In this article by Andre Bogus, we will be focusing on migrating from Apache to Lighttpd web server. Lighttpd is the perfect solution for every server that is suffering load problems, as it has a small memory footprint compared to other web-servers, effective management of the cpu-load, and advanced feature set, such as FastCGI, SCGI, Auth, Output-Compression, URL-Rewriting, and many more. Apache is still the most common web server used today, so while we wait for Lighttpd's world domination, the migration from this server warrants its own article. As this article is on Lighttpd and not on Apache, it assumes some knowledge of the Apache configuration. If anything is unclear, the Apache documentation at http://apache.org/docs/ will be of help.Read Migration from Apache to Lighttpd in full
Resource-Oriented clients are client programs that consume services designed in accordance with the REST architectural principles. The key REST principles include:
- The concept of resource (for example, a document is a resource)
- Every resource given a unique ID (for example, document URL)
- Resources can be related (for example, One document linking to another)
- Use of standard (HTTP, HTML, XML)
- Resources can have multiple forms (for example, status of a document, updated, validated, deleted)
- Communicate in a stateless fashion using HTTP (for example, subsequent requests not related to each other)
In this article by Samisa Abeysinghe, we will study how we can implement clients to consume those services. We will use a real-world example, the simplified library system, to learn from scratch how to design clients with REST principles in mind.Read Resource-Oriented Clients with REST Principles in full
In this article by Dmitry Dulepov, we will discuss why planning an extension is important and how to plan an extension. Planning issues related to web development are covered in depth in many specialized books. Here, we will cover planning only with regard to TYPO3 extensions.Read Planning Extensions in TYPO3 in full
This article by Dr. Jayaram Krishnaswamy teaches how you may create a .NET Compact Framework (CF) 2.0 forms application. This can be used with Pocket PC 2003, or later devices. In the absence of a device being available for testing, the emulator is the next best thing. The application will be tested on one of the many emulators available in Visual Studio 2005. You may try other devices as well just by choosing the item in the Device Emulation Manager described in the article.Read A Simple Pocket PC Application using Visual Studio 2005 in full
- Customizing Google Maps
In this article by Alexandru Serban, let's take a more realistic software development scenario. What I am going to build is a room-reservation system for the newly launched Orbital Hotel. As you well know, this is the very first space building, after the International Space Station, used for tourism, allowing people to enjoy a view of our blue planet and stars from their private rooms. OK, OK, the Orbital Hotel doesn't yet exist, but when it does, it must have a room reservation system anyway. Who knows, it might be this one.Read Visual SourceSafe:Creating a Service-Oriented Application in full
We should set up a user name for each person who will be using Zenoss, and all the users should log in using their user account, not as the admin user. Individual users can be granted the same privileges as the admin account. The security of the user accounts is important. Various roles and groups can be assigned to a user. In this article by Michael Badger, the following is discussed:
- How to add new users and edit the properties of their user accounts
- The various available roles and their privileges
- Administered objects such as devices and systems
- Creating and editing custom event views
- Attaching alerts to users or groups of users
- Creating alert escalations
- Customizing alert messages
- Setting a schedule for each alerting rule
- Adding and editing groups and assigning users to groups
"Technorati recently published its annual report, State of the Blogosphere 2008. As usual, it makes interesting reading, especially for those of us interested in business blogging.
The report shows that Technorati has indexed 133 million blogs since 2002. 1.5 million blogs have been updated in the last 7 days and 7.4 million in the last 120 days. These figures support my argument in the first chapter of my book, WordPress For Business Bloggers, that business bloggers should not be put off by the total number of blogs out there because, in fact, only a small proportion are active."Read Business Blogging On The Up - Technorati State of the Blogosphere 2008 in full
DWR (Direct Web Remoting), is an Open Source Java framework, licensed under commercial-friendly Apache Software License v2 for building AJAX applications. DWR's main idea is to hide AJAX implementation details such as XMLHttpRequest from developers. Developers can concentrate on developing the application and business objects and leave AJAX details behind the scenes where they belong.
In this article by Sami Salkosuo, we discuss a Chatroom application which demonstrates the use of DWR. The Chatroom sample application is a very typical multi-user chatroom. The functionalities of this sample include a list of online users, automatic refresh of chat text, and the ability to send messages to the chat room.Read Chatroom Application using DWR Java Framework in full
MySQL introduced cursor in its release 5. You create a cursor to define a set of rows from one or more table that you want to access row-by-row sequentially. If your need is really to access the rows one at a time then use cursor. But a lot of data processing is actually set processing, and set processing is what relational database is best for.
This article by Djoni Darmawikarta compares cursor approach and set approach using various examples.Read Comparing Cursor and Set Approaches in Processing Relational Data in full
Oracle SQL Developer Tool is a stand alone program that connects to Oracle as well as third-party databases which can be used to perform a variety of tasks from running simple queries to migration of databases from third party vendor products to Oracle. Please review the following articles on the earlier versions 1.1 and 1.2: MS Access Queries with Oracle SQL Developer 1.2 Tool and Migrating MS Access 2003 Data using the Oracle SQL Developer 1.2.
In the present article by Dr. Jayaram Krishnaswamy the latest version of this tool [Oracle SQL Developer 22.214.171.124, IDE Version: 126.96.36.199.22.49. 33] will be described and some details of how to use this tool with SQL Server 2005 will be discussed. While the default installation is ready to connect to Oracle and Access databases the other third-party products such as SQL Server 2005, MySQL and Sybase require additional JDBC drivers. This article describes how you may connect to SQL Server 2005 and SQLExpress servers using the JDBC drivers. The Scratch Editor interface which accepts an SQL Statement from a 3rd party and translates into PL/SQL code is described. This feature was also available in the earlier version.Read Oracle SQL Developer Tool 1.5 with SQL Server 2005 in full
Change is a constant companion in our daily routine. Most of what we do is changing (transforming) one work product into another or revising or updating it. We might be transforming requirements into design, design into a prototype, client brief into a story board, idea into a concept document, creating versions of a banner ad, or updating a project plan to reflect progress; the list goes on. In this introductory article by Gurudutt Talgery we will see how we can bring a change management discipline to our work products or personal – not just software – projects with two simple tools on Linux: Subversion and a GUI front-end called eSvn.Read Change Control for Personal Projects - Subversion Style in full
In this article by Aaron Winborn, we will see how to add third-party video on a site. This article talks about the advantages of third-party video hosting and how it can be achieved on websites by using Drupal. Its also gives a proper insight about the Third-Party Video providers and Embedded Media Field, which helps in hosting video from our own server.Read Third-Party Video Hosting on Drupal Websites in full
Active Directory (AD) failure, which includes corruption, is something that is dreaded by any administrator. Simply put, it means that the directory service can no longer read the Active Directory database that it has locally. This will prevent logon and authentication as well as any directory-dependent services. Essentially, it renders the domain controller (DC) useless. What's worse, though, is that several times, the replication keeps going so that the corrupted database spreads out to the other DCs.
In this article by Florian Rommel, we will look at the different options and approaches available to recover a DC that has a database corruption. In addition, this article outlines, symptoms, causes, and solutions for this scenario.Read How to Recover from an Active Directory Failure in full