In this article by Alexandru Serban, let's take a more realistic software development scenario. What I am going to build is a room-reservation system for the newly launched Orbital Hotel. As you well know, this is the very first space building, after the International Space Station, used for tourism, allowing people to enjoy a view of our blue planet and stars from their private rooms. OK, OK, the Orbital Hotel doesn't yet exist, but when it does, it must have a room reservation system anyway. Who knows, it might be this one.Read Visual SourceSafe:Creating a Service-Oriented Application in full
We should set up a user name for each person who will be using Zenoss, and all the users should log in using their user account, not as the admin user. Individual users can be granted the same privileges as the admin account. The security of the user accounts is important. Various roles and groups can be assigned to a user. In this article by Michael Badger, the following is discussed:
- How to add new users and edit the properties of their user accounts
- The various available roles and their privileges
- Administered objects such as devices and systems
- Creating and editing custom event views
- Attaching alerts to users or groups of users
- Creating alert escalations
- Customizing alert messages
- Setting a schedule for each alerting rule
- Adding and editing groups and assigning users to groups
"Technorati recently published its annual report, State of the Blogosphere 2008. As usual, it makes interesting reading, especially for those of us interested in business blogging.
The report shows that Technorati has indexed 133 million blogs since 2002. 1.5 million blogs have been updated in the last 7 days and 7.4 million in the last 120 days. These figures support my argument in the first chapter of my book, WordPress For Business Bloggers, that business bloggers should not be put off by the total number of blogs out there because, in fact, only a small proportion are active."Read Business Blogging On The Up - Technorati State of the Blogosphere 2008 in full
DWR (Direct Web Remoting), is an Open Source Java framework, licensed under commercial-friendly Apache Software License v2 for building AJAX applications. DWR's main idea is to hide AJAX implementation details such as XMLHttpRequest from developers. Developers can concentrate on developing the application and business objects and leave AJAX details behind the scenes where they belong.
In this article by Sami Salkosuo, we discuss a Chatroom application which demonstrates the use of DWR. The Chatroom sample application is a very typical multi-user chatroom. The functionalities of this sample include a list of online users, automatic refresh of chat text, and the ability to send messages to the chat room.Read Chatroom Application using DWR Java Framework in full
MySQL introduced cursor in its release 5. You create a cursor to define a set of rows from one or more table that you want to access row-by-row sequentially. If your need is really to access the rows one at a time then use cursor. But a lot of data processing is actually set processing, and set processing is what relational database is best for.
This article by Djoni Darmawikarta compares cursor approach and set approach using various examples.Read Comparing Cursor and Set Approaches in Processing Relational Data in full