testing the product based on functional and non-functional requirements with the help of testing tools and techniques. The tools are useful in simulating a real life situation and the user load. For example, testing a web application with more than 1000 user load is a very time consuming and tedious task if we do it manually. But the performance testing tool that comes along with Visual Studio 2010 can simulate this scenario and test it in a very short period of time. Visual Studio 2010 provides additional tools for testing all type of applications and scenarios such as Unit testing, Load Testing, Web testing, Ordered testing, and generic testing.
This article by Satheesh Kumar N and Subashni S, authors of Software Testing using Visual Studio Team System 2010, provides a high level overview on all the testing tools and techniques supported by Visual Studio 2010. This article covers the following topics:
- Testing as part of the software development life cycle
- Types of Testing
- Test Management in Visual Studio 2010
- Testing Tools in Visual Studio 2010
Read Packt Enterprise Special $9.99 eBook Offer in full
In this article by Marcel van der Plas and Michel van Zoest, authors of the book Oracle APEX 4.0 Cookbook, we will cover:
- Creating an item type plug-in
- Creating a region type plug-in
- Creating a dynamic action plug-in
- Creating a process type plug-in
Microsoft SQL Server Integration Services 2008 (SSIS) is a full service Extract, Transform, and Load (ETL) program tightly integrated with SQL Server 2008 with a Rapid Application Development (RAD) user interface. Microsoft SQL Server Reporting Services 2008(SSRS) is a third generation reporting program that is also tightly integrated with SQL Server 2008, which hosts the Report Server providing full support with a web service frontend for a variety of reporting needs—from web-based reporting to embedded reporting.
In this article by Jayaram Krishnaswamy, author of Microsoft SQL Azure Enterprise Application Development, we will be leveraging SSIS, SSRS, and the tools used to address ETL processes, and Report authoring with SQL Azure as the source of data. We will be looking at the following data-related items in some detail:
- Moving a MySQL database to SQL Azure database
- Creating a report using SQL Azure as data source
- Accessing SQL Azure from Report Builder 3.0
|During 2010 Packt Publishing really excelled with its range of Oracle books - cementing our reputation as a leading publisher for Oracle Professionals. Packt has produced a multitude of bestsellers - and not only did we exceed in terms of quantity, but in quality, with each book released receiving a plethora of positive reviews. In 2011 Packt hope to continue this success, with over 20 new book titles currently planned for publication in a range of subjects - to receive notifications for new Oracle books are published, simply sign-up to the Packt Enterprise Newsletter via your Packt Publishing Account. Books already outlined for publication in 2011 include:|
In the previous article, Microsoft Enterprise Library: Security Application Block, we saw an overview of the Security Application block in Microsoft Enterprise Library.
In this article by Sachin Joshi, author of Microsoft Enterprise Library 5.0, you will:
- Be introduced to Authorization Providers such as Authorization Rule Provider and AzMan Authorization Provider
- Be introduced to the Security Cache Provider
- Learn to save user Identity in cache and obtain a temporary token for an Authenticated User
- Learn to retrieve a token from cache and authenticate user
- Learn to terminate a User session by expiring cached identity
- Learn to implement a custom authorization provider
Security is of prime importance for any application, especially enterprise applications where the business impact is potentially high. At the very core, security is a two step mechanism.
In this article by Sachin Joshi, author of Microsoft Enterprise Library 5.0, you will be introduced to the Security Application Block.Read Microsoft Enterprise Library: Security Application Block in full