Latest Articles

PostgreSQL's Transaction Model

by Jonathan Gardner | September 2008 | MySQL PHP

A database must always be ACID (Atomicity, Consistency, Isolation, and Durability) compliant. Databases comply with ACID requirements through the concept of transactions. In this article by Jonathan Gardner, we will see the differences in the transaction model of PostgreSQL and Oracle. We will look into the details of how PostgreSQL handles transactions and how it can be advantageous over Oracle's Transaction Model.

Read PostgreSQL's Transaction Model in full

Business Process Modeling

by Kapil Pant | August 2008 | BPEL SOA Web Services Oracle

A business process is a set of coordinated activities that are performed either by humans or by tools with an objective to realize a certain business result. The order of these activities and the efficiency of those who perform the activities determine the overall performance of a business process. It is very much in the interest of every company to have business processes that are efficient and include only necessary activities, because this will allow them to work faster and more efficiently. In this article by Matjaz B. Juric and Kapil Pant, we will look at business process modeling, the main objective of which is to develop a process model that defines the existing process flow in detail.

Read Business Process Modeling in full

Oracle Web Services Manager: Authentication and Authorization

by Sitaraman Lakshminarayanan | August 2008 | BPEL SOA Web Services Oracle

The first step in protecting web services is to authenticate and authorize the web service requests. Authentication in web services is the process of verifying that the user has valid credentials to access the web services and authorization is the process of validating that the authenticated user has appropriate privileges to access the web services. Besides restricting access to users with valid credentials and proper privileges, Oracle WSM can track who accessed which service and when—to provide detailed audit trails. In this article, Sitaraman Lakshminarayanan explores how Oracle Web Services Manager can be leveraged to authenticate and authorize the web services requests.

Read Oracle Web Services Manager: Authentication and Authorization in full

Application Development in Visual C++ - The Tetris Application

by Stefan Björnander | August 2008 | .NET Microsoft

Tetris is a classic game. In this article by Stefan Björnander, we will develop a version very similar to the original version. Seven figures of different shapes and colors fall down and the player's job is to move and rotate them into positions so that as many rows as possible are completely filled. When a row is filled, it disappears. Every removed row gives one point.

Read Application Development in Visual C++ - The Tetris Application in full

Search Engines in ColdFusion

by John Farrar | August 2008 | AJAX Web Development

Knowing where something isn't can be almost as valuable as knowing where something is. If it isn't there, then the time and resources aren't wasted looking in the wrong place. We need to make sure that we have a broad base of methods to manage our future search capabilities. In this article by John Farrar, we will be discussing about the built-in search engine and the custom search engines (Google) in ColdFusion.

Read Search Engines in ColdFusion in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software