Article Network

NHibernate 3.0: Using Named Queries in the Data Access Layer

by Jason Dentler | October 2010 | .NET Cookbooks Open Source Web Development

Named Queries encapsulated in query objects is a powerful combination. This article by Jason Dentler, author of NHibernate 3.0 Cookbook, shows you how to use Named Queries with your NHibernate data access layer.

The reader will benefit from the previous article, NHibernate 3.0: Working with the Data Access Layer.

Read NHibernate 3.0: Using Named Queries in the Data Access Layer in full

NHibernate 3.0: Working with the Data Access Layer

by Jason Dentler | October 2010 | .NET Cookbooks Open Source Web Development

This article series by Jason Dentler, author of NHibernate 3.0 Cookbook, shows how to build a flexible, extensible data access layer based on NHibernate and its many query APIs. There are two styles of data access layer common in today's applications. The first recipe shows the beginnings of a typical data access object. The remaining recipes show how to set up a repository-based data access layer with NHibernate's various APIs.

In these articles we will cover the following topics:

  • Transaction Auto-wrapping for the data access layer
  • Setting up an NHibernate repository
  • Using Named Queries in the data access layer
  • Using ICriteria in the data access layer
  • Using Paged Queries in the data access layer
  • Using LINQ specifications in the data access layer

Of these the first two are dealt with in this article.

Read NHibernate 3.0: Working with the Data Access Layer in full

NHibernate 3: Creating a Sample Application

by Dr. Gabriel Nicolas Schenker | September 2011 | Open Source

In this article we will see how easy it is to use NHibernate in a real world application. We will create, with minimal effort, a fully working sample that allows us to write to and subsequently, read data from a database.

In this article by Dr. Gabriel Nicolas Schenker, author of NHibernate 3 Beginner’s Guide, we shall:

  • Prepare our system to enable development of applications using NHibernate
  • Create a simple model of a problem domain
  • Create a database and define a mapping between the model and the database
  • Write and read data to and from the database
Read NHibernate 3: Creating a Sample Application in full

Ninja Topics

by Matthew Robbins | October 2013 | Open Source

This article by Matthew Robbins, author of Application Testing with Capybara, helps us in using Capybara outside Cucumber in bespoke frameworks, within popular test frameworks such as RSpec and explores some alternatives to Capybara's built-in drivers.

It seems appropriate for us to look beyond the basic API and functionality that Capybara offers. You now have all the skills required to automate your application using Capybara, regardless of whether it is a Rails/Sinatra application or a web application written using any other framework.

This article will ensure that you are comfortable using Capybara outside of Cucumber. It will also show how you can access functionality in your chosen driver that is not mapped by Capybara's API and introduce you to some of the other drivers that you may not have encountered.

Specifically, we will cover:

  • Using Capybara outside of Cucumber
  • Advanced interactions and accessing the driver directly
  • Advanced driver configuration
  • The driver ecosystem—some alternative options
Read Ninja Topics in full

Ninject Patterns and Anti-patterns

by Daniel Baharestani | September 2013 | Open Source

In this article, by Daniel Baharestani, the author of Mastering Ninject for Dependency Injection, we will learn how Ninject facilitates the implementation of Dependency Injection to solve common design problems of real-life applications in a simple and easy-to-understand format. It will teach you everything you need in order to implement Dependency Injection using Ninject in a real-life project.

Read Ninject Patterns and Anti-patterns in full

Nmap Fundamentals

by Paulino Calderón Pale | November 2012 | Cookbooks Open Source

Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities.

In this article by Paulino Calderon Pale, author of Nmap 6: Network exploration and security auditing Cookbook, we will cover:

  • Downloading Nmap from the official source code repository
  • Compiling Nmap from source code
  • Listing open ports on a remote host
  • Fingerprinting services of a remote host
  • Finding live hosts in your network
  • Scanning using specific port ranges
Read Nmap Fundamentals in full

Nokogiri

by Hunter Powers | August 2013 | Open Source Web Development

In this article by Hunter Powers, author of the book Instant Nokogiri, you will get an insight about Nokogiri the open source library to parse XML and HTML in Ruby.

Read Nokogiri in full

Non-default Magento Themes

by Richard Carter | July 2009 | PHP

In this article by Richard Carter, we've made use of default themes in Magento, and we can customize our Magento store further by using non-default themes. In particular, we'll look at:

  • Setting your non-default theme to be the one that your visitors will see
  • Creating a number of simple non-default themes
  • The theme hierarchy in Magento
Read Non-default Magento Themes in full

nopCommerce – The Public-facing Storefront

by Brandon Atkinson | August 2013 | e-Commerce Open Source

The public-facing storefront of nopCommerce is your e-commerce store. This article by Brandon Atkinson author of Getting Started with nopCommerce will cover the most important parts and generally speaking the most used parts of your site.

All examples in this article are taken from a base nopCommerce installation that used the Create sample data option during the install process.

Read nopCommerce – The Public-facing Storefront in full

Normalizing Dimensional Model

by Djoni Darmawikarta | January 2010 | Architecture & Analysis

In the Solving Many-to-many Relationship in Dimensional modeling article published in December 2009, a fact is added to solve the author-to-book many-to-many relationship in the book sales dimensional model, effectively normalizing the author out of the book dimension into its own author dimension.

In this article by Djoni Darmawikarta, we will discuss how to solve other denormalised structures in a dimensional model.

Read Normalizing Dimensional Model in full

Notifications and Events in Nagios 3.0- part2

by Wojciech Kocjan | May 2009 | Linux Servers Networking & Telephony Open Source

This is the second part of the two part series by Wojciech Kocjan in which we have covered notifications and events in Nagios 3.0. The first part covered:

In this article, we will cover the following sub-topics:

  • External Commands
  • Event Handlers
  • Modifying Notifications
  • Adaptive Monitoring

 

Read Notifications and Events in Nagios 3.0- part2 in full

Notifications and Events in Nagios 3.0-part1

by Wojciech Kocjan | May 2009 | Linux Servers Networking & Telephony Open Source

This is a 2-part series by Wojciech Kocjan. We have made an attempt to cover all about events and notifications in Nagios 3.0 in detail in this series. The following sub-topics will be covered as a part of this series:

  • Effective Notifications
  • Escalations
  • External Commands
  • Event Handlers
  • Modifying Notifications
  • Adaptive Monitoring

 

Read Notifications and Events in Nagios 3.0-part1 in full

NumPy: Commonly Used Functions

by Ivan Idris | November 2011 | Open Source

NumPy (from Numerical Python) is an open source Python library for scientific computing. NumPy lets you work with arrays and matrices in a natural way. The library contains a long list of useful mathematical functions including some for linear algebra, Fourier transformation, and random number generation routines.

In this article by Ivan Idris, author of Numpy Beginners Guide, we shall cover the following topics:

  • Functions working on arrays
  • Loading arrays from files
  • Writing arrays to files
  • Simple mathematical and statistical functions
Read NumPy: Commonly Used Functions in full

NumPy: Commonly Used Functions

by Ivan Idris | November 2011 | Open Source

NumPy (from Numerical Python) is an open source Python library for scientific computing. NumPy lets you work with arrays and matrices in a natural way. The library contains a long list of useful mathematical functions including some for linear algebra, Fourier transformation, and random number generation routines.

In this article by Ivan Idris, author of Numpy Beginners Guide, we shall cover the following topics:

  • Functions working on arrays
  • Loading arrays from files
  • Writing arrays to files
  • Simple mathematical and statistical functions
Read NumPy: Commonly Used Functions in full

OAuth Authentication

by Waylon Kenning | September 2013 | Open Source Oracle

Open Source Identity Management Patterns and Practices Using OpenAM 10.x shows how authentication and authorization can be managed using OpenAM, guiding you through the process of installing and configuring the application in a series of prototypes. Key concepts and technologies are covered giving you broad knowledge of the different areas of Identity Management, as well as specific examples of using Identity Management technologies such as OAuth and OATH.

This article by, Waylon Kenning, the author of Open Source Identity Management Patterns and Practices Using OpenAM 10.x, explains how to:

  • Use Facebook as OAuth provider
  • Configure OAuth module
Read OAuth Authentication in full

Objects and Types in Documentum 6.5 Content Management Foundations

by Pawan Kumar | June 2010 | Enterprise Articles

In this article series by Pawan Kumar, author of Documentum 6.5 Content Management Foundations, we will explore the following concepts:

  • Objects and types
  • Type hierarchies and type categories
  • Object and content persistence
  • Lightweight and shareable object types
  • Aspects
  • Querying objects
Read Objects and Types in Documentum 6.5 Content Management Foundations in full

Objects and Types in Documentum 6.5 Content Management Foundations- A Sequel

by Pawan Kumar | June 2010 | Enterprise Articles

In this article by Pawan Kumar, author of Documentum 6.5 Content Management Foundations, we will explore the following concepts:

  • Object and content persistence
  • Lightweight and shareable object types
  • Aspects
  • Querying objects

In the previous part of this article series—Objects and Types in Documentum 6.5 Content Management Foundations, we learnt about:

  • Objects and types
  • Type hierarchies and type categories

 

Read Objects and Types in Documentum 6.5 Content Management Foundations- A Sequel in full

Objects in Python

by Dusty Phillips | July 2010 | Open Source

Let's have a look at the Python syntax that allows us to create object-oriented software. In this article by Dusty Phillips, Author of Python 3 Object Oriented Programming we will understand:

  • How to create classes and instantiate objects in Python
  • How to add attributes and behaviors to Python objects
  • How to organize classes into packages and modules
Read Objects in Python in full

Obtaining a binary backup

by Shaun M. Thomas | April 2013 | Open Source

This article by Shaun M. Thomas, from the book, Instant PostgreSQL Backup and Restore How-to explains about another backup method available to PostgreSQL, which is a base backup, which consists of the actual data files themselves. These kinds of backups do not need to be restored, only uncompressed or copied. Using them can be more complicated, but they can be ready much faster depending on the database size. The developers have kindly provided pg_basebackup as a simple starting point.

Read Obtaining a binary backup in full

Obtaining Alfresco Web Content Management (WCM)

by Jeff Potts | November 2008 | Content Management Open Source

People have been using Alfresco to manage web content since the early days of the product. In 2007, Alfresco released its formal web content management functionality that added features most people expect when they think of a Web Content Management (WCM) offering, including templating, site preview, snapshots, virtualization, and deployment. WCM is a specialized subset of the larger Enterprise Content Management (ECM) umbrella that is focused specifically on authoring, managing, and publishing files used to produce a website.

In this article by Jeff Potts, we will discuss how to create a web project and define web forms using XML Schema to allow non-technical users to create content.

Read Obtaining Alfresco Web Content Management (WCM) in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software