In this article by Aaron Winborn, we will see how to add third-party video on a site. This article talks about the advantages of third-party video hosting and how it can be achieved on websites by using Drupal. Its also gives a proper insight about the Third-Party Video providers and Embedded Media Field, which helps in hosting video from our own server.Read Third-Party Video Hosting on Drupal Websites in full
Active Directory (AD) failure, which includes corruption, is something that is dreaded by any administrator. Simply put, it means that the directory service can no longer read the Active Directory database that it has locally. This will prevent logon and authentication as well as any directory-dependent services. Essentially, it renders the domain controller (DC) useless. What's worse, though, is that several times, the replication keeps going so that the corrupted database spreads out to the other DCs.
In this article by Florian Rommel, we will look at the different options and approaches available to recover a DC that has a database corruption. In addition, this article outlines, symptoms, causes, and solutions for this scenario.Read How to Recover from an Active Directory Failure in full
So far, the general approach towards SOA has been that it is just a tidying-up of application integration. SOA, according to this approach, is not about building new a business functionality but about organizing existing systems. In this article by Michael Havey, we will see that, in reality, SOA is more than merely getting organized. Its principal mandate is to build something new; indeed, SOA is fundamentally about building new processes. We will consider an approach to SOA architecture that is, yes, methodical, but has the burden of actually designing new and challenging orchestration and ESB processes.
In this article, we will build examples of choreography and orchestration, study best practices for message handling in orchestration processes, and develop fundamental orchestration concepts, such as interaction, invisible hub, and deferred choice.Read Modeling Orchestration and Choreography in Service Oriented Architecture in full
In this article by Alex Buchner, you would learn how to customize the front page of your Moodle site. Before taking an insight into this, let's first take a general overview of Moodle's look and feel elements.Read Front Page Customization in Moodle in full
In this article by Ankur Shah, you will see how to manage multiple printers at a time. Unlike other printing systems, CUPS features a way to let you select a group of printers to print a job instead of selecting just one. In that way, if one printer is busy or down, another printer can be automatically selected to perform the job. Such groupings of printers are called printer classes.Read CUPS: How to Manage Multiple Printers in full
Security is a wide ranging topic which operates on many levels and covers many technologies. The technologies involved include networks, operating systems, database systems, and application servers as well as manual procedures.
Application level security in the context of Java EE applications is provided by web and EJB containers. This article by Michael Sikora will be mostly concerned with EJB container security. However, as EJBs are often invoked from the web-tier we will take a brief look at web container security later in this article.
We will cover the following topics:
- Java EE container security
The aim of this article by Javier Collado is to show how tasks may be automated using Python together with STAF (Software Testing Automation Framework) by means of an example. We will first see a problem and then derive its solution using classical Python-only as well as Python+STAF. The implementation of the solution will evolve in different stages. This will help us in comparing both the solution in terms of simplicity and efficiency.Read Automation with Python and STAF/STAX in full
This article by Tarek Ziadé focuses on a repeatable process to write and release Python packages. We will focus on how to install, uninstall, develop, test, register, and upload a package.Read Writing a Package in Python in full
The re-architecture approach reduces the mainframe costs and legacy risks by migrating the application off the mainframe and re-structuring it using all the modern software tools and capabilities at our disposal. However, this very process of re-structuring the application, and essentially re-building it using knowledge and business rules mined from existing code, introduces certain risks. How can we ensure that the new application maintains functional equivalence, and operational characteristics of the original? Can we meet the performance and scalability requirements not only of the current environment, but future growth needs as well? Can we deliver the new application within the time and budget constraints agreed to at the beginning of the project? The older the application, the larger its scope and volume of code, and the fewer original developers available, the higher these risks may be.
This article by Jason Williamson, Tom Laszewski and Mark Rakhmilevich, takes a look at an alternative approach that attempts to balance these risks in a different way. Re-host-based modernization approach is focused on migrating the application off the mainframe to a compatible software stack on an open-systems platform, preserving the language and middleware services on which the application has been built. It protects legacy investment by relying on a mainframe-compatible software stack to minimize any changes in the core application, and preserve the application's business logic intact, while running it on an open-system platform using more flexible and less expensive system infrastructure. It keeps open the customer's options for SOA enablement and re-architecture, by using an SOA-ready middleware stack to support Web services and ESB interfaces for re-hosted components. And using an extensible platform with transparent integration to J2EE components, BPM-based processes, and other key tools of the re-architecture approach means you can start to re-architect selected components at will, without requiring changes to the re-hosted services running the remainder of the business logic.Read Introduction to Re-Host based Modernization Using Tuxedo in full
Joomla!, a very popular content management system (CMS) is as you may know an easy-to-deploy-and-use content management system. This ease of use has lent itself to rapid growth of both the CMS and extensions for it. You can install it on almost any host, running Linux or Windows. This highly versatile software has found itself in such lofty places as large corporate web portals, and humble places such as the simple blog.
Joomla! itself is inherently safe, but misconfigurations of the CMS, vulnerable components, hosts that are poorly configured, and weak passwords can all contribute to the downfall of your site. Hence, it's always better to ensure the security of your site.
In this article by Tom Canavan, we will take a look at how SQL injection attacks can occur to your Joomla website, how we can test for SQL injection attacks, and how to stop SQL injection.
Read Preventing SQL Injection Attacks on your Joomla Websites in full
There are various types of Content Management Systems (CMS) which are widely used for building and managing a website. Although Zen Cart is very good for running an online shop, it cannot be used for building a company website. Your organization may have a website running a CMS, and as you are going to open an online shop, you may need to integrate Zen Cart with that existing CMS. In this article by Suhreed Sarkar, we will see how we can integrate Zen Cart with some of the existing Content Management SystemsRead Integrating Zen Cart with Content Management Systems in full
When query results exceed the display area then you resort to scrolling and wish you had some way to limit the number of results displayed and comfortable to view without scrolling. Paging functionality which provides an answer to this is therefore a much desired feature. The Data Pager Control in Visual Studio 2008 provides this functionality when you create an ASP.NET web form under .NET Framework 3.5. It can be configured automatically using the GUI, or it can be installed manually after installing the ListView. In this article both of them are described. While the number of items displayed in a list can be declaratively coded, it is possible to set it at page load time as well.
This article by Dr. Jayaram Krishnaswamy describes how you may connect to SQL Server 2008 and display the retrieved data in a ListView Control on a web page. The ListView Control is the only control in ASP.NET that supports the new ASP.NET control, the Data Pager Control. This article shows how the data from a table in SQL Server 2008 is displayed in the ListView and how the Data Pager is configured to cycle the List View items.Read Using the Data Pager Control in Visual Studio 2008 in full
ExpressionEngine comes with a built-in photo gallery module included as part of the purchase fee. With the prevalence of digital cameras, having a place to upload and share photos on your website is a great feature of ExpressionEngine. In this article by Leonard Murphy we will:
- Install the photo gallery module
- Design our photo gallery to fit in with the design of the rest of our site
- Make it easy to upload new photos, add comments and descriptions, and otherwise create a very functional gallery
On our website, we can have multiple photo galleries independent of each other (the photos are in a different folder; the gallery has a different URL) or we can have one gallery for all our photos, using categories to distinguish groups of related photos.
For the purposes of this article we are going to create only one photo gallery, but if desired the same principles can be followed again to create multiple galleries.
To keep our photo gallery visually interesting, we will be straying just slightly from our toast website theme, and will not be using our photo gallery to display slices of toast.
Let's get started!
A database must always be ACID (Atomicity, Consistency, Isolation, and Durability) compliant. Databases comply with ACID requirements through the concept of transactions. In this article by Jonathan Gardner, we will see the differences in the transaction model of PostgreSQL and Oracle. We will look into the details of how PostgreSQL handles transactions and how it can be advantageous over Oracle's Transaction Model.Read PostgreSQL's Transaction Model in full