Article marketing means that you will write articles about your field of interest and distribute them for publication on other websites, blogs, and ezines with a link back to your site. Each time your article is published on a website you get a one-way link to your site.
By publishing articles in your own online store, you not only get better indexed by search engines, but what's more important provide useful information to your customers who may be seeking for it.
In this article by Vadym Gurevych, we will see how to use the articles for the purpose of marketing and improve the sales.
Read Article Marketing on CMS, Blogs, and Online Magazines to Improve Sales in full
In this article, author Markus Feilner shows how to create X509 server and client certificates for use with OpenVPN. We will learn to create a certificate authority, and sign and distribute new certificates. We will use easy-rsa, which comes with OpenVPN and exists both for Windows and Linux. This tool allows creation and administration of certificates that have to be transferred to the machines that are supposed to take part in the VPN.Read Setting Up OpenVPN with X509 Certificates in full
Welcome to the fourth and the last article in the Python LDAP applications series by Matt Butcher. In previous three articles we have seen the installation and configuration of Python-LDAP library, and the binding-unbinding operations, and changing of the LDAP password as well as LDAP operations, and LDAP URL library and some more LDAP operations.
In this article, we will take a brief look at what might be the most complex module in the Python-LDAP API, the ldap.schema module.Read Python LDAP Applications: Part 4 - LDAP Schema in full
Joomla! is currently designed to use the MySQL database. However, the architecture does allow for the implementation of other database drivers. There is some uncertainty surrounding the issue of supporting other databases, because of the usage of functions and syntax, in queries, which is specific to MySQL.
This article by James Kennard takes a look at the role of the database in Joomla!. It defines some standard rules we need to abide by.Read Joomla! and Database in full
As we know, DBIx::Class can provide a powerful interface to your data. Sometimes, however, DBIx::Class is not the right tool for the job. Situations often arise in which your application won't be able to access database tables directly and instead you'll need to access data through predefined stored procedures. In this case, DBIx::Class would be useless as you aren't able to read and modify objects with the usual SELECT, INSERT, UPDATE, and DELETE command set—everything must be done by calling a procedure and reading back the result. In other cases, your data won't be in a database at all. You might instead choose to store and retrieve information from files in a directory.
In this article, author Jonathan Rockway covers three common cases—mixing a procedural interface with a relational DBIx::Class interface, writing a database interface without DBIx:: Class, and building a custom Model that doesn't use a database at all.Read Catalyst Web Framework: Building Your Own Model in full
With the Lotus Notes 8 client comes a new suite of productivity tools which support the OASIS Open Document Format (ODF). ODF is an international standard that provides support for multiple file formats for word processing, presentations, and spreadsheets. By adopting this format, IBM has allowed Notes users to read and save documents in the Microsoft Office format as well as read from IBM Lotus SmartSuite documents. Both can be saved as ODF documents or as PDF format documents.
The advantage of using the productivity tools with ODF is that you no longer have to purchase an application from a single vendor in order to share and save your documents. Using a non commercial ODF product, will allow you to avoid having to maintain licenses, and also allow you to stop worrying about your software reaching the end of its shelf life. These benefits can lead to a lower TCO for maintaining software for document-based data.
In this article, the authors provide an overview of the three productivity tools that are provided with the client:Read Lotus Notes 8 — Productivity Tools in full
This is the third article in the article mini-series on Python LDAP applications by Matt Butcher. The first part deals with the installation and configuration of Python-LDAP library, and the binding-unbinding operations, and changing of the LDAP password. The second article takes a look at some of LDAP operations.
In this article we will see some more LDAP operations such as add operation, delete operation etc. Then we will take a look at LDAP URL Library.Read Python LDAP Applications: Part 3 - More LDAP Operations and the LDAP URL Library in full
The aim of this Photoshop Foundation series is to give both beginners, and more experienced users, all the information they need to use Photoshop as efficiently as possible. This series aims to both, guide you through the more confusing aspects of Photoshop, and show you the very best ways to use this application.
In this first article, we are going to look at the difference between vector and bitmap graphics, which is one of the most important principles to understand when working with graphics on a computer, inside or outside of Photoshop.Read Photoshop Foundation - The Difference between Vector and Bitmap Graphics in full
The web services model brings into the system unique security challenges because the business data in the form of XML documents may be required to travel across untrusted networks and has the chance of being manipulated by external systems.
Throughout the entire business transaction, different classes of users and systems need access to the entire business transaction. If any part of this chain is compromised, the whole business application deployed as a service will fail. Web services are inherently about how to share the process of computing across a distributed network of systems. Web services' communication channel being XML, messages are text-based, readable, and self describing.Read Securing XML Documents in full
This is the second article in the article mini-series on Python LDAP applications by Matt Butcher. For first part please visit this link.
In this article we will see some of the LDAP operations such as compare operation, search operation. We will also see how to change an LDAP password.Read Python LDAP Applications: Part 2 - LDAP Opearations in full
Planning is a key element of any IT implementation, but planning can only be accomplished with an understanding of the technical underpinnings of the proposed solution. In this article, authors Mitesh Desai and Dan Renfroe delve more deeply into the technical architecture of BES in order to provide you with an understanding of what’s under the hood. This article also covers the system requirements and pre-requisites for a BES implementation, including operating system, hardware, network, and database requirements.Read BlackBerry: BES Architecture and Implementation Planning in full
Python LDAP Applications: Part 1 - Installing and Configuring the Python-LDAP Library and Binding to an LDAP Directory
This article mini-series by Matt Butcher will look at the Python application programmers interface (API) for the LDAP libraries, and using this API, we will connect to our OpenLDAP server and manipulate the directory information tree. More specifically, we will cover the following in this article series:
- Installing and configuring the Python-LDAP library.
- Binding to an LDAP directory.
- Comparing attributes between the client and server.
- Performing searches on the directory.
- Modifying the directory information tree with add, delete, and modify operations.
- Modifying directory passwords.
- Working with LDAP schemas.
This first part will deal with installation and configuration of the Python-LDAP library. We will then see how the binding operation is performed.Read Python LDAP Applications: Part 1 - Installing and Configuring the Python-LDAP Library and Binding to an LDAP Directory in full
LINQ to Objects means that we can use LINQ to query objects in a collection. We can access the in-memory data structures using LINQ. We can query any type of object that implements the IEnumerable interface or IEnumerable
In this article, author N. Satheesh Kumar shows us how to query different objects using LINQ operators and avoid having to use the looping method to filter the values in a collection.Read LINQ to Objects in full
Objects confused me when I started to use CodeIgniter. I came to CodeIgniter via PHP 4, which is a procedural language, not really an Object-Oriented (OO) language. I duly looked up objects and methods, properties and inheritance, and encapsulation, but my early attempts to write CI code were plagued by the error message "Call to a member function on a non-object". I saw it so often that I was thinking of having it printed on a t-shirt: it has a mysteriously libertarian, anarchist tone, and I could see myself wearing it at a modern art exhibition.
This is the geek article. It describes the way CodeIgniter actually works, 'under the hood'. If you are new to CI, you may want to skip it. However, sooner or later, you may want to understand why things happen in certain ways—as opposed to just knowing that they do.Read CodeIgniter and Objects in full
Integration is a necessary evil using which we can interconnect systems, applications and services to facilitate seamless information flow within and across Organization boundaries. We have been using technologies like JSP, EJB, JMS, etc. in the Java world for building Enterprise Applications (EA). But if we have to interconnect such applications, we will need Enterprise Application Integration (EAI). Many a times we also use EA technologies and tools to do EAI. This will give a short term solution to our integration problems, which may not scale up when we want to perform integration at Enterprise (Customers, Vendors, Partners, ...) level. Java Business Integration (JBI) is the new specification trying to fill this gap of EAI in the Java world. So next time when you want to integrate, don't write a single line of Java code, instead plug and assemble JBI based integration libraries to control your message flow! Does it looks promising? Believe it or read the article below to get yourself convinced.
In this article by Binildas Christudas, we will look into Integration in general and to JBI and ESB in particular. We will then explain few functionalities usually done by integration components like protocol conversions, content transformations, etc., with some code snippets too.Read Aggregate Services in ServiceMix JBI ESB in full